|
基于信息隐藏的新型图像保护方案
|
Abstract:
本文提出了一种新型的利用信息隐藏技术进行图像保护的方案。在该方案中,我们从原始图像中选取一些像素组成信息图像,并将未被选中的像素点构成的图像称之为剩余图像。对信息图像中像素点的离散余弦变换结果进行量化和编码,再将得到的码流压缩后的结果嵌入到缩略图中。最后,将嵌入数据的缩略图在公开信道中传输。在接收端,具有权限的接收者可以在预览缩略图后使用密钥重建原始图像。在仿真实验中,重建图像的PSNR值达到了40 dB,这表明我们的方法具有较低的图像失真率。此外,文中所提出的方法可以实现高数据压缩率和低运行时间。
This study proposes a new type of copyright protection scheme using information hiding technology. In the scheme, we select some pixels from the original image to form an information image, and a thumbnail of the original image is composed of the residual pixels. Quantizing and encoding the result of the discrete cosine transform (DCT) of the pixels in the information image, then obtained code stream is compressed and embedded in the thumbnail. Finally, the thumbnail with embedded data is transmitted in public channel. And recipients with permission can reconstruct the original image using the key after previewing the image. In the simulation experiment, the PSNR value of restored image reached 40 dB which shows that our method can improve the image quality. Besides, the proposed method can achieve high data compression rate and low running time.
[1] | Dabeer, O., Sullivan, K. and Madhow, U. (2004) Detection of Hiding in the Least Significant Bit. The IEEE Transactions on Signal Processing, 52, 3046-3058. https://doi.org/10.1109/TSP.2004.833869 |
[2] | Celik, M., Sharma, G. and Tekalp, A. (2005) Lossless Generalized-LSB Data Embedding. IEEE Transactions on Image Processing, 14, 253-266. https://doi.org/10.1109/TIP.2004.840686 |
[3] | Solak, S. (2020) High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms. IEEE Access, 8, 166513-166524. https://doi.org/10.1109/ACCESS.2020.3023197 |
[4] | Li, X., Yang, B. and Cheng, D. (2009) A Generalization of LSB Matching. The IEEE Signal Processing Letters, 16, 69-72. https://doi.org/10.1109/LSP.2008.2008947 |
[5] | Hua, G., Xiang, Y. and Bi, G. (2016) When Compressive Sensing Meets Data Hiding. The IEEE Signal Processing Letters, 23, 473-477. https://doi.org/10.1109/LSP.2016.2536110 |
[6] | Xiao, D., Li, F. and Wang, M. (2020) A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery. The IEEE Signal Processing Letters, 27, 296-300.
https://doi.org/10.1109/LSP.2020.2967593 |
[7] | Fan, Y., Liao, Y. and Li, F. (2019) Identity-Based Auditing for Shared Cloud Data with Efficient and Secure Sensitive Information Hiding. IEEE Access, 7, 114246-114260. https://doi.org/10.1109/ACCESS.2019.2932430 |
[8] | Li, Y., Yao, S. and Yang, K. (2019) A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for Jpeg Images. IEEE Access, 7, 73573-73582. https://doi.org/10.1109/ACCESS.2019.2920178 |
[9] | Qiu, Y., Qian, Z. and Yu, L. (2016) Adaptive Reversible Data Hiding by Extending the Generalized Integer Transformation. The IEEE Signal Processing Letters, 23, 130-134. https://doi.org/10.1109/LSP.2015.2504464 |
[10] | He, J., Chen, J. and Luo, W. (2019) A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted Jpeg Bitstreams. IEEE Transactions on Circuits and Systems for Video Technology, 29, 3501-3515.
https://doi.org/10.1109/TCSVT.2018.2882850 |
[11] | Pitas, I. (1998) A Method for Watermark Casting on Digital Image. IEEE Transactions on Circuits and Systems for Video Technology, 8, 775-780. https://doi.org/10.1109/76.728421 |
[12] | Loan, N.A., Hurrah, N.N. and Parah, S.A. (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access, 6, 19876-19897. https://doi.org/10.1109/ACCESS.2018.2808172 |
[13] | Chen, Z., Li, L. and Peng, H. (2018) A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization. IEEE Transactions on Multimedia, 20, 1973-1986. https://doi.org/10.1109/TMM.2018.2794985 |
[14] | Hu, W.W., Zhou, R.G. and El-Rafei, A. (2019) Quantum Image Watermarking Algorithm Based on HAAR Wavelet Transform. IEEE Access, 7, 121303-121320. https://doi.org/10.1109/ACCESS.2019.2937390 |
[15] | Huang, Y., Niu, B. and Guan, H. (2019) Enhancing Image Watermarking with Adaptive Embedding Parameter and PSNR Guarantee. IEEE Transactions on Multimedia, 21, 2447-2460. https://doi.org/10.1109/TMM.2019.2907475 |
[16] | Liu, X.L., Lin, C.C. and Yuan, S.M. (2018) Blind Dual Watermarking for Color Images Authentication and Copyright Protection. IEEE Transactions on Circuits and Systems for Video Technology, 28, 1047-1055.
https://doi.org/10.1109/TCSVT.2016.2633878 |
[17] | Chang, C.S. and Shen, J.J. (2017) Features Classification Forest: A Novel Development That Is Adaptable to Robust Blind Watermarking Techniques. IEEE Transactions on Image Processing, 26, 3921-3935.
https://doi.org/10.1109/TIP.2017.2706502 |
[18] | Menendez-Ortiz, A., Feregrino-Uribe, C. and Hasimoto-Beltran, R.A. (2019) Survey on Reversible Watermarking for Multimedia Content: A Robustness Overview. IEEE Access, 7, 132662-132681.
https://doi.org/10.1109/ACCESS.2019.2940972 |
[19] | Sadreazami, H. and Amini, M. (2019) A Robust Image Watermarking Scheme Using Local Statistical Distribution in the Contourlet Domain. IEEE Transactions on Circuits and Systems II: Express Briefs, 66, 151-155.
https://doi.org/10.1109/TCSII.2018.2846547 |
[20] | Ernawan, F. and Kabir, M.N. (2019) An Improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments. IEEE Access, 7, 151985-152003. https://doi.org/10.1109/ACCESS.2019.2948086 |
[21] | Zhang, X. and Zhang, W. (2015) Semantic Image Compression Based on Data Hiding. IET Image Processing, 9, 54-61.
https://doi.org/10.1049/iet-ipr.2014.0321 |