Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding
-
摘要: 针对现有算法中加密图像存在安全隐患,及选用编码不佳导致图像压缩率较低的问题,提出了一种基于预测误差自适应编码的图像加密可逆数据隐藏算法.图像加密阶段,设计了一种基于误差维持的图像加密算法,首先对3×3的图像块做块间置乱和像素调制加密,然后根据图像块中心像素值将非中心像素分组置乱.数据嵌入阶段,根据图像自身预测误差分布自适应编码,使用编码表对像素进行标记分类后,将编码表与附加数据共同隐藏在加密图像中生成携密加密图像.实验结果表明:加密阶段分组置乱操作,使原始图像与加密图像中特征值差异块数增多,难以确定加密前后图像中各图像块间的对应关系,提高了加密图像的安全性,且图像整体的预测误差分布保持不变;相较于现有算法,平均嵌入率提高0.49bpp以上,且能无损提取附加数据、恢复原始图像.Abstract: For the security problem of existing schemes in the image encryption, and the problem of low compression due to poor coding, this paper proposes a reversible data hiding algorithm of image encryption based on prediction error adaptive coding. In the image encryption stage, an image encryption algorithm based on error maintenance is designed. First, block scrambling and pixel modulation encryption are performed on 3×3 image blocks, and then non-center pixels are grouped and scrambled according to the central pixel value of the image block. In the data embedding stage, adaptive coding is based on the prediction error distribution of the image, after marking and classifying the pixels with the coding table, and the coding table and additional data are hidden together in the encrypted image to generate a marked encrypted image. The experimental results show that group scrambling operation in the encryption phase increases the number of eigenvalue difference blocks between the original image and the encrypted image, makes it difficult to determine the correspondence between the image blocks in the image before and after encryption, improves the security of the encrypted image, and keeps the overall prediction error distribution of the image. Compared with state-of-the-art algorithms, the average embedding rate can be improved by more than 0.49bpp, the additional data can be extracted losslessly and the original image can be restored.
-
-
期刊类型引用(10)
1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 . 百度学术
2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 . 百度学术
3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 . 百度学术
4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 . 百度学术
5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 . 百度学术
6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 . 百度学术
7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 . 百度学术
8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 . 百度学术
10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 . 百度学术
其他类型引用(12)
计量
- 文章访问数:
- HTML全文浏览量: 0
- PDF下载量:
- 被引次数: 22