Abstract
The development of image decryption techniques means that some current encryption techniques that turn a secret image into a meaningless image are no longer safe. Recently, encrypting an image into another meaningful image has opened a new route to transmit the secret image. This paper proposes an improved image encryption approach to camouflage the secret image into another host image. The visual quality of the final camouflage image has been significantly improved by using a human visual system (HVS) model. First, the secret image is pre-encrypted with a specific image encryption method, e.g., chaotic mapping method, then the host image is decomposed by a lifting wavelet transform (LWT) to generate integral wavelet coefficients. The encrypted secret image is then adaptively adjusted to a narrower range to guarantee that the final camouflage image is within a reasonable interval. Next, by using a HVS model, each modified image pixel is embedded into the corresponding detailed coefficients through an adaptive allocation strategy. Specifically, for pixels with extremely high or low intensity or high texture complexity, more bits of the modified secret pixels are allocated to substitute for the corresponding bits of coefficients. Then the modified coefficients are retransformed back to generate the final camouflage image. The secret image can be losslessly recovered through reversal procedures. The experimental results demonstrate the efficacy of the proposed method.













Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Change history
28 November 2018
The expression J’ in pages 4, 6, 9, 12 and 13 of the original publication were incorrectly written as J where the symbol prime (‘) was missing. Also the expression Pi,j found in page 5 of the original publication was incorrectly written as Pi,j.
References
Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207
Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791
BossBase Image Database. http://agents.fel.cvut.cz/stegodata/RAWs. Accessed 09 Oct 2018
Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51
Chu H, Hsu W, Mitra N, Cohen-Or D, Wong T, Lee T (2010) Camouflage images. ACM Trans Graph 29(4):1–8
Dalhoum A, Madain A, Hiary H (2016) Digital image scrambling based on elementary cellular automata. Multimedia Tools Appl 75(24):17019–17034
Dragoi I, Coltuc D (2015) On local prediction based reversible watermarking. IEEE Trans Image Process 24(4):1244–1246
Farri E, Ayubi P (2018) A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn 93(4):1875–1897
FIPS PUB (1999) Data encryption standard (DES). http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf. Accessed 09 Oct 2018
FIPS PUB (2001) Announcing the advanced encryption standard (AES). https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf. Accessed 09 Oct 2018
Hou D, Zhang W, Yu N (2016) Image camouflage by reversible image transformation. J Vis Commun Image Represent 40:225–236
Hou D, Qin C, Yu N, Zhang W (2018) Reversible visual transformation via exploring the correlations within color images. J Vis Commun Image Represent 53:134–145
Hua Z, Zhou Y, Pun C, Chen C (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208
Lai I, Tsai W (2011) Secret-fragment-visible mosaic image–a new computer art and its application to information hiding. IEEE Trans Inf Forensics Security 6(3):936–945
Lama R, Han S, Kwon G (2014) SVD based improved secret fragment visible mosaic image generation for information hiding. Multimedia Tools Appl 73(2):873–886
Lee Y, Tsai W (2014) A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations. IEEE Trans Circuits Syst Video Technol 24(4):695–703
Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104–112
Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools Appl 75(21):13557–13583
Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2018.2799243
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293
Qin C, Ji P, Chang C, Dong J, Sun X (2018) Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia. https://doi.org/10.1109/MMUL.2018.112142509
Rivest R (1992) The RC4 encryption algorithm. Rsa Data Security Inc Document 20(1):86–96
Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511–546
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318–1332
Yao H, Qin C, Tang Z, Tian Y (2017) Guided filtering based color image reversible data hiding. J Vis Commun Image Represent 43:152–163
Yao H, Liu X, Tang Z, Hu YC, Qin C (2018) An improved image camouflage technique using color difference channel transformation and optimal prediction-error expansion. IEEE Access 6:40569–40584
Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimedia 18(8):1469–1479
Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China (61702332, 61672354, 61562007), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security(MIMS16-03), the Guangxi Natural Science Foundation (2017GXNSFAA198222), the Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing. The authors would like to thank the anonymous reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised: The expression J’ in pages 4, 6, 9, 12 and 13 of the original publication were incorrectly written as J where the symbol prime (’ ) was missing. Also the expression Pi,j found in page 5 of the original publication was incorrectly written as Pi,j.
Rights and permissions
About this article
Cite this article
Yao, H., Liu, X., Tang, Z. et al. Adaptive image camouflage using human visual system model. Multimed Tools Appl 78, 8311–8334 (2019). https://doi.org/10.1007/s11042-018-6813-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6813-8