B样条驱动纹理生成的构造式信息隐藏
Constructive information hiding with texture generation driven by B-spline
- 2024年29卷第4期 页码:989-1002
纸质出版日期: 2024-04-16
DOI: 10.11834/jig.221173
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2024-04-16 ,
移动端阅览
郦姝伊, 韩彦芳, 乐燕芬, 姚恒, 秦川. 2024. B样条驱动纹理生成的构造式信息隐藏. 中国图象图形学报, 29(04):0989-1002
Li Shuyi, Han Yanfang, Le Yanfen, Yao Heng, Qin Chuan. 2024. Constructive information hiding with texture generation driven by B-spline. Journal of Image and Graphics, 29(04):0989-1002
目的
2
传统构造式图像信息隐藏算法通常直接将图像空域特征与秘密信息关联,对算法的安全性造成威胁。因此,本文将曲线绘制函数与信息隐藏相结合,提出一种以B样条控制点为特征,在图像空域间接隐藏信息的算法。
方法
2
算法主要分为信息隐藏及信息提取两阶段。在信息隐藏阶段,发送方首先通过选取初始控制点、仿射变换及B样条曲线绘制生成多条参考曲线,然后利用曲线控制点的位置隐藏信息,最后为图像填充颜色,即完成含密纹理图像的构造。在信息提取阶段,提取方根据纹理曲线和图像颜色获得含密曲线及参考曲线,经对照计算即可提取出秘密信息。
结果
2
本算法具有较高的隐藏容量、鲁棒性和安全性。实验结果表明,由本文算法生成的800 × 800像素图像,其最高隐藏容量可达2 870 bits,分别是另两种典型构造式信息隐藏算法的6.7和3.4倍,且在质量因子为10的JPEG(joint photographic experts group)压缩攻击下的提取误码率可低至0,优于鲁棒较强的选择式信息隐藏算法LDA-DCT(robust coverless image steganography based on DCT and LDA topic classification)以及与之类似的构造式信息隐藏算法。同时,抗隐写分析检测实验表明,在隐藏容量小于250 bits时检测误差趋近于0.5。
结论
2
本文以B样条曲线控制点为特征,在纹理图像的绘制过程中隐藏信息,有效提高了传统构造式图像信息隐藏算法的安全性、隐藏容量和鲁棒性。
Objective
2
Information hiding techniques, including watermarking and steganography, have currently become effective and important applications for secret communication. For a country or an organization, information hiding technology can be used to realize the communication of confidential information through watermarking technology to protect the copyright of software or digital publications. Information hiding technologies always realize information hiding by modifying the transmission carrier. However, with the continuous development of steganalysis technology, information hiding algorithms suffer from the risk of easy detection. Therefore, some scholars have introduced coverless information hiding algorithms. Coverless information hiding does not mean secret communication without transmission media and does not modify the transmission media, realizingsecret information transmission by transmitting the original media without modification. The coverless information hiding algorithm can be divided into selective and constructed information hiding. Selective information hiding encodes or extracts features from the images in the image library and chooses the images corresponding to the secret information. By contrast, constructive information hiding is a technology that uses secret information as the driver to generate secret communications media to realize information hiding. However, traditional constructive information hiding algorithms generally use visual signals such as pixels or patterns to hide the secret information directly in the image, resulting in a strong correlation between the image content and the secret information, which is easily identified by analyzing and detecting the image. Considering the widespread use of B-spline curves in computer graphics, this paper proposes a constructive information hiding algorithm based on B-spline to generate texture images. The position of the control points is modified in accordance with the secret information. Therefore, the secret information is indirectly hidden in the image special domain and has no direct relationship with the spatial characteristics.
