详细信息
Image hiding algorithm based on local binary pattern and compressive sensing ( SCI-EXPANDED收录 EI收录) 被引量:6
文献类型:期刊文献
英文题名:Image hiding algorithm based on local binary pattern and compressive sensing
作者:Ye, Guodong[1];Liu, Shoukang[1];Xiao, Xiuchun[2];Hunag, Xiaoling[1]
机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Guangdong Ocean Univ, Sch Elect & Informat Engn, Zhanjiang 524088, Peoples R China
年份:2025
卷号:237
起止页码:316
外文期刊名:MATHEMATICS AND COMPUTERS IN SIMULATION
收录:SCI-EXPANDED(收录号:WOS:001491727200001)、、EI(收录号:20252018419799)、Scopus(收录号:2-s2.0-105004874895)、WOS
基金:The authors would like to thank the anonymous Reviewers for useful comments. This work was supported in part by the Guangdong Basic and Applied Basics Research Foundation (No. 2023A1515011207) , the Special Project in Key Area of General University in Guangdong Province of China (No. 2020ZDZX3064) , the Characteristic Innovation Project of General University in Guangdong Province of China (No. 2022KTSCX051) , and the Innovation Team Project of General University in Guangdong Province of China (No. 2024KCXTD042) .
语种:英文
外文关键词:Compressive sensing; Image hiding; Local binary pattern; SHA-256; 2 k correction
外文摘要:In recent years, with the rapid growth of digital communication, the protection of image privacy has become a critical concern. Traditional image encryption methods may attract attacker attention due to the noise-like appearance of cipher image. To address the theft risk to the private image, a novel three-dimensional chaotic map of Chebyshev coupled Logistic with Sine map (3D-CCLSM) is designed, and then an image hiding algorithm based on local binary pattern (LBP) and compressive sensing (CS) is proposed, named ImHALC. By integrating LBP-based texture feature extraction and CS-based image compression, ImHALC aims to enhance both the security and imperceptibility for steganographic image. Especially, LBP is taken to connect the plain image and keystream, resulting a high security for ImHALC. Firstly, in stage of keystream generation, texture information of the plain image is extracted by using LBP and seen as input of hash function SHA-256, to produce corresponding hash values. Then, these hash values are used to generate the initial value of 3D-CCLSM by a new designed key transformation model (KAM), so as to get the keystream for encryption. Secondly, in stage of image compression, a measurement matrix is constructed by above keystream, and CS is applied to the plain image to get measurements. Thirdly, in stage of image encryption, measurements are confused and diffused to produce a cipher image. Finally, in stage of embedding, an embedding method using integer wavelet transformation (IWT) and 2k correction is presented, so as to embed the secrets (i.e., cipher image) into a given carrier image to obtain hiding performance, i.e., forming a carrier image hiding secrets (CHS). In particular, the ImHALC can achieve the effect of blind extraction. After adopting a two-dimensional projection gradient algorithm with embedded decryption (2DPG-ED), the reconstruction quality for the plain image is good for test images.
参考文献:
正在载入数据...
