Computer Science ›› 2015, Vol. 42 ›› Issue (3): 162-166.doi: 10.11896/j.issn.1002-137X.2015.03.034

Previous Articles     Next Articles

Artificial Image Security Degradation Algorithm Based on Invertible Information Hiding in Spatial Domain

LEI Zheng-qiao and XIAO Di   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to meet the requirement of the digital image business model of try with option to buy,we proposed an artificial image security degradation algorithm based on invertible information hiding in spatial domain.The algorithm uses histogram shifting method of lossless hiding to embed the compensation matrix for recovering the original image precisely.By controlling the embedding depth,the algorithm can generate publishing image which has large distortion but also keeps the main information of the original image.The scrambling and encryption methods are used in the algorithm so that the invaders can not recover the original image correctly by brute-force method without authorized files.The experiment results demonstrate that the algorithm can not only obtain the publishing image which has big differences with the original one,but also recover the exact image when security permission is released.

Key words: Image artificial degradation,Lossless hiding,Control factor,Histogram shifting,Authorized files

[1] 赵亮,廖晓峰,向涛,等.基于Z矩阵映射和选择加密的彩色图像退化算法研究[J].物理学报,2010,59(3):1507-1523
[2] Huang H-C,Chang F-C,Fang W-C.Reversible Data Hidingwith Histogram-Based Difference Expansion for QR code Application[J].IEEE Transactions on Consumer Electronics,2010,57(7):779-787
[3] Wang J X,LU Z M.A Path Optional Lossless Data HidingScheme Based on VQ Joint Neighboring Coding[J].Information Sciences,2009,9(9):3332-3348
[4] Jung S W,Ha L T,Ko S J.A new histogram modification based reversible data hiding algorithm considering the human visual system[J].IEEE Signal Processing Letters,2011,8(2):721-724
[5] Lin C C,Tai W L,Chang C C.Multilevel Reversible Data Hiding Based on Histogram Modification of difference images[J].Pattern Recognition,2009,1(12):3582-3591
[6] 柳玲,陈同孝,曹晨,等.一种随机嵌入抗SPAM检测的可逆数据隐藏算法[J].计算机应用研究,2013,0(7):2111-2114
[7] 邱应强.一种大嵌入容量的可逆数据隐藏方法[J].计算机应用研究,2014,1(3):850-852
[8] Deng C,Gao X B,Li X L,et al.A local Tchebichef moments-based robust image watermarking[J].Signal Processing,2009,89(8):1531-1539
[9] Gao X-B,Deng C,et al.Geometric distortion insensitive image watermarking in affine covariant regions[J].IEEE Transactions on System,Man and Cybernetics,2010,40(3):278-286
[10] 肖旭韬,张雪锋.基于线性反馈移位寄存器和组合猫映射的伪随机序列生成方法[J].计算机应用研究,2013,0(1):161-164

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!