半色調(diào)圖像及視頻信息隱藏算法研究
發(fā)布時間:2018-07-17 08:09
【摘要】:隨著計算機和網(wǎng)絡(luò)技術(shù)的不斷發(fā)展,人們在享受網(wǎng)上大量資源的同時,如何保證信息的安全已經(jīng)成為一個亟需解決的問題。信息隱藏是信息安全領(lǐng)域的一項主要技術(shù)。圖像和視頻信息隱藏成為最常用的形式,一般指通過特定方式對圖像和視頻的數(shù)據(jù)進行修改,從而隱藏信息,在隱藏后,圖像和視頻的使用不受影響。半色調(diào)圖像是一種特殊的圖像載體,僅通過黑白兩個顏色值來表示一幅圖像。半色調(diào)圖像中信息隱藏可分為兩類:(1)網(wǎng)點水印:一幅半色調(diào)圖像中,通過網(wǎng)點特征,直接隱藏水印信息;(2)半色調(diào)可視加密(halftone visual cryptography,簡稱HVC):在多幅半色調(diào)圖像中,隱藏一幅秘密圖案。在HVC中,(2,2) HVC最常用,即將一幅秘密圖案隱藏在兩幅半色調(diào)圖像中,通過處理兩幅半色調(diào)圖像,可提取出秘密圖案。目前已有的(2,2) HVC算法,在提取圖案的正確率(CDR)和生成圖像的質(zhì)量上,都有待提高。另外,現(xiàn)有(k,n) HVC的算法,需要碼書,并會造成像素擴展,即隨著用戶數(shù)目n的增加,生成半色調(diào)圖像的分辨率需要擴展為原圖像的很多倍。立體視頻是一種特殊的視頻載體,每幀立體視頻包括左右兩個通道的圖像,這兩個通道的圖像相近,但不相同,立體視頻水印成為一個新的視頻水印研究方向。由于實際項目需要,希望實現(xiàn)一種能夠抵抗多種攻擊的圖像水印算法,包括:編碼攻擊、裁剪攻擊、直線攻擊、縮放攻擊,并且能保證一定的水印容量。針對以上的各種問題,本文針對半色調(diào)信息隱藏、立體視頻水印和圖像水印進行研究,主要取得以下成果:(1)基于新共軛的彩色(2,2)半色調(diào)可視加密算法。針對彩色半色調(diào)圖像,提出新共軛的概念,并將這個概念應(yīng)用到誤差擴散半色調(diào)圖像和點擴散半色調(diào)圖像信息隱藏中,提出基于誤差擴散的新共軛數(shù)據(jù)隱藏算法(Data hiding by new conjugate color error diffusion,簡稱NCCED)和基于點擴散的新共軛數(shù)據(jù)隱藏算法(Data hiding by new conjugate color dot diffusion,簡稱NCCDD )。兩種算法將秘密圖案隱藏在兩幅彩色半色調(diào)圖像中。通過執(zhí)行這兩種算法,在彩色半色調(diào)圖像信息隱藏過程中,減少需要置換的分量數(shù)目,減少由于置換干擾太大而無法實施數(shù)據(jù)隱藏的情況,可以提高提取秘密圖案的正確解碼率(CDR),還可提高生成半色調(diào)圖像的質(zhì)量;提出平均每像素干擾值(Average distortion per pixel,簡稱 ADPP)的概念,通過 ADPP 的大小衡量信息隱藏算法對生成半色調(diào)圖像質(zhì)量的影響。(2)基于塊共軛的高質(zhì)量(2,2)半色調(diào)可視加密算法。選擇多個半色調(diào)圖像作為訓(xùn)練樣本,生成最小均方濾波器(Least mean square filter,簡稱LMSF),用LMSF評價半色調(diào)圖像的質(zhì)量。為提高信息隱藏算法生成半色調(diào)圖像的質(zhì)量,提出塊共軛的概念,將塊共軛概念應(yīng)用到半色調(diào)信息隱藏中,提出一種基于塊共軛的高質(zhì)量半色調(diào)信息隱藏算法(High quality data hiding in halftone images based on block conjugate,簡稱HQDHBC)。該算法將一幅秘密圖案隱藏在兩幅基于誤差擴散的半色調(diào)圖像中。在兩幅圖像對應(yīng)的M×N分塊中,如果前M×N-1個點都共軛或相同時,則最后一個點不影響塊共軛關(guān)系,最后一點執(zhí)行正常的半色調(diào)方法,而不執(zhí)行信息隱藏算法。由于執(zhí)行HQDHBC算法,可在不影響秘密圖案提取正確率的前提下,減少實施信息隱藏算法的點數(shù),從而提高生成半色調(diào)圖像的質(zhì)量。(3)基于Shamir分享的(k,n)半色調(diào)可視加密算法。將Shamir秘密分享應(yīng)用到半色調(diào)可視加密中,提出一種基于Shamir秘密分享的(k,n)半色調(diào)可視加密算法(a (k,n) halftone visual cryptography based on Shamir's secret sharing,簡稱 HVCSSS)。通過本算法,可實現(xiàn)(k,n)半色調(diào)可視加密,即將一幅二值秘密圖像隱藏到n幅半色調(diào)圖像中,任意選取k幅半色調(diào)圖像,都可以提取原始的秘密圖像。首先,利用Shamir分享,將原始二值秘密圖像,分享為n幅無意義分享圖像;然后,利用半色調(diào)圖像的自隱藏技術(shù),將分享圖像隱藏在半色調(diào)圖像中,構(gòu)成n幅半色調(diào)分享圖像;第三,從n幅半色調(diào)分享圖像中,通過半色調(diào)圖像自提取技術(shù),提取出n幅隱藏的分享圖像;最后,從n幅提取出的分享圖像中,任意選擇k幅分享圖像,利用拉格朗日插值技術(shù),提取隱藏的秘密圖像。(4)變換域立體視頻盲水印算法。在實現(xiàn)并分析基于DCT和基于DFT的視頻水印算法性能基礎(chǔ)上,提出一種變換域立體視頻盲水印算法。通過立體視頻左右路圖像中分別嵌入具有相反嵌入規(guī)則的DCT水印和DFT水印,在視頻受到攻擊后,結(jié)合左右路圖像相對關(guān)系提取水印,并采用擇優(yōu)使用的方式從DCT水印和DFT水印中選擇提取魯棒性更強的水印。(5)基于DFT的高效改進圖像水印算法。在實現(xiàn)并分析基于DFT的圖像水印算法基礎(chǔ)上,提出一種基于DFT的高效圖像水印算法。對原始水印信息進行混合糾錯編碼,保證嵌入水印后的圖像,在承受攻擊情況下,提取正確率達到100%;針對每個4×4頻域數(shù)據(jù)塊改變嵌入水印方式,分別采用右上-左下和左上-右下的能量關(guān)系表示水印值,并且用2×1的頻域點來表示能量關(guān)系,可在PSNR基本相同的前提下,嵌入容量增加為原來的2倍;通過調(diào)整嵌入水印的范圍,擴展水印容量。
[Abstract]:With the continuous development of computer and network technology, while people enjoy a lot of resources on the Internet, how to ensure the security of information has become an urgent problem. Information hiding is a major technology in the field of information security. Image and video information hiding is the most commonly used form, generally refers to a specific way to the image. The data of video and video are modified to hide information. After hiding, the use of images and videos is not affected. The halftone image is a special image carrier, only by two color values of black and white to represent an image. The information hiding in the halftone image can be divided into two categories: (1) a dot watermark: a halftone image through a dot. Features, direct hidden watermark information; (2) halftone visual encryption (halftone visual cryptography, HVC): in multiple halftone images, hidden a secret pattern. In HVC, (2,2) HVC is most commonly used, a secret pattern is hidden in two halftone images, and the secret pattern can be extracted by processing two halftone images. The former (2,2) HVC algorithm needs to be improved in extracting the correctness of the pattern (CDR) and generating the quality of the image. In addition, the existing (k, n) HVC algorithm needs codebook and will cause pixel expansion, that is, with the increase of the number of users n, the resolution of the generated half tone image needs to be extended to many times the original image. The stereo video is a kind of