Method
2
In the information hiding stage, the hider first divides the blank canvas into blocks and numbers and scrambles the subblocks for encryption. The midpoints of a group of subblocks are randomly selected to obtain a group of coordinate points as the initial control points of a B-spline curve. The control points of multiple groups of B-spline curves are then obtained by affine transformation of the initial control points. Consequently, the B-spline curves are drawn. The position of control points of each curve is changed in accordance with the secret information; that is, a texture image comprising stego curves is generated. Finally, the colors corresponding to the numbers of the selected subblocks are chosen from the color library to fill the texture image; that is, the construction of the color stego texture image is completed. In the information extraction stage, the extractor first blocks, numbers, and scrambles the image with the same key and then extracts the indexes of subblocks according to the colors of the stego image to calculate the initial control points. The edge detection of the stego texture image is conducted to obtain stego curves. Finally, the control points of stego curves are obtained by combining the stego curves and the initial control points, and then the secret information is extracted.
Result
2
The hidden capacity of the texture image generated by the algorithm in this paper can change with the variation of texture shape. In the comparison experiment of hidden capacity for the color image with the same size of 800 × 800 pixels, the algorithm in this paper can hide 2 870 bits of secret information, which is 6.7 and 3.4 times of the hidden capacity of the two other texture constructive information hiding algorithms. The proposed algorithm has good robustness to common image attacks and has strong anti-JPEG compression capability. The SRNet algorithm is used for steganalysis, and the detection error is close to 0.5 when the hiding capacity is low, which indicates that detecting the proposed algorithm using traditional steganalysis algorithm is difficult.
Conclusion
2
In this paper, the control points of the B-spline curve are used as features to realize indirect information hiding in image spatial domain, which solves the problem of strong management of image content and secret information in traditional constructive information hiding algorithm. The hidden capacity of this texture image generation algorithm can be adjusted flexibly, demonstrating its robustness to common image attacks and strong steganalysis resistance.
构造式信息隐藏B样条纹理图像隐藏容量安全性鲁棒性
constructive information hidingB-splinetexture imagehiding capacitysecurityrobustness
Boroumand M, Chen M and Fridrich J. 2019. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5): 1181-1193 [DOI: 10.1109/TIFS.2018.2871749http://dx.doi.org/10.1109/TIFS.2018.2871749]
Dong T L, Li X R, Yao H and Qin C. 2021. Robust coverless information hiding based on image classification. Journal of Applied Sciences, 39(6): 893-905
董腾林, 李欣然, 姚恒, 秦川. 2021. 基于图像分类的鲁棒无载体信息隐藏. 应用科学学报, 39(6): 893-905 [DOI: 10.3969/j.issn.0255-8297.2021.06.002http://dx.doi.org/10.3969/j.issn.0255-8297.2021.06.002]
Fridrich J and Goljan M. 2002. Practical steganalysis of digital images: state of the art//Proceedings of 2002 SPIE 4675, Security and Watermarking of Multimedia Contents IV. San Jose, USA: SPIE: 1-13 [DOI: 10.1117/12.465263http://dx.doi.org/10.1117/12.465263]
