Font Size: a A A

Image Hiding Techniques Based On Data Interpolation

Posted on:2019-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:L F ShiFull Text:PDF
GTID:2428330566476016Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology and multimedia technology,a large number of multimedia resources have been produced on the Internet.The application of multimedia data sharing and dissemination is increasingly widespread in people's daily life.It brings great convenience to people,but also causes a series of hidden dangers and problems.In particular,how to protect the security of multimedia data has become a key issue for researchers at present.Aiming at this problem,researchers first introduced encryption technology to protect multimedia data,ensuring that only legitimate recipients can access encrypted multimedia data.Considering that the encrypted data may cause the listener's attention to carry out the attack,the researchers also put forward the data hiding technology.Data hiding technology embeds secret data into multimedia carriers.Because embedded operation does not change the audio-visual characteristics of multimedia,it will not cause listeners' attention,so as to achieve the purpose of data security transmission.According to the different data types,data hiding technology can be divided into text data hiding,image data hiding,video data hiding and audio data hiding.This paper mainly studies the technology of image data hiding.Based on analyzing the current image data hiding technology,data hiding technology to study the image data interpolation by using the theory of this paper,put forward a kind of image data hiding algorithm based on interpolation technique and the reference matrix,and designs a random interpolation method and data hiding scheme for encrypted image hiding,good performance.The main results of this paper are as follows.1.Design of random interpolation and data hiding scheme for encrypted imageThe algorithm generates interpolation image by data interpolation technology.In the process of data embedding,we use reference matrix to modify pixel values of interpolation pixels,so as to achieve data hiding.Because the embedding process does not modify the pixels of the original image,so the algorithm can not only extract the secret data correctly,but also achieve the purpose of completely restoring the original image.Specifically,in the embedded data,firstly the input image interpolation with linear interpolation method,generates a new image;then the interpolation image is divided into nonoverlapping blocks,the block size is 2 x 2;3 pixels with pixel structure of each block,the 3 pixels on the map to the reference matrix in the plane coordinates of the pixelsaccording to the form;finally the secret data embedding and the reference matrix to modify the vertical coordinate corresponding to the value realization of data embedding.When extracting data,we use the same method to do the overlapped block image,and construct 3 pixel pairs with 4 pixels of each block,then map the 3 pixel pairs to the reference matrix,and finally extract the secret data according to the corresponding coordinates of pixels.Since the embedding process only modifies the interpolated pixels,the input image can be recovered completely by sampling the loaded image and extracting the non interpolated pixels.A large number of experimental results show that the algorithm has larger embedding capacity and better visual quality,and can restore the input image accurately.2.A random interpolation method and data hiding scheme for cipher images are proposed.The histogram of the encrypted image obtained by the common image encryption algorithm has the characteristic of approximately uniform distribution.The traditional data interpolation method is applied to the encrypted image,and the histogram of the interpolated image is not approximately uniform.If these interpolated images are used as vectors to encrypt data in the encrypted domain,it may cause listeners' attention,so as to reduce the security of data hiding system.For this reason,this paper studies and designs a random interpolation method for the encrypted image.This method can ensure the approximate uniform distribution of the histogram of the interpolated results of the encrypted image,so as to ensure the security of the carrier image.On this basis,this paper designs an data hiding scheme for encrypted domain.Specifically,in the embedded data,according to the encryption key of the original image encryption operation,generating a cipher image,image interpolation and utilizing the random interpolation method is proposed in this paper to generate encrypted image,the secret data embedded into random pixel interpolation.When the data is extracted,the bit completion data is extracted directly from the interpolated pixels according to the random embedding rule.When the image is restored,the encrypted image can be recovered completely by sampling the encrypted image and extracting the non interpolated pixels.The experimental results show that the stochastic interpolation method in this paper has better security,and the data hiding scheme of the encrypted domain has a larger embedding capacity.
Keywords/Search Tags:Data interpolation, data hiding, encrypted image, reversible data hiding, reference matrix, random interpolation
PDF Full Text Request
Related items