one. Special video carrier, each frame video includes images of about two channels. The images of the two channels are similar, but different. Stereo video watermarking becomes a new research direction of video watermarking. Because of the actual needs of the project, we hope to achieve a kind of image watermarking algorithm that can resist many attacks, including: coding attack, cutting attack. Attack, straight line attack, zoom attack, and can guarantee a certain watermark capacity. Aiming at all the problems above, this paper focuses on halftone information hiding, stereo video watermarking and image watermarking. The main achievements are as follows: (1) a new conjugate based color (2,2) halftone visual encryption algorithm. A new method for color halftone images is proposed. A new conjugate data hiding algorithm based on error diffusion (Data hiding by new conjugate color error diffusion, abbreviated NCCED) and a new conjugate data hiding algorithm based on point diffusion (Data hiding by) are applied to the concept of conjugation, which is applied to error diffusion half tone image and point diffusion half tone image information hiding. Conjugate color dot diffusion, abbreviated as NCCDD). The two algorithms hide the secret pattern in two color half tone images. By executing these two algorithms, the number of components needed to be replaced in the process of color half tone image information hiding, and the situation that the data hiding can not be implemented because the displacement interference is too large and can be improved. The correct decoding rate (CDR) of the secret pattern can also be extracted, and the quality of the generated half tone image can be improved; the concept of average per pixel interference value (Average distortion per pixel, abbreviated for short) is proposed, and the influence of the information hiding algorithm on the quality of the generated halftone image is measured by the size of ADPP. (2) high quality (2,2) halftone based on block conjugation According to the encryption algorithm, multiple half tone images are selected as training samples, and the minimum mean square filter (Least mean square filter, called LMSF) is generated to evaluate the quality of the halftone image with LMSF. In order to improve the quality of the half tone image generated by the information hiding algorithm, the concept of block conjugation is proposed and the block conjugation concept is applied to the halftone information hiding. A high quality halftone information hiding algorithm based on block conjugation (High quality data hiding in halftone images based on block conjugate, referred to as HQDHBC) is proposed. The algorithm hides a secret pattern in two halftone images based on error diffusion. When the conjugate or the same, the last point does not affect the block conjugate relation, the last point executes the normal halftone method and does not carry out the information hiding algorithm. Because of the execution of the HQDHBC algorithm, the number of information hiding algorithms can be reduced without affecting the accuracy of the secret pattern extraction, thus improving the quality of the generated halftone image. (3) the (k, n) half tone visual encryption algorithm based on Shamir sharing. The Shamir secret sharing is applied to the halftone visual encryption, and a K, n semi tone visual encryption algorithm based on Shamir secret sharing is proposed. Halftone visual encryption, a two value secret image is hidden in the N amplitude and half tone image, and K amplitude and half tone images are selected arbitrarily. The original secret image can be extracted. First, the original two value secret images are shared with the N amplitude meaningless sharing image by Shamir sharing. Then, the self hiding technology of the halftone image will be used to share the image. The image is hidden in the half tone image to form n amplitude half tone sharing images. Third, from the N amplitude and half tone sharing image, the shared images hidden in n amplitude are extracted by the self extraction technology of halftone image. Finally, from the shared images extracted from the N amplitude, the K amplitude sharing image is chosen arbitrarily, and the hidden secret is extracted by Lagrange interpolation technique. (4) transform domain stereo video blind watermarking algorithm. On the basis of realizing and analyzing