Fridrich J, Goljan M, Lisonek P and Soukal D. 2005. Writing on wet paper. IEEE Transactions on Signal Processing, 53(10): 3923-3935 [DOI: 10.1109/TSP.2005.855393http://dx.doi.org/10.1109/TSP.2005.855393]
Gou H M and Wu M. 2005. Data hiding in curves with application to fingerprinting maps. IEEE Transactions on Signal Processing, 53(10): 3988-4005 [DOI: 10.1109/TSP.2005.855411http://dx.doi.org/10.1109/TSP.2005.855411]
Johnson N F and Jajodia S. 1998. Exploring steganography: seeing the unseen. Computer, 31(2): 26-34 [DOI: 10.1109/MC.1998.4655281http://dx.doi.org/10.1109/MC.1998.4655281]
Liu L Y, Wang Z C, Qian Z X, Zhang X P and Feng G R. 2019. Steganography in beautified images. Mathematical Biosciences and Engineering, 16(4): 2322-2333 [DOI: 10.3934/mbe.2019116http://dx.doi.org/10.3934/mbe.2019116]
Otori H and Kuriyama S. 2007. Data-embeddable texture synthesis//Proceedings of the 8th International Symposium on Smart Graphics. Kyoto, Japan: Springer: 146-157 [DOI: 10.1007/978-3-540-73214-3_13http://dx.doi.org/10.1007/978-3-540-73214-3_13]
Otori H and Kuriyama S. 2009. Texture synthesis for mobile data communications. IEEE Computer Graphics and Applications, 29(6): 74-81 [DOI: 10.1109/MCG.2009.127http://dx.doi.org/10.1109/MCG.2009.127]
Ou B, Yin Z X and Xiang S J. 2022. Overview of reversible data hiding in plaintext image. Journal of Image and Graphics, 27(1): 111-124
欧博, 殷赵霞, 项世军. 2022. 明文图像可逆信息隐藏综述. 中国图象图形学报, 27(1): 111-124 [DOI: 10.11834/jig.210384http://dx.doi.org/10.11834/jig.210384]
Pan L, Qian Z X and Zhang X P. 2016. Steganography by constructing texture images. Journal of Applied Sciences, 34(5): 625-632
潘琳, 钱振兴, 张新鹏. 2016. 基于构造纹理图像的数字隐写. 应用科学学报, 34(5): 625-632 [DOI: 10.3969/j.issn.0255-8297.2016.05.015http://dx.doi.org/10.3969/j.issn.0255-8297.2016.05.015]
Qian Z X, Pan L, Huang N N and Zhang X P. 2018b. Constructive steganography by tangles. KSII Transactions on Internet and Information Systems, 12(8): 3911-3925 [DOI: 10.3837/tiis.2018.08.020http://dx.doi.org/10.3837/tiis.2018.08.020]
Qian Z X, Pan L, Li S and Zhang X P. 2018a. Steganography by constructing marbling texture//Proceedings of the 4th International Conference on Cloud Computing and Security. Haikou, China: Springer: 428-439 [DOI: 10.1007/978-3-030-00015-8_37http://dx.doi.org/10.1007/978-3-030-00015-8_37]
Qin C, Sun M H and Chang C C. 2018. Perceptual hashing for color images based on hybrid extraction of structural features. Signal Processing, 142: 194-205 [DOI: 10.1016/j.sigpro.2017.07.019http://dx.doi.org/10.1016/j.sigpro.2017.07.019]
Si G W, Qin C, Yao H, Han Y F and Zhang Z C. 2020. Robust coverless data hiding based on texture classification and synthesis. Journal of Applied Sciences, 38(3): 441-454
司广文, 秦川, 姚恒, 韩彦芳, 张志超. 2020. 基于纹理特征分类与合成的鲁棒无载体信息隐藏. 应用科学学报, 38(3): 441-454 [DOI: 10.3969/j.issn.0255-8297.2020.03.010http://dx.doi.org/10.3969/j.issn.0255-8297.2020.03.010]
Sun W, Niessen W J and Klein S. 2017. Randomly perturbed B-splines for nonrigid image registration. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(7): 1401-1413 [DOI: 10.1109/TPAMI.2016.2598344http://dx.doi.org/10.1109/TPAMI.2016.2598344]
Wang H Q and Wang S Z. 2004. Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10): 76-82 [DOI: 10.1145/1022594.1022597http://dx.doi.org/10.1145/1022594.1022597]
