999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

2019-02-22 07:32:34DiXiaoJiaLiangQingqingMaYanpingXiangandYushuZhang
Computers Materials&Continua 2019年1期

Di Xiao , Jia Liang Qingqing Ma Yanping Xiang and Yushu Zhang

Abstract: To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded into the encrypted image, and the scrambling operation is used to further improve security. Finally, the original image and non-image data can be separably recovered and extracted according to the request from the valid users with different access rights. Experimental results demonstrate that the proposed scheme outperforms other data hiding methods based on CS, and is more suitable for nonequivalent resources.

Keywords: Compressive sensing, encrypted image, data hiding, prediction error,nonequivalent resources.

1 Introduction

There are many application scenarios in Internet of Things or Cloud Computing where different entities possess nonequivalent resources. For example, in wireless multimedia sensor networks (WMSNs), various nodes, such as common scalar sensors, multimedia sensors, multimedia processing hubs and sink, have different requirement about resources.Especially general sensors are typically resource- constrained devices which cannot afford a huge number of computation, while multimedia processing hubs and sink will have comparatively large computational resources [Akyildiz, Melodia and Chowdury(2007)]. Due to the resource limitation, there are lots of challenges in its corresponding security application [Li, Zhang, Chen et al. (2018)]. Fortunately, the emergence of compressive sensing (CS) opens up a new vision for multimedia data security with nonequivalent resource limitation.

CS has gained wide attention since it was introduced. CS can achieve compression and encryption together through matrix multiplication [Rachlin and Baron (2008)]. Compared with the stream cipher encryption, the encrypted data based on CS can reduce bandwidth resources effectively. Due to this feature of CS, research results based on CS often serve multimedia data compression and representation [Wu, Yu, Yuan et al. (2016)].Meanwhile, CS has a low computation cost in the sensing part while the computation of recovery is rather complex at the receiving end.

Information hiding plays an important role in protecting various information from being destroyed [Cao, Zhou, Sun et al. (2018)]. Within the current application of CS in reversible data hiding, there are two main types: the first one usually embeds data in the samples of DCT/DWT and then uses CS to compress [Xiao and Chen (2014)]. The other one embeds data in the measured value [Cao, Du, Wei et al. (2016); Li, Xiao and Zhang(2016); Pan, Li, Yang et al. (2015)]. However, both of the two schemes have some defects. The first one is more suitable for digital watermarking rather than data hiding,which focuses on the protection of the copyright about the carrier and the robustness of the watermark. But, data hiding puts more emphasis on the capacity and security of the embedded information itself. The scheme proposed by Pan et al. [Pan, Li, Yang et al.(2015)] is a watermarking scheme for plain image only which does not provide security for the cover. The scheme proposed by Cao et al. [Cao, Du, Wei et al. (2016)] is not suitable for nonequivalent resources, although this scheme has a brilliant performance on recovery. The reason is that sparse representation to vacate room for data embedding in the preprocessing operation is very complicated. The scheme proposed by Li et al. [Li,Xiao and Zhang (2016)] is a smart data hiding scheme based on block compressive sensing, but its capacity is limited by block size. To design a qualified hiding scheme in encrypted image based on CS for nonequivalent resources, the computational complexity in the sensing part should be focused on.

In this paper, we propose a high capacity data hiding scheme in encrypted image based on CS for nonequivalent resources. Multimedia sensor nodes take pretreatment on covers to vacate room and encrypt them by CS. General sensor nodes get non-image data, then encrypt them. Multimedia processing hubs gather data from sensor nodes and embed the encrypted scalar data into the processed image. Sink node is in charge of managing and processing data from hubs, and will extract the embedded data and recover image for the valid user with different access rights. Due to the properties of CS, the processes of encryption and embedding are simple and suitable for resources constrained device. This feature falls in with nonequivalent resources on this point while the process of embedding secret data into encrypted image can reduce the data transmission. The main advantages of our scheme include the adaptability to nonequivalent resources, the separable processing according to different access rights, the improvement of the embedding rate and the quality of recovery image.

The rest of this paper is organized as follows. Section 2 introduces the theory of CS.Section 3 provides detailed description of the proposed scheme. The experimental results and analysis are shown in Section 4. Finally, this paper is concluded in Section 5.