the performance based on DCT and DFT based video watermarking algorithm, a transform domain stereo video blind watermarking algorithm is proposed. The watermark and the DFT watermark which have the opposite embedding rules are embedded in the left and right image of the stereo video. After the video is attacked, The watermark is extracted from the relative relationship between the left and right path images, and the more robust watermark is extracted from the DCT watermark and the DFT watermark. (5) the efficient improvement of the image watermarking algorithm based on the DFT. On the basis of the realization and analysis of the image watermarking algorithm based on the DFT, an efficient image watermarking algorithm based on DFT is proposed. The watermark information is coded to ensure that the image is embedded in the watermark, and the correct rate is reached to 100% under the condition of the attack. For each 4 x 4 frequency domain data block, the watermark is changed by the right upper left and the left to right, and the energy relationship is expressed with the 2 x 1 frequency domain points. Under the premise that PSNR is basically the same, the embedding capacity is increased by 2 times. The watermark capacity is expanded by adjusting the range of embedding watermark.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2017
【分類號】:TP391.41;TP309
[Abstract]:With the continuous development of computer and network technology, while people enjoy a lot of resources on the Internet, how to ensure the security of information has become an urgent problem. Information hiding is a major technology in the field of information security. Image and video information hiding is the most commonly used form, generally refers to a specific way to the image. The data of video and video are modified to hide information. After hiding, the use of images and videos is not affected. The halftone image is a special image carrier, only by two color values of black and white to represent an image. The information hiding in the halftone image can be divided into two categories: (1) a dot watermark: a halftone image through a dot. Features, direct hidden watermark information; (2) halftone visual encryption (halftone visual cryptography, HVC): in multiple halftone images, hidden a secret pattern. In HVC, (2,2) HVC is most commonly used, a secret pattern is hidden in two halftone images, and the secret pattern can be extracted by processing two halftone images. The former (2,2) HVC algorithm needs to be improved in extracting the correctness of the pattern (CDR) and generating the quality of the image. In addition, the existing (k, n) HVC algorithm needs codebook and will cause pixel expansion, that is, with the increase of the number of users n, the resolution of the generated half tone image needs to be extended to many times the original image. The stereo video is a kind of one. Special video carrier, each frame video includes images of about two channels. The images of the two channels are similar, but different. Stereo video watermarking becomes a new research direction of video watermarking. Because of the actual needs of the project, we hope to achieve a kind of image watermarking algorithm that can resist many attacks, including: coding attack, cutting attack. Attack, straight line attack, zoom attack, and can guarantee a certain watermark capacity. Aiming at all the problems above, this paper focuses on halftone information hiding, stereo video watermarking and image watermarking. The main achievements are as follows: (1) a new conjugate based color (2,2) halftone visual encryption algorithm. A new method for color halftone images is proposed. A new conjugate data hiding algorithm based on error diffusion (Data hiding by new conjugate color error diffusion, abbreviated NCCED) and a new conjugate data hiding algorithm based on point diffusion (Data hiding by) are applied to the concept of conjugation, which is applied to error diffusion half tone image and point diffusion half tone image information hiding. Conjugate color dot diffusion, abbreviated as NCCDD). The two algorithms hide the secret pattern in two color half tone images. By executing these two algorithms, the number of components needed to be replaced in the process of color half tone image information hiding, and the situation that the data hiding can not be implemented