基于小波变换的秘密图像共享方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着现代通信技术的飞速发展和计算机互联网技术的迅速普及,信息的共享、传播变得尤为重要。它给人们带来种种便利的同时也带来了一系列的信息安全问题,比如信息窃取问题、多媒体信息的版权保护问题、信息篡改问题等。而传统信息安全保障手段—密码术并不能真正解决此类问题。数字密写技术将秘密信息隐藏于公开的载体中进行传输,不易引起攻击者注意,降低了被截获的可能。
     现有的数字密写算法存在一定的缺陷,大多采用灰度图像作为传输的载体,限制了应用领域;采用一对一的嵌入,即一个秘密图像隐藏在一幅载体图像中,含密图像如果在传输过程中被截获或者被破坏,接收方将得不到任何信息。
     本文针对现有密写算法的不足之处,提出了一种新的基于小波变换的秘密图像共享方法。该算法弥补了经典的( r ,n)限方案的不足之处,通过设置多个门限值来控制恢复得到的秘密图像的质量。门限值设为( r1 ,r2,...,rk ,n),将秘密图像共享为n个子图,当拥有的子图数num≥rk时,恢复全部的秘密信息;当num < r1时,得不到任何秘密信息;当r1≤num     采用基于块的Arnold变换置乱算法不仅保证了块内像素间的相关性,同时增强了秘密信息传输的隐蔽性和安全性;采用小波变换和位平面扫描技术保证了每个像素块越前面的像素越能体现原图的主要能量;采用最低有效位替换方法将各个子图嵌入到彩色图像R,G,B三个颜色通道中,达到了更好的视觉效果。实验结果表明本文提出的方法具有较好的不可见性、较高的安全性和较大的嵌入容量等特点。
With the rapid development of modern communication technology and the wide application of computer internet technology, information sharing and transmission becomes more and more important. It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication. But traditional security protection way-cryptography can’t indeed solve the above problems. Steganography hides the secret information into public carrier to transmit it secretly, which can not arouse attacker’s attention and reduce the possibility of being intercepted and captured.
     There is some fault in recent Steganography, in which gray-image is used as carrier, which restricts the application domain. Further more, one secret image is hidden in one carrier image, the receiver couldn’t obtain anything once the stego-image is attacked or destroyed.
     This paper brings forward a new secret image sharing method based on discrete wavelet transform according to the fault of recent methods. This method is reparation of traditional image sharing technique, which controls the vision quality of the extracted secret image by defining several thresholds. The thresholds are defined as ( r1 ,r2,...,rk ,n). Sharing the secret image into n shadows, when the number of shadows are more than rk , the receiver can obtain all the information of the secret image, when fewer than r1 , we can get nothing, when the number between the two values, the more shadows, the better quality of the secret image.
     Adapting Arnold transform based on block not only ensure the relativity between pixels, but also improve the invisibility and the security of the secret information. discrete wavelet transform and Bit-plane scanning is used to ensure the more information the frontier pixels of each block pixels. A well visual effect can be achieved adapting Least Significant Bit substitution method to imbed each shadow image into R, G and B channels of the cover image. The experimental results show that our method can achieve the better invisibility, higher security and the big imbedding space.
引文
[1]杨义先,钮心忻.信息安全新技术[M].北京:北京邮电大学出版社,2002.47-148.
    [2]孙圣和,陆哲明,牛夏牧等著.数字水印技术及应用[M],北京:科学出版社,2004.11-30.
    [3] B. Pfitzmann. Information Hiding Terminology[A]. In: First Information Hiding Workshop[C] 1996:347-350.
    [4]汪小帆,戴跃伟,茅耀斌.信急隐藏技术——方法与应用[M].北京:机械工业出版社,2001.1-14.
    [5] Zoran Duric, Michael Jacobs, Sushil Jajodia. Information Hiding: Steganography and Steganalysis[J]. Handbook of Statistics, 2005, 24: 171-187.
    [6]刘振华,尹萍.信息隐藏技术及其应用[M].北京:科学出版社,2002.
    [7]吴秋新,钮心忻,杨义先等译.信息隐藏技术——隐写术与数字水印[M].北京:人民邮电出版社,2001.
    [8]杨义先,钮心忻.应用密码学[M].北京:北京邮电大学出版社,2005.
    [9] G. J. Simmons. The Prisoner’s Problem and The Subliminal Channel[J]. Proceedings of Crypto-83, 1984: 51-67.
    [10] C. C. Chang,J. Y. Hsiao,C. S. Chan. Finding optimal least-significant bit substitution in image hiding by dynamic programming strategy[J].Pattern Recognition, 2003, 36(7): 1583-1595.
    [11] H. Noda, J. Spaulding, M. N. Shirazi, et al. Application of bit-plane decomposition steganography to JPEG2000 encoded images[J]. IEEE Signal Processing Letters, 2002(9): 410-413.
    [12] C. K. Chan, L. M. Cheng. Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004,37(3): 469-474.
    [13] F. A. P. Peticolas, R. J. Anderson, M. G. Kuhn. Information Hiding: A Surver[C]. Proceedings of the IEEE,1999, 87(7): 1062-1077.
