• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reversible Data Hiding Based on Varying Radix Numeral System

    2021-12-10 11:53:56HemalathaGeethaGeethaBalasubramanianDanielaElenaPopescuandJudeHemanth
    Computers Materials&Continua 2021年10期

    J.Hemalatha,S.Geetha,R.Geetha,C.Balasubramanian,Daniela Elena Popescu and D.Jude Hemanth

    1AAA College of Engineering and Technology,Sivakasi,India

    2SCOPE,VIT University,Chennai,India

    3SENSE,VIT University,Chennai,India

    4Department of CSE,Kalasalingam Academy of Research and Education,India

    5Faculty of Electrical Engineering and Information Technology,University of Oradea,Oradea,Romania

    6Department of ECE,Karunya Institute of Technology and Sciences,Coimbatore,India

    Abstract:A novel image reversible data-hiding scheme based on primitive and varying radix numerical model is presented in this article.Using varying radix,variable sum of data may be embedded in various pixels of images.This scheme is made adaptive using the correlation of the neighboring pixels.Messages are embedded as blocks of non-uniformlength in the high-frequency regions of the rhombus mean interpolated image.A higher amount of data is embedded in the high-frequency regions and lesser data in the low-frequency regions of the image.The size of the embedded data depends on the statistics of the pixel distribution in the cover image.One of the major issues in reversible data embedding,the location map,is minimized because of the interpolation process.This technique,which is actually LSB matching,embeds only the residuals of modulo radix into the LSBs of each pixel.No attacks on this RDH technique will be able to decode the hidden content in the marked image.The proposed scheme delivers a prominent visual quality despite high embedding capacity.Experimental tests carried out on over 100 natural image data sets and medical images show an improvement in results compared to the existing schemes.Since the algorithm is based on the variable radix number system,it is more resistant to most of the steganographic attacks.The results were compared with a higher embedding capacity of up to 1.5 bpp reversible schemes for parameters like Peak Signal-to-Noise Ratio(PSNR),Embedding Capacity(EC)and Structural Similarity Index Metric(SSIM).

    Keywords:Data hiding;spatial correlation;radix system;prediction error;embedding capacity

    1 Introduction

    In recent years of the information era,multimedia content in digital form is widely used in many applications.However,at the same time,an increasing number of security issues have been exposed.For instance,the increase of intelligent editing tools can also facilitate misuse,illegitimate duplicating and distribution,plagiarism and misappropriation,which could bring down the interests of the creator or owner of the multimedia effort.This is creating a strong need for schemes that can efficiently cope with multimedia security and privacy,including copyright protection and integrity authentication.In the advanced digital communication era,ensuring the privacy of individuals becomes a challenging task.Various methods like encryption and steganography have been developed for the protection of personal privacy.In encryption,one can observe the communication happening.However,steganography or data hiding is not observable.For many years,with many communications having taken place over long distances,intervened by modern technology and alertness to interception related issues,there is never a guarantee for secure communication means.In an expansive mean,a covert channel for covert communication is the path for one to communicate with others and conceals the fact that the communication is taking place.

    Data hiding is the art of covert communication.Secret information is embedded imperceptibly into the cover medium[1,2].The cover medium can be any multimedia files,such as audio,images,video etc.The four prominent characteristics that any data-hiding algorithm should possess are robustness,security,capacity and quality/imperceptibility.Reversible Data Hiding(RDH),which is under research for the past two decades,has been proved with enormous improvement in the quality parameters of the image after embedding the data.The Challenge in RDH is to recover the secret data and to restore the cover medium without any degradation[3–6].Any RDH algorithm developed should have the capacity to withstand various attacks in steganography.In general,the RDH scheme can be shown as in Eq.(1)

    The function represents the operator or the embedding scheme by which the secret informationEmwill be embedded into the cover imageCe,having a shared keyKmas an option into the embedding scheme.The final stego image or the marked image is given asZm.Similarly,decoding can be visualized as in Eq.(2)

    An RDH scheme should generally possess four vital characteristics to facilitate a consistent and reliable covert communication channel.

    Imperceptibility:Enables to embed information undetected by the Human Visual System.

    Security:Provides resistance to the attack even after the realization of the existence of secret data.

    Robustness:Ability of stego-object to oppose unintentional actions.

    Capacity:Amount of information that can be embedded without affecting the visual quality.RDH finds its application in the medical field,law enforcement and military image processing.

    In the past years,the motivation of RDH is mainly about integrity authentication.More than that,few innovative applications based on RDH,covering reversible visual transformation,reversible steganography,reversible image processing,reversible adversarial example,further support the belief that style transfer,colorization etc.,can also be reversible.These applications have valuable prospects on RDH and extend it further.There are still many technical hitches to be solved in these reversible processes.As for some complex image processing methods,the secondary information for restoring the original image is too much to be included by RDH,or will greatly degrade the quality of the processed stego image.In the future,we will try to overcome those difficulties to make these reversible operations better.

    2 Structure

    For more than two decades,RDH schemes have been used in the spatial domain,frequency domain or compressed domain.RDH methods are mostly derived from approaches such as Histogram Modification(HM),Difference Expansion(DE)and Interpolation in one of the domains such as frequency domain,spatial domain and encrypted domain.

    2.1 Spatial Domain Techniques

    Using HM techniques Lin et al.[7]presented a multilevel histogram modification reversible data hiding technique considering the difference images.They applied the peak point of a histogram into a difference image and generated an inverse transformation in the spatial domain to create free space.They also observed the characteristics of an image and found that the probability of adjacent pixels being similar is very high.Tai et al.[8]and Kim et al.[9]introduced a reversible data hiding scheme based on histogram modification.They described a binary tree structure to communicate with peak point pairs.

