1. Introduction
High dynamic range (HDR) images [1,2] have attracted much interest in recent years because they offer a more dynamic range, allowing displays to show images in a clearer way, especially in the details of the highlights and shadows. Highlights can be shown brighter and truly dark, and deep shadows can be displayed. Thus, the original image can be shown more completely and faithfully, closer to what the human eye can see and perceive. Dynamic range is the ratio between the brightest and darkest values that a display can show. Using the floating-point number to store crucial information, HDR images can faithfully represent a large range of luminance and colors, thereby offering great potential to become the leading image standard.
There are three main HDR image encoding formats: RGBE [3], LogLuv [4], and OpenEXR [5]. Any two formats can be converted in either a forward or backward manner. Tone-mapping [1,2,6], an essential step for HDR images, consists of adjusting the tonal values of an image with a high dynamic range so that it can be viewed on digital displays. Tone-mapping operator, TMO, scales down the dynamic range while attempting to preserve the appearance of the original image. It is thus applied to HDR images to reveal their full details and give them a dynamic twist and realistic look, providing the best image presentation for visualizing an HDR image.
Data hiding [7], also known as steganography, is a technique developed to embed secret messages into digital media. The camouflaged media looks like the original harmless one, thus arousing no suspicion among malicious eavesdroppers. The media before message embedding is called a cover, and the media after the message concealment is referred to as a stego. In the era of internet transmission and cloud computing, data hiding provides a method for communicating secretly. While time-varying media, such as video, can be used as a carrier [8], static images are the most popular because they are widely transmitted over the Internet. Data hiding schemes using conventional low dynamic range (LDR) images, such as binary, grayscale, color, or palette images, have been presented in the extant literature [7,9,10].
Despite HDR images having the potential to become a leading standard, limited numbers of HDR data hiding works have been proposed in the literature. Similar to LDR image data hiding, the number of bits that an HDR image can carry is called the embedding capacity (EC). Taking the image resolutions into consideration, the embedding rate (ER) represents the number of bits concealed in a pixel, also denoted as bits per pixel (bpp). One of the goals pursued by a data hiding algorithm is providing an embedding rate that is large enough for practical applications. Cheng and Wang [11] proposed an adaptive data hiding and authentication algorithm for HDR RGBE images. They provided an embedding rate in the range of 5.13 to 9.69 bpp. The peak signal-to-noise ratios (PSNR) of the tone-mapped stego images are only slightly greater than the 30 dB. Li et al. [12] adopted HDR images with a 48-bit TIFF format and improved the embedding rate of Cheng and Wang’s scheme. Their algorithm offered an average embedding rate of 26 bpp, with the PSNR of the tone-mapped stego images between 30.47 and 37.00 dB. Chang et al. [13], Wang et al. [14], and Yu et al. [15] took advantage of modifying a homogeneity index to achieve distortion-free data hiding in HDR RGBE images. However, the penalty of this approach limited the embedding rate to only 0.127–0.145 bpp. Lin et al. [16] presented a novel data hiding algorithm (DHOB) and an aggressive bit encoding and decomposition (ABED) scheme for OpenEXR images. Depending on the parameters, the embedding rate was between 2.433 and 20.002 bpp. He et al. [17] and Gao et al. [18] employed prediction error expansion to embed a secret message in every individual Red, Green, and Blue color channel. Their algorithms provided embedding rates ranging from 1.202 to 2.85 bpp. Tsai et al. [19] applied the multiple-base notational system and homogeneity index modification and proposed an authentication algorithm for RGBE images. With the aid of the distortion tolerance, the embedding rate reached 2.27 bpp. Finally, Tsai et al. [20] extended the multi-MSB prediction and Huffman coding developed for LDR image and proposed reversible data hiding in encrypted RGBE images. Their scheme offered an embedding rate of 6.19–7.03 bpp.
Adaptive message embedding is an effective way for hiding data in LDR or HDR images. Since an HDR image can represent a large range of luminance and human eyes are not sensitive to the dark luminance, the darker pixels are better candidates than the brighter ones to carry more messages. Cheng and Wang’s algorithm [11] classified pixels of RGBE images into flat or boundary areas to embed different quantities of secret messages. Yu et al. [15] used the homogeneous representations inherent in the RGBE pixels to conceal different numbers of messages. Gao et al. [18] employed a two-level pixel prediction mechanism in complex regions of an RGBE image to reduce the distortion caused by message embedding. Targeting the OpenEXR images, Lin et al. [16] divided pixels into three categories based on the luminance and embedded more messages in low luminance pixels.
In the above works, secret messages were embedded by modifying pixels in a cover HDR image in order to generate a stego pixel, where the cover image and the stego image share the same image format. Data hiding using pixel modification inevitably produces interference with the natural features of a cover image, even though the modification is minor and even subtle. Consequently, the more that the information is concealed, the greater the image reveals distortion, which makes it difficult for these classical data hiding schemes to resist the attack of steganalysis, which intends to detect any secret messages hidden in an innocuous image. To resolve the potential steganalytic risk, a new data hiding scheme has been designed, which conceals secret messages by directly constructing a stego image rather than modifying the existing covers. This approach is termed “constructive data hiding” or “constructive steganography”. Technical algorithms developed to construct a stego image include texture synthesis [21] and color transfer [22], among others.
Image encryption [23,24] is an effective way for preserving privacy and maintaining security. While a number of low dynamic range (LDR) image encryption schemes have been presented [25,26], and unfortunately, research works on HDR encryption are limited. Yan et al. [27] used the elementary cellular automata (ECA) as an encryption tool to cipher RGBE images. Lin et al. [28] used a logistic map to generate a pseudo-random number sequence in order to encrypt an HDR image with the LogLuv format. Chen and Chang [29] encrypted the bits in the exponent field in OpenEXR images and obtain good encryption performance. Chen and Yan [30] proposed an encryption and authentication scheme for OpenEXR images; they made use of the torus automorphism as the permutation function and Vernam cipher as the stream cipher, where the plaintext is combined with a pseudo-random stream of data to generate the ciphertext using the Boolean “exclusive or” (XOR) function. Finally, Tsai et al. [20] reserved room for data hiding in the RGBE image, and then encrypted the image using a series of random binary digits. Their scheme is one of few algorithms in the extant literature that can conceal a secret message and encrypt an HDR image.
