计算机科学 ›› 2022, Vol. 49 ›› Issue (9): 340-346.doi: 10.11896/jsjkx.220300238

• 信息安全 • 上一篇    下一篇

压缩差值后的双直方图平移可逆信息隐藏方法

郝洁, 平萍, 付德银, 赵红泽   

  1. 河海大学计算机与信息学院 南京 211100
  • 收稿日期:2022-03-25 修回日期:2022-06-03 出版日期:2022-09-15 发布日期:2022-09-09
  • 通讯作者: 平萍(pingpingnjust@163.com)
  • 作者简介:(haojie01016@163.com)
  • 基金资助:
    国家自然科学基金(61902110)

Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences

HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze   

  1. School of Computer & Information,Hohai University,Nanjing 211100,China
  • Received:2022-03-25 Revised:2022-06-03 Online:2022-09-15 Published:2022-09-09
  • About author:HAO Jie,born in 1998,postgraduate,is a member of China Computer Federation.Her main research interests include reversible data hiding and so on.
    PING Ping,born in 1982,Ph.D,asso-ciate professor.Her main research in-terests include network and information security.
  • Supported by:
    National Natural Science Foundation of China(61902110).

摘要: 基于直方图平移(Histogram Shifting,HS)的可逆信息隐藏(Reversible Data Hiding,RDH)是目前信息隐藏中最为普遍的技术,特别是对于结合了差值扩展和直方图平移的方法来说,可以实现较高的嵌入容量和较低的图像失真。文中提出了一种压缩差值后的双直方图平移的可逆信息隐藏方法。该算法通过综合压缩、差值及优化后的直方图平移这3种方法,改进了现有基于直方图平移方法嵌入容量不够大的缺陷,同时也给出了图像像素值在平移过程中产生溢出的处理方式。在接收端,不仅能够完整地提取数据,也能够进行无损的图像恢复。将所提方法与当前流行的4种方法进行了比较,所提方法在嵌入容量方面优于现有的基于直方图平移的算法,其嵌入容量与近年的4种方法相比提升了 23%,11%,57%和93%。实验结果表明,所提方法的嵌入容量大幅增加,能够有效地实现大嵌入容量的可逆信息隐藏。

关键词: 压缩, 差值, 直方图平移, 双峰值, 可逆数据隐藏

Abstract: Reversible data hiding(RDH) based on histogram shifting(HS) is the most common technology in current information hiding,especially for the combined method of difference extension and histogram shifting,which can achieve high embedding capacity and low image distortion.In this paper,a reversible information hiding method of bi-histogram shifting after compressed difference is proposed.The algorithm improves the defect of insufficient embedding capacity of the existing method based on histogram shifting by synthesizing three methods of compression,difference and optimized histogram shifting.At the same time,the processing method for the overflow of the image pixel value in the shifting process is also given.At the receiving end,not only can the data be completely extracted,but also lossless image recovery can be performed.After the experiment,a comparison is made with the four current popular schemes.Our method outperforms existing histogram shifting based algorithms in terms of embedding capacity.Compared with other methods,its embedded capacity improves by 23%,11%,57% and 93%.Experimental results show that the proposed method greatly increases the embedding capacity and can effectively realize reversible information hiding with large embedding capacity.

Key words: Compression, Difference, Histogram shifting, Double peak, Reversible data hiding

中图分类号: 