    With the PEE technique,Thodi et al.[10]proposed an alternative technique that overcomes the undesirable distortion suffered by Tian.The histogram technique is introduced as an alternative to location map embedding.A Prediction Error Expansion Embedding method is proposed,which exploits the similarity inherent between the neighbor pixels instead of performing difference expansion.Ou et al.[11]proposed an efficient reversible data hiding using prediction error expansion for pixel pair.They exploited image redundancy and also considered the correlation between pixel errors which lead to superior performance.They proposed to pair up adjacent pixel prediction error and generated an error sequence.Based on the error sequence and the predicted error 2D histogram,single or two bits could be embedded,by shifting and expanding the bins of the 2D error histogram.

    Using adaptive embedding in PEE,Gui et al.[12]described a large embedding capacity RDH scheme based on adaptive embedding and generalized pixel prediction error expansion.They predicted each pixel using Gradient Adjusted Predictor(GAP)and also computed the complexity measurement partitioned into several levels according to its context.The amount of information bits that can be embedded depends upon the complexity measurement.They embedded more bits in smooth regions,and in each complexity level,the number of bits was adaptively chosen to give the best performance.Sachnev et al.[13]introduced an embedding technique that does not use a location map in most cases.The local variance magnitude is calculated and a sorting technique is used for recording the prediction error.By using sorting and prediction,information is embedded into the pixels with less distortion and the location map if required.They also introduced the concept of rhombus prediction to exploit sorting.Massive improvement in the embedding capacity and visual quality is shown in[14,15].

    In interpolation RDH schemes,Jung et al.[16]introduced a reversible data hiding approach using the interpolation technique.The Neighbor mean scaling up interpolation procedure is used and they achieved high calculation speed with less time complexity.Lee et al.[17]introduced an interpolation by neighboring pixel(INP)method on maximum difference value and improved the efficiency of embedding data proposed by Jung.They also considered the pixel localization property to propose a better quality image interpolation.Zhang et al.[18]described a reversible data embedding technique based on interpolation.The cover image is revealed with a factor of two and the interpolated image is obtained using parabolic interpolation.Seed pixels remain unchanged during the embedding process and only the interpolated pixels are scanned one by one to embed the secret data.Parah et al.[19]analyzed the importance of information security in the e-healthcare domain and introduced a RDH scheme to embed a high amount of patient clinical data imperceptibly into the medical image.They also developed a mechanism to detect tampering of embedded data using check sum calculation

    2.2 Frequency Domain Techniques

    Kamstra et al.[20]proposed a method with some improvement to Tian’s difference expansion.They created free space for embedding the message by decorrelating the pixels using Haar Wavelet transformation and performed embedding by expanding the high-frequency Haar coefficients.They also included the LM concept introduced by Tian to identify the expandable Haar coefficients.Zou et al.[21]presented a semi-fragile RDH scheme using IWT.They used a 5/3 filter bank wavelet family for processing the cover image.Unlike the other data embedding schemes,the overflow/underflow issues are taken care of in a considerable way.The block-based coding scheme uses a special mask as the size of the block to avoid underflow/overflow.Xuan et al.[22]introduced a lossless image data embedding method using IWT and adaptive histogram modification pair.They achieved this by selecting an apt threshold to achieve a high PSNR of the stego image for a given payload.An et al.[23]described a robust reversible watermarking scheme using clustering and enhanced pixel-wise masking.They also incorporated the histogram shifting approach in the wavelet domain.This helped in improving the robustness and reduced the run time complexity.

    2.3 Encrypted Domain Techniques

    Qin et al.[24]introduced a separable reversible data hiding for JPEG bit stream in encrypted images.They constructed this scheme by reserving room before encryption and modified the bit stream with less distortion so that the content owner will get enough space for embedding the data.Yi et al.[25]presented a technique called binary block reversible data embedding in encrypted images.They achieved this by embedding binary bit in lower bit planes of the cover image into higher bit planes so that by reserving lower bit planes,they embed secret information.Yi[26]presented a separable reversible data hiding.They adopted the parametric binary tree labeling methodology to embed secret information in encrypted images.In order to achieve embedding,they explored the spatial redundancy present in a small block of the image.Chang et al.[27]introduced an RDH method for encrypted JPEG bitstreams in a separable form.They modified the original image with minimal distortion to provide more space for embedding data.Later,encrypting the modified bit streams.Qin et al.[28]proposed a reversible data hiding scheme for encrypted images.They developed an efficient sparse block coding scheme that makes use of the redundancy transfer.They adopted a special encryption method and bit plane disordering block scrambling followed by pixel scrambling.Wu et al.[29]and Yin et al.[30]developed a RDH algorithm in encrypted images.The authors first predicted the Most Significant Bits(MSB)adaptively and performed Huffman coding on to the original image.Later,they encrypted the image using stream cipher and introduced vacated space for embedding bits.They recorded each pixel label as auxiliary information so that to ensure reversibility of the cover image after extracting the embedded information.In all the above-mentioned strategies,the message to be communicated is represented either in decimal or binary number notation.In the proposed methodology,we aim at introducing a Prediction Error Expansion-Variable Radix Numeral System(PEE–VRNS)based RDH technique,which provides more robustness and security to the means of covert communication.In[31],a PVO based technique using rhombus prediction and histogram shifting has been developed to improve the visual quality of the image.

    3 Background of the Proposed Work

    3.1 Varying Radix Numeral System

    In positional terminology,an integer R may be defined by a series of digits(dn?1dn?2...d2d1d0)as well as a static base or radix r.This R is taken as

    The decimal scheme of radix r = 10 is more occasionally found in western cultures and has been the math standard.Throughout both the machines and in optical circuitry,a discrete framework with radix r = 2 is being used.The whole radii in such devices remain unchanged.The radices with Varying Radix Numeral System(VRNS)[32]differ per each position-value of R.For VRNS the integer N is defined as shown below,

    (dn?1dn?2...d2d1d0)(rn?1rn?2...r2r1r0)(4)

    where 0 ≤di

    Using(rn?1rn?2...r2r1r0)reflects distinct radices.Provided N and radices,it will be possible to approximate the digits(dn?1dn?2...d2d1d0)having the usual successive divisions system,except with specific radii as the divisor for every point.Consequently,that value for R could be retrieved from both the quantities d and r as

    For e.g.,if R = 59 and r = 345,for every step,we need to divide successively using each digit from r as the divisors.