Security is perhaps the most important issue for image encryption [31,32]. However, the current state-of-the-art HDR encryption algorithms fail to analyze the security comprehensively. Some algorithms only present visual perception metric without further analysis, for example, Lin et al. [28] and Tsai et al. [20]. Apart from visual perception metric, some reported extra metrics including histograms and pixel correlation/key security results; for example, Yan et al. [27], Chen and Change [29], and Chen and Yan [30], which represent the most comprehensive work for security analysis. To the best of our knowledge, entropy analysis and image sensitivity analysis have never been presented by these HDR encryption algorithms in the extant literature. Without thorough security analysis, it remains unclear whether the image cipher actually does have a high security level able to resist malicious attacks, such as entropy attacks and differential attack [23,24].
This paper proposes a novel constructive data hiding and chaotic sequence-based bit-level image encryption algorithm. Our scheme offers six significant features. First, we conceal secret messages when converting an HDR image from the OpenEXR format into the RGBE one. From the steganalysis point of view, our scheme is able to resist the steganalytic attack because we construct a stego image rather than generate it from the existing cover image. Second, we adaptively embed a secret message according to the distribution of the exponent channel shared by the Red, Green, and Blue channels. The adaptivity enables our scheme to conceal more secret messages in pixels with low luminance, where their exponent value is smaller than the median of the whole HDR image. Third, we exploit adaptive message embedding to satisfy a user’s request. A user can request a large embedding rate in exchange for endurable image quality. Alternatively, an end user can exchange a limited embedding rate for a high quality stego image. Fourth, we introduce a chaotic sequence-based bit-level image encryption algorithm which not only protects the image contents, but also secures the hidden messages, thereby reducing the probability of any inappropriate use of the stego HDR RGBE image produced. We adopt a 2D Sine Logistic modulation map (2D-SLMM) [33] to generate pseudo-random sequences. The map holds two large positive Lyapunov exponent (LE) values and two large Kolmogorov entropy values, thereby providing better hyperchaotic behavior, more complexity, and unpredictability. Fifth, we apply the random permutation technique to our scheme in a bit-level permutation mechanism. As evidence from the experimental results, the bit-level permutation significantly increases the security of HDR image encryption. The final feature of our scheme is that we present six metrics to thoroughly and comprehensively evaluate the security of the cipher image.
The main contributions of our work can be summarized as follows:
We present a novel adaptive data hiding algorithm for an HDR image. Secret messages are concealed during the HDR format conversion, signifying that the cover and stego image are in different image formats, avoiding the vulnerability caused by conventional data hiding utilizing the cover image modification approach.
Our algorithm adaptively embeds secret messages. More secret messages are conveyed in those pixels containing low luminance appearing to be dark pixels, while fewer secret messages are injected into pixels with high luminance which appear to be brighter; this coincides with the phenomena that human eyes are less sensitive to the dark pixels and more sensitive to noticing subtle changes encountered in the brighter area.
Our data hiding scheme provides the ability to satisfy the request for the embedding rate proposed by the end user. In addition, image distortion due to the message concealment can be predicted prior to real message embedding. Thanks to the optimal base mechanism we introduce, which not only satisfies users’ demand, but also derives the minimal mean squared error to reduce the image distortion as small as possible. To the best of our knowledge, no algorithm in the HDR data hiding literature can comply with the embedding rate requested by the end user. In addition, there is no algorithm in the HDR imaging literature which can predict the distortion in terms of the mean squared error caused by the message concealment.
We present a secure image encryption scheme, which adopts a 2D-SLMM to generate a pseudo-random sequence with better hyperchaotic behavior. Pixels are ciphered through the bit-level permutation using the random permutation algorithm with the time complexity of . As a result, our scheme can completely shuffle the whole bits aligned by the Red, Green, Blue and Exponent channel in an HDR image.
We present a thorough and comprehensive security analysis for stego HDR RGBE images. Our scheme offers 18% to 32% more embedding rate than that provided by the current state-of-the-art works without impairing the quality of stego image. In addition, our scheme provides high image encryption security, surpassing those of our competitors. To the best of our knowledge, our scheme is the first that can report the security of HDR cipher image from six aspects: visual perception, histogram, correlation, entropy, image sensitivity, and key security.
The rest of this paper is organized as follows: Section 2 presents our proposed methods in detail. The experiments and analysis are given in Section 3. Finally, Section 4 describes conclusions and future work.
2. Our Proposed Methods
This section details our proposed algorithm for adaptive data hiding and image encryption for HDR images. Figure 1 exhibits the flowchart of our algorithm. In the sender part, two main processes are concurrent image conversion and adaptive message embedding (CICAME) and image encryption, while in the recipient part, there are image decryption and message extraction processes. Here, we briefly highlight these processes and will detail them in the following subsections.
To embed a secret message, the sender inputs the demanded target embedding rate (), secret message {S}, and a source HDR OpenEXR image (). The first part of message embedding is converting into a new HDR image encoded by the RGBE format. During the conversion, we seamlessly embed secret message {S} into each pixel to generate the stego image (). Next, we encrypt using the encryption key ( to protect the image contents and secret hidden message. The resultant stego encrypted image () is then delivered to the recipient through a public channel, such as the Internet. In this way, the secret message is camouflaged during the format conversion and image encryption.
Image decryption and message extraction are conducted on the recipient side. The receiver first inputs the stego encrypted HDR RGBE image (). It is then deciphered by the aid of the decryption key () provided prior by the sender. The image decryption produces the stego HDR RGBE image () which contains a hidden message. Finally, a secret message {S} is extracted from using the extraction key (), thereby completing the message extraction process. The following subsections detail each step in the message embedding and extraction processes.
2.1. Concurrent Image Conversion and Adaptive Message Embedding
In this process, we convert the input HDR image, encoded by the OpenEXR format into the HDR image encoded by the RGBE format. Figure 2 shows the 48-bit/pixel OpenEXR and 32-bit/pixel RGBE formats. A pixel in an OpenEXR image is represented by a floating-point vector, The floating-point value in the corresponding Red, Green, and Blue channels can be converted from 1-bit sign, 5-bit exponent, and 10-bit mantissa fields. In contrast, a pixel in an RGBE image is denoted by representing the respective Red, Green, Blue, and the Exponent channels with 8-bit storage. During the conversion, we concurrently and adaptively embed a secret message, thus constructing a new stego HDR RGBE image, . The process is completed by the following five steps:
Step 1: Image conversion. An is converted into the HDR image encoded by the RGBE format. The expressions shown on the left expression in Equation (1) convert chromatic information into the four components in the RGBE format:
(1)
where represents the i-th pixel in scene-referred color in and denotes the i-th pixel in the corresponding RGBE HDR image. Note that we omit the index i if the expression does not cause any ambiguity. In a special case when is less than the conversion is written out as . We can translate the integer representation in back to the scene-referred color, using the right expressions in Equation (1), which is also known as reverse conversion. In a special case described above, we directly translate to
Note that the four components, are integers within the range of [0, 255]. While the first three components, represent the respective pixel values in the Red, Green, and Blue channels, the fourth component, indicates the pixel value in the Exponent channel (hereafter E-channel).
