结合EMD-
c l 嵌入的多载体密图分存方法Multi-carrier secret image sharing scheme with EMD-
c l embedding- 2018年23卷第8期 页码:1108-1130
收稿:2017-11-21,
修回:2018-3-6,
纸质出版:2018-08-16
DOI: 10.11834/jig.170596
移动端阅览

浏览全部资源
扫码关注微信
收稿:2017-11-21,
修回:2018-3-6,
纸质出版:2018-08-16
移动端阅览
目的
2
传统误差扩散或恢复函数的多载体密图分存会对嵌密载体视觉质量造成较大影响,同时恢复函数需单独设计,只适用于二值或灰度图像,且通过简单Arnold置乱或异或加密仅能提供有限的安全性。针对此问题,提出结合EMD-
c
l
嵌入的多载体密图分存方法。
方法
2
采用双哈希MD5和SHA-1值产生多组与密图属性和用户密钥有关的置乱参数,驱动2维双尺度矩形映射来改变载体像素对应关系,然后将置乱后载体同位置像素构成向量,按扩展约瑟夫遍历映射分配基向量,通过EMD-
c
l
嵌入秘密像素,从而将密图分存到多张载体中。
结果
2
采用EMD-
c
l
提高了嵌密载体视觉质量且不需额外设计恢复函数,可针对不同分辨率和灰度阶密图分存。所提方法载体像素位置和EMD-
c
l
基向量都与密图MD5和SHA-1值以及用户密钥紧密绑定,仅有正确用户密钥和密图MD5和SHA-1值才能对密图恢复,并可通过第三方公信方托管的参与者分存信息MD5和SHA-1值使得所述策略具备认证能力。所提方法密钥空间为1.193 6×10
118
,可抵抗暴力破解。实验结果表明,结合EMD-
c
l
,所提方法具有较好的嵌密载体视觉质量,NC趋近于1,对于EMD-3
l
,嵌密载体PSNR均接近50 dB;对于EMD-5
l
和EMD-7
l
,PSNR分别达到45 dB和42 dB,而传统方法,PSNR最好仅为42 dB。所提方法可分存不同分辨率和灰度阶密图,可对参与者密钥分存信息的真实性进行检验且对密图哈希和用户密钥极度敏感。
结论
2
所提方法具有较低复杂度,较高安全性和普适性及认证能力,在整体性能上优于传统误差扩散或恢复函数的多载体密图分存方法,适用于对嵌密载体视觉质量要求高和针对不同分辨率和灰度阶密图分存的安全场景中。
Objective
2
Conventional multi-carrier secret image sharing scheme based on error diffusion and recovery function can be used to hide secret image in multiple same size carriers. In these carriers
the error diffusion method leads to low visual quality and the recovery function is only designed for specific gray scale images
such as 1-bit binary images or 8-bit gray scale images. This scheme can only provide limited security by using simple Arnold scrambling or XOR encryption in which Arnold mapping is usually employed for special resolution images
such as square images. However
the security of Arnold mapping is poor due to its dependence on iteration numbers
and its scrambling coefficients are only 1
1
1
2. In addition
Arnold mapping cannot change its mapping type and form by multiple iterations. To address these problems and further improve the visual qualities of carriers and security
a multi-carrier secret image sha
ring scheme with EMD-
c
l
embedding is proposed in this study.
Method
2
In sharing phase
the double hash function values (MD5 and SHA-1 values) are first used to randomly generate scrambling. Iteration variables of secret images and related user keys are used to change every carrier pixel position by 2D bi-scale rectangular mapping. Vectors composed of same position pixels in scrambled carriers are then randomly allocated to the weights of EMD-
c
l
basis vector using extended Josephus mapping where the start position and count termination value
count gap
and count direction sequences are added to increase the number of permutations and the kinds of variations in Josephus mapping. Afterward
EMD-
c
l
embedding strategy is used to embed secret image pixels into multiple carriers to verify the high visual qualities of stego carriers. Finally
both user keys and the double hash function values of secret image are distributed to
N
participant sharing information by Lagrange (
N
N
) under module
p
where each participant sharing information is kept by one participant and the MD5 and SHA-1 values of each participant sharing information are known to the third trust party to guarantee that every participant sharing information cannot be faked. In recovering phase
all participant sharing information is verified by checking their MD5 and SHA-1 values known to the third trust party. This information is used to recover the related variables
such as the MD5 and SHA-1 values of secret image and the user keys by Lagrange (
N
N
) under module
p
. These related variables are used to generate groups of scrambling and iteration variables of a 2D bi-scale rectangular mapping and variables of extended Josephus mapping. Scrambling and iteration variables are used to find the mapping relationship
s between each secret pixel and
N
carrier pixels. Extended Josephus mapping variables are used to find the weights of EMD-
c
l
and EMD-
c
l
is adopted to embed the secret image pixels. In recovering phase
if all participant sharing information passes the third trust party checking and the related variables are the same as those of the sharing phase
then the secret image can be recovered correctly.