    Iteration 1:59 mod 5 yields 4,throwing 11 as Quotient.

    Iteration 2:11 mod 4 yields 3,throwing 2 as Quotient.

    Iteration 3:2 mod 3 yields 2,throwing 0 as Quotient.

    Finally,it is represented in VRNS as

    5910=234345

    Well into the debugging hand we now have for

    234345=4+(3×5)+(2×5×4)=4+15+40=5910

    A number’s radix is proportional to the sum of data that is stored in every one of the numbers.In the discrete method,for example,that digit only contains a single bit of data.When the radix factor grows it often reduces the data found in every one of the origin digits.Therefore,a variable sum of data may be ingested in various pixels of images by utilizing different bases.Fig.1 shows the index representation of a portion of the image.

    Figure 1:Matrix arrangement of pixels showing the pixel group

    3.2 Rhombus Mean Computation

    To achieve reversibility in the proposed method,the original image is up-sampled to get the cover image.The interpolated image comprises of two different pixels,the seed pixels or the pivot pixels being the actual points present in the image and the additionally added interpolated pixels which are approximated by computation.In all the RDH schemes based on interpolation,the message to be hidden is embedded into the interpolated points and the seed pixels remain unchanged to obtain reversibility.The proposed approach to estimate the interpolated point is by the means of rhombus mean computation,which is considered the best approximation procedure.Instead of duplicating the pixels to form a block,the Rhombus Mean Interpolation(RMI)technique measures the average of four pixels of the nearest neighbor.In equation form,RMI is expressed as

    The cover imageCIfor the proposed scheme is computed using Eq.(6)of sizew?h,and the secretjbit message data to be embedded is M,expressed in Eqs.(7)and(8)respectively.

    where,M represents the set of j bit secret data.The resultant stego image after embedding the secret message is given by Eq.(9)

    where,the resistance factor λ controls the payload for embedding.

    Fig.2 explains a part of image size 2×3 being interpolated to form an image size 4×6.For all index valuesw,hwheremod(w,2)=1 &mod(h,2)=1,the seed points are preserved.The pixels present at the index valued mod(i,2)=0andmod(j,2)=0 are calculated initially by taking the average of the available neighborsThen,the left over points are estimated by calculating the average of the available vertical and horizontal neighbors e.g.,In the scaled up cover image CI which is shown in Fig.2,the points indicated as ‘O’are calculated with the help of pivot pixels present in the image.Set of points indicated as ‘@’are estimated considering the pivot pixels as well as the ‘O’set points in the image.Finally,the set of points due to interpolation are estimated to get the approximated cover imageCIthat can be used for hiding the message.The seed pixels P1,P2,P3...remain unchanged during the embedding process.We modify only the interpolated points for embedding.So the problem of location map could be eliminated using interpolation methods.

    Figure 2:Computation of interpolated points using RMI

    4 Proposed Methodology

    The correlation between the image pixel intensity is used for adaptively embedding the information into the cover.In general,smooth regions of the image constitutes the low-frequency area,the edges and sharp intensity variations indicate high-frequency regions.A considerable change in the smooth region will be perceptible to the human virtual system.Hence,uniform embedding of information will result in the poor quality of marked images.In the proposed system,we adopt an adaptive embedding scheme,which embeds more information in high-frequency points and less amount of data in low-frequency points.The pixel value in the low-frequency region is closely correlated to its neighbor when compared to the high-frequency region,which is much more deviated from its neighbors.This characteristic of pixel distribution in the image is used to adaptively embed the data.The information to be hidden is modified into a series of numbers with varying information,carrying capacity by means of different radices.A larger variance in the predicted pixel value and the neighborhood will result in a larger radix.

    4.1 Embedding Procedure

    The pixel coordinates in an image can be represented using any one of the following combinations:〈i0,j0〉,〈i0,je〉,〈ie,jo〉,〈ie,je〉 where i,j represents the row and column respectively and o,e represents odd and even respectively as given in Fig.2.In the cover image,the pixels 〈ie,je〉carry the hidden information while the remaining pixels 〈i0,j0〉,〈i0,je〉,〈ie,jo〉decide the amount of information that 〈ie,je〉can carry without causing perceptual distortion to the image.

    The information to be hidden is divided into a fixed length sequence ofαbits(sayα= 8).The integer version of the sequence can be embedded sequentially into the pixels in a specific traversal sequence ‘Ts’that can be used as a key.

    The following steps are used for embedding an integermof range[0to2α?1]into a cover image CI :

    (1)Assume g = 1,the variable that is used to find whether the message to be embedded,‘m’,had been embedded completely into cover image pixels.

    (2)Let the marked value of the pixel beI′(x,y).

    (3)Neighbour ofI(x,y)are given by the set S i.e.,

    (4)The radix r for pixel into which the information is embedded is calculated based on the prediction of the pixelI(x,y)

    where,1

    Forr≤1 means that the pixel is very sensitive to small changes,hence ignores the pixel and proceed to the next pixel.Ifr>16,then fix the radix value as 16.

    (5)Compute the digit to be embedded in VRNS

    (6)Find the binary equivalent ofb(x,y)and code it as:b3,b2,b1,b0.This is embedded into〈ie,je〉,〈ie,jo〉,〈i0,je〉,〈i0,j0〉respectively by PEE based embedding technique and then computeI′(x,y)

    (7)Update the value of w

    Ifw<2bthen ‘m’is not embedded completely.Detect the value ‘m’that has been embedded and update ‘m’and start again from Step(2)

    Ifw>2b,then message ‘m’is successfully embedded.

    This procedure is followed for the remaining bits in the message stream and the final marked image is generated.

    4.2 Extraction Procedure

    The extraction procedure involves the recovery of the cover pixel and extraction of the symbols hidden using variable radices.Later,the symbols and the order of extraction of bits for radices should be the same as mentioned in Step(6).The following steps are followed to extract the message and recover the original pixels from the marked image

    (1)Set w = 1 and k = 0,to have a check whether ‘m’has been completely extracted.