-
Step 2: Optimal base determination. In this step, we determine an optimal base, for the i-th pixel according to i.e., this pixel’s value in the E-channel. An optimal base is required so that we can embed a secret message in the In this paper, we convey a secret message in the Red-, Green-, and Blue-channels and leave the E-channel intact because the E-channel is the exponent shared by the other three channels, so any changes in it, for example, plus or minus n values will result in the magnitude of exponential changes, in three other components. Instead, we utilize the value of the E-channel in a pixel as a guide to determine its corresponding optimal base, thereby achieving adaptive message embedding. We detail this step as follows.
Let represent the value of the pixel in E-channel which is currently processed. Let denote the median of the pixels in the E-channel derived from the HDR RGBE image which has just been converted from an OpenEXR HDR image. Let represent the minimal notational number system where an F-ary secret message can be concealed in . Inspired by the fact that human eyes are less sensitive to the pixel with low luminance (dark pixels), we derive in Equation (2) as a function of because the constant, is given by the end user and the constant, is derived from the HDR RGBE image,
(2)
The derived strongly relates to the difference between and the median . If , . This means that, if a pixel’s is identical to the median, the derived equals the two’s power of the target embedding rate , as expected. However, if , the derived will be smaller than , and the larger the , the larger the difference between and ; this means that fewer secret messages are conveyed in this pixel. In contrast, if , the derived will be larger than , and the smaller the the larger the difference between and implying that more secret messages will be conveyed in this pixel. This approach coincides with the concept that since human eyes are less sensitive to the pixel with low luminance (dark pixels), more secret message can be concealed in a pixel with smaller (larger difference between and ) without causing noticeable difference. In this paper, we set bpp, and apparently, the end user can alter it without any restraint.
Once is determined, we can derive an optimal base, provided that two conditions are held. First, ; Second, has minimal expected mean squared error (EMSE), which can be determined by Equation (3):
(3)
We adopt the term, expected, implying that we assume the three components, , , have an equal probability of appearing. We remark that EMSE represents the distortion in the R-, G-, B-channels rather than the entire HDR RGBE image. We also remark that, since depends on is also a function of Once is discovered, we can compute , which may be equal to or larger than Consequently, represents the ultimate notational system that a secret message can be concealed in
We present an example to further illustrate how to determine an optimal base. If an end user demands a target embedding rate, bpp, and the median of the HDR RGBE image is . We consider four representative pixels, , , as follows: and First, since in and this value equals the median, the corresponding . Thus, an optimal base is because and is minimal. Since , can conceal a 175-ary secret message. We remark that although other bases, such as or do satisfy the first condition, and , unfortunately, they hold larger expected mean squared errors, where and . Consequently, does actually represent an optimal base for . Since and have the same , they share the same optimal base able to conceal a 175-ary secret message.
With regard to the pixel, we derive and the optimal base is , thereby producing 4.0. Since , the pixel can carry a 343-ary secret message, conforming to our design goal for embedding a more secret message when is smaller than . Finally, an optimal base for the pixel is because and . As expected, a limited 27-ary secret message will be concealed in this pixel, as its is much larger than the median, .
-
Step 3: Real embedding rate determination. Deriving the real embedding rate, , to comply with the end user’s request, we verify that the real embedding rate is greater than or equals the target embedding rate . In this step, we derive using Equation (4):
(4)
where represents the number of pixels in the entire HDR RGBE image holding value in E-channel; for example, denotes the number of pixels holding . Since is within the range of [0, 255], it is certain that equals the image resolution of In case , we adjust the median until we adhere to the end user’s request. Finally, we will construct an E-channel mapping table, as shown in Table 1a, which maps every value to , , and . In addition, we can derive the real embedding rate, , and the expected mean squared error for three channels, .
Table 1a presents the E-channel mapping table constructed after Step 2 for the HDR image “memorial”. The end user requests the embedding rate of bpp and the median of E-channel in this image is . We list according to in ascending order, and the associate optimal bases. Referring to Equation (4), the real embedding rate, bpp, is larger than the user’s request. Also shown in the right part of table is the E-channel mapping table built when the requested embedding rate is bpp. As can be seen from the table, when a user requests different the same corresponds to different and Nevertheless, both cases show that our scheme offers a more embedding rate than that request by the end user.
Table 1b shows another E-channel mapping table constructed for the HDR image “display1000”. This image has the median of E-channel, . We can observe from the table that, when a pixel has a smaller a larger optimal base is determined, thereby enabling it to conceal a larger -ary secret message. Again, the real embedding rate, bpp, is larger than the request, bpp.
These two tables demonstrate that our scheme can adaptively conceal a secret message according to the features of pixels in an HDR RGBE image. In addition, the overall real embedding rate is always larger than the one requested by the end user, yet our scheme ensures determining an optimal base, thereby producing a stego image with the minimal expected mean squared error.
-
Step 4: Message decomposition. Given a general n-tuple optimal base and an M-ary secret message, where , we can decompose into secret digits using Equation (5):
(5)
In this paper, we produce a 3-tuple optimal base so we set in Equation (5) to decompose an -ary secret message, , into three digits, . As an example, given and a 175-ary secret message, , we can decompose 89 into 3 digits as follows. First, we let and derive . Next, we derive . Finally, we obtain . Consequently, the three digits decomposed by are .
-
Step 5: Message embedding. Once we have obtained , we can embed them into by the aid of the optimal base thus producing a 3-tuple stego pixel components, The concept of embedding is producing so that three digits can later be extracted using the modulus operator. In addition, we need to minimize the distortion, caused by the message embedding. We take the component and the digit as an example to illustrate the digit embedding, which utilizes Equations (6)–(8) to produce the stego component :
(6)
(7)
(8)
In Equation (6), we first obtain the remainder using the divisor , and then calculate the difference, between and in Equation (7). Finally, referring to Equation (8), we produce according to the magnitude of with respect to . Note that the component in the E-channel remains intact during the digit embedding. We can follow the same approach to embed other two digits, and accordingly.
