期刊文献+

基于马赛克技术的秘密图像共享改进算法 被引量:5

Improved algorithm of secret image sharing based on mosaic technique
在线阅读 下载PDF
导出
摘要 针对秘密图像共享产生无意义影子图像的问题,为了减少影子图像的噪点,把秘密图像分割成小块,并重新分组;然后通过比较图像块相似度把秘密图像共享到载体图像中,得到含有秘密图像的马赛克图像;最后采用可逆的信息隐藏技术,把位置信息隐藏到马赛克图像中,得到有意义的影子图像。实验表明,该算法可以提高影子图像的质量,与Zhai等人的算法相比,马赛克图像的PSNR平均提高了7 d B。结论证明该算法增强和保障了秘密图像的安全性和完整性。 This paper proposed an improved algorithm which generated meaningful shadow image based on mosaic technology for the problem that many secret image sharing algorithms were easy to generate shadow image like noise. In order to reduce noise in the shadow image, it divided secret image into small blocks and regrouped them by a key. Then, it shared secret image into cover image through comparing the similarity between images pixels. It could obtain the mosaic images which contained secret image. Finally, it hid location information into the mosaic images through reversible information hiding technology, so that it could get some complete and meaningful shadow images. The experimental results indicate that this algorithm greatly improves the quality of the shadow image by comparing the similarity of secret image and cover image. Comparing with Zhai' s algorithm, the generated mosaic images' PSNR increases about 7 dB by average. The conclusions prove that the algorithm enhances and guarantees the security and integrity of secret image during image sharing.
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3480-3484,共5页 Application Research of Computers
关键词 秘密图像共享 信息隐藏 相似度 马赛克图像 峰值信噪比 安全性 secret image sharing information hiding similarity mosaic image peak signal to noise ratio(PSNR) security
  • 相关文献

参考文献12

  • 1Huynh N T, Bharanitharan K, Chang C C. Quadri-directional searching algorithm for secret image sharing using meaningful shadows [ J ]. Journal of Visual Communication & Image Representation, 2015,28 (4) :105-112.
  • 2Thien C C,Lin J C. Secret image sharing[J]. Computer & Gra- phics ,2002,26(5 ) :765-770.
  • 3Shamir A. How to share a secret [ J ]. Communications of the ACM, 1979,22( 11 ) :612-613.
  • 4Yang Chingnung, Chang Weijen, Cai Songruei, et al. Secret image sha- ring without keeping permutation key[ C]//Proc of International Con- ference on Information and Communications Technologies. [ S. 1. ] : IEEE Press ,2014 : 1-7.
  • 5Li Xiaohong, Chen Yuan, Wang Feng, et al. The secret image sharing scheme based on improved LSB algorithm [ C ]//Proc of the 5th Inter- national Conference on Computing, Communication and Networking Technologies. 2014 : 1-5.
  • 6Chang Chinchen, Lin Peiyu, Chan Chishiong. Secret image sharing with reversible steganography [ C ]//Proc of International Conference on Computational Intelligence and Natural Computing. 2009: 253- 256.
  • 7Zhang Xinpeng, Wang Shuozhong. Efficient steganographic embedding by exploiting modification direction [ J ]. I EEE Communications Let- ters,2006,10( 11 ) :781-783.
  • 8Mielikainen J. LSB matching revisited [ J]. I EEE Signal Processing Letters,2006,13 ( 5 ) : 285 - 287.
  • 9Chang C C, Chou Y C, Kieu T D. An information hiding scheme using sudoku[ C ]//Proc of the 3rd International Conference on Innovative Computing Information and Control. 2008:17.
  • 10Zhai Shengyun, Li Fan, Chang Chinchen, et aL A meaningful scheme for sharing secret images using mosaic images [ J ]. International Journal of Network Security ,2015,17 (5) :643- 649.

二级参考文献11

  • 1Yeung, Mintzer FC. Invisible watermarking for image verification[J]. Electron Imag, 1998,7(3):578-591.
  • 2Tian J. Reversible data embedding using a difference expansion [J]. IEEE Transaction on Circuits and Systems for Video Technology,2003,13(8): 890-896.
  • 3Chang C C, Tai W L, Lin M H. A reversible data hiding scheme with modified side match vector quantization[C].Taiwan: Proceedings of the International Conference on Advanced Information networking and Applications,2005:947-952.
  • 4Vleeschouwer C D, Delaigle J E, Macq B. Circular interpretation of histogram for reversible watermarking [C]. France: Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing,2001:345 -350.
  • 5Leest A, Veen M, Bruekers F. Reversible image watermarking [C]. Barcelona, Spain:Proceedings of IEEE International Conference on Image Processing,2003:731-734.
  • 6Xuan G, Zhu J, Chen J, et al. Distortionless data hiding based on integer wavelet transform[J]. IEEE, Electronics Letters, 2002,38 (25): 1646-1648.
  • 7Ni Z, Shi Y, Ansari N, et al. Reversible data hiding [J]. IEEE Tran On Circuits and System for Video Technology,2006,16(3): 354-362.
  • 8Wang Ran-Zan, Lin Chi-Fang, Lin Ja-Chen. Hiding data in images by optimal moderately-significant-bit replacement[J]. Electronics Letters,2000,36(25):2069-2070.
  • 9Celik M U, Sharma G, Tekalp A M, et al.Reversible data hiding [C]. NY, USA: IEEE Int Conf on Image Processing, 2002: 157-160.
  • 10Tian J. Wavelet-based reversible watermarking for authentication[C].California,USA:Proc SPIE Security and Watermarking of Multimedia Contents Ⅳ,2002:679-690.

共引文献9

同被引文献26

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部