    (2)Sequentially extract the bitsb0,b1,b2,b3from the LSB ofI′(ieje),I′(iejo),I′(ioje),I′(iojo)respectively and the original pixel can be restored as

    (3)Calculater(x,y)using Eq.(3)

    Ifr≤1;go to Step(2),ifr>1;proceed with Step(4),else set r = 16.

    (4)Convert the extracted bitsb3,b2,b1,b0into its equivalent decimal which is nothing butb(x,y)

    (5)Revise the value of ‘w’using

    (6)SetBk=b(x,y)andRk=r(x,y)

    (7)Ifw<2α:then k = k + 1 and go to Step(2)

    Else:Reconstruct ‘m’from digits

    (Ak?1Ak?2...A2A1A0)and

    radix(Rk?1Rk?2...R2R1R0)

    The embedding and the extraction procedure is represented as a flow chart in Fig.3.

    This procedure is followed for all the non-overlapping blocks in the entire image.Finally,we get the recovered cover image and the secret bits separated from the marked image.The basic embedding and extraction procedure has been explained in the above sections.The embedding rate can be improved by implementing the adaptive pixel selection procedure which will be explained in the further section.The proposed algorithm is illustrated using a portion of the 512 × 512 Lena as image shown in Fig.3.The advantage of imposing adaptive embedding in the proposed scheme can be analyzed using the average distortion Eqs.(19)and(20)which holds for conventional PEE and double embedding adaptive.For conventional PEE,the expansion is only once and the average distortion is given

    When we compare the above two equations for arbitrary prediction errorse1and e2,it can be derived thatDAp

    We define a parameter P for optimizing the embedding capacity in each region of the image.The data embedding procedure is implemented for various values of P being 1–4.Fig.4 shows the plot for various embedding capacities and the corresponding PSNR values for randomly selected parameter values in each region and the optimized parameter values on a 512 × 512 Lena image.To demonstrate the features for the parameter determination procedure,we will examine the graph plot shown in Fig.5.One can see that the performance evaluation for optimization parameter P = 3 which is shown as a solid blue line,out performs the randomly selected parameter sets.This also proves the effectiveness of the algorithm.When the parameter is increased from 1–3,the performance increased with an improvement in the maximum EC and with the performance gain.There was a slight increase in gain as P changes from 3 to 4.This observation was also validated for the remaining test images.Running time for the given image to determine the parameter implemented in Matlab is about 1 s for P = 1,15 s for P = 2,2 min for P = 3 and 45 min for P = 4.

    Figure 3:Flow chart of the proposed embedding and extraction procedure

    Figure 4:Performance comparison of the proposed scheme with randomly selected parameters

    Figure 5:Standard test images.(a)Lena(b)Barbara(c)Baboon(d)Airplane

    5 Experimental Results and Discussions

    The proposed algorithm has been experimented with different medical images and natural images like Lena,Barbara,Baboon,Airplane as shown in Fig.5,using the MATLAB R2014a platform.The input image size of 512×512 was considered for the cover image.Fig.6 shows the 512 × 512 medical images considered for experimentation.The iteration steps for the embedding and extraction procedures are given in Tab.1.The proposed scheme has been experimented upon 100 uncompressed,standard and clinical 512 × 512 text images.No other auxiliary information is required for decoding the embedded information.

    Fig.6 shows some of the medical images for which the results have been tabulated and is shown in Tab.2.The average objective quality parameters for a payload of 0.75 bpp came to be 52.75 dB PSNR,0.983 for SSIM and for 1.5 bpp,it turned out to be 48.36 dB PSNR and 0.9811 SSIM.

    Figure 6:(a)Thorax X-ray image(b)Brain CT scan image(c)Cephalogram dental image(d)Palm X-ray image(e)Ultra scan fetus image(f)Brain MRI scan image

    PSNR(Eq.(18))gives the similarity between the cover data and the stego data.The higher the value of PSNR,the better is the imperceptibility of the stego image.

    where MSE(Eq.(19))is nothing but the Mean Square Error which is computed between the cover image CI and stego image CI’,both of sizeM×N.

    The computation of SSIM(Eqs.(20)–(23))is centered on the estimates of three terms,namely the contrast,luminance,and structure.The complete index is presented by:

    where,

    where,σx,σy,μx,μyand σxyare the standard deviations,local means,and cross-covariance for imagesx,yrespectively.The terml(x,y)gives the luminance assessment between the two images,the next termc(x,y)gives the contrast assessment and the final terms(x,y)gives the structure assessment of the two imagesx,y.

    Table 1:Embedding and extraction procedure

    The proposed approach for embedding into the rhombus mean interpolated image by adaptive means of pixels selection is carried out to avoid uniform embedding throughout the image.The embedding procedure is carried out by dividing the image into blocks of 3 × 3,overlapping blocks on the rows and columns.The generated stego image can withstand a moderate embedding capacity maintaining the perceptual quality of the image.Moreover,it can overcome the LSB attack on the marked image.Experimental results and comparison over other existing techniques show that the proposed scheme delivers the quantity as well as the quality requirement for the RDH scheme.This approach could be extended for other multimedia files such as audio/video,to enable correct communication.The proposed method can be improved to overcome other active attacks like RS steganalysis.By employing a suitable image pre-processing technique,the proposed method can be used to improve the contrast of low-quality medical images.This can also help in the proper diagnosis of the clinical images.

    Figure 7:Performance evaluation curve showing the comparison of various schemes

    Performance analysis of the proposed scheme is compared with various existing schemes.The performance comparison curve is shown in Fig.7.The VRNS based embedding into the interpolated image performance at a lower embedding rate is almost similar to the existing schemes.But the proposed scheme performs better at higher embedding rates.This is because,in histogram shifting or expansion schemes,as the embedding rate increase,more bins need to be shifted or expanded.Here,we adopted an adaptive embedding in the interpolated image.Pixel modification happens in higher frequency points and low-frequency points undergo fewer modifications.The graph is plotted for Lena,Barbara,Airplane and Baboon images up to an embedding rate of 1.0 bpp.Tab.2 shows the performance comparison of the proposed method with recent existing schemes that had shown better performance in medical images.The performance metric capacity,PSNR and SSIM is also computed and tabulated.

    Table 2:Comparison of proposed method with other schemes

    Message m = 59 is embedded into the cover image I(x,y)and the resultant marked image is denoted as I′(x,y).Steps involved in extracting the message from I′(x,y)is also summarized in Tab.1.

    The proposed method can also be considered for color images.Color images consists of three color components namely R G B.Using the relationship v =?0:299r + 0:587g + 0:114b?and fv(r;g;b)=?0:299r + 0:587g + 0:114b?,convert the color components into the corresponding grey version of color image.Later,embedding can be performed using the proposed method in each of the color components.But,the major challenge is to explore the correlation between each of the color channel in RGB.Another approach would be to perform color plane separation and hide data in either red or blue color channels.Since the green channel is highly sensitive to any stego noise injection,it has to be spared.After the data hiding process,the three color channels can be combined and the stego color image is constructed back.The extraction is a reverse process of the same,with one additional information needed about the color plane in which data is hidden.

    Perceptual Quality Analysis:A moderate amount of payload capacity up to 1.5 bpp were experimented on various test images using the proposed schemes.The PSNR for various embedding capacity of the proposed algorithm is compared with the latest scheme that works on low embedding capacity and shown in Fig.7.It is evident that the proposed scheme gives a better perceptual quality.

    Attacks on RDH:Most of the RDH techniques are LSB embedding and of radix 10.Collection of LSB’s of various pixels and reordering will result in the secret information.The proposed technique,which is actually LSB matching,embeds only the residuals of the radix into the LSB’s of each pixel.No attacks on this RDH technique will be able to decode the hidden content in the marked image.