We now analyze the time complexity of the embedding process. Let represent the size of an HDR RGBE image. We remark that the message concealment consists of five steps, as described above, and it is performed in the Red, Green, and Blue channels in a pixel-by-pixel approach. Consequently, the time complexity of message concealment is We now present an example for message embedding.
We present an example to illustrate the message embedding process. Let represent a pixel in the OpenEXR image. In step 1, we convert to be a pixel in the RGBE format, where In step 2, without loss of generality, we assume the optimal base has been determined, where In step 3, we determine the real embedding rate as shown in Table 1a. In step 4, the message, , has been decomposed into . To embed these three digits in step 5, we first refer to Equation (6) and obtain the remainders at each component, where We then calculate the difference, in Equation (7). Finally, using Equation (8), we derive the stego components in the Red, Green, and Blue channels, Thus, the stego pixel produced becomes as the E-channel is intact. All the other pixels can work in the same manner to convey the corresponding digits.
2.2. Image Encryption
This stego image encryption process ciphers the stego image to protect secret messages and avoid the image from unauthorized user access. The image encryption contains the following four steps:
Step 1: Obtaining an image feature We calculate the feature of a stego HDR RGBE image in Equation (9):
(9)
where represents the i-th byte data of the image. The parameter is considered as a part of the secret encryption key, where its range is within [0, 1].Step 2: Generating a pseudo-random sequence. In this step, we produce a pseudo-random sequence from the 2D-SLMM [33]. As shown in Equation (10):
(10)
The range of the control parameters, and is 1 and respectively. When the parameter is close to 3, 2D-SLMM shows good hyperchaotic performance. In this study, we select . The trajectories of the 2D-SLMM map are shown in Figure 3, which provides a wider chaotic range, better ergodicity, and hyperchaotic properties than existing chaotic maps. In addition, we set the initial value where represents a part of the secret encryption key. Note that the initial value is related to the feature of an image derived from Step 1, indicating that the initial values dynamically depend on the stego HDR RGBE image to be processed, thereby increasing the security of image encryption.
Given , , and , we generate number of pseudo-random sequence, , where is the number of elements in the sequences to be discarded in order to eliminate the transient effects. Note that each element is produced by first computing and then representing the values as the IEEE double-precision floating-point format (IEEE Standard for Floating-Point Arithmetic, IEEE 754) [34], followed by extracting the least significant 8 bits to form an integer between 0 and 255.
-
Step 3: Pixel bit-level permutation and diffusion. We adopt a secret encryption key, , to perform bit-level permutation, which shuffles both the pixel contents (32 bits) and the pixel positions in the stego HDR RGBE image. We adopt a random permutation scheme [35] with an encryption key to generate pseudo-random numbers to accomplish the bit-level permutation.
We take an 8-bit pixel as an example. Let represent the index of position in a pixel, and denote the corresponding bits, which represent the decimal value 91. Thus, the first three bits, for example, can be referred to by and , etc. When utilizing the random permutation scheme, we execute 7 iterations. At the i-th iteration, we generate a (9 − i)-ary random number k. Then, we exchange the current last index with the index k. The process continues 7 times until we shuffle the indices in completely.
Table 2 shows an example of the index permutation, where the shaded color indicates indices that have been shuffled. In the first round (i = 1), we generate an 8-ary random number k = , and then exchange the 3rd index, 3, and the last index, which is 8, thus producing In the second iteration (i = 2), we generate a 7-ary random number, say k = ; we exchange the 4th index, 4, and the last index, which is 7, thus leading to In the third iteration (i = 3), we generate a 6-ary random number from 1 to 5, say k = ; we exchange the first index 1 and the last index, which is 5, thus leading to The final permuted index , implying that the bit-level permutation produces representing a decimal value 234.
In our implementation, we align a total of components (each pixel contains the R-, G-, B- and E-channel components). We then apply the bit-level random permutation, described above, to all of the bits. We remark that the random permutation shuffles the indices in place rather than producing a shuffled copy. Along with the increase of iterations, the number of indices in the shuffled set increases. Consequently, the random permutation algorithm has the time complexity of and the space complexity of
-
Step 4: Pixel diffusion. The final step is to encrypt the shuffled pixels using exclusive-OR operator, with respect to the pseudo-random sequence, . Without loss of generality, we list the shuffled pixel as The pixel encryption contains two sub-steps. First, we generate five initial values, from the encryption key. Next, we utilize Equation (11) to cipher four components. Note that since we have provided five initial values, the index ranges from 0 to .
(11)
As an example, let represent the first stego pixel and pseudo-random sequence Let be the initial five values. Referring to Equation (11) with the index we can derive . We can further adopt the resultant to encrypt thus producing . Similarly, we can encrypt using the previous result, we can encrypt using the previous result, accordingly. Consequently, the stego pixel, , has been ciphered to become .
Our scheme provides the benefit of the avalanche effect [23,24], which means that an error encountered in a previous component will produce an error in the current component being processed. This chain-reaction feature will be propagated across the entire components to be encrypted, causing a drastic change in the ciphertext stego HDR RGBE image.
We now analyze the time complexity of the image encryption process. In the image encryption, we first obtain an image feature which requires the time complexity of Next, referring to a 2D-SLMM map, we generate a pseudo-random sequence, which needs the time complexity of where is used to avoid the transient effects. The third step performs the bit-level permutation in all four channels, thus requiring the time complexity of In the final step, the pixel diffusion needs the time complexity of
In summary, the time complexity of four steps determines the computational complexity of our image encryption algorithm Consequently, our stego HDR encryption scheme has the computational complexity of . We consider this complexity has satisfactory performance because there is an extra exponent channel in an HDR RGBE image.
2.3. Image Decryption
The decryption process is the inverse operation of the encryption process. The input is the stego encrypted HDR RGBE image, , and the output is the deciphered stego HDR RGBE image, which contains a hidden message.
The image decryption contains the following three steps:
Step 1: We determine parameters, from the secret decryption key. Then, we input them as initial values in the 2D-SLMM to generate the pseudo-random sequence We discard the first items so the resultant is exactly the same as that produced in the encryption process.
