计算机科学与探索 ›› 2020, Vol. 14 ›› Issue (11): 1849-1864.DOI: 10.3778/j.issn.1673-9418.1910073

• 网络与信息安全 • 上一篇    下一篇

结合二次聚类编码的生成式可逆信息隐藏方法

赵迪,邵利平,任平安   

  1. 陕西师范大学 计算机科学学院,西安 710119
  • 出版日期:2020-11-01 发布日期:2020-11-09

Reversible Generating Information Hiding Method Through Quadratic Clustering Coding

ZHAO Di, SHAO Liping, REN Ping'an   

  1. School of Computer Science, Shaanxi Normal University, Xi'an 710119, China
  • Online:2020-11-01 Published:2020-11-09

摘要:

为避免纹理生成式信息隐藏和马赛克拼图式信息隐藏存在的拼接痕迹和产生有意义图像,并提高抗攻击能力,提出一种结合二次聚类编码的生成式可逆信息隐藏方法。将不同灰度阶随机二值噪点小块作为候选样本小块,由二次聚类编码筛选出用于二值秘密信息表示的编码样本小块。然后结合随机二值参考图和嵌密位置来放置编码样本小块以生成含密掩体。在提取时,按二次聚类编码产生编码样本小块,结合参考图和嵌密位置提取秘密信息。所提方法不产生拼接痕迹,也不涉及任何修改式嵌入,可生成视觉质量良好的有意义图像并可无损地恢复为原掩体。所提方法具有较好的抗攻击能力,且嵌入和提取过程完全依赖于用户密钥,具有较高的安全性。

关键词: 生成式信息隐藏, 马赛克拼图, 二次聚类编码, 可逆, 无修改

Abstract:

In texture generating-based information hiding and mosaic-based information hiding, there always exist stitching traces. To avoid these stitching traces and produce meaningful image and further improve attack abilities, a reversible generating information hiding method through quadratic clustering coding is proposed. The proposed method takes random two-value noise patches as candidate sample patches and selects coding sample patches for representing two-value secret information through quadratic clustering coding. The stego cover image is produced by placing coding sample patches according to a random two-value reference image and embedding positions. In   extraction, the coding sample patches are generated by quadratic clustering coding, and then the two-value secret information is extracted by combining the two-value reference image and random embedding positions. The proposed method can generate meaningful images with fantastic visual quality without any splicing trace or modification embedding. The cover image can be completely restored to the original image without loss of quality. The proposed method has wonderful anti-attack abilities, and the embedding and extraction process is entirely dependent on the user key, therefore it has high security.

Key words: generating information hiding, mosaic, quadratic clustering coding, reversible, no modification