    6 Conclusion

    In this paper,we proposed a novel VRNS based RDH using the rhombus mean interpolation technique.Wherein embedding is carried out by dividing the image into blocks of 3 × 3,nonoverlapping on the rows and overlapping on the columns.The generated marked image can withstand higher embedding capacity,maintaining the perceptual quality of the image.Moreover,it can overcome the LSB attack on the marked image.Experimental results and comparison over other existing techniques show that the proposed scheme delivers the quantity as well as the quality requirement for the RDH scheme.This approach could be extended for other multimedia files such as audio/video,to enable correct communication.Since all RDH schemes are fragile in nature,the same can be applied on the receiving end to verify the integrity of the received message.Our method can be improved to overcome other active attacks.By employing a suitable image pre-processing technique,the proposed method can be used to improve the contrast of low quality medical images.This can be achieved by applying histogram shifting to the rhombus predicted image and selecting suitable bins on both sides of the prediction error histogram so as to enhance the contrast of the texture area.This can also help in the proper diagnosis of the clinical images.Other than data hiding for content retrieval,more functions such as content enhancement,authentication and content annotation can be achieved.The future scope of the paper is to develop a scheme that could be suitable for images in the encrypted domain.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人啪精品午夜网站| 最近中文字幕2019免费版| 国产精品 国内视频| 亚洲国产av新网站| 9191精品国产免费久久| 午夜免费成人在线视频| 捣出白浆h1v1| 亚洲人成电影观看| 成人影院久久| 9热在线视频观看99| 欧美+亚洲+日韩+国产| 人人妻人人爽人人添夜夜欢视频| 国产精品 国内视频| 一级片'在线观看视频| 婷婷色综合www| 丝瓜视频免费看黄片| 久久av网站| 人成视频在线观看免费观看| 亚洲国产欧美在线一区| 一本大道久久a久久精品| 成人国产一区最新在线观看 | 亚洲精品乱久久久久久| 热99国产精品久久久久久7| 亚洲精品一区蜜桃| 国产熟女欧美一区二区| 色婷婷av一区二区三区视频| 黄色毛片三级朝国网站| 乱人伦中国视频| 岛国毛片在线播放| 国产成人一区二区三区免费视频网站 | 日本一区二区免费在线视频| 亚洲色图综合在线观看| 成人国产一区最新在线观看 | 老司机影院成人| 精品亚洲成国产av| 亚洲国产精品一区二区三区在线| 国产亚洲欧美精品永久| 亚洲欧美一区二区三区国产| 考比视频在线观看| 欧美日韩成人在线一区二区| 午夜免费鲁丝| 久久久久久久大尺度免费视频| 午夜福利,免费看| 这个男人来自地球电影免费观看| 两个人看的免费小视频| 悠悠久久av| 亚洲久久久国产精品| 18在线观看网站| 久久久国产一区二区| 亚洲自偷自拍图片 自拍| 丁香六月天网| 国产成人精品久久二区二区91| 国产一区亚洲一区在线观看| 超碰成人久久| 在线观看免费视频网站a站| 国产免费福利视频在线观看| √禁漫天堂资源中文www| 美女国产高潮福利片在线看| 午夜免费男女啪啪视频观看| 视频在线观看一区二区三区| 欧美久久黑人一区二区| 午夜视频精品福利| 成人亚洲欧美一区二区av| 欧美亚洲 丝袜 人妻 在线| 高清av免费在线| 在线 av 中文字幕| 免费一级毛片在线播放高清视频 | 夜夜骑夜夜射夜夜干| 亚洲伊人色综图| 视频区欧美日本亚洲| bbb黄色大片| 91精品国产国语对白视频| 在线亚洲精品国产二区图片欧美| 99国产综合亚洲精品| 亚洲av男天堂| 夜夜骑夜夜射夜夜干| 人人妻,人人澡人人爽秒播 | 精品高清国产在线一区| 一个人免费看片子| 母亲3免费完整高清在线观看| 熟女少妇亚洲综合色aaa.| 中文乱码字字幕精品一区二区三区| 国产在线观看jvid| 一级片免费观看大全| √禁漫天堂资源中文www| 久久国产精品影院| 九草在线视频观看| 成人国产av品久久久| 亚洲精品乱久久久久久| 九色亚洲精品在线播放| 中文字幕人妻丝袜一区二区| 国产国语露脸激情在线看| 丁香六月欧美| 国产精品久久久久久精品古装| 精品人妻熟女毛片av久久网站| 男人操女人黄网站| 精品高清国产在线一区| 日韩精品免费视频一区二区三区| 日本色播在线视频| 亚洲欧美日韩高清在线视频 | 欧美成人午夜精品| 国产精品九九99| 国产国语露脸激情在线看| 91九色精品人成在线观看| 97在线人人人人妻| 亚洲国产欧美一区二区综合| 欧美精品av麻豆av| 18禁观看日本| 免费观看人在逋| 亚洲国产日韩一区二区| 亚洲av成人精品一二三区| 国产免费一区二区三区四区乱码| 国产真人三级小视频在线观看| 亚洲一码二码三码区别大吗| 9色porny在线观看| 久久久久久久大尺度免费视频| 波野结衣二区三区在线| 男女国产视频网站| 久久久久国产精品人妻一区二区| 亚洲av美国av| 