液晶与显示, 2020, 35 (4): 374, 网络出版: 2020-05-30  

基于级联混沌映射与低位嵌入的图像隐写算法

Image steganography algorithm based on cascaded chaotic map and low bits embedding
作者单位
滇西科技师范学院 信息工程学院, 云南 临沧 677000
摘要
为保证部分具有重要价值的数字图像在不可信信道中传输的安全性, 本文设计了一种基于级联混沌映射和伪装图低位嵌入的图像隐写算法。该算法为置乱-混淆-低位嵌入结构。在置乱步骤中, 首先通过两个混沌映射的级联设计了一种新型的混沌映射并用其产生具有高度随机性的随机数序列, 然后随机数序列被用于数字图像的置乱, 生成置乱图。在混淆步骤中, 通过用户随机选择的伪装图与置乱图的与或操作来实现置乱图中像素值的混淆。最后, 在低位嵌入步骤中, 混淆步骤生成的图像按照两个位平面一组的规则被拆分成4份子图像并嵌入到伪装图的最低两位。在多个混沌映射性能指标的测试中, 本文所提出的级联混沌映射均表现优异。在图像安全性和性能分析实验中, 本文所提出的图像隐写算法表现出高度的安全性和极高的执行效率。
Abstract
In order to ensure the security of some digital images with important value in untrusted channels, an image steganography algorithm based on cascaded chaotic map and low-bits embedding is proposed. The algorithm has a permutation-confusion-low bits embedding structure. In the permutation step, a novel chaotic map is firstly designed by cascade of two chaotic maps and used to generate a highly random sequence of random numbers, and then the random number sequence is used for scrambling digital images. In the confusion step, the confusion of the pixel values in the scrambling image is achieved by the XOR operation of the randomly selected cover image and the scrambling image. Finally, in the low bits embedding step, the image generated by the confusion step is split into four sub-images and embedded in the lowest two bits of the cover image. In the test of several chaotic map performance indicators, the cascaded chaotic map proposed in this paper is excellent. In the image security and performance analysis experiments, the image steganography algorithm proposed in this paper also shows high security and high execution efficiency.
参考文献

[1] 黄晓生.数字图像安全技术研究进展[J].华东交通大学学报, 2006, 23(1): 82-86.

    HUANG X S. A brief review on security of digital image [J]. Journal of East China Jiaotong University, 2006, 23(1): 82-86. (in Chinese)

[2] 于琛.图像隐藏技术在信息安全中的应用研究[D].青岛: 中国海洋大学, 2006.

    YU C. The application of image hiding technique in information security [D]. Qingdao: Ocean University of China, 2006. (in Chinese)

[3] FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps [J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.

[4] WANG X Y, YANG L, LIU R, et al. A chaotic image encryption algorithm based on perceptron model [J]. Nonlinear Dynamics, 2010, 62(3): 615-621.

[5] KANSO A, GHEBLEH M. A novel image encryption algorithm based on a 3D chaotic map [J]. Communications in Nonlinear Science and Numerical Simulation, 2012, 17(7): 2943-2959.

[6] CHEN G R, MAO Y B, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps [J]. Chaos, Solitons & Fractals, 2004, 21(3): 749-761.

[7] LIU L, ZHANG Q, WEI X P, et al. Image encryption algorithm based on chaotic modulation of Arnold dual scrambling and DNA computing [J]. Journal of Computational and Theoretical Nanoscience, 2011, 4(11/12): 3537-3542.

[8] LAFE O. Data compression and encryption using cellular automata transforms [J]. Engineering Applications of Artificial Intelligence, 1997, 10(6): 581-591.

[9] KEKRE H B, SARODE T, HALARNKAR P N. Partial image scrambling using Walsh sequency in sinusoidal wavelet transform domain [M]//BERRETTI S, THAMPI S M, SRIVASTAVA P R. Intelligent Systems Technologies and Applications. Cham: Springer, 2015: 471-484.

[10] SONG C Y S, QIAO Y L. A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos [J]. Entropy, 2015, 17(12): 6954-6968.

[11] 雷正桥, 肖迪.基于空域可恢复信息隐藏的图像安全人工退化算法[J].计算机科学, 2015, 42(3): 162-166.

    LEI Z Q, XIAO D. Artificial image security degradation algorithm based on invertible information hiding in spatial domain [J]. Computer Science, 2015, 42(3): 162-166. (in Chinese)

[12] 穆晓芳, 邓红霞, 李晓宾, 等.基于人工蜂群算法的两阶段图像隐写分析算法[J].计算机科学, 2019, 46(6): 174-179.

    MU X F, DENG H X, LI X B, et al. Two-phase Image Steganalysis algorithm based on artificial bee colony algorithm [J]. Computer Science, 2019, 46(6): 174-179. (in Chinese)

[13] 陈嘉勇, 王超, 张卫明, 等.安全的密文域图像隐写术[J].电子与信息学报, 2012, 34(7): 1721-1726.

    CHEN J Y, WANG C, ZHANG W M, et al. A secure image Steganographic method in encrypted domain [J]. Journal of Electronics & Information Technology, 2012, 34(7): 1721-1726. (in Chinese)

[14] GUL E, OZTURK S. A novel hash function based fragile watermarking method for image integrity [J]. Multimedia Tools and Applications, 2019, 78(13): 17701-17718.

[15] YAO X M, DU W C, HUANG M, et al. Pattern-based blind spatial image watermarking [C]//Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. Jinggangshan, China: IEEE, 2010.

[16] SU Q T, NIU Y G, WANG Q J, et al. A blind color image watermarking based on DC component in the spatial domain [J]. Optik, 2013, 124(23): 6255-6260.

[17] 吴佳楠, 王世刚, 张迪, 等. 融合量子密钥真随机性的二值图像水印 [J]. 光学 精密工程, 2017, 25(11): 2968-2974. WU J N, WANG S G, ZHANG D, et al. Binary image watermark fusionbased on quantum key true randomness [J]. Optics and Precision Engineering, 2017, 25(11): 2968-2974. (in Chinese)

[18] 王玉海, 朱长青, 苏守宝,等. 结合感知哈希与数字水印的遥感影像认证方法 [J]. 光学 精密工程, 2016, 24(10s): 640-648.

    WANG Y H, ZHU C Q, SU S B, et al. An authentication method based on perceptual hashing and watermarking for remote sensing image [J]. Optics and Precision Engineering, 2016, 24(10s): 640-648. (in Chinese)

[19] CARDOSO V, MIRANDA A S, BERTI E, et al. Geodesic stability, Lyapunov exponents, and quasinormal modes [J]. Physical Review D, 2009, 79(6): 064016.

穆俊. 基于级联混沌映射与低位嵌入的图像隐写算法[J]. 液晶与显示, 2020, 35(4): 374. MU Jun. Image steganography algorithm based on cascaded chaotic map and low bits embedding[J]. Chinese Journal of Liquid Crystals and Displays, 2020, 35(4): 374.

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!