because the displacement interference is too large and can be improved. The correct decoding rate (CDR) of the secret pattern can also be extracted, and the quality of the generated half tone image can be improved; the concept of average per pixel interference value (Average distortion per pixel, abbreviated for short) is proposed, and the influence of the information hiding algorithm on the quality of the generated halftone image is measured by the size of ADPP. (2) high quality (2,2) halftone based on block conjugation According to the encryption algorithm, multiple half tone images are selected as training samples, and the minimum mean square filter (Least mean square filter, called LMSF) is generated to evaluate the quality of the halftone image with LMSF. In order to improve the quality of the half tone image generated by the information hiding algorithm, the concept of block conjugation is proposed and the block conjugation concept is applied to the halftone information hiding. A high quality halftone information hiding algorithm based on block conjugation (High quality data hiding in halftone images based on block conjugate, referred to as HQDHBC) is proposed. The algorithm hides a secret pattern in two halftone images based on error diffusion. When the conjugate or the same, the last point does not affect the block conjugate relation, the last point executes the normal halftone method and does not carry out the information hiding algorithm. Because of the execution of the HQDHBC algorithm, the number of information hiding algorithms can be reduced without affecting the accuracy of the secret pattern extraction, thus improving the quality of the generated halftone image. (3) the (k, n) half tone visual encryption algorithm based on Shamir sharing. The Shamir secret sharing is applied to the halftone visual encryption, and a K, n semi tone visual encryption algorithm based on Shamir secret sharing is proposed. Halftone visual encryption, a two value secret image is hidden in the N amplitude and half tone image, and K amplitude and half tone images are selected arbitrarily. The original secret image can be extracted. First, the original two value secret images are shared with the N amplitude meaningless sharing image by Shamir sharing. Then, the self hiding technology of the halftone image will be used to share the image. The image is hidden in the half tone image to form n amplitude half tone sharing images. Third, from the N amplitude and half tone sharing image, the shared images hidden in n amplitude are extracted by the self extraction technology of halftone image. Finally, from the shared images extracted from the N amplitude, the K amplitude sharing image is chosen arbitrarily, and the hidden secret is extracted by Lagrange interpolation technique. (4) transform domain stereo video blind watermarking algorithm. On the basis of realizing and analyzing the performance based on DCT and DFT based video watermarking algorithm, a transform domain stereo video blind watermarking algorithm is proposed. The watermark and the DFT watermark which have the opposite embedding rules are embedded in the left and right image of the stereo video. After the video is attacked, The watermark is extracted from the relative relationship between the left and right path images, and the more robust watermark is extracted from the DCT watermark and the DFT watermark. (5) the efficient improvement of the image watermarking algorithm based on the DFT. On the basis of the realization and analysis of the image watermarking algorithm based on the DFT, an efficient image watermarking algorithm based on DFT is proposed. The watermark information is coded to ensure that the image is embedded in the watermark, and the correct rate is reached to 100% under the condition of the attack. For each 4 x 4 frequency domain data block, the watermark is changed by the right upper left and the left to right, and the energy relationship is expressed with the 2 x 1 frequency domain points. Under the premise that PSNR is basically the same, the embedding capacity is increased by 2 times. The watermark capacity is expanded by adjusting the range of embedding watermark.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2017
【分類號】:TP391.41;TP309
【參考文獻】
相關(guān)期刊論文 前10條
1 劉U啿,
本文編號:2129737
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2129737.html
最近更新
教材專著