电子学报 ›› 2020, Vol. 48 ›› Issue (1): 92-100.DOI: 10.3969/j.issn.0372-2112.2020.01.011

• 学术论文 • 上一篇    下一篇

图像插值空间完全可逆可分离密文域信息隐藏算法

王继军1, 李国祥2, 夏国恩2, 孙泽锐2   

  1. 1. 广西财经学院信息与统计学院, 广西南宁 530003;
    2. 广西财经学院教务处, 广西南宁 530003
  • 收稿日期:2018-10-18 修回日期:2019-03-22 出版日期:2020-01-25 发布日期:2020-01-25
  • 作者简介:王继军 男,1981年出生,山西吕梁人.副教授,2008年毕业于广西师范大学计算机应用技术专业,获硕士学位,研究方向:信息隐藏、数字水印.E-Mail:wangjijun1209@126.com;李国祥 男,1984年出生,山东济宁人.副教授,2010年毕业于广西师范大学计算机应用技术专业,获硕士学位,研究方向:人工智能、数据挖掘.
  • 基金资助:
    国家自然科学基金(No.71862003);广西多源信息挖掘与安全重点实验室(No.MIMS18-05);广西高校中青年教师能力提升项目(No.2018KY0518);广西应用经济学一流学科(培育)开放性课题(No.2018YB01);广西(东盟)财经研究中心开放性课题(No.2018DMCJYB10);广西高校中青年教师能力提升项目(No.2018KY0520);广西财经学院科研项目(No.2016B033);广西财经学院青年发展基金(No.2018QNB18)

A Separable and Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation Space

WANG Ji-jun1, LI Guo-xiang2, XIA Guo-en2, SUN Ze-rui2   

  1. 1. Department of Information and Statistics, Guangxi University of Finance and Economics, Nanning, Guangxi 530003, China;
    2. Office of Academic Affairs, Guangxi University of Finance and Economics, Nanning, Guangxi 530003, China
  • Received:2018-10-18 Revised:2019-03-22 Online:2020-01-25 Published:2020-01-25

摘要: 密文域可逆信息隐藏技术在医学、云服务、军事、商业等众多领域有着广泛应用,针对现有密文域信息隐藏算法的可逆性不能完全保证、嵌入率低、不能完全分离等不足,提出一种完全可逆可分离密文域信息隐藏算法,首先,给出了适合图像加密遍历矩阵所需满足的条件和构造方法,载体图像拥有者设置密钥1构造遍历矩阵,并对明文图像进行加密,然后将加密图像传送给信息嵌入者,信息嵌入者设置密钥2,以期望插值为目标,根据插值区间大小确定嵌入位数,再由差值修正因子和秘密信息共同确定最终插值,使最终插值最大限度接近期望插值,确保载密图像高质量,整个过程无附加信息、无数据溢出、且均可保证可逆性,密钥1拥有者和密钥2拥有者两种权限互不干涉,是完全可逆可分离算法,平均嵌入率可达到3 bit/pixel,通过与8种优秀算法的实验比较,表明算法在嵌入容量、可逆性、可分离性率等方面相比于对比算法均有一定优势.

关键词: 信息安全, 可逆信息隐藏, 密文域, 图像插值, 遍历矩阵

Abstract: Reversible steganography in encrypted domain is widely used in medical,cloud services,military,commercial and other fields.Aiming at the problems of encrypted domain information hiding algorithm,such as incomplete guarantee of reversibility,low embedding rate and incomplete separation,this paper proposed a separable and reversible steganography in encrypted domain.Firstly,the conditions and construction methods for the ergodic matrix of image encryption are given.The carrier image owner sets the key1 to construct the ergodic matrix and encrypts the plaintext image,the information embedder sets the key2,in order to achieve the goal of expectation interpolation,the number of embedding bits is determined according to the size of interpolation interval,and then the final interpolation is determined by the difference correction factor and secret information together,so that the final interpolation is close to the expectation interpolation to the maximum extent,ensuring the high quality of the encrypted image.There is no additional information,no data overflow and reversibility is guaranteed in the whole process,the two permissions do not interfere with each other,and the algorithm is completely reversible and separable,and the average embedding rate can reach 3 bit/pixel.The experimental results show that the algorithm is better than the other eight excellent algorithms in terms of embedding capacity,reversibility and separability.

Key words: information security, reversible data hiding, encrypted domain, image interpolation, ergodic matrix

中图分类号: