1.中山大学计算机学院, 广东 广州 510006
2.中山大学网络空间安全学院, 广东 深圳 518107
张汉华(1995年生),男;研究方向:可逆信息隐藏和图像认证;E-mail:zhanghh73@mail2.sysu.edu.cn
黄方军(1973年生),男;研究方向:人工智能安全和多媒体安全;E-mail:huangfj@mail.sysu.edu.cn
纸质出版日期:2024-09-25,
网络出版日期:2024-07-12,
收稿日期:2024-05-25,
录用日期:2024-06-19
移动端阅览
张汉华,黄方军.基于IPVO的高效图像可逆认证方法[J].中山大学学报(自然科学版)(中英文),2024,63(05):106-114.
ZHANG Hanhua,HUANG Fangjun.Efficient image reversible authentication method based on IPVO[J].Acta Scientiarum Naturalium Universitatis Sunyatseni,2024,63(05):106-114.
张汉华,黄方军.基于IPVO的高效图像可逆认证方法[J].中山大学学报(自然科学版)(中英文),2024,63(05):106-114. DOI: 10.13471/j.cnki.acta.snus.ZR20240175.
ZHANG Hanhua,HUANG Fangjun.Efficient image reversible authentication method based on IPVO[J].Acta Scientiarum Naturalium Universitatis Sunyatseni,2024,63(05):106-114. DOI: 10.13471/j.cnki.acta.snus.ZR20240175.
提出了一种基于小波域预测误差直方图平移的图像可逆认证方法。首先,对待认证图像进行一次哈尔小波变换;其次,将变换得到的低频子带和高频子带分别分块,并根据块内的系数值和块的位置生成认证码;然后,使用改进的像素值排序(IPVO)方法将认证码嵌入到分块中,通过哈尔小波逆变换得到包含认证信息的图像;在认证阶段,通过对比分块提取认证码和生成认证码来实现篡改检测功能,并可无损地恢复原始图像。实验结果表明,该方法提供了更准确的检测结果,并确保了一定水平的图像质量。
A reversible image authentication method based on wavelet-domain prediction error histogram translation is proposed. First, the image to be authenticated performs a Haar wavelet transform. Second, the low-frequency and high-frequency subbands obtained from the transform are separately partitioned into blocks, and an authentication code is generated based on the coefficient values and locations of these blocks. Then, the authentication code is embedded into the blocks using the improved pixel value ordering (IPVO) method, and the image containing the authentication information is reconstructed using the Haar wavelet inverse transform. In the authentication stage, the tampering detection function is realized by extracting the authentication code and generating the authentication code. If the image is not tampered with, the original image can be recovered losslessly. Experimental results show that the method provides more accurate detection results and ensures a certain level of image quality.
图像可逆认证脆弱水印篡改检测
imagereversible authenticationfragile watermarkingtamper detection
何玉芬, 殷赵霞, 汤进, 等, 2019. 基于非对称直方图平移的可逆信息隐藏算法[J]. 网络与信息安全学报,5(5): 80-89.
王泓,黄方军, 2022.基于可逆信息隐藏技术的认证方案的攻击与改进[J].信息安全学报,7(1):56-65.
钟亦友,黄方军, 2023.基于分块的高效图像可逆认证方法[J].软件学报,34(12):5848-5861.
BARTON J M,1997. Method and apparatus for embedding authentication information within digital data:US5646997[P/OL].https://www.freepatentsonline.com/5646997.htmlhttps://www.freepatentsonline.com/5646997.html.
BAS P,FILLER T,PEVNY T,2011.Break our steganographic system: The ins and outs of organizing BOSS[M].Lecture Notes in Computer Science.Berlin Heidelberg:Springer.
FAN G, PAN Z, GAO E, et al, 2021. Reversible data hiding method based on combining IPVO with bias-added Rhombus predictor by multi-predictor mechanism[J]. Signal Process, 180: 107888.
HOLLIMAN M, MEMON N, 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans Image Process,9(3): 432-441.
HONG W, CHEN M, CHEN T, 2017. An efficient reversible image authentication method using improved PVO and LSB substitution techniques[J]. Signal Process Image Commun, 58: 111-122.
HU R, XIANG S, 2021. CNN prediction based reversible data hiding[J]. IEEE Signal Process Lett, 28: 464-468.
HU R, XIANG S, 2022. Reversible data hiding by using CNN prediction and adaptive embedding[J]. IEEE Trans Pattern Anal Mach Intell,44(12):10196-10208.
JIA Y, YIN Z, ZHANG X, et al, 2019. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting[J]. Signal Process, 163: 238-246.
KIM S, QU X, SACHNEV V, et al, 2019. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions[J]. IEEE Trans Circuits Syst Video Technol, 29(11): 3236-3246.
LEE S K, SUH Y H, HO Y S, 2006. Reversible image authentication based on watermarking[C]//International Conference on Multimedia and Expo. Toronto, ON, Canada: IEEE:1321-1324.
LI X, ZHANG W, GUI X, et al, 2015. Efficient reversible data hiding based on multiple histograms modification[J]. IEEE Trans Inf Forensics Secur, 10(9): 2016-2027.
LO C C, HU Y C, 2014. A novel reversible image authentication scheme for digital images[J]. Signal Process, 98: 174-185.
NGUYEN T S, CHANG C C, YANG X Q, 2016. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain[J]. Int J Electron Commun, 70(8): 1055-1061.
NI Z, SHI Y Q, ANSARI N, et al, 2006. Reversible data hiding[J]. IEEE Trans Circuits Syst Video Technol, 16(3): 354-362.
OU B, LI X, ZHANG W, et al, 2019. Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection[J]. IEEE Trans Circuits Syst Video Technol, 29(7): 2176-2190.
PENG F, LI X, YANG B, 2014. Improved PVO-based reversible data hiding[J]. Digit Signal Process, 25: 255-265.
QIN J, HUANG F, 2019. Reversible data hiding based on multiple two-dimensional histograms modification[J]. IEEE Signal Process Lett, 26(6): 843-847.
TIAN J, 2003. Reversible data embedding using a difference expansion[J]. IEEE Trans Circuits Syst Video Technol, 13(8): 890-896.
TSAI P, HU Y C, YEH H L, 2009. Reversible image hiding scheme using predictive coding and histogram shifting[J]. Signal Process, 89(6): 1129-1143.
WEBER A G, 1997. The USC-SIPI image database version 5[P/OL].https://sipi.usc.edu/reports/https://sipi.usc.edu/reports/.
WU H, LI X, ZHAO Y, et al, 2020. Improved PPVO-based high-fidelity reversible data hiding[J]. Signal Process, 167: 107264.
YAO H, WEI H, QIN C, et al, 2020. A real-time reversible image authentication method using uniform embedding strategy[J]. J Real Time Image Process, 17(1): 41-54.
YIN Z, NIU X, ZHOU Z, et al, 2016. Improved reversible image authentication scheme[J]. Cogn Comput, 8(5): 890-899.
ZHANG T, LI X, QI W, et al, 2020. Location-based PVO and adaptive pairwise modification for efficient reversible data hiding[J]. IEEE Trans Inf Forensics Secur, 15: 2306-2319.
0
浏览量
60
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构