Wang Y M, Kong L S, Qian Z X, Feng G R, Zhang X P and Zheng J M. 2019. Breaking permutation-based mesh steganography and security improvement. IEEE Access, 7: 183300-183310 [DOI: 10.1109/ACCESS.2019.2960455http://dx.doi.org/10.1109/ACCESS.2019.2960455]
Westfeld A. 2001. F5-A steganographic algorithm: high capacity despite better steganalysis//Proceedings of the 4th International Workshop on Information Hiding. Pittsburgh, USA: Springer: 289-302 [DOI: 10.1007/3-540-45496-9_21http://dx.doi.org/10.1007/3-540-45496-9_21]
Wu X S, Xu M, Qiao T, Pan B M and Liao X. 2022. Review of reversible data hiding based on the spatial domain of images. Journal of Image and Graphics, 27(1): 125-149
武晓帅, 徐明, 乔通, 潘彬民, 廖鑫. 2022. 图像空域可逆信息隐藏研究进展. 中国图象图形学报, 27(1): 125-149 [DOI: 10.11834/jig.210292http://dx.doi.org/10.11834/jig.210292]
Xiao Y J, Ding M Y and Peng J X. 2000. ICP-based B-spline curve fitting. Journal of Image and Graphics, 5(7): 585-588
肖轶军, 丁明跃, 彭嘉雄. 2000. 基于迭代最近点的B样条曲线拟合方法研究. 中国图象图形学报, 5(7): 585-588 [DOI: 10.3969/j.issn.1006-8961.2000.07.009http://dx.doi.org/10.3969/j.issn.1006-8961.2000.07.009]
Xu J Y, Mao X Y, Jin X G, Jaffer A, Lu S F, Li L and Toyoura M. 2015. Hidden message in a deformation-based texture. The Visual Computer, 31(12): 1653-1669 [DOI: 10.1007/s00371-014-1045-zhttp://dx.doi.org/10.1007/s00371-014-1045-z]
Yi P Y, Qian Z X, Yin Z X and Zhang X P. 2018. Style transferring based data hiding for color images//Proceedings of the 4th International Conference on Cloud Computing and Security. Haikou, China: Springer: 440-449 [DOI: 10.1007/978-3-030-00015-8_38http://dx.doi.org/10.1007/978-3-030-00015-8_38]
Zhang W M, Zhang X P and Wang S Z. 2008. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes//Proceedings of the 10th International Workshop on Information Hiding. Sana Barbara, USA: Springer: 60-71 [DOI: 10.1007/978-3-540-88961-8_5http://dx.doi.org/10.1007/978-3-540-88961-8_5]
Zhang X, Peng F and Long M. 2018. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Transactions on Multimedia, 20(12): 3223-3238 [DOI: 10.1109/TMM.2018.2838334http://dx.doi.org/10.1109/TMM.2018.2838334]
Zhou H, Chen K J, Zhang W M and Yu N H. 2022. 3D mesh steganography and steganalysis: review and prospect. Journal of Image and Graphics, 27(1): 150-162
周航, 陈可江, 张卫明, 俞能海. 2022. 3D网格隐写与隐写分析回顾与展望. 中国图象图形学报, 27(1): 150-162 [DOI: 10.11834/jig.210371http://dx.doi.org/10.11834/jig.210371]
Zhou Z L, Cao Y and Sun X M. 2016. Coverless information hiding based on bag-of-words model of image. Journal of Applied Sciences, 34(5): 527-536
周志立, 曹燚, 孙星明. 2016. 基于图像Bag-of-Words模型的无载体信息隐藏. 应用科学学报, 34(5): 527-536 [DOI: 10.3969/j.issn.0255-8297.2016.05.005http://dx.doi.org/10.3969/j.issn.0255-8297.2016.05.005]
Zhou Z L, Sun H Y, Harit R, Chen X Y and Sun X M. 2015. Coverless image steganography without embedding//Proceedings of the 1st International Conference on Cloud Computing and Security. Nanjing, China: Springer: 123-132 [DOI: 10.1007/978-3-319-27051-7_11http://dx.doi.org/10.1007/978-3-319-27051-7_11]
Zou L M, Li J, Wan W B, Wu Q M J and Sun J D. 2022. Robust coverless image steganography based on neglected coverless image dataset construction. IEEE Transactions on Multimedia, 1-13 [DOI: 10.1109/TMM.2022.3194990http://dx.doi.org/10.1109/TMM.2022.3194990]
相关作者
相关机构