Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (1): 107-116.doi: 10.19665/j.issn1001-2400.2021.01.012
Previous Articles Next Articles
QIU Yingqiang1(),CAI Canhui1(),ZENG Huanqiang1(),FENG Gui1(),LIN Xiaodan1(),QIAN Zhenxing2()
Received:
2020-08-14
Online:
2021-02-20
Published:
2021-02-03
CLC Number:
QIU Yingqiang,CAI Canhui,ZENG Huanqiang,FENG Gui,LIN Xiaodan,QIAN Zhenxing. Joint reversible data hiding in encrypted images with the self-correcting ability[J].Journal of Xidian University, 2021, 48(1): 107-116.
"
方法 | Lena | Baboon | Man | Lake | Goldhill | Boats | Couple | Tiffany |
---|---|---|---|---|---|---|---|---|
文献[ | 1 156 | 196 | 625 | 1 024 | 784 | 1 024 | 1 024 | 900 |
文献[ | 1 296 | 225 | 900 | 1 296 | 1 764 | 1 764 | 1 396 | 1 153 |
文献[ | 1 296 | 225 | 784 | 1 024 | 784 | 1 296 | 1 396 | 784 |
文献[ | 3 897 | 629 | 3 630 | 2 094 | 2 434 | 2 434 | 3 723 | 1 497 |
本文方法 | 98 304 | 65 536 | 98 304 | 65 536 | 98 304 | 98 304 | 98 304 | 98 304 |
"
图像 | 翻转最低 有效位位数 | 数据嵌入量/bit | |||||||
---|---|---|---|---|---|---|---|---|---|
1 536 | 3 072 | 6 144 | 12 288 | 24 576 | 49 152 | 65 536 | 98 304 | ||
Lena | 2 | 44.593 3 | 44.436 4 | 44.391 3 | 44.152 0 | 43.208 1 | 39.227 9 | 36.080 1 | 30.830 8 |
3 | 38.464 7 | 38.412 2 | 38.389 9 | 38.444 1 | 38.337 7 | 37.357 4 | 36.178 2 | 32.577 6 | |
Baboon | 2 | 43.774 2 | 43.187 0 | 41.775 9 | 38.792 1 | 33.766 6 | 28.129 3 | 25.271 0 | |
3 | 38.308 7 | 38.150 5 | 37.802 1 | 36.757 9 | 33.492 2 | 28.429 3 | 25.762 3 | ||
Man | 2 | 44.523 4 | 44.334 7 | 44.006 2 | 43.103 2 | 40.389 4 | 34.859 1 | 31.574 3 | 25.690 0 |
3 | 38.334 5 | 38.248 3 | 38.221 7 | 38.130 7 | 37.556 6 | 34.950 5 | 32.542 0 | 27.461 2 | |
Lake | 2 | 44.560 3 | 44.343 0 | 43.984 5 | 43.048 2 | 40.214 2 | 33.666 8 | 30.193 5 | |
3 | 38.414 4 | 38.321 5 | 38.300 6 | 38.140 3 | 37.409 6 | 33.895 1 | 31.041 9 | ||
Goldhill | 2 | 44.612 0 | 44.420 2 | 43.886 3 | 42.484 1 | 39.735 7 | 34.004 8 | 30.803 5 | 25.047 9 |
3 | 38.471 9 | 38.405 0 | 38.353 9 | 38.142 8 | 37.332 4 | 34.188 9 | 31.595 0 | 26.383 1 | |
Boats | 2 | 44.180 6 | 43.911 6 | 43.491 3 | 42.482 6 | 39.544 8 | 33.772 4 | 30.319 5 | 24.506 4 |
3 | 38.439 6 | 38.373 1 | 38.295 5 | 38.135 1 | 37.269 1 | 33.905 8 | 31.021 0 | 25.728 2 | |
Couple | 2 | 44.436 6 | 44.183 2 | 43.644 0 | 42.274 9 | 38.909 7 | 32.626 8 | 29.396 9 | |
3 | 38.410 1 | 38.334 3 | 38.243 3 | 38.047 7 | 37.050 0 | 33.107 6 | 30.191 5 | 24.643 5 | |
Tiffany | 2 | 44.320 3 | 44.126 9 | 43.724 5 | 42.892 0 | 40.319 6 | 35.008 0 | 31.690 6 | 26.327 3 |
3 | 38.411 4 | 38.323 8 | 38.279 9 | 38.151 2 | 37.628 9 | 34.945 7 | 32.580 6 | 27.672 0 |
"
方法 | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文中方法 |
---|---|---|---|---|---|---|---|---|---|---|---|
嵌入方式 | VRAE | VRBE | VRBE | VRBE | VRBE | VRBE | VRAE | VRAE | VRAE | VRAE | VRAE |
提取方式 | 分离式 | 分离式 | 分离式 | 分离式 | 分离式 | 分离式 | 联合式 | 联合式 | 联合式 | 联合式 | 联合式 |
嵌入容量 | 低 | 中等 | 高 | 高 | 高 | 高 | 低 | 低 | 低 | 低 | 中等 |
载密质量 | 一般 | 较好 | 较好 | 较差 | 较差 | 较差 | 一般 | 一般 | 一般 | 一般 | 较好 |
提取误码 | 无 | 无 | 无 | 无 | 无 | 无 | 存在 | 存在 | 存在 | 存在 | 无 |
恢复失真 | 无 | 无 | 无 | 无 | 无 | 无 | 存在 | 存在 | 存在 | 存在 | 无 |
[1] |
WANG X, LI X L, YANG B, et al. Efficient Generalized Integer Transform for Reversible Watermarking[J]. IEEE Signal Processing Letters, 2010,17(6):567-570.
