Skip to main content
Log in

Adaptive image camouflage using human visual system model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 28 November 2018

This article has been updated

Abstract

The development of image decryption techniques means that some current encryption techniques that turn a secret image into a meaningless image are no longer safe. Recently, encrypting an image into another meaningful image has opened a new route to transmit the secret image. This paper proposes an improved image encryption approach to camouflage the secret image into another host image. The visual quality of the final camouflage image has been significantly improved by using a human visual system (HVS) model. First, the secret image is pre-encrypted with a specific image encryption method, e.g., chaotic mapping method, then the host image is decomposed by a lifting wavelet transform (LWT) to generate integral wavelet coefficients. The encrypted secret image is then adaptively adjusted to a narrower range to guarantee that the final camouflage image is within a reasonable interval. Next, by using a HVS model, each modified image pixel is embedded into the corresponding detailed coefficients through an adaptive allocation strategy. Specifically, for pixels with extremely high or low intensity or high texture complexity, more bits of the modified secret pixels are allocated to substitute for the corresponding bits of coefficients. Then the modified coefficients are retransformed back to generate the final camouflage image. The secret image can be losslessly recovered through reversal procedures. The experimental results demonstrate the efficacy of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Change history

  • 28 November 2018

    The expression J’ in pages 4, 6, 9, 12 and 13 of the original publication were incorrectly written as J where the symbol prime (‘) was missing. Also the expression Pi,j found in page 5 of the original publication was incorrectly written as Pi,j.

References

  1. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207

    Article  MathSciNet  Google Scholar 

  2. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  Google Scholar 

  3. BossBase Image Database. http://agents.fel.cvut.cz/stegodata/RAWs. Accessed 09 Oct 2018

  4. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Article  Google Scholar 

  5. Chu H, Hsu W, Mitra N, Cohen-Or D, Wong T, Lee T (2010) Camouflage images. ACM Trans Graph 29(4):1–8

    Article  Google Scholar 

  6. Dalhoum A, Madain A, Hiary H (2016) Digital image scrambling based on elementary cellular automata. Multimedia Tools Appl 75(24):17019–17034

    Article  Google Scholar 

  7. Dragoi I, Coltuc D (2015) On local prediction based reversible watermarking. IEEE Trans Image Process 24(4):1244–1246

    Article  MathSciNet  Google Scholar 

  8. Farri E, Ayubi P (2018) A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn 93(4):1875–1897

    Article  Google Scholar 

  9. FIPS PUB (1999) Data encryption standard (DES). http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf. Accessed 09 Oct 2018

  10. FIPS PUB (2001) Announcing the advanced encryption standard (AES). https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf. Accessed 09 Oct 2018

  11. Hou D, Zhang W, Yu N (2016) Image camouflage by reversible image transformation. J Vis Commun Image Represent 40:225–236

    Article  Google Scholar 

  12. Hou D, Qin C, Yu N, Zhang W (2018) Reversible visual transformation via exploring the correlations within color images. J Vis Commun Image Represent 53:134–145

    Article  Google Scholar 

  13. Hua Z, Zhou Y, Pun C, Chen C (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  14. Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208

    Article  Google Scholar 

  15. Lai I, Tsai W (2011) Secret-fragment-visible mosaic image–a new computer art and its application to information hiding. IEEE Trans Inf Forensics Security 6(3):936–945

    Article  Google Scholar 

  16. Lama R, Han S, Kwon G (2014) SVD based improved secret fragment visible mosaic image generation for information hiding. Multimedia Tools Appl 73(2):873–886

    Article  Google Scholar 

  17. Lee Y, Tsai W (2014) A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations. IEEE Trans Circuits Syst Video Technol 24(4):695–703

    Article  Google Scholar 

  18. Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104–112

    Article  Google Scholar 

  19. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools Appl 75(21):13557–13583

    Article  Google Scholar 

  20. Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2018.2799243

  21. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  22. Qin C, Ji P, Chang C, Dong J, Sun X (2018) Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia. https://doi.org/10.1109/MMUL.2018.112142509

    Article  Google Scholar 

  23. Rivest R (1992) The RC4 encryption algorithm. Rsa Data Security Inc Document 20(1):86–96

    MathSciNet  Google Scholar 

  24. Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511–546

    Article  MathSciNet  Google Scholar 

  25. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  26. Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318–1332

    Article  Google Scholar 

  27. Yao H, Qin C, Tang Z, Tian Y (2017) Guided filtering based color image reversible data hiding. J Vis Commun Image Represent 43:152–163

    Article  Google Scholar 

  28. Yao H, Liu X, Tang Z, Hu YC, Qin C (2018) An improved image camouflage technique using color difference channel transformation and optimal prediction-error expansion. IEEE Access 6:40569–40584

    Article  Google Scholar 

  29. Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimedia 18(8):1469–1479

    Article  Google Scholar 

  30. Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (61702332, 61672354, 61562007), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security(MIMS16-03), the Guangxi Natural Science Foundation (2017GXNSFAA198222), the Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing. The authors would like to thank the anonymous reviewers for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan Qin.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: The expression J’ in pages 4, 6, 9, 12 and 13 of the original publication were incorrectly written as J where the symbol prime (’ ) was missing. Also the expression Pi,j found in page 5 of the original publication was incorrectly written as Pi,j.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, H., Liu, X., Tang, Z. et al. Adaptive image camouflage using human visual system model. Multimed Tools Appl 78, 8311–8334 (2019). https://doi.org/10.1007/s11042-018-6813-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6813-8

Keywords

Navigation