2 Compressed sensing

Then the matrix Φ satisfies the k-th order restricted isometry property (RIP). The matrix approximately preserves the distance between k vectors, and the sparse coefficients can be accurately reconstructed from the measurements. In the sampling process, one fact is that real world datamay not be always sparse. But as long as it can be represented as asparse vector α under some properly chosen sparse basiscan still use CS theory and have. Here, let, If matrixsatisfies RIP, then the sparsecould be recovered with high probability fromby solving an-minimization problem.

Rachlin et al. [Rachlin and Baron (2008)] pointed out that compressed sensing is computationally secure, although CS does not reach the perfect security definition of Shannon. So, CS can compress and encrypt when sampling. The standard CS can be interpreted as a symmetric encryption system where the original signalXis a plaintext,the measurementsYis a ciphertext, and the encryption algorithm is a linear transformation operated by a key which is a measurement matrix.

3 Proposed scheme

In this section, we present the detailed procedures of our scheme. As illustrated in Fig. 1,it involves five entities: multimedia sensor nodes, general nodes, multimedia processing hubs, sink nodes and valid users.

3.1 Image pretreatment and encryption

For an 8-bit grayscale image, let the pixel value at the position. As shown in Fig. 1, at the multimedia sensor nodes, the original image is first divided into two parts according to a checkerboard style. If the indicessatisfyis classified intopart. And the rest pixels infall intopart.

Figure 1: The flow chart of the proposed scheme

Next, pseudo-random bits are padded in front ofhave the same size withand the number of padded bits is the embedding capacity which is determined by the compression ratio. The last step is to embed the embedding capacity in the first three positions of, as the front ofis vacated for data embedding.

Finally, the encrypted image with vacated room,, is generated by restoring the corresponding position ofin the checkerboard, wherecan be considered as the encryption key.

3.2 Message encryption

General sensor nodes gain other types of datasuch as temperature, humidity and position. For security, these data need to be encrypted as well. Here, a standard stream cipher is used to encrypt the data intoby bitwise exclusive-or operation with a pseudo-random bit sequence generated by the key. This process is similar to Eq. (5).

3.3 Data hiding in the encrypted images

At the multimedia processing hubs, the encrypted image should be partitioned intoandat first, and the embedding capacity is extracted from the first three positions inThen, the encrypted datais embedded intoby replacing the former padded pseudo-random bits. As the data is embedded in the front ofif image is directly restored according to the corresponding location, the embedded data will be in dangerous.In order to improve the security, the block with embedded data,, will be lightly encrypted intoby digitized Arnold transform:

3.4 Data extraction and image recovery

Sink node will extract data and restore image accordingto the request from valid users with different access rights.

If valid user can access comprehensive data including image and embedded data, sink node will recover image, extract embedded data and send them to user by both data hiding key and encryption key. The processes in the extracting and recovering are the inverse of data embedding and image encryption, so they are not elaborated here. CS reconstruction is a solution of the minimalnorm [Donoho (2006)].

In the second case, if the valid user can only access embedded data, sink node will extract data by the hiding key and deliver it to user.

In the third case, if the valid user can only access approximate image, sink node will decrypt thepart inby the encryption key and then provide an approximately recovered image without embedded data through interpolation.

For the latter two cases, the resource consumption can be effectively reduced because CS reconstruction is not in need.

4 Experimental results and analysis

In this section, eight 512×512 standard images, including Lena, Cameraman, Baboon,Barbara, Boat, Plane, Peppers and Mondrian, are used in the experiment. Besides, another test image set containing 100 images is formed by randomly selecting from Corel database which is available from CorelDraw version 10.0 software. And the selected image is cropped to 512×512 pixels and turned into grayscale. The prediction error is calculated by interpolation technique. The sampling operator is scrambled dense FFT[Candes and Romberg (2006)]. The sparsifying transform is the 9-7 wavelet transform used in the JPEG 2000 standard and the optimizer is based on the GPSR program[Figueiredo, Nowak and Wright (2008)].

