基于动态失真补偿量化索引调制的可逆数据隐藏算法
doi: 10.3724/SP.J.1146.2009.00859
A Reversible Data Hiding Algorithm Based on Dynamic Distortion-Compensated Quantization Index Modulation
-
摘要: 不同于传统的失真补偿量化索引调制,该文提出了动态失真补偿量化索引调制的概念。两者的区别在于量化步长和失真补偿参数是否可变。首先推导出动态失真补偿量化索引调制可逆性的成立条件,然后推导出失真补偿参数的可允许范围,最后利用可逆性设计一个具体的可逆数据隐藏算法。在只执行一遍时,它的数据隐藏率高达1 bit每像素,高于其他可逆数据隐藏算法。另外,算法的动态特性有利于防止参数泄露。实验结果表明:不管初始条件如何,该算法既能正确解码出秘密信息,又能准确恢复原始载体。Abstract: The concept of dynamic Distortion-Compensated Quantization Index Modulation (dynamic DC-QIM) is proposed, which differs from the conventional DC-QIM in whether or not quantization step size and DC parameter are changeable. Firstly, the condition satisfying the reversibility of dynamic DC-QIM is deduced. Then, the allowable range of DC parameter is derived. Finally, the procedure of reversible data hiding algorithm based on dynamic DC-QIM is designed. Its data hiding rate can achieve as high as 1bpp in a single iteration, higher than its former counterparts. Furthermore, the use of dynamic characteristic is in favor of preventing its parameters from being disclosed. Experimental results show that it not only accurately decodes the secret information, but also perfectly restores the original cover, regardless of initial conditions.
-
Coltuc D and Tremeau A. Simple reversible watermarking schemes. Proc. SPIE: Security, Steganography, Watermarking of Multimedia Contents VII, San Jose, CA, Jan. 2005, Vol. 5681: 561-568.[2]Coltuc D and Chassery J M. Very fast watermarking by reversible contrast mapping[J].IEEE Signal Processing Letters.2007, 14(4):255-258[3]Eggers J J, Bauml R, and Tzschoppe R, et al.. Inverse mapping of SCS-watermarked data[J].Proc. Eleventh European Signal Processing Conference (EUSIPCO2002), Toulouse, France, Sep.2002, Vol. I:59-62[4]Perez-Gonzalez F, Balado F, and Hernandez J R. Performance analysis of existing and new methods for data hiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing.2003, 51(4):960-980[5]Prez-Freire L, Comesana P, and Prez-Gonzlez F. Detection in quantization-based watermarking: Performance and security issues. Proc. SPIE: Security, Steganography, Watermarking of Multimedia Contents VII, San Jose, CA, Jan. 2005, Vol. 5681: 721-733.[6]Vleeschouwer C D, Delaigle J F, and Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management[J].IEEE Transactions on Multimedia.2003, 5(1):97-105
计量
- 文章访问数: 3329
- HTML全文浏览量: 77
- PDF下载量: 744
- 被引次数: 0