Journal of Guangxi Normal University(Natural Science Edition) ›› 2016, Vol. 34 ›› Issue (2): 67-73.doi: 10.16088/j.issn.1001-6600.2016.02.010

Previous Articles     Next Articles

Protecting Method of Regions of Interest of ImageBased on Information Hiding

YU Chunqiang1,2, FU Rui3, CHEN Yan1,2, LEI Yun2,4, ZHANG Xianquan1,2,3, WANG Xiaoyun5   

  1. 1. Network Center, Guangxi Normal University, Guilin Guangxi 541004, China;
    2. Guangxi Experiment Center ofInformation Science,Guilin University of Electronic Technology, Guilin Guangxi 541004, China;
    3. College ofComputer Science and Information Technology, Guangxi Normal University, Guilin Guangxi 541004, China;
    4.School of Pre-university, Guangxi University for Nationalities, Nanning Guangxi 530006, China;
    5.College of Computer Engineering, Yangtze Normal University, Chongqing 408100, China
  • Received:2015-09-10 Online:2016-06-25 Published:2018-09-14

Abstract: A protecting method of regions of interest(ROIs) of image based on information hiding is proposed. Firstly, by calculating the saliency map of the image, the saliency map is segmented to obtain the ROIs of the image. Secondly, the minimum enclosing rectangles of ROIs are calculated and regions of the minimum enclosing rectangles are used as image protection areas. Thirdly, the pixels in protected regions of an image are transformed into binary data and the number of hidden backups is determined according to the binary data bits and the hiding capacity of the image. Finally, multiple backups of protecting regions are embedded in original image to achieve protection of ROIs. It is shown, by experimental results, that the hidden protected regions can be extracted to restore image when protected regions of an image are destroyed.

Key words: information hiding, saliency map, ROIs, information security

CLC Number: 

  • TN919. 81
[1] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学 E 辑:信息科学,2007,37(2):129-150.
[2] ZHAO Qi, KOCH C. Learning saliency-based visual attention:A review[J]. Signal Processing, 2013, 93(6):1401-1407. DOI:10.1016/j.sigpro.2012.06.014.
[3] GOFERMAN S, ZELNIK-MANOR L, TAL A. Context-aware saliency detection[C] //2010 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2010:2376-2383. DOI:10.1109/CVPR.2010.5539929.
[4] CHENG Mingming ZHANG Guoxin, MITRA N J, et al. Global contrast based salient region detection[C] //2011 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2011:409-416. DOI: 10.1109/CVPR.2011.5995344.
[5] ADVANI S, SUSTERSIC J, IRICK K, et al. A multi-resolution saliency framework to drive foveation[C] //2013 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE Press, 2013:2596-2600. DOI:10.1109/ICASSP.2013.6638125.
[6] BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35(3/4):313-336. DOI:10.1147/sj.353.0313.
[7] 张显全,祝英俊,孙容海,等,基于位平面的彩色图像大容量信息隐藏方法[J]. 光电子·激光, 2009, 20(8):1092-1095. DOI:10.16136/j.joel.2009.08.022.
[8] ZHANG Xianquan, TANG Zhenjun, LIANG Tao, et al. Data hiding method based on local image features[M] //Active Media Technology: Lecture Notes in Computer Science Vol 7669. Berlin: Springer, 2012:247-256. DOI: 10.1007/978-3-642-35236-2_25.
[9] LIN Y K. A data hiding scheme based upon DCT coefficient modification[J]. Computer Standards & Interfaces,2014,36(5):855-862. DOI:10.1016/j.csi.2013.12.013.
[10] SHEN Shuyuan, HUANG Lihong. A data hiding scheme using pixel value differencing and improving exploiting modification directions[J]. Computers & Security,2015,48:131-141. DOI:10.1016/j.cose.2014.07.008.
[11] 张鸿宾, 杨成.图像的自嵌入及窜改的检测和恢复算法[J]. 电子学报, 2004, 32(2):196-199.
[12] QIN Chuan, CHANG Chinchen, CHEN Peiyu. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012,92(4):1137-1150. DOI:10.1016/j.sigpro.2011.11.013.
[13] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding[J]. IEEE Transaction on Image Processing, 2013, 22(3):1134-1147. DOI:10.1109/TIP.2012.2227769.
[1] ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70.
[2] SUN Ronghai, SHI Linfu, HUANG Liyan, TANG Zhenjun, YU Chunqiang. Reversible Data Hiding Based on Image Interpolation and Reference Matrix [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(2): 90-104.
[3] YU Chunqiang, DENG Fangzhou, ZHANG Xianquan, TANG Zhenjun, CHEN Yan, HE Nan. A Reversible Information Hiding Method Based on Multiple Prediction Values [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(2): 24-32.
[4] ZOU Hua,LIU Huarong,MEI Ping. Interaction between Carbon Quantum Dots and Human Serum Albumin [J]. Journal of Guangxi Normal University(Natural Science Edition), 2017, 35(2): 101-107.
[5] ZHANG Xian-quan, WANG Xian-hui, WANG Xiao-yun, YUChun-qiang. Information Hiding Algorithm for JPEG Images Based on Block [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 119-124.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!