4.1 Evaluation of the proposed scheme

In our scheme, the vacated room for embedding data is obtained by CS. Therefore, the embedding rate is directly related to the compression rate of CS onpart in Fig. 1. Since only half of each image is processed by CS, for an 8-bit gray image, the relation is

Table 1: The relation between embedding rate and compression rate

Table 2: PSNR(dB) with different embedding rates for different test images

Figure 2: Relationship between compression ratio and PSNR

In the schemes of data hiding in CS domain, both the cover data (sparse samples) and the embedded data are exactly recovered under certain noise, payload and sparsity conditions,so these methods can be qualified as conditionally reversible data hiding [Yama?, Dikici and Sankur (2016)]. In our scheme, CS is the only part of the whole process that will bring the loss, and the sensing object of CS is the prediction error. The accuracy of part,the first half of the original image, is ensured; while the other half of the original image,part, can be recovered based on both the interpolation technique and the prediction error reconstructed by CS. As a result, the proposed scheme has a good recovery performance.This can be seen in Fig. 2, Fig. 3 and Tab. 2. When the compression rate is significantly low, the quality of the full recovery image is close to the one using interpolation technique only. Of course, the higher the compression rate is, the smaller the error of CS reconstruction is, and the quality of recovery image will be higher. When the compression rate approaches 0.95, the PSNR values of the full recovery image are greater than 43, and may even be close to 55.

Figure 3: The PSNR under different ER values

It should be noted that the computation in the encryption and embedding processes of the proposed scheme is relatively low because there are only arithmetic and matrix multiplication. And in the process of image recoveryoptimization problem is a relatively complex operation. Meanwhile, since this is a high capacity scheme, other types of non-image data and part of image data can be embedded into the cover image to reduce the transmission consumption. The comprehensive data collected in the same area can be considered as the properties of the region and has its special usage. In our scheme,the obtained comprehensive data, including the encrypted non-image data and image in the same area, can not only ensure the data security, but also be convenient for data management.

Therefore, the scheme is suitable for the applications with nonequivalent resources.

4.2 Performance comparison

When compared with other schemes based on CS, it can be seen from Fig. 4 that the proposed scheme has a better recovered image performance when using the same compression ratio for the whole image. In Fig. 4, the abscissa indicates the compression ratio, and the ordinate indicates the PSNR value of the recovered image. The reason is that only half of the data in the original image is processed and compressed by CS, and the other half is processed by the conventional stream cipher. Therefore, the quality of the restored image is ensured to be significantly better than other schemes based on CS.

Figure 4: Comparison results of the same compression ratio

Moreover, we make a comprehensive comparison among our scheme and some typical data hiding schemes based on CS in Tab. 3. According to Eq. (9), the maximal theoretical embedding rate of the proposed scheme is 4 bpp, and we calculate the average PSNR values of the recovered Lena under different embedding ratios for different schemes. It should be noted that although the title of the scheme proposed by Li et al. [Li, Xiao and Zhang (2016)] contains “reversible data hiding”, it is not a lossless scheme, so its PSNR is not infinite. Based on Tab. 3, the proposed scheme has the largest theoretical capacity so that the embedding rate can be adaptively adjusted according to different requirements.

At the same time, the quality of recovered image is only worse than he scheme proposed in Cao et al. [Cao, Du, Wei et al. (2016)]. However, since the background of our scheme is resource deficient device, we need to focus on the computational complexity about image pretreatment and encryption (as the embedding operation is relatively simple, and the data extraction side has more resources for complex calculation). According to the scheme proposed in Cao et al. [Cao, Du, Wei et al. (2016)], its computational complexityis the image size,is the number of dictionary atomsis the nonzero element number in each coefficient vector,andis the embedding round number. Meanwhile, the computational complexity of our scheme iscorresponding to the three main processes: stream encryption, prediction error estimation and CS, whereis the image size, andis the row number in measurement matrix. In this aspect, our scheme is more suitable for nonequivalent resources than the scheme proposed by Cao et al [Cao, Du, Wei et al.(2016)].

All in all, the proposed scheme is a high capacity data hiding scheme which is more suitable for resource-constrained devices and has a better performance while comparing with other existing schemes.

Table 3: Performance comparison

4.3 Security of encrypted image

In this section, we will discuss the security of the encrypted image in the proposed method.