最黄视频免费看| 啦啦啦视频在线资源免费观看| 97精品久久久久久久久久精品| 午夜福利,免费看| 操出白浆在线播放| 2021少妇久久久久久久久久久| 美女午夜性视频免费| 伊人亚洲综合成人网| 精品久久蜜臀av无| 国产亚洲一区二区精品| 国产伦理片在线播放av一区| 老司机午夜十八禁免费视频| 97人妻天天添夜夜摸| 国产又色又爽无遮挡免| 在线观看免费午夜福利视频| 美国免费a级毛片| 亚洲第一av免费看| 大香蕉久久成人网| 91精品国产国语对白视频| 亚洲成人免费av在线播放| 男女免费视频国产| 黑人欧美特级aaaaaa片| 女人高潮潮喷娇喘18禁视频| 中国美女看黄片| 91老司机精品| 日韩视频在线欧美| 一区在线观看完整版| 久久国产亚洲av麻豆专区| 丁香六月天网| 两性夫妻黄色片| 黄色毛片三级朝国网站| 久久精品aⅴ一区二区三区四区| 国产精品偷伦视频观看了| 亚洲国产精品一区三区| 精品亚洲成国产av| 欧美日韩视频精品一区| 精品高清国产在线一区| 国产精品国产av在线观看| 国产色视频综合| 国产成人免费无遮挡视频| av天堂在线播放| av网站免费在线观看视频| 亚洲国产精品一区三区| 国产日韩欧美在线精品| 国产精品一国产av| 午夜福利影视在线免费观看| 精品人妻熟女毛片av久久网站| 99热网站在线观看| 亚洲中文字幕日韩| 中文字幕另类日韩欧美亚洲嫩草| 人人澡人人妻人| 亚洲 国产 在线| 久久人妻熟女aⅴ| 精品一区在线观看国产| videos熟女内射| 天天添夜夜摸| av天堂久久9| 久久精品国产a三级三级三级| 久久精品国产亚洲av高清一级| 成人影院久久| 国产又爽黄色视频| 午夜老司机福利片| 2021少妇久久久久久久久久久| 亚洲第一青青草原| 各种免费的搞黄视频| 国产精品国产三级国产专区5o| 国产三级黄色录像| 丰满人妻熟妇乱又伦精品不卡| 纯流量卡能插随身wifi吗| 美女高潮到喷水免费观看| 又大又爽又粗| 大片电影免费在线观看免费| 老熟女久久久| 国产黄色免费在线视频| 王馨瑶露胸无遮挡在线观看| 午夜免费观看性视频| 操出白浆在线播放| 亚洲五月色婷婷综合| 成年人免费黄色播放视频| av又黄又爽大尺度在线免费看| 精品少妇一区二区三区视频日本电影| 欧美激情极品国产一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 午夜日韩欧美国产| 精品人妻在线不人妻| 69精品国产乱码久久久| 侵犯人妻中文字幕一二三四区| 黄色一级大片看看| 国产97色在线日韩免费| 亚洲精品在线美女| 亚洲国产欧美一区二区综合| 亚洲欧美清纯卡通| 性高湖久久久久久久久免费观看| av一本久久久久| 亚洲伊人色综图| 这个男人来自地球电影免费观看| 99九九在线精品视频| 午夜免费观看性视频| 亚洲欧洲国产日韩| 日韩中文字幕欧美一区二区 | 国产精品99久久99久久久不卡| 国产欧美亚洲国产| 亚洲欧洲精品一区二区精品久久久| 亚洲专区中文字幕在线| 欧美日韩成人在线一区二区| 丝袜脚勾引网站| 国产欧美亚洲国产| 久久热在线av| avwww免费| 如日韩欧美国产精品一区二区三区| 欧美 亚洲 国产 日韩一| 男女床上黄色一级片免费看| 中文精品一卡2卡3卡4更新| 国产高清视频在线播放一区 | 精品一区二区三区四区五区乱码 | 大话2 男鬼变身卡| 真人做人爱边吃奶动态| 亚洲精品一二三| 人人妻人人澡人人看| 欧美日韩av久久| 女人久久www免费人成看片| 午夜久久久在线观看| 久久久久久久国产电影| 汤姆久久久久久久影院中文字幕| 国精品久久久久久国模美| 男女无遮挡免费网站观看| 国产成人av教育| 国产精品免费视频内射| 视频区欧美日本亚洲| 久久午夜综合久久蜜桃| 久热这里只有精品99| av片东京热男人的天堂| 18禁观看日本| 大香蕉久久成人网| 亚洲欧美日韩另类电影网站| 叶爱在线成人免费视频播放| 丁香六月欧美| 精品人妻熟女毛片av久久网站| 国产激情久久老熟女| 嫩草影视91久久| 又大又爽又粗| 亚洲欧美精品综合一区二区三区| 男女下面插进去视频免费观看| 久久国产亚洲av麻豆专区| 18禁国产床啪视频网站| 亚洲国产中文字幕在线视频| 一个人免费看片子| 日本vs欧美在线观看视频| 免费看av在线观看网站| 丝袜人妻中文字幕| 手机成人av网站| 90打野战视频偷拍视频| 黄色怎么调成土黄色| h视频一区二区三区| 日韩一卡2卡3卡4卡2021年| 国产亚洲一区二区精品| 又大又爽又粗| 一级黄色大片毛片| 国产精品 国内视频| 一本大道久久a久久精品| 亚洲中文av在线| av天堂久久9| 男人添女人高潮全过程视频| 最新在线观看一区二区三区 | 亚洲激情五月婷婷啪啪| 欧美日韩精品网址| 亚洲欧美精品自产自拍| av电影中文网址| 国产欧美日韩精品亚洲av| 国产精品三级大全| h视频一区二区三区| 日韩大片免费观看网站| 久久人人97超碰香蕉20202| 18在线观看网站| 曰老女人黄片| 交换朋友夫妻互换小说| 亚洲国产精品成人久久小说| 99国产精品一区二区蜜桃av | 热re99久久精品国产66热6| 久久国产精品大桥未久av| 欧美日韩视频高清一区二区三区二| 久久精品aⅴ一区二区三区四区| 各种免费的搞黄视频| 亚洲图色成人| 人人妻人人澡人人看| 婷婷色av中文字幕| 亚洲精品自拍成人| 精品福利观看| 天天躁夜夜躁狠狠久久av| 久久精品亚洲熟妇少妇任你| 精品国产乱码久久久久久男人| 精品高清国产在线一区| 国产精品一区二区在线观看99| 亚洲 欧美一区二区三区| 人妻一区二区av| 男女边吃奶边做爰视频| 久久久精品免费免费高清| 欧美黄色淫秽网站| 精品人妻一区二区三区麻豆| 女人精品久久久久毛片| 97在线人人人人妻| 久久久久久亚洲精品国产蜜桃av| 日本91视频免费播放| 日韩制服骚丝袜av| 韩国精品一区二区三区| 日韩制服骚丝袜av| av在线app专区| 操出白浆在线播放| 欧美+亚洲+日韩+国产| 99香蕉大伊视频| 超碰97精品在线观看| 老鸭窝网址在线观看| 欧美 亚洲 国产 日韩一| 美女脱内裤让男人舔精品视频| 国精品久久久久久国模美| 欧美人与善性xxx| 国产日韩一区二区三区精品不卡| 欧美97在线视频| 婷婷色综合大香蕉| 久久久久网色| 亚洲欧美精品自产自拍| 亚洲精品日本国产第一区| 亚洲九九香蕉| 热99国产精品久久久久久7| 中文字幕另类日韩欧美亚洲嫩草| 不卡av一区二区三区| 色网站视频免费| 好男人视频免费观看在线| 黄色视频不卡| 久久 成人 亚洲| 捣出白浆h1v1| 久久99热这里只频精品6学生| 欧美人与善性xxx| 久久热在线av| 国产在线视频一区二区| 国产免费视频播放在线视频| 看十八女毛片水多多多| 日日夜夜操网爽| 精品少妇黑人巨大在线播放| 校园人妻丝袜中文字幕| 五月开心婷婷网| 高潮久久久久久久久久久不卡| 国产精品二区激情视频| 人人澡人人妻人| 国产成人一区二区在线| 50天的宝宝边吃奶边哭怎么回事| 午夜福利一区二区在线看| 国产男女内射视频| 久久亚洲精品不卡| 久久久精品94久久精品| 国产伦理片在线播放av一区| 久久青草综合色| 波多野结衣av一区二区av| 