A Reversible Visual Transformation Algorithm for JPEG Images

被引:0
|
作者
Wu H. [1 ]
Tang H. [2 ]
Wang J. [2 ]
机构
[1] School of Computer Science and Engineering, South China University of Technology, Guangzhou, 510006, Guangdong
[2] School of Digital Media, Jiangnan University, Wuxi, 214122, Jiangsu
来源
| 2018年 / South China University of Technology卷 / 46期
基金
中国国家自然科学基金;
关键词
DCT transform; Image encryption; JPEG image; Privacy protection; Reversible visual transformation;
D O I
10.3969/j.issn.1000-565X.2018.05.003
中图分类号
学科分类号
摘要
Image reversible visual transformation is an emerging image processing technique that can exactly recover the original image from the visually transformed image. It can be used in the applications of secret image encryption and transmission. A new image reversible visual transformation algorithm is proposed for JPEG images with low complexity. Since JPEG format is one of the most used image types in the daily usages, study of data hiding and reversible visual transformation of JPEG images is important and attracts much attention from the community. The proposed algorithm replaces the last four DCT coefficients to embed the transform information. Consequently, the original image can be restored without any distortion by extracting the hidden data. The experimental results show that the proposed algorithm can change the secret image content while achieving reversible image visual transformation. That means the original JPEG image can be exactly recovered from the corresponding visually transformed one. © 2018, Editorial Department, Journal of South China University of Technology. All right reserved.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 16 条
  • [1] iCloud leaks of celebrity photos
  • [2] Guo L., Ni J., Su W., Et al., Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Transactions on Information Forensics & Security, 10, 12, pp. 2669-2680, (2015)
  • [3] Hu Y., Jeon B., Reversible visible watermarking and lossless recovery of original images, IEEE Transactions on Circuits and Systems for Video Technology, 16, 11, pp. 1423-1429, (2006)
  • [4] Wu H.T., Cheung Y.M., Reversible watermarking by modulation and security enhancement, IEEE Transactions on Instrument and Measurement, 59, 1, pp. 221-228, (2010)
  • [5] Wu H.T., Huang J., Reversible image watermarking on prediction error by efficient histogram modification, Signal Processing, 92, 12, pp. 3000-3009, (2012)
  • [6] Ou B., Li X., Zhao Y., Et al., Pairwise prediction-error expansion for efficient reversible data hiding, IEEE Transactions on Image Processing, 22, 12, pp. 5010-5021, (2013)
  • [7] Li X., Zhang W., Gui X., Et al., Efficient reversible data hiding based on multiple histograms modification, IEEE Transactions on Information Forensics & Security, 10, 9, pp. 2016-2027, (2015)
  • [8] Wu H.T., Dugelay J.L., Shi Y.Q., Reversible image data hiding with contrast enhancement, IEEE Signal Processing Letter, 22, 1, pp. 81-85, (2015)
  • [9] Wu H.T., Cheung Y.M., Huang J., Reversible data hiding in paillier cryptosystem, Journal of Visual Communications and Image Representation, 40, pp. 765-771, (2015)
  • [10] Wu H.T., Tang S., Huang J., Et al., A novel reversible data hiding method with image contrast enhancement, Signal Processing: Image Communication, 62, pp. 64-73, (2018)