基于秘密分享和直方图平移的多图像水印算法
Multi-Image Watermarking Algorithm Based on Secret Sharing and Histogram Shifting
DOI: 10.12677/JISP.2019.82012, PDF,    国家自然科学基金支持
作者: 赵卓影, 张佳志:中国矿业大学信息与控制工程学院,江苏 徐州;张晓强*:徐州市人工智能与大数据重点实验室,江苏 徐州
关键词: 图像水印秘密分享直方图平移多图像处理Image Watermarking Secret Sharing Histogram Shifting Multiple Image Process
摘要: 针对目前图像水印算法存在的嵌入容量小和安全性弱的问题,利用秘密分享方案将一幅水印图像分解成多幅影子图像,再通过直方图平移算法把影子图像分别嵌入到多幅载体图像中,从而提出了一种基于秘密分享和直方图平移的多图像水印算法。在该算法中,若仅有一幅影子图像将无法提取出水印图像,需要有其他影子图像,从而提高了图像水印算法的安全性。同时,通过增加载体图像的数量,可扩大图像水印算法的嵌入容量。算法分析和实验结果表明该算法的可行性。
Abstract: To solve the problems of small embedding capacity and low security of image watermarking algo-rithm, a watermarking image can be decomposed into multiple shadow images with the secret sharing algorithm, and then the shadow images can be embedded into multiple carrier images by histogram shifting. This paper proposes a multi-image watermarking algorithm based on secret sharing and histogram shifting. In this algorithm, the watermarking image cannot be extracted by only one shadow image, and other shadow images must be used. Therefore, the algorithm security is improved. Meanwhile, the embedding capacity of image watermarking can be enlarged by in-creasing the number of carrier images. Algorithm analyses and experimental results show that the proposed algorithm is feasible.
文章引用:赵卓影, 张佳志, 张晓强. 基于秘密分享和直方图平移的多图像水印算法[J]. 图像与信号处理, 2019, 8(2): 83-89. https://doi.org/10.12677/JISP.2019.82012

参考文献

[1] 张景中, 陈亮, 滕鹏国, 王晓京. 一种基于阵列码的图像秘密分享方法[J]. 四川大学学报(工程科学版), 2016, 48(6): 140-148.
[2] Ding, H.Y., Li, Z.C. and Bi, W. (2018) (k,n) Halftone Visual Cryptography Based on Shamir’s Secret Sharing. The Journal of China Universities of Posts and Telecommunications, 25, 60-76.
[3] 吴万琴, 阮文惠, 贺元香. 一种基于直方图平移和局部复杂度的可逆水印算法[J]. 南京师大学报(自然科学版), 2016, 39(3): 33-39.
[4] 于爽, 李健. 基于直方图平移的鲁棒可逆信息隐藏方案[J]. 武汉大学学报(工学版), 2018, 51(3): 268-275+282.
[5] 孙鹤鹏, 张晓强. 基于DNA编码的多图像加密算法[J]. 计算机工程与设计, 2018, 39(10): 3050-3054+3099.
[6] Bao, L., Yi, S. and Zhou, Y.C. (2017) Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing. IEEE Transactions on Image Processing, 26, 5618-5631.
[Google Scholar] [CrossRef] [PubMed]
[7] Ding, H.Y., Li, Z.C. and Bi, W. (2018) (k,n) Halftone Visual Cryptography Based on Shamir’s Secret Sharing. The Journal of China Universities of Posts and Telecommunications, 25, 60-76.
[8] Ni, Z.C., Shi, Y.Q., Ansari, N. and Su, W. (2006) Reversible Data Hiding. IEEE Transactions on Cir-cuits and Systems for Video Technology, 16, 354-362.
[Google Scholar] [CrossRef
[9] 李雪景, 李江隐, 康宝生. 基于图像插值和直方图平移的可逆水印算法[J]. 计算机应用研究, 2016, 33(4): 1159-1163.
[10] 罗昊, 谢晓尧, 彭长根. 基于直方图平移的加密域可逆水印算法[J]. 郑州大学学报(理学版), 2018, 50(2): 29-34.
[11] 谭亦夫, 李子臣. 基于Shamir门限秘密分享的图像可视加密算法[J]. 网络与信息安全学报, 2018, 4(7): 69-76.
[12] Li, M., Yu, J. and Hao, R. (2017) A Cellular Automata Based Verifiable Multi-Secret Sharing Scheme without a Trusted Dealer. Chinese Journal of Electronics, 26, 313-318.
[Google Scholar] [CrossRef
[13] 张晓强, 王蒙蒙, 朱贵良. 图像水印算法研究新进展[J]. 计算机工程与科学, 2012, 34(4): 17-22.
[14] 王俊祥, 杨波. 基于直方图平移可逆水印的性能估计[J]. 计算机应用, 2010, 30(12): 3246-3251.