一本—道久久a久久精品蜜桃钙片| 日本五十路高清| 亚洲av成人精品一二三区| 国产爽快片一区二区三区| 99香蕉大伊视频| 午夜精品国产一区二区电影| 老司机午夜十八禁免费视频| 少妇精品久久久久久久| 免费久久久久久久精品成人欧美视频| 久久毛片免费看一区二区三区| 久久久久精品国产欧美久久久 | 19禁男女啪啪无遮挡网站| 高清不卡的av网站| 国产一区二区激情短视频 | 亚洲少妇的诱惑av| 在线av久久热| 国产真人三级小视频在线观看| 欧美日韩亚洲国产一区二区在线观看 | 免费观看av网站的网址| 国产精品熟女久久久久浪| 男女之事视频高清在线观看 | 看十八女毛片水多多多| av电影中文网址| 免费女性裸体啪啪无遮挡网站| 日本欧美国产在线视频| 一级,二级,三级黄色视频| 一边摸一边做爽爽视频免费| 久久九九热精品免费| 欧美成人精品欧美一级黄| 久久精品久久久久久噜噜老黄| 嫩草影视91久久| 两人在一起打扑克的视频| 国产日韩欧美亚洲二区| 少妇的丰满在线观看| 搡老岳熟女国产| 啦啦啦在线观看免费高清www| av欧美777| 大码成人一级视频| 精品一品国产午夜福利视频| 两个人看的免费小视频| 国产精品.久久久| 精品高清国产在线一区| 久久人妻福利社区极品人妻图片 | 一级,二级,三级黄色视频| 亚洲成人免费电影在线观看 | 久久精品国产a三级三级三级| 亚洲av男天堂| 在线观看免费视频网站a站| 国产人伦9x9x在线观看| 成年人免费黄色播放视频| 国产成人精品久久二区二区免费| 天堂中文最新版在线下载| www日本在线高清视频| 男女下面插进去视频免费观看| 亚洲欧美精品综合一区二区三区| 欧美成狂野欧美在线观看| 丝袜在线中文字幕| 99热网站在线观看| 精品一品国产午夜福利视频| 久久人人爽av亚洲精品天堂| 国产精品九九99| 欧美乱码精品一区二区三区| 国产精品久久久久久人妻精品电影 | 国产精品人妻久久久影院| 精品一品国产午夜福利视频| 欧美日韩视频高清一区二区三区二| 又大又爽又粗| 麻豆乱淫一区二区| 日本色播在线视频| 国产亚洲精品第一综合不卡| 欧美国产精品一级二级三级| 国产在线视频一区二区| 一区二区三区乱码不卡18| 大型av网站在线播放| 亚洲欧美精品综合一区二区三区| 亚洲天堂av无毛| 亚洲精品一区蜜桃| 亚洲国产中文字幕在线视频| www.999成人在线观看| 日日摸夜夜添夜夜爱| 色94色欧美一区二区| 一本综合久久免费| 视频在线观看一区二区三区| 国产欧美日韩一区二区三区在线| 各种免费的搞黄视频| 考比视频在线观看| 日日爽夜夜爽网站| 亚洲七黄色美女视频| 狂野欧美激情性bbbbbb| 如日韩欧美国产精品一区二区三区| 黑人巨大精品欧美一区二区蜜桃| av网站在线播放免费| 考比视频在线观看| 国产99久久九九免费精品| 午夜福利在线免费观看网站| 五月天丁香电影| 久久99精品国语久久久| 飞空精品影院首页| 成人国产av品久久久| 国产成人欧美| 99热网站在线观看| 另类亚洲欧美激情| 一区二区三区四区激情视频| 99精国产麻豆久久婷婷| 久久国产精品影院| 黄色片一级片一级黄色片| 久久国产精品男人的天堂亚洲| 丰满人妻熟妇乱又伦精品不卡| 成年人免费黄色播放视频| 无限看片的www在线观看| 视频在线观看一区二区三区| 亚洲 国产 在线| 午夜激情久久久久久久| 熟女av电影| 精品卡一卡二卡四卡免费| 你懂的网址亚洲精品在线观看| 少妇 在线观看| 日韩伦理黄色片| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲欧洲精品一区二区精品久久久| 国产精品九九99| 热99国产精品久久久久久7| 免费人妻精品一区二区三区视频| 精品人妻1区二区| 免费av中文字幕在线| 一二三四社区在线视频社区8| 日韩免费高清中文字幕av| 久久免费观看电影| 成年av动漫网址| 大码成人一级视频| 91精品三级在线观看| 婷婷色综合www| 欧美亚洲 丝袜 人妻 在线| av线在线观看网站| 男女高潮啪啪啪动态图| 国产一区二区激情短视频 | 久久精品aⅴ一区二区三区四区| 一级毛片女人18水好多 | 亚洲精品成人av观看孕妇| 国产成人av激情在线播放| 色94色欧美一区二区| 老司机在亚洲福利影院| 久久精品久久久久久噜噜老黄| 国产xxxxx性猛交| 色视频在线一区二区三区| 你懂的网址亚洲精品在线观看| 欧美成人午夜精品| 操美女的视频在线观看| 另类亚洲欧美激情| av国产久精品久网站免费入址| 日韩av在线免费看完整版不卡| 好男人电影高清在线观看| 日本猛色少妇xxxxx猛交久久| 啦啦啦 在线观看视频| 国产老妇伦熟女老妇高清| 欧美人与性动交α欧美精品济南到| av在线app专区| 欧美精品av麻豆av| 美女脱内裤让男人舔精品视频| 国产视频一区二区在线看| 亚洲欧洲国产日韩| 国产精品久久久人人做人人爽| 热re99久久国产66热| 男女边摸边吃奶| 狠狠精品人妻久久久久久综合| 日本猛色少妇xxxxx猛交久久| 大香蕉久久网| 国产精品99久久99久久久不卡| 女警被强在线播放| 赤兔流量卡办理| 美女福利国产在线| a级毛片在线看网站| 国产深夜福利视频在线观看| 欧美国产精品一级二级三级| 国产成人精品在线电影| 欧美成人午夜精品| 一本—道久久a久久精品蜜桃钙片| 国产成人一区二区在线| 久久精品亚洲熟妇少妇任你| 中文字幕人妻熟女乱码| 一区二区日韩欧美中文字幕| 亚洲av片天天在线观看| 看十八女毛片水多多多| 又紧又爽又黄一区二区| 七月丁香在线播放| 精品一品国产午夜福利视频| 国产1区2区3区精品| av网站免费在线观看视频| 成年av动漫网址| 国产亚洲午夜精品一区二区久久| 国产一区二区三区综合在线观看| www日本在线高清视频| 亚洲天堂av无毛| 国产成人系列免费观看| 校园人妻丝袜中文字幕| 国产福利在线免费观看视频| 女人被躁到高潮嗷嗷叫费观| 高清av免费在线| 啦啦啦 在线观看视频| 一边摸一边抽搐一进一出视频| 麻豆国产av国片精品| 青春草视频在线免费观看| 啦啦啦在线免费观看视频4| 亚洲av欧美aⅴ国产| 女人被躁到高潮嗷嗷叫费观| 国产激情久久老熟女| 日韩熟女老妇一区二区性免费视频| 777久久人妻少妇嫩草av网站| 欧美成狂野欧美在线观看| 日韩视频在线欧美| 看免费av毛片| 久久99一区二区三区| 亚洲五月色婷婷综合| 女人精品久久久久毛片| 国产精品二区激情视频| 国产老妇伦熟女老妇高清| 黄色片一级片一级黄色片| 久久久精品免费免费高清| 精品国产国语对白av| 亚洲五月婷婷丁香| 搡老岳熟女国产| 国精品久久久久久国模美| 欧美精品人与动牲交sv欧美| 久久精品国产a三级三级三级| 在线观看国产h片| 狠狠婷婷综合久久久久久88av| 午夜两性在线视频| 一本—道久久a久久精品蜜桃钙片| www.999成人在线观看| 中文乱码字字幕精品一区二区三区| 99热国产这里只有精品6| 久久亚洲精品不卡| 9191精品国产免费久久| 国产精品成人在线| 女人高潮潮喷娇喘18禁视频| 天堂8中文在线网| 日本a在线网址| 晚上一个人看的免费电影| 黑人猛操日本美女一级片| 丝袜美腿诱惑在线| 悠悠久久av| 男女国产视频网站|