Result
2
Unlike in conventional methods
the visual qualities of all stego carriers are enhanced because EMD-
c
l
only makes slight modifications
and the most modification for any non-overflow pixel is only
$$ \pm \left\lfloor {c/2} \right\rfloor $$
. The proposed scheme need not design any recovery function and can be easily applied in different resolutions or gray scale images. The following are the improved securities:1) The proposed strategy uses different 2D bi-scale rectangular mappings to scramble distinct carrier with varying iteration numbers to avoid the fixed relationship of carrier pixels. 2) A 2D bi-scale rectangular mapping can be used to scramble images in different resolution
and its multiple iterations differ in transform type and form
so this mapping is more complex and secure than Arnold mapping. 3) By introducing the double hash function values
that is
the MD5 and SHA-1 values of the secret image
the proposed strategy easily overcomes the conflict brought by the single hash value (MD5 or SHA-1 value). 4) The proposed strategy uses extended Josephus mapping to scramble weights of EMD-
c
l
basis vector
guaranteeing high steganography security. 5) All key variables in the proposed strategy
that is
the MD5 and SHA-1 values of the secret image
and the user keys are closely binded where only the correct user keys and MD
5 and SHA-1 values can be used to recover the secret image but not vice versa. 6) To avoid tricks
the MD5 and SHA-1 values of key related variable sharing information are known to the third trusted party to provide authentication. 7) The total key space is 1.193 6×10
118
which can resist brute-force attack. Experimental results show that
by EMD-
c
l
embedding
the proposed multi-carrier secret image sharing scheme has enhanced visual qualities in stego carriers. The NC value is close to 1. The PSNR values of all stego carriers are close to 50 dB by EMD-3
l
embedding strategy. In EMD-5
l
embedding strategy
the PSNR values of all stego carriers are close to 45 dB
and the PSNR values of all stego carriers are close to 42 dB for the EMD-7
l
method. However
in conventional multi-carrier secret image sharing schemes
the best results of the PSNR values of all stego carriers are only approximately 42 dB. The proposed strategy can share different resolutions or different gray scale secret images
so it boasts high universality. Everyone can verify the facticity of any key sharing information provided by other participants. Moreover
the strategy is extremely sensitive to any slight modification in the user keys and hash function values:MD5 and SHA-1 or both of them. Therefore
the security of the proposed strategy is higher than that of conventional multi-carrier secret image sharing schemes.
Conclusion
2
The proposed method has low complexity and high security and universality
and it provides several authentication capabilities. Thus
the overall performance of the proposed method is superior to that of conventional multi-carrier secret image sharing schemes in terms of error diffusion and recovery function. The proposed method is suitable for multi-carrier secret image sharing schemes that need the high visual qualities of stego carriers and require sharing of secret images in different resolutions or gray scale secret.
Tang Z J, Wang F, Zhang X Q. Image encryption based on random projection partition and chaotic system[J]. Multimedia Tools and Applications, 2017, 76(6):8257-8283.[DOI:10.1007/s11042-016-3476-1]
Li Y P, Wang C H, Chen H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Optics and Lasers in Engineering, 2017, 90:238-246.[DOI:10.1016/j.optlaseng.2016.10.020]
Sharif A, Mollaeefar M, Nazari M. A novel method for digital image steganography based on a new three-dimensional chaotic map[J]. Multimedia Tools and Applications, 2017, 76(6):7849-7867.[DOI:10.1007/s11042-016-3398-y]
Khanna A K, Roy N R, Verma B. Digital image watermarking and its optimization using genetic algorithm[C ] //International Conference on Computing, Communication and Automation. Noida, India: IEEE, 2017: 1140-1144. [ DOI:10.1109/ccaa.2016.7813888 http://dx.doi.org/10.1109/ccaa.2016.7813888 ]
Munib S, Khan A. Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding[J]. Multimedia Tools and Applications, 2017, 76(6):8695-8710.[DOI:10.1007/s11042-016-3485-0]
Vidyadharan D S, Thampi S M. Digital image forgery detection using compact multi-texture representation[J]. Journal of Intelligent&Fuzzy Systems, 2017, 32(4):3177-3188.[DOI:10.3233/JIFS-169261]
Wu C C, Kao S J, Hwang M S. A high quality image sharing with steganography and adaptive authentication scheme[J]. Journal of Systems and Software, 2011, 84(12):2196-2207.[DOI:10.1016/j.jss.2011.06.021]
Chang C C, Chen Y H, Wang H C. Meaningful secret sharing technique with authentication and remedy abilities[J]. Information Sciences, 2011, 181(14):3073-3084.[DOI:10.1016/j.ins.2011.03.002]
Wu X T, Sun W. Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform[J]. Journal of Systems and Software, 2013, 86(4):1068-1088.[DOI:10.1016/j.jss.2012.11.021]
Ouyang X B, Shao L P, Chen W X. Meaningful ( K , N ) image sharing scheme combined with the adjusting difference transformation[J ] . Journal of Image and Graphics, 2015, 20(5):633-642..