The natural images pixels are highly correlated. A qualified encryption algorithm must break the correlation between adjacent pixels to resist statistical attack. A correlation coefficient value “one” represents a highly correlated image which is susceptible to statistical attacks. Correlation Coefficient (CC) is given by

Table 4: Correlation Coefficient (CC) and SSIM

The randomness of the image is measured by Entropy as

For an image with 256 grey levels the absolute maximum of entropy is 8 bits per pixel.The maximum entropy is obtained when the gray levels have equal probability of occurrence. Hence for a cipher image, the entropy value should be close to 8. From Tab.5, we can infer that the lower the compressionofDpart, the greater the entropy.The encrypted image has high randomness as the entropy of cipher is close to the theoretical value of 8.

Table 5: Entropy of encrypted image

5 Conclusion

In this paper, a high capacity data hiding scheme in encrypted image based on CS is proposed. In this scheme, image decryption and data extraction are separable to match the requests of the users with different access rights. The experimental results have demonstrated that it performs well in the tradeoff between the embedding rate and the recovered image quality. Compared with other data hiding schemes based on CS, the proposed one is much more suitable for nonequivalent resources. In our future study, a part of image may be embedded into other image data to further reduce the transmission consumption.

Acknowledgement:The work was funded by the National Natural Science Foundation of China (Grant Nos. 61572089, 61502399, 61633005), the Chongqing Research Program of Basic Research and Frontier Technology (Grant No. cstc2017jcyjBX0008),the Project Supported by Graduate Student Research and Innovation Foundation of Chongqing (Grant No. CYB17026), the Chongqing Postgraduate Education Reform Project (Grant No. yjg183018), the Chongqing University Postgraduate Education Reform Project (Grant No. cquyjg18219) and the Fundamental Research Funds for the Central Universities (Grant Nos. 106112017CDJQJ188830, 106112017CDJXY180005).

主站蜘蛛池模板: 午夜毛片免费看| 青青久在线视频免费观看| 国产99免费视频| 久久毛片免费基地| 中文字幕在线看| 亚洲国产精品不卡在线| 啪啪啪亚洲无码| 在线国产欧美| 亚洲天堂免费在线视频| 91精品日韩人妻无码久久| 8090成人午夜精品| 免费视频在线2021入口| 青草国产在线视频| 91亚洲国产视频| 在线播放国产99re| 久草网视频在线| 无码又爽又刺激的高潮视频| 亚洲国产AV无码综合原创| 丁香婷婷激情网| a级毛片一区二区免费视频| 精品国产自在在线在线观看| 亚洲无码免费黄色网址| 亚洲色图另类| 最新亚洲人成网站在线观看| 日韩毛片基地| 国产一区二区三区日韩精品 | 国产理论最新国产精品视频| 国产99视频精品免费观看9e| 亚洲第一视频免费在线| 国产成人无码AV在线播放动漫| 久久一日本道色综合久久| 国产一区二区三区在线观看视频| 天天操精品| 国产精品午夜福利麻豆| 99精品免费在线| 在线观看国产精美视频| 国产一区二区三区在线精品专区| 国产原创第一页在线观看| 91色综合综合热五月激情| 露脸一二三区国语对白| 国产午夜看片| 欧美日韩精品一区二区视频| 欧洲av毛片| 找国产毛片看| 久久成人国产精品免费软件 | 亚洲欧美日韩动漫| 91久久偷偷做嫩草影院| 国产在线精彩视频二区| 色网站免费在线观看| 99久久国产综合精品2020| 四虎在线高清无码| 欧美成人区| 精品福利国产| 亚洲精品色AV无码看| 国产成人精品在线| 日本道综合一本久久久88| 黄色网址手机国内免费在线观看| 日韩专区欧美| 亚洲av无码人妻| 中文字幕在线看视频一区二区三区| 欧洲高清无码在线| 天堂在线视频精品| 无码一区中文字幕| 99这里只有精品在线| 午夜视频免费试看| 日韩精品免费在线视频| 欧美精品在线看| 国产精品亚洲一区二区三区z| 伊人久久精品亚洲午夜| a天堂视频| 国产经典三级在线| 国产乱子伦视频三区| 一本大道在线一本久道| 国产精品久久精品| 国产青青草视频| 亚洲综合色婷婷| 国产亚卅精品无码| 亚洲综合经典在线一区二区| 国产亚洲美日韩AV中文字幕无码成人 | 五月天综合网亚洲综合天堂网| 一本大道AV人久久综合| 国产浮力第一页永久地址|