首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于低有效位数值排序的密文域可逆信息隐藏
引用本文:孔咏骏,张敏情,涂广升,彭菓玉.基于低有效位数值排序的密文域可逆信息隐藏[J].科学技术与工程,2019,19(33):279-289.
作者姓名:孔咏骏  张敏情  涂广升  彭菓玉
作者单位:武警工程大学网络与信息安全武警部队重点实验室,西安,710086;武警工程大学密码工程学院,西安,710086
基金项目:基于加密过程的密文域可逆信息隐藏理论与方法研究
摘    要:提出了一种基于低有效位数值排序的密文域可逆信息隐藏方法。该方法首先对像素信息进行位平面划分,然后对非重叠像素块的低有效位进行数值排序实现秘密信息的可逆嵌入,同时利用排序结果提取排序特征。整个加密过程中对不同位平面采用不同的加密机制,对低有效位进行Josephus映射加密,将映射对应的低有效位排序特征作为混沌序列控制变量再对高有效位进行logistic加密。利用低有效位像素值排序,不仅能够实现信息提取与图像恢复的可分离操作,而且可以驱动排序特征控制整个高有效位加密过程,从而提高图像加密的安全性。

关 键 词:密文域可逆信息隐藏  像素值排序  Josephus遍历映射  Logistic混沌加密
收稿时间:2019/4/18 0:00:00
修稿时间:2019/8/21 0:00:00

An Efficient Reversible Data Hiding Scheme in Encryption Domain Based on Lower-Significant-Bit Value Ordering Method
KONG Yong-jun and.An Efficient Reversible Data Hiding Scheme in Encryption Domain Based on Lower-Significant-Bit Value Ordering Method[J].Science Technology and Engineering,2019,19(33):279-289.
Authors:KONG Yong-jun and
Abstract:This paper proposes a reversible data hiding method in encryption domain based on lower-bit pixel value ordering. Firstly, the pixel information is divided by bit planes. Then the low-significant-bits of non-overlapping pixel blocks are sorted by pixel value to realize the reversible embedding of secret information. During the whole encryption process, different encryption mechanisms are used for different bit planes. The low-significant-bits are encrypted by Josephus mapping, and the ranking features of the low-significant-bits corresponding to the mapping are taken as the control variables of the chaotic sequence. The high-significant-bits are encrypted by Logistic method finally. Using low-significant-bit pixel value sorting method can not only realize the separation of information extraction and image restoration, but also drive sorting features to control the whole high-significant-bit encryption process, thereby improving the security of image encryption.
Keywords:reversible data hiding in encryption domain    pixel value ordering    Josephus traversing cast    Logistic chaotic encryption
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号