  • TP391
[1]LU W,HE L,YEUNG Y,et al.Secure binary image stegano-graphy based on fused distortion measurement[J].IEEE Transa-ctions on Circuits and Systems for Video Technology,2018,29(6):1608-1618.
[2]WANG Z,QIAN Z,ZHANG X,et al.On improving distortion functions for jpeg steganography[J].IEEE Access,2018(6):74917-74930.
[3]QIN C,JI P,ZHANG X,et al.Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J].Signal Process,2017(138):280-293.
[4]YUAN X C,LI M.Local multi-watermarking method based on robust and adaptive feature extraction[J].Signal Process,2018(149):103-117.
[5]QIAN Z X,ZHOU H,ZHANG W M,et al.Robust steganography using texture synthesis[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Cham:Sprin-ger,20177:25-33.
[6]SHI Y Q,LI X D,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237.
[7]LI X L,ZHANG W M,GUI X L,et al.Efficient Reversible Data Hiding Based on Multiple Histograms Modification[J].IEEE Transactions on Information Forensics and Security,2015,10(9):2016-2017.
[8]ZENG X T,LI Z,PING L D.Reversible data hiding schemeusing reference pixel and multilayer embedding[J].AEU-International Journal of Electronics and Communications,2012,66(7):532-539.
[9]ZHANG T C,HOU T S,WENG S W,et al.Adaptive reversible data hiding with contrast enhancement based on multi-histogram modification[J/OL].IEEE Transactions on Circuits and Systems for Video Technology,2022.https://ieeexplore.ieee.org/document/9691384.
[10]BARTON J M.Method and apparatus for embedding authentication information within digital data:US Patent,564997[P].1997-07-08.
[11]WEINBERGER M J,RISSANEN J J,ARPS R B.Applications of universal context modeling to lossless compression of gray-scale images[J].IEEE Transactions on Image Processing,1996,5(4):575-586.
[12]ZHANG W M,HU X C,LI X L,et al.Recursive HistogramModification:Establishing Equivalency Between Reversible Data Hiding and Loss less Data Compression[J].IEEE Transactions on Image Processing,2013,22(7):2775-2785.
[13]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[14]OU B,LI X L,WANG J W.High-fidelity reversible data hiding based on pixel value-ordering and pairwise prediction error expansion[J].Journal of Visual Communication and Image Representation,2016(39):12-23.
[15]WANG J X,NI J Q,ZHANG X,et al.Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting[J].IEEE Transactions on Cybernetics,2017,47(2):315-326.
[16]TANG J R,ISA N A M.Bi-histogram equalization using modified histogram bins[J].Applied Soft Computing,2017(55):31-43.
[17]WANG J X,CHEN X,NI J Q,et al.Multiple Histograms Based Reversible Data Hiding:Framework and Realization[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,30(8):2313-2328.
[18]TIAN J.Reversible watermarking by difference expansion[J/OL].Proceedings of Workshop on Multimedia & Security,2002.https://www.researchgate.net/publication/228809844_Reversible_watermarking_by_difference_expansion.
[19]HSU F H,WU M H,WANG S J.Reversible data hiding using side-match predictions on steganographic images[J].Multimedia Tools and Applications,2013,67(3):571-591.
[20]CHEN Y H,HUANG H C,LIN C C.Block-based reversible data hiding with multi-round estimation and difference alteration[J/OL].Multimedia Tools and Applications,2015:1-26.https://link.springer.com/article/10.1007/s11042-015-2825-9.
[21]TSAI Y Y,TSAI D S,LIU C L.Reversible data hiding scheme based on neighboring pixel differences[J].Digital Signal Process,2013,23(3):919-927.
[22]HU Y,LEE H,LI J.DE-Based Reversible Data Hiding WithImproved Overflow Location Map[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(2):250-260.
[23]THODI D M,RODRIGUEZ J J.Expansion Embedding Techniques for Reversible Watermarking[J].IEEE Transactions on Image Processing,2007,16(3):721-730.
[24]NGUYEN T S,CHANG C C,HUYNH N T.A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm[J].Journal of Visual Communication and Image Representation,2015(33):389-397.
