期刊文献+

基于空域可恢复信息隐藏的图像安全人工退化算法 被引量:8

Artificial Image Security Degradation Algorithm Based on Invertible Information Hiding in Spatial Domain
下载PDF
导出
摘要 为了满足数字图像先用后买的商务模式的需要,提出了一种基于空域可恢复信息隐藏的数字图像人工退化算法。该算法使用可恢复信息隐藏算法中的直方图平移技术来嵌入补偿矩阵,以达到最终恢复精确原始图像的目的。通过控制嵌入深度,可得到与原始图像相比有较大失真但又能获知主要信息的公开图像。在嵌入过程中采用置乱以及加密技术,使得入侵者在没有得到授权文件的情况下无法强行恢复出原始图像。实验结果表明,该算法既可以得到与原始图像相差较大的公开图像,又能在得到安全认可的情况下完整地恢复出原始图像。 In order to meet the requirement of the digital image business model of try with option to buy,we proposed an artificial image security degradation algorithm based on invertible information hiding in spatial domain.The algorithm uses histogram shifting method of lossless hiding to embed the compensation matrix for recovering the original image precisely.By controlling the embedding depth,the algorithm can generate publishing image which has large distortion but also keeps the main information of the original image.The scrambling and encryption methods are used in the algorithm so that the invaders can not recover the original image correctly by brute-force method without authorized files.The experiment results demonstrate that the algorithm can not only obtain the publishing image which has big differences with the original one,but also recover the exact image when security permission is released.
作者 雷正桥 肖迪
出处 《计算机科学》 CSCD 北大核心 2015年第3期162-166,共5页 Computer Science
基金 应急通信重庆市重点实验室开放课题项目(CQKLEC 20140504)资助
关键词 图像人工退化 可恢复隐藏 控制因子 直方图平移 授权文件 Image artificial degradation Lossless hiding Control factor Histogram shifting Authorized files
  • 相关文献

参考文献4

二级参考文献47

  • 1高军涛,董丽华,胡予濮.广义互缩生成器[J].计算机学报,2006,29(6):936-943. 被引量:4
  • 2吴晓云,刘红梅,黄继武.结合Zernike矩和水印的半脆弱图像认证[J].自动化学报,2007,33(2):145-150. 被引量:6
  • 3张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 4谢于明,程义民,田源,汪云路.基于整数变换的无损隐秘传输方法仿真研究[J].系统仿真学报,2007,19(19):4594-4598. 被引量:6
  • 5MATTHEWS R. On the derivation of a chaotic encryption algorithm [ J ]. Cryptologia, 1989,13 ( 1 ) : 29 - 42.
  • 6PARKER A T, SHORT K M chaotic encryption scheme [ J ] Reconstructing the keystream from a IEEE Yrans on Circuit and Sys- tems Fundamental Theory and Applications, 2001,48 ( 5 ) : 624- 630.
  • 7ALVAREZ G, MONTOYA F, ROMERA M, et al. Breaking two secure communication systems based on chaotic masking [ J ]. IEEE Trans on Circuits and Systems I1,2004,51 (10) :505-506.
  • 8ZHANG Han, WANG Xiu-feng, LI Zhao-hui, et al. A new image en- cryption algorithm based on chaos system [ C ]//Proc of International Conference on Robotics, Intelligent Systems and Signal Processing. [ S. 1. ] :IEEE Press,2003:778-782.
  • 9SINGH N, SINHA A. Optical image encryption using Hartley transform and logistic map [ J ]. Optics Communications, 2009,282 ( 6 ) : 1104-1109.
  • 10LI Na, QI Wen-feng. Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity[ J]. IEEE Trans on Information Theory,2006,52(5 ) :2271-2273.

共引文献20

同被引文献45

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部