Step 2: We determine five setting values, from the decryption key. Then, we utilize Equation (12) to decipher stego encrypted pixels in four components:
(12)
Following up on our previous example, we present and the setting values Let be the first stego encrypted pixel. Referring to Equation (12), we produce . We can apply the same manner to decipher the other three components. Thus, the decrypted stego pixel becomes .
-
Step 3: Pixel bit-level inverse permutation and diffusion. The recipient can adopt the secret encryption key, , to generate pseudo-random numbers to accomplish the inverse bit-level permutation. We follow up on the previous example. Let represent the index of position in an input pixel. When utilizing the inverse version of the permutation scheme, we also generate a (9 − i)-ary random number k for the i-th iteration. However, we apply these random numbers in a reverse order, i.e., let j = 8 − i and j be the actual index we used in the inverse version. Then, we exchange index j+1 with index k. The process continues 7 times until the indices in are fully permuted.
Table 3 continues the example for the inverse index permutation, where the shaded color indicates an index to be exchanged between itself and the index k, which is determined by the generated random number. In the first round (j = 1), the random number produced is k = , and no exchange is needed because it is in the 1st index. In the second iteration (j = 2), the random number produced is k = ; we exchange the 2nd index, 8, and the j + 1 = 3rd index, which is 2, thus leading to the current In the third iteration (j = 3), the random number produced is k = ; we exchange the 1st index, which is 5, and the 4th index, which is 6, thus updating to become The final inverse permuted index indicating that represents the inverse bit-level permutation, which is the same as the original decimal pixel value 91.
2.4. Message Extraction
Since E-channel is intact and the target embedding rate is considered as a secret key, the receiver can reconstruct the E-channel mapping table similar to Table 1. Then, every pixel, , in the stego image can be processed pixel-by-pixel. For each pixel, the receiver refers to to obtain the optimal base from the E-channel mapping table. Afterwards, one can extract the secret messages, using the modulus operator with the divisor for every component, where Finally, the receiver can apply Equation (13) with the parameter, = 3, using the available to composite the M-ary secret message , where , and represents a general n-tuple optimal base:
(13)
Following up on our previous example, we first read in the stego pixel . Then, referring to the E-channel mapping table with as shown in Table 1, we derive the optimal base, . Next, we extract the message digits . Finally, applying Equation (13), we composite the final 175-ary secret message, .
3. Experimental Results and Analysis
We implemented our algorithm using C++ and Python programming languages and collected our experimental results on a Personal Computer equipped with an i7-10610U CPU, 16 GB RAM, and Windows 10 operating system. Unlike LDR data hiding, no standard image database is available for HDR image, and we instead collect our 20 test images form the Internet [36] and indexed them from test image 1 to test image 20. We remark that some of these HDR images have been adopted as test images in the literature [18,19,20,29,30]. In the following, we first report the secret message embedding results and then present the security analysis of the encrypted stego HDR images.
3.1. Secret Message Embedding Results
Figure 4 lists 20 stego HDR RGBE images produced by our scheme, each conveying a different number of secret bits. Note that these images are tone-mapped low dynamic range images, and we adopted the tone-mapping algorithms introduced in [2,37].
We present a larger size of the stego image “dani_catheral” for the purpose of visualization, as shown in Figure 5. This stego image has conveyed around 5.92 million of secret bits prior to the encryption process. As shown in Figure 5a, direct display of a stego HDR image is not satisfying because over- and under-exposed areas hide image features. In contrast, the tone-mapped (TM) stego images reveal their full details and give them a dynamic twist as well as a realistic look, as shown in Figure 5b,c, respectively, Nevertheless, even though our scheme offers a significant high embedding rate, reaching 7.550 bpp, the distortions in these stego images are difficult to be perceived by human eyes.
Table 4 shows the features of test images and the embedding capacity as well as the results of the image quality assessments. Depending on the image resolutions, the embedding capacity ranges from 51.25 million bits (No. 15, 3025 × 2129) to 2.59 million bits (No. 13, 720 × 480). Depending on the distribution of E-channel, the embedding rate ranges from 7.386 bpp (No. 11) to 8.258 bpp (No. 16). Nevertheless, all the test images comply with the demand of 7.3 bpp requested by the end user. As observed in Table 4, the mean squared error of three channels, MSE(RGB), in the stego HDR RGBE image varies from 3.183 to 45.546, depending on the image resolution, the distribution of the E-channel, and that of the secret message. In this table, we show the PSNR values of the tone-mapped images as they are now in the low dynamic range, thereby using 8 bits per sample to represent a pixel. Apart from the “Still Life” image, the PSNR values are all larger than 40 dB, while some of them are even higher than 50 dB. In addition, the structural similarity index measure (SSIM) and the universal image quality index (Q-index) are all very close to 1.0. Image assessment results indicate that the stego tone-mapped image has good image quality.
3.2. Security Analysis
This section evaluates the performance of image encryption when we encrypt the stego HDR RGBE image by our scheme to produce a stego encrypted HDR RGBE image, To the best of our knowledge, no existing security metrics are available to evaluate an encrypted HDR image. Since the interest of our study focuses on the RGBE format with four channels, we instead modify the LDR security evaluation metrics extending them to four channels in an HDR RGBE image. In this study, we use six categories to analyze the security of the encrypted images: the visual perception, histogram, correlation, entropy, image sensitivity, and key security.
3.2.1. Visual Perception
Figure 6 exhibits the tone-mapped images generated from our scheme in different stages. We adopted the tone-mapping algorithm introduced in [2]. From Figure 6a,b, image distortion is not perceived after the format conversion and the message embedding. Figure 6c shows the encryption images which successfully shelter the outlines and detail features. The encrypted images are completely submerged by noise without revealing any meaningful information. Consequently, our encryption scheme is visually secure.
3.2.2. NIST SP 800-22 Randomness Test
The National Institute of Standards and Technology (NIST) statistical test [38] was adopted to test the randomness of sequences generated by the 2D-SLMM to ensure that they are suitable for cryptosystems. NIST SP 800-22 consists of 16 statistical tests, and each test provides a p-value between 0 and 1 under the significance level . If p-value , the sequence passes the randomness test successfully with the confidence of Otherwise, the sequence fails the test. In our experiment, we set the default value, for testing.
Table 5 shows the NIST test results. From the table, we can see that all p-values are larger than 0.01, indicating that the 2D-SLMM sequence passes the randomness tests with 99% confidence.