[25]XUE B,LI X,WANG J,et al.Improved reversible data hiding based on two-dimensional difference-histogram modification[J].Multimedia Tools and Applications,2016,76(11):1-19.
[26]ARHAM A,HUGROHO H A,ADJI T B.Multiple layer data hiding scheme based on difference expansion of quad☆[J].Signal Processing,2017(137):52-62.
[27]NI Z C,SHI Y Q,ANASRI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Techno-logy,2006,16(3):354-362.
[28]FALLAHPOUR M,SEDAAGHI M H.High capacity losslessdata hiding based on histogram modification[J].IEICE Electron Express,2007,4(7):205-210.
[29]TSAI P,HU Y C,YEH H L.Reversible image hiding schemeusing predictive coding and histogram shifting[J].Signal Proces-sing,2009,89(6):1129-1143.
[30]BISWAS T,HASAN M M,DEBNATH T.A New Method of Reversible Data Hiding Based on Compressed Gray Level Histogram Shifting[C]//2016 3rd International Conference on Electrical Engineering and Information Communication Technology.IEEE,2016:1-6.
[31]JUNG K H.A high-capacity reversible data hiding scheme based on sorting and prediction in digital images[J].Multimedia Tools and Applications,2017,76(11):13127-13137.
[32]JIA Y J,YIN Z X,ZHANG X P,et al.Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting[J].Signal Processing,2019(163):238-246.
[33]PAN Z B,GAO X Y,GAO E,et al.Adaptive Complexity for Pixel-Value-Ordering Based Reversible Data Hiding[J].IEEE Signal Processing Letters,2020(27):912-919.
[1] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[2] 楚玉春, 龚航, 王学芳, 刘培顺.
基于YOLOv4的目标检测知识蒸馏算法研究
Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4
计算机科学, 2022, 49(6A): 337-344. https://doi.org/10.11896/jsjkx.210600204
[3] 武霖, 孙静宇.
多分支RA胶囊网络及在图像分类中的应用
Multi-branch RA Capsule Network and Its Application in Image Classification
计算机科学, 2022, 49(6): 224-230. https://doi.org/10.11896/jsjkx.210400087
[4] 程祥鸣, 邓春华.
基于无标签知识蒸馏的人脸识别模型的压缩算法
Compression Algorithm of Face Recognition Model Based on Unlabeled Knowledge Distillation
计算机科学, 2022, 49(6): 245-253. https://doi.org/10.11896/jsjkx.210400023
[5] 陈志文, 王坤, 周广蕴, 王旭, 张晓丹, 朱虎明.
基于胶囊网络及其权重剪枝的SAR图像变化检测方法
SAR Image Change Detection Method Based on Capsule Network with Weight Pruning
计算机科学, 2021, 48(7): 190-198. https://doi.org/10.11896/jsjkx.200800225
[6] 钱心缘, 吴文渊.
基于R-SIS和R-LWE构建的IBE加密方案
Identity-based Encryption Scheme Based on R-SIS/R-LWE
计算机科学, 2021, 48(6): 315-323. https://doi.org/10.11896/jsjkx.200700215
[7] 刘东, 王叶斐, 林建平, 马海川, 杨闰宇.
端到端优化的图像压缩技术进展
Advances in End-to-End Optimized Image Compression Technologies
计算机科学, 2021, 48(3): 1-8. https://doi.org/10.11896/jsjkx.201100134
[8] 孙彦丽, 叶炯耀.
基于剪枝与量化的卷积神经网络压缩方法
Convolutional Neural Networks Compression Based on Pruning and Quantization
计算机科学, 2020, 47(8): 261-266. https://doi.org/10.11896/jsjkx.190700062
[9] 丁青锋, 奚韬, 连义翀, 吴泽祥.
基于物理层安全的空间调制系统天线选择算法
Antenna Selection for Spatial Modulation Based on Physical Layer Security
计算机科学, 2020, 47(7): 322-327. https://doi.org/10.11896/jsjkx.190600133
[10] 蒋文斌, 符智, 彭晶, 祝简.
一种基于4Bit编码的深度学习梯度压缩算法
4Bit-based Gradient Compression Method for Distributed Deep Learning System
计算机科学, 2020, 47(7): 220-226. https://doi.org/10.11896/jsjkx.200300097
[11] 尚进跃, 毕秀丽, 肖斌, 李伟生.
基于DCT系数哈希的图像篡改检测算法
Image Forgery Detection Based on DCT Coefficients Hashing
计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081
[12] 倪晓军, 佘戌豪.
面向无线传感网络应用的改进LZW算法
Improvement of LZW Algorithms for Wireless Sensor Networks
计算机科学, 2020, 47(5): 260-264. https://doi.org/10.11896/jsjkx.190400108
[13] 郑哲, 胡庆浩, 刘青山, 冷聪.
量化权值激活的生成对抗网络
Quantizing Weights and Activations in Generative Adversarial Networks
计算机科学, 2020, 47(5): 144-148. https://doi.org/10.11896/jsjkx.190700176
[14] 刘玉红,刘树英,付福祥.
基于卷积神经网络的压缩感知重构算法优化
Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network
计算机科学, 2020, 47(3): 143-148. https://doi.org/10.11896/jsjkx.190100199
[15] 田伟, 刘浩, 陈根龙, 宫晓蕙.
面向分块压缩感知的交叉子集导引自适应观测
Cross Subset-guided Adaptive Measurement for Block Compressive Sensing
计算机科学, 2020, 47(12): 190-196. https://doi.org/10.11896/jsjkx.200800197
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!