doi: 10.1109/LSP.2010.2046930 |
[2] | QIU Y Q, QIAN Z X, YU L. Adaptive Reversible Data Hiding by Extending the Generalized Integer Transformation[J]. IEEE Signal Processing Letters, 2016,23(1):130-134. |
[3] | 王祥, 李可, 付凯元, 等. 直方图平移的自适应大容量可逆水印算法[J]. 西安电子科技大学学报, 2014,41(1):124-129. |
WANG Xiang, LI Ke, FU Kaiyuan, et al. Histogram Shifting Based Adaptive Reversible Watermarking Algorithm with a High Capacity[J]. Journal of Xidian University, 2014,41(1):124-129. | |
[4] | QIN J Q, HUANG F J. Reversible Data Hiding Based on Multiple Two-dimensional Histograms Modification[J]. IEEE Signal Processing Letters, 2019,26(6):843-847. |
[5] | OU B, ZHAO Y. High Capacity Reversible Data Hiding Based on Multiple Histograms Modification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8):2329-2342. |
[6] | QI W F, LI X L, ZHANG T, et al. Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8):2300-2312. |
[7] | ZHANG X P. Separable Reversible Data Hiding in Encrypted Image[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):826-832. |
[8] | MA K D, ZHANG W M, ZHAO X F, et al. Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(3):553-562. |
[9] | QIU Y Q, QIAN Z X, ZENG H Q, et al. Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation[J]. Signal Processing, 2020,167:107288. |
[10] | PUTEAUX P, PUECH W. An Efficient MSB Prediction-based Method for High-capacity Reversible Data Hiding in Encrypted Images[J]. IEEE Transactions on Information Forensics and Security, 2018,13(7):1670-1681. |
[11] | YIN Z X, XIANG Y Z, ZHANG X P. Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding[J]. IEEE Transactions on Multimedia, 2020,22(4):874-884. |
[12] |
WU Y Q, XIANG Y Z, GUO Y T, et al. An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling[J]. IEEE Transactions on Multimedia, 2020,22(8):1929-1938.
doi: 10.1109/TMM.6046 |
[13] |
ZHANG X P. Reversible Data Hiding in Encrypted Image[J]. IEEE Signal Processing Letters, 2011,18(4):255-258.
doi: 10.1109/LSP.2011.2114651 |
[14] |
HONG W, CHEN T S, WU H Y. An Improved Reversible Data Hiding in Encrypted Images Using Side Match[J]. IEEE Signal Processing Letters, 2012,19(4):199-202.
doi: 10.1109/LSP.2012.2187334 |
[15] |
LIAO X, SHU C W. Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels[J]. Journal of Visual Communication and Image Representation, 2015,28(2):21-27.
doi: 10.1016/j.jvcir.2014.12.007 |
[16] |
QIAN Z X, DAI S, JIANG F, et al. Improved Joint Reversible Data Hiding in Encrypted Images[J]. Journal of Visual Communication and Image Representation, 2016,40:732-738.
doi: 10.1016/j.jvcir.2016.08.020 |
[17] |
ZHANG L, WU X L. An Edge-guided Image Interpolation Algorithm via Directional Filtering and Data Fusion[J]. IEEE Transaction on Image Processing, 2006,15(8):2226-2238.
doi: 10.1109/TIP.2006.877407 |
[1] | ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain [J]. Journal of Xidian University, 2022, 49(2): 135-145. |
[2] | LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption [J]. Journal of Xidian University, 2022, 49(1): 1-16. |
[3] | WANG Kaiwen,WANG Shulan,WANG Haiyan,DING Yong. Top-k multi-keyword ciphertext retrieval scheme supporting attribute revocation [J]. Journal of Xidian University, 2022, 49(1): 26-34. |
[4] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
[5] | YAN Xixi,ZHAO Qiang,TANG Yongli,LI Yingying,LI Jingran. Multi-keyword search encryption scheme supporting flexible access control [J]. Journal of Xidian University, 2022, 49(1): 55-66. |
[6] | GE Bin,CHEN Xu,CHEN Gang. Fast hyper-chaotic image encryption algorithm using vector operation [J]. Journal of Xidian University, 2021, 48(6): 187-196. |
[7] | WANG Xingxin,HU Wei,TAN Jing,ZHU Jiacheng,TANG Shibo. Correlation fault attack on AES [J]. Journal of Xidian University, 2021, 48(4): 192-199. |
[8] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[9] | YE Tao,WEI Yongzhuang,LI Lingchen. Analysis of zero-sum distinguisher of the KNOT authenticated encryption algorithm [J]. Journal of Xidian University, 2021, 48(1): 76-86. |
[10] | CHE Xiaoliang,ZHOU Haonan,YANG Xiaoyuan,ZHOU Tanping,LIU Longfei,LI Ningbo. Efficient multi-key fully homomorphic encryption scheme from RLWE [J]. Journal of Xidian University, 2021, 48(1): 87-95. |
[11] | WANG Junxiang,HUANG Lin,ZHANG Ying,NI Jiangqun,LIN Lang. Algorithm for the detection of a low complexity contrast enhanced image source [J]. Journal of Xidian University, 2021, 48(1): 96-106. |
[12] | ZHAI Sheping,WANG Yijing,CHEN Siji. Research on the application of blockchain technology in the sharing of electronic medical records [J]. Journal of Xidian University, 2020, 47(5): 103-112. |
[13] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[14] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[15] | LUO Yuling,OUYANG Xue,CAO Lüchen,QIU Senhui,LIAO Zhixian,CEN Mingcan. Image encryption using the genetic simulated annealing algorithmand chaotic systems [J]. Journal of Xidian University, 2019, 46(5): 171-179. |
|