3.2.3. Histogram Analysis
The histogram contains much statistical information about an image, and the histogram of a plain image contains obvious distribution features. An eligible encryption algorithm should completely eliminate these features. Figure 7 shows histograms of the plaintext image and the ciphered one. Our encryption algorithm makes the distribution more uniform and completely different from the histograms of the plaintext in four channels. No meaningful information can be obtained from the histogram of the stego encrypted HDR image. Therefore, our scheme can effectively prevent statistical attacks.
Variance of histogram (VOH) quantitatively reflects the randomness of the image. VOH is calculated by Equation (14), where denotes the number of counts at each bin in the histogram and represents the average value over all bins. The smaller the VOH, the more randomness the test image holds:
(14)
Apart from VOH, we utilize the Chi-square () test. When the significance level, is set as 0.05 and the degree of freedom is 255; the threshold of the test is 293.25. If the value of a histogram is under this threshold, the histogram can be considered to perform with uniform distribution statistically.
Table 6 lists VOH and values of the “memorial” test image before and after encryption. The results show that encryption reduces the VOH values dramatically, from over several millions to as small as several thousands. In addition, the values also show a significant decrease in the encrypted image, from one hundred thousand to several hundreds. Finally, values in four channels are below the threshold, thereby all 20 stego encrypted test images pass the test.
To provide more insights, we conducted the test for all 20 test images. Figure 8 shows the test results. As can be seen from the figure, all of the values in the entire 20 test cases in four channels are below the threshold, shown as a dashed line. Based on the results presented in Table 6 and Figure 8, we conclude that, firstly, VOH and the values are greatly reduced in the stego encrypted image in comparison with those appearing in the stego plaintext image. In addition, the results confirm the success of passing the test. Our proposed algorithm determines a uniform distribution of the encrypted pixels in four channels, offering high security for image encryption.
3.2.4. Correlation Analysis
In plain images, adjacent pixels are often highly correlated in three directions: horizontal, vertical, and diagonal, which makes it possible to predict current pixels by adjacent pixels. An eligible encryption algorithm should eliminate such correlations. The correlation among pixels can be evaluated by the correlation coefficient in Equation (15):
(15)
where and are values of adjacent pixels. and are the expectation and variance of and over some pairs of samples, respectively. Finally, the correlation coefficient values are between −1 and +1: the closer to zero, the less correlations among chosen pixels. In addition, if the correlation coefficient is a positive number, the variables are directly related. If, on the other hand, the coefficient is a negative number, the variables are inversely related.We compute the scene-referred color values using Equation (1), which are all floating-point values in the R-, G-, B-channels. Therefore, the analysis is represented in three R-, G-, B-channels. Table 7 shows the correlation coefficients calculated from 5000 pairs of adjacent pixels in three directions: horizontal (H), vertical (V), and diagonal (D) for three channels in the plaintext and encrypted images. The statistics show that the correlation coefficients have been dramatically reduced in the ciphered image, and the values are very close to zero.
The correlation coefficients for all 20 stego test images are shown in Figure 9, where the coefficient coefficients are close to zero from both the positive and negative directions, indicating that our image encryption algorithm is effective in reducing the correlation in three directions.
3.2.5. Entropy Analysis
Entropy is a physical quantity to express the degree of uncertainty in a system. Since Shannon [39] introduced the concept to information theory, it is referred to as the Shannon entropy or information entropy.
For an 8-bit grayscale image, , the definition of Shannon entropy is shown in Equation (16), where represents the probability of the i-th gray level occurring in the image:
(16)
If is an ideal random image, and . Therefore, the Shannon entropy for an encrypted 8-bit image is targeted to 8, representing the success of image encryption. Table 8 lists the Shannon entropy for the plaintext image and the encrypted one. The statistics demonstrate that our scheme is so effective that it can produce Shannon entropy for the encrypted RGBE image close to 8 in all channels.
Furthermore, Wu et al. [40] proposed the local Shannon Entropy (LSE) to overcome the weakness of the (global) Shannon entropy and introduced a process to conduct the statistical test. For an 8-bit grayscale image, the LSE can be computed in Equation (17), which averages the information entropy on randomly chosen non-overlapping blocks each of which contains pixels. If , the ideal value of LSE is 7.9025. If the significance level, is set as 0.05, the LSE of a ciphered image should be within the range of [7.9019, 7.9030] in order to pass the statistical test:
(17)
Figure 10 shows the results of LSE for all 20 stego ciphered images. The figure indicates that only two local Shannon entropy values are not within the range to pass the test, indicating that the pass rate is as high as 97.5%. The global and the local Shannon entropy test confirm that our algorithm generates stego encrypted images exhibiting both global and local randomness; thereby, they are capable of resisting the entropy attacks.
3.2.6. Image Sensitivity
A good algorithm designed for image encryption must be sensitive to any tiny difference between two input images, even though there is only a one-bit difference because a hacker can try to find the relationship between two ciphered images by modifying one bit of the plaintext image. Thus, image sensitivity is also an indicator to show the ability of resisting differential attacks. The number of pixel change rates (NPCR) and the unified averaged changed intensity (UACI) are the two most common quantities used to evaluate the strength of image encryption algorithms with respect to differential attacks [41,42,43]. NPCR and UACI are defined in Equations (18)–(20), where and are the pixel values in images and :
(18)
(19)
(20)
The variance of NPCR and UACI is related to the resolutions of the test images. In addition, it is unclear how high NPCR/UACI is such that the image cipher does actually have a high security level able to resist malicious attacks. To this end, Wu et al. [42] proposed a mathematical model for ideally encrypting images and then they derived expectations and variances of NPCR and UACI used to form statistical hypothesis tests. Their findings indicate that the ideal values of NPCR and UACI are 99.6094 and 33.4635, respectively.
Table 9 reports the results of NPCR and UACI for the test image “memorial”. We remark that E-channel has a narrow histogram band in the plaintext image (see Figure 7a). However, our encryption performs so effectively that it shows near uniform distortion after the image encryption, as shown in Figure 7b. Consequently, all NPCR values, including the E channel, are close to the ideal value (99.6094), while the UACI statistics are also close to the ideal value (33.4635), reflecting that the stego encrypted image, “memorial”, can resist the differential attack.