欧阳显斌, 邵利平, 陈文鑫.结合调整差值变换的( K , N )有意义图像分存方案[J ] .中国图象图形学报, 2015, 20(5):633-642. [DOI:10.11834/jig.20150506 ] .
Ouyang X B, Shao L P. Meaningful ( K , N ) free expansion image sharing scheme based on GF(2 3 )[J ] . Computer Science, 2015, 42(12):251-256..
欧阳显斌, 邵利平.一种基于GF(2 3 )的( K , N )有意义无扩张图像分存方案[J ] .计算机科学, 2015, 42(12):251-256. [DOI:10.11896/j.issn.1002-137X.2015.12.054 ] .
Wu X T, Sun W. Image sharing scheme based on error diffusion[J]. Journal of Computer Applications, 2011, 31(1):74-77, 81.
吴小天, 孙伟.基于误差扩散的图像分存方案[J].计算机应用, 2011, 31(1):74-77, 81. [DOI:10.3724/SP.J.1087.2011.00074]
Tsai T F, Su P C. An information sharing scheme in halftone images based on multi-scale error diffusion[C ] //Proceedings of 2015 International Carnahan Conference on Security Technology. Taipei, Taiwan, China: IEEE, 2015: 369-372. [ DOI:10.1109/ccst.2015.7389712 http://dx.doi.org/10.1109/ccst.2015.7389712 ]
Su P C, Tsai T F, Chien Y C. Visual secret sharing in halftone images by multi-scale error diffusion[J]. Multimedia Tools and Applications, 2018, 77(10) 12111-12138.[DOI:10.1007/s11042-017-4861-0]
Ou D H, Wu X T, Sun W, et al. Secret gray-level image sharing schemebased on recovery function and error diffusion[J]. Computer Science, 2013, 40(2):112-116.
欧锻灏, 吴小天, 孙伟, 等.基于恢复函数和误差扩散的灰度图像分存方案[J].计算机科学, 2013, 40(2):112-116. [DOI:10.3969/j.issn.1002-137X.2013.02.025]
Ou D H, Ye L L, Sun W. User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion[J]. Journal of Visual Communication and Image Representation, 2015, 29:46-60.[DOI:10.1016/j.jvcir.2015.01.017]
Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11):781-783.[DOI:10.1109/LCOMM.2006.060863]
Qin C, Chang C C, Hsu T J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images[J]. Multimedia Tools and Applications, 2015, 74(15):5861-5872.[DOI:10.1007/s11042-014-1894-5]
Kim H J, Kim C, Choi Y, et al. Improved modification direction methods[J]. Computers&Mathematics with Applications, 2010, 60(2):319-325.[DOI:10.1016/j.camwa.2010.01.006]
Niu X J, Ma M, Tang R, et al. Image steganography via fully exploiting modification direction[J]. International Journal of Security and Its Applications, 2015, 9(5):243-254.[DOI:10.14257/ijsia.2015.9.5.24]
Lee C F, Chang C C, Pai P Y, et al. Adjustment hiding method based on exploiting modification direction[J]. International Journal of Network Security, 2015, 17(5):607-618.[DOI:10.6633/IJNS.201509.17(5).12]
Liao Q N, Sun X B, Pan R D. Secure steganography by n -dimensional hypercube modulo mapping[J ] . Acta Electronica Sinica, 2016, 44(1):160-167.
廖琪男, 孙宪波, 潘瑞冬. n 维超立方体模映射安全隐写算法[J ] .电子学报, 2016, 44(1):160-167. [DOI:10.3969/j.issn.0372-2112.2016.01.024 ]
Xiang D S, Xiong Y S. Digital image scrambling based on Josephus traversing[J]. Computer Engineering and Applications, 2005, 41(10):44-46.
向德生, 熊岳山.基于约瑟夫遍历的数字图像置乱算法[J].计算机工程与应用, 2005, 41(10):44-46. [DOI:10.3321/j.issn:1002-8331.2005.10.014]
Guo Y, Shao L P, Yang L. Bit-level image encryption algorithm based on Josephus and Henon chaotic map[J]. Application Research of Computers, 2015, 32(4):1131-1137.
郭毅, 邵利平, 杨璐.基于约瑟夫和Henon映射的比特位图像加密算法[J].计算机应用研究, 2015, 32(4):1131-1137. [DOI:10.3969/j.issn.1001-3695.2015.04.041]
Shao L P, Qin Z, Liu B, et al. 2D bi-scale rectangular mapping and its application in image scrambling[J]. Journal of Computer-Aided Design&Computer Graphics, 2009, 21(7):1025-1034.
邵利平, 覃征, 刘波, 等.二维双尺度矩形映射及其在图像置乱上的应用[J].计算机辅助设计与图形学学报, 2009, 21(7):1025-1034.
相关作者
相关机构
京公网安备11010802024621