广西师范大学学报(自然科学版) ›› 2016, Vol. 34 ›› Issue (2): 67-73.doi: 10.16088/j.issn.1001-6600.2016.02.010

• • 上一篇    下一篇

基于信息隐藏的图像感兴趣区域保护算法

俞春强1,2, 付睿3, 陈艳1,2, 雷芸2,4, 张显全1,2,3, 王晓云5   

  1. 1.广西师范大学网络中心, 广西桂林541004;
    2.桂林电子科技大学广西信息科学实验中心,广西桂林541004;
    3. 广西师范大学计算机科学与信息工程学院, 广西桂林541004;
    4. 广西民族大学预科教育学院,广西南宁530006;
    5.长江师范学院计算机工程学院,重庆408100)
  • 收稿日期:2015-09-10 出版日期:2016-06-25 发布日期:2018-09-14
  • 通讯作者: 张显全(1964—), 男, 重庆人, 广西师范大学教授。E-mail:zxq6622@163.com
  • 基金资助:
    国家自然科学基金资助项目(61363034,61300109,61562007);广西自然科学基金资助项目(2012GXNSFBA053166,2015GXNSFDA139040);教育部“春晖计划”合作科研项目(Z2015149);重庆市涪陵区科技计划项目(FLKJ,2012ABA1056);广西信息科学实验中心项目(20130204);广西教育厅高校科研项目(YB2014048,LX2014056,LX2014115,KY2015LX006);广西高校云计算与复杂系统重点实验室项目(15202);广西师范大学校级项目青年课题

Protecting Method of Regions of Interest of ImageBased on Information Hiding

YU Chunqiang1,2, FU Rui3, CHEN Yan1,2, LEI Yun2,4, ZHANG Xianquan1,2,3, WANG Xiaoyun5   

  1. 1. Network Center, Guangxi Normal University, Guilin Guangxi 541004, China;
    2. Guangxi Experiment Center ofInformation Science,Guilin University of Electronic Technology, Guilin Guangxi 541004, China;
    3. College ofComputer Science and Information Technology, Guangxi Normal University, Guilin Guangxi 541004, China;
    4.School of Pre-university, Guangxi University for Nationalities, Nanning Guangxi 530006, China;
    5.College of Computer Engineering, Yangtze Normal University, Chongqing 408100, China
  • Received:2015-09-10 Online:2016-06-25 Published:2018-09-14

摘要: 本文提出一种基于信息隐藏的图像感兴趣区域保护算法。该算法首先通过计算图像的显著图,对显著图进行分割,得到图像的感兴趣区域。然后求出感兴趣区域最小的外接矩形,外接矩形区域作为图像的保护区域。将保护区域内像素转换成二进制数据,根据二进制数据位数和图像的隐藏容量确定隐藏的备份数,将保护区域信息的多个备份隐藏在图像中,实现对图像感兴趣区域的保护。实验效果表明,当图像的保护区域被破坏时,通过提取隐藏的保护区域信息能较好地恢复图像。

关键词: 信息隐藏, 显著图, 感兴趣区域, 信息安全

Abstract: A protecting method of regions of interest(ROIs) of image based on information hiding is proposed. Firstly, by calculating the saliency map of the image, the saliency map is segmented to obtain the ROIs of the image. Secondly, the minimum enclosing rectangles of ROIs are calculated and regions of the minimum enclosing rectangles are used as image protection areas. Thirdly, the pixels in protected regions of an image are transformed into binary data and the number of hidden backups is determined according to the binary data bits and the hiding capacity of the image. Finally, multiple backups of protecting regions are embedded in original image to achieve protection of ROIs. It is shown, by experimental results, that the hidden protected regions can be extracted to restore image when protected regions of an image are destroyed.

Key words: information hiding, saliency map, ROIs, information security

中图分类号: 

  • TN919. 81
[1] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学 E 辑:信息科学,2007,37(2):129-150.
[2] ZHAO Qi, KOCH C. Learning saliency-based visual attention:A review[J]. Signal Processing, 2013, 93(6):1401-1407. DOI:10.1016/j.sigpro.2012.06.014.
[3] GOFERMAN S, ZELNIK-MANOR L, TAL A. Context-aware saliency detection[C] //2010 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2010:2376-2383. DOI:10.1109/CVPR.2010.5539929.
[4] CHENG Mingming ZHANG Guoxin, MITRA N J, et al. Global contrast based salient region detection[C] //2011 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2011:409-416. DOI: 10.1109/CVPR.2011.5995344.
[5] ADVANI S, SUSTERSIC J, IRICK K, et al. A multi-resolution saliency framework to drive foveation[C] //2013 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE Press, 2013:2596-2600. DOI:10.1109/ICASSP.2013.6638125.
[6] BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35(3/4):313-336. DOI:10.1147/sj.353.0313.
[7] 张显全,祝英俊,孙容海,等,基于位平面的彩色图像大容量信息隐藏方法[J]. 光电子·激光, 2009, 20(8):1092-1095. DOI:10.16136/j.joel.2009.08.022.
[8] ZHANG Xianquan, TANG Zhenjun, LIANG Tao, et al. Data hiding method based on local image features[M] //Active Media Technology: Lecture Notes in Computer Science Vol 7669. Berlin: Springer, 2012:247-256. DOI: 10.1007/978-3-642-35236-2_25.
[9] LIN Y K. A data hiding scheme based upon DCT coefficient modification[J]. Computer Standards & Interfaces,2014,36(5):855-862. DOI:10.1016/j.csi.2013.12.013.
[10] SHEN Shuyuan, HUANG Lihong. A data hiding scheme using pixel value differencing and improving exploiting modification directions[J]. Computers & Security,2015,48:131-141. DOI:10.1016/j.cose.2014.07.008.
[11] 张鸿宾, 杨成.图像的自嵌入及窜改的检测和恢复算法[J]. 电子学报, 2004, 32(2):196-199.
[12] QIN Chuan, CHANG Chinchen, CHEN Peiyu. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012,92(4):1137-1150. DOI:10.1016/j.sigpro.2011.11.013.
[13] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding[J]. IEEE Transaction on Image Processing, 2013, 22(3):1134-1147. DOI:10.1109/TIP.2012.2227769.
[1] 周戎龙,罗玉玲,闭金杰,岑明灿,丘森辉,廖志贤. 图像并行加密算法在手持设备上的应用研究[J]. 广西师范大学学报(自然科学版), 2019, 37(3): 60-70.
[2] 孙容海, 施林甫, 黄丽艳, 唐振军, 俞春强. 基于图像插值和参考矩阵的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2019, 37(2): 90-104.
[3] 俞春强, 邓方舟, 张显全, 唐振军, 陈艳, 何南. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32.
[4] 韦春荣, 何楚. 基于改进型互信息的遥感图像配准方法[J]. 广西师范大学学报(自然科学版), 2014, 32(2): 20-25.
[5] 雷芸, 王现会, 王晓云, 孙泽锐, 俞春强, 张显全. 一种JPEG图像的信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2013, 31(4): 48-53.
[6] 张显全, 王现会, 王晓云, 俞春强. 基于分块的JPEG图像信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2012, 30(3): 119-124.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!
版权所有 © 广西师范大学学报(自然科学版)编辑部
地址:广西桂林市三里店育才路15号 邮编:541004
电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn
本系统由北京玛格泰克科技发展有限公司设计开发