We conducted a statistical hypothesis test, suggested in [42] for all 20 stego encrypted images. We first flipped the least significant bit (LSB) of four corner pixels and the center pixel in R-channel, generating five respective stego encrypted images, each of which is one-bit different from its original. We then calculated the NPCR and UACI values for five pairs of images (original vs. the image with a flipping pixel) for analysis.
Figure 11 shows the NPCR and UACI results averaged from five pair of images for 20 stego encrypted images. The NPCR results show that their values are larger than the threshold, thus passing the hypothesis test. The UACI results indicate that their values are within the range formed by the lower bound and upper bound, implying that these images pass the UACI hypothesis test. According to Table 9 and Figure 11, we conclude that our encryption scheme produces good performance in resisting the differential attacks.
3.2.7. Key Security
Key security can be discussed from the perspectives of key space and key sensitivity. In order to resist the brute force attack, the encryption algorithm must have large key space. In addition, the eligible encryption algorithm needs to be sensitive so that any subtle changes of the keys produce a completely different ciphered image. We discuss the key space and key sensitivity in the following:
Key space: When employing the 2D-SLMM pseudo-random sequence generator, we use three 64-bit double-precision floating-point numbers: , , , and a 16-bit integer to discard the first items to avoid the transient effect. For the encryption algorithm, we adopt five 8-bit integers: , , , , as the initial values. Therefore, the key space is , larger than the minimal requirement of , thus capable of resisting a brute force attack.
Key sensitivity: We conducted the key sensitivity test for our algorithm as follows: First, we used two keys, and , with only one-bit difference. We then encrypted the test image using and thus producing shown in Figure 12b and shown in Figure 12d. Next, we decrypted using , thus producing the original image, shown in Figure 12c. In addition, when we decrypted using a different key, the decrypted image produced looks like a noise image containing no useful information, shown in Figure 12f. The NPCR and UACI between and are close to the ideal values, 99.6094 and 33.4635. We conclude that our algorithm provides the benefit of strong key sensitivity features.
3.3. A Comparison with the Current State-of-the-Art Works
Table 10 compares our algorithm with the current state-of-the-art works presented for HDR data hiding/HDR image encryption. While most of the schemes were based on RGBE format, only two algorithms adopted the OpenEXR format. The embedding rates for these schemes vary ranging from less than 1.0 bpp to as large as 20.0 bpp. Our algorithm performs better than most competitors except Lin et al.’s work [16]. With regard to the quality of tone-mapped image, our scheme produces a tone-mapped stego image with moderate PSNR (50.49 dB), which is inferior to [16,19] but superior to [17,18]. Note that the PSNR depends not only on the tone mapping algorithm adopted but also on the number of concealed secret messages.
Our algorithm is the first constructive data hiding approach that can adaptively convey secret messages, encrypt the stego HDR image, and offer the prediction ability. Our scheme conceals more secret messages in pixels with low luminance. In addition, the user has flexibility to embed in a high payload with more distortion allowed, or to conceal a low payload in exchange for high image quality. In this paper, the user demand embedding rate is set to be 7.3 bpp, but our scheme can offer the embedding rate to reach 9.29 bpp, larger than most of our competitors, or alternatively to reduce to 4.3 bpp or even lower. Nevertheless, thanks to the adaptive embedding and the optimal base, the stego image produced by our scheme maintains high image quality. Furthermore, Tsai et al. [20] and our algorithm investigated the HDR image encryption. However, we propose six metrics to evaluate the security analysis completely rather than providing only visual perception. The security analysis confirms that our scheme produces a secure image encryption result to become the current state-of-the-art work.
4. Conclusions and Future Work
In this paper, we proposed a constructive adaptive HDR data hiding method, where a stego HDR image is synthesized during the HDR format conversion. Secret messages are adaptively embedded based on the distribution of the E channel information, so more messages are conveyed in lower-luminance pixels and fewer in higher-luminance areas. Thanks to the optimal base mechanism we propose, our algorithm not only complies with a user’s demand, but also generates a stego image with minimal mean squared error. To the best of our knowledge, our algorithm is the first providing prediction and satisfying the user’s embedding capacity demand in the HDR image literature. To further protect the stego image from unauthorized user access as well as the hidden secret message, we adopted 2D Sine Logistic modulation map and the sequence produced passed 16 randomness tests in the NIST SP 800-22 test suite, confirming that it has better hyperchaotic behavior to cipher the stego HDR image. We introduced a random permutation technique able to fully shuffle the pixel contents, thus achieving the bit-level permutation image ciphering. We adopted six metrics to thoroughly and comprehensively evaluate the security of the stego ciphered HDR RGBE image. Our scheme offers 18% to 32% larger embedding rate than the current state-of-the-art schemes’ results without degrading the quality of stego image. The security evaluation confirms that our scheme provides high security that is superior to the competitors.
Our future work is to extend the current algorithm to provide the reversibility, able to restore the original HDR image after message extraction, and to improve our algorithm by taking into consideration human visual sensitivity for message embedding.
Conceptualization, C.-F.L. and C.-M.W.; methodology, C.-F.L.; software, C.-F.L.; validation, C.-F.L.; writing—original draft preparation, C.-F.L. and C.-M.W.; writing—review and editing, C.-F.L. and C.-M.W.; project administration, C.-M.W. and W.L.; Supervision, W.L. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Data are available in a publicly accessible repository.
This work is supported in part by the Ministry of Science and Technology, Taiwan, under Grant MOST 107-2221-E-005-069, 108-2221-E-005-051, MOST 109-2221-E-005-062, MOST 110-2221-E-005-069, and NSC-111-2221-E-005-076.
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 1. The flowchart of our proposed method consisting of message embedding and extraction processes.
Figure 2. The bit breakdown for the 48-bit/pixel OpenEXR, 1-bit sign, 5-bit exponent, 10-bit mantissa, and 32-bit/pixel RGBE encodings, 8-bit in the Red, Green, Blue, and Exponent channel.
Figure 3. Trajectories of 2D-SLMM with an initial value [Forumla omitted. See PDF.] and the control values [Forumla omitted. See PDF.].
Figure 4. An exhibition of 20 stego tone-mapped images before the encryption process.
Figure 5. Stego HDR images “dani_cathedral”: (a) direct display of an HDR image; (b) and (c) using different tone-mapped algorithms [37] and [2], respectively, and then displaying the stego low dynamic range TM images.