    [14] R. Z. Wang, C. F. Lin, J. C. Lin. Image hiding by optimal LSB substitution and genetic algorithm[J]. Pattern Recognition, 2001, 34(3): 671-683.
    [15]张新鹏,王朔中,张开文.一种抗统计分析的 LSB 密写方案[J].中国图像图形学报,2003(9).
    [16]张新鹏,王朔中.对OPA密写的检测和增强安全性的调色板图像密写方案[J],电子学报,2004,32(10):1702-1705.
    [17] Suk-Ling Li, Kai-Chi Leung. A novel image-hiding scheme based on block difference[J]. Pattern Recognition, 2006, 39(6): 1168-1176.
    [18] Yu-Chen Hu. High-capacity image hiding scheme based on vector quantization[J]. Pattern Recognition, 2006, 39(9): 1715-1724.
    [19]王海春,邱寄帆,邱敦国.基于图片的数字密写设计与实现,计算机工程[J],2006,32(21):155-156.
    [20]罗向阳,陆佩忠,刘粉林.一类可抵御 SPA 分析的动态补偿 LSB 信息隐藏方法[J],计算机学报,2007,30(3):463-473.
    [21]徐江峰,李昊,杨有.一种基于多变换的 LSB 隐写算法[J].计算机科学,2007,34(10):106-109.
    [22] Faisal T. Alturki, Ali F. Almutairi, Russell M. Mersereauu. Analysis of blind data hiding using discrete cosine transforms phase modulation[J]. Signal Processing: Image Communication, 2007, 22(4):347-362.
    [23] C. C. Chang, C. L. Chiang, J. Y. Hsiao. A DCT-domain System for Hiding Fractal CompressedImages[C]. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005, 28(2): 83-86.
    [24] Xiaoxia Li, Jianjun Wang. A steganographic method based upon JPEG and particle swarm optimization algorithm[J]. Information Sciences, 2007, 177(15): 3099-3109.
    [25] Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng. Reversible hiding in DCT-based compressed images[J], Information Sciences, 2007, 177(13): 2768-2786.
    [26] Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin. SVD-based digital image watermarking scheme[J],Pattern Recognition Letters, 2005, 26(10): 1577-1586.
    [27]王宽全,李伟东,张凤淼,等.一种新的图像置乱及 DCT 域信息隐藏算法[J],计算机科学,2002.
    [28]李庆忠,于琛,褚东升.一种 DCT 域稳健的彩色图像隐藏方法[J],计算机应用研究,2007(1):188-190.
    [29]王海军,樊养余.基于灰关联的彩色图像 DWT 域信息隐藏算法[J],计算机应用,2006,26(9):2153-2155.
    [30]刘劲,康志伟,何怡刚.一种基于小波对比度和 LSB 的密写方法[J],电子学报,2007,35(7):1391-1393.
    [31]丁玮,阎伟齐,齐东旭.基于 Arnold 变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,13(4):338-341.
    [32] Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin. A new steganographic method for color and grayscale image hiding[J], Computer Vision and Image Understanding, 2007, 107(3): 183-194.
    [33]周丽.数字图像置乱使用的若干变换周期问题的研究[J].计算机工程与应用,2003,39(18):77-79.
    [34] A. Shamir. How to share a secret[J]. In Communications of the ACM, 1979, 22(11): 612-613.
    [35] G. R. Blakley. Safeguarding cryptographic keys[C]. Proc. AFIPS1979 National Computer Conference, New York, 1979: 313-317.
    [36] Chih-Ching Thien, Ja-Chen Lin. Secret image sharing[J]. Computers & Graphics, 2002, 26(5): 765-770.
    [37] Y. S. Wu, C. C. Thien, J. C. Lin. Sharing and hiding secret images with size constraint[J]. Pattern Recognition, 2004, 37(7): 1377-1385.
    [38] Ran-Zan Wang, Chin-Hui Su. Secret image sharing with smaller shadow images[J]. Pattern Recognition letters, 2006, 27(6): 551-555.
    [39] S. K. Chen, J. C. Lin. Fault-tolerant and progressive transmission of images[J]. Pattern Recognition, 2005, 38(12): 2466–2471.
    [40] Chin-Chen Chang, Iuon-Chang Lin. A new (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image[J]. Proceeding of ICCT, 2003: 196-202.
    [41] Shyong Jian Shyu. Efficient visual secret sharing scheme for color images[J]. Pattern Recognition, 2006, 39(5): 866-880.
    [42] Yung-Fu Chen, Yung-Kuan Chan, Ching-Chun Huang. A multiple-level visual secret-sharing scheme without image size expansion[J]. Information Sciences, 2007, 177(21): 4696-4710
    [43] Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin. A novel secret image sharing scheme in color images using small shadow images[J]. Information Sciences, 2008, 178(11): 2433-2447.
    [44] Wen-Pinn Fang. Friendly progressive visual secret sharing[J]. Pattern Recognition, 2008, 41(4): 1410-1414.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700