Figure 6. The visual perception of the tone-mapped test image, “memorial,” first row, and the test image 8 (“Display1000”), second row. (a) the original HDR image in the OpenEXR format; (b) the stego images concealing a hidden message in the RGBE format; (c) the stego encrypted image; (d) the deciphered plaintext image.
Figure 7. Histograms of the stego HDR RGBE image, “memorial”; (a) the histogram of the plain stego image; (b) the histogram of the stego encrypted image.
Figure 8. All 20 stego encrypted images in four channels pass the [Forumla omitted. See PDF.] test.
Figure 9. Adjacent correlation coefficients are close to zero for all 20 stego test images in the (a) horizontal, (b) vertical, and (c) diagonal directions.
Figure 10. The local Shannon Entropy (LSE) results for all 20 stego ciphered images.
Figure 12. Key sensitivity test using the image, “rosette,” where the secret key [Forumla omitted. See PDF.] is one-bit different from the secret key [Forumla omitted. See PDF.]; (a) the original stego image [Forumla omitted. See PDF.]; (b) using [Forumla omitted. See PDF.] to cipher [Forumla omitted. See PDF.] and producing [Forumla omitted. See PDF.]; (c) deciphering [Forumla omitted. See PDF.] by [Forumla omitted. See PDF.] to produce the genuine [Forumla omitted. See PDF.]; (d) using [Forumla omitted. See PDF.] to cipher [Forumla omitted. See PDF.] and producing [Forumla omitted. See PDF.]; (e) NPCR and UACI results for the image pair [Forumla omitted. See PDF.]; (f) deciphering [Forumla omitted. See PDF.] by the incorrect key, [Forumla omitted. See PDF.], and producing a noisy image.
Figure 11. The results of NPCR and UACI values for statistical hypothesis tests. (a) NPCR. (b) UACI.
(a) An example of the optimal base determination derived in the E-channel mapping table for the “memorial” mage with the median,
(a) | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
≤119 | 0 | - | - | - | - | - | - | - | - | - | - | - | - |
120 | 1 | 10,086 | 10,143 | 21 | 21 | 23 | 39.111 | 32,768 | 32,768 | 32 | 32 | 32 | 85.500 |
121 | 1380 | 5043 | 5202 | 17 | 17 | 18 | 25.056 | 16,384 | 16,875 | 25 | 25 | 27 | 54.889 |
122 | 15,766 | 2523 | 2535 | 13 | 13 | 15 | 15.556 | 8192 | 8400 | 20 | 20 | 21 | 34.556 |
123 | 24,177 | 1261 | 1331 | 11 | 11 | 11 | 10.000 | 4096 | 4096 | 16 | 16 | 16 | 21.500 |
124 | 38,229 | 631 | 576 | 8 | 9 | 9 | 6.278 | 2048 | 2197 | 13 | 13 | 13 | 14.000 |
125 | 77,910 | 316 | 343 | 7 | 7 | 7 | 4.000 | 1024 | 1100 | 10 | 10 | 11 | 9.000 |
126 | 108,287 | 158 | 175 | 5 | 5 | 7 | 2.667 | 512 | 512 | 8 | 8 | 8 | 5.500 |
127 | 79,791 | 79 | 80 | 4 | 4 | 5 | 1.667 | 256 | 294 | 6 | 7 | 7 | 3.722 |
128 | 26,106 | 40 | 45 | 3 | 3 | 5 | 1.111 | 128 | 150 | 5 | 5 | 6 | 2.389 |
129 | 9609 | 20 | 27 | 3 | 3 | 3 | 0.667 | 64 | 64 | 4 | 4 | 4 | 1.500 |
130 | 3231 | 10 | 12 | 2 | 2 | 3 | 0.556 | 32 | 36 | 3 | 3 | 4 | 0.944 |
131 | 1819 | 5 | 6 | 1 | 2 | 3 | 0.389 | 16 | 18 | 2 | 3 | 3 | 0.611 |
132 | 1325 | 3 | 3 | 1 | 1 | 3 | 0.222 | 8 | 12 | 2 | 2 | 3 | 0.556 |
133 | 1711 | 2 | 2 | 1 | 1 | 2 | 0.167 | 4 | 4 | 1 | 2 | 2 | 0.333 |
134 | 2862 | 1 | 1 | 1 | 1 | 1 | 0 | 2 | 2 | 1 | 1 | 2 | 0.167 |
135 | 517 | 1 | 1 | 1 | 1 | 1 | 0 | 1 | 2 | 1 | 1 | 2 | 0.167 |
136 | 296 | 1 | 1 | 1 | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 |
137 | 165 | 1 | 1 | 1 | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 |
138 | 34 | 1 | 1 | 1 | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 |
≥139 | 0 | - | - | - | - | - | - | - | - | - | - | ||
(b) | |||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
≤106 | 0 | - | - | - | - | - | - | - | - | - | - | - | |
107 | 3 | 41,310,352 | 16,777,216 | 256 | 256 | 256 | 5461.500 | 134,217,728 | 16,777,216 | 256 | 256 | 256 | 5461.500 |
108~116 | 0 | - | - | - | - | - | - | - | - | - | - | - | - |
117 | 4 | 40,343 | 40,460 | 34 | 34 | 35 | 98.333 | 131,072 | 132,651 | 51 | 51 | 51 | 216.667 |
118 | 87 | 20,172 | 20,412 | 27 | 27 | 28 | 62.278 | 65,536 | 65,600 | 40 | 40 | 41 | 135.667 |
119 | 1755 | 10,086 | 10,143 | 21 | 21 | 23 | 39.111 | 32,768 | 32,768 | 32 | 32 | 32 | 85.500 |
120 | 6679 | 5043 | 5202 | 17 | 17 | 18 | 25.056 | 16,384 | 16,875 | 25 | 25 | 27 | 54.889 |
121 | 45,803 | 2522 | 2535 | 13 | 13 | 15 | 15.556 | 8192 | 8400 | 20 | 20 | 21 | 34.556 |
122 | 274,663 | 1261 | 1331 | 11 | 11 | 11 | 10.000 | 4096 | 4096 | 16 | 16 | 16 | 21.500 |
123 | 600,771 | 631 | 648 | 8 | 9 | 9 | 6.278 | 2048 | 2197 | 13 | 13 | 13 | 14.000 |
124 | 584,862 | 316 | 343 | 7 | 7 | 7 | 4.000 | 1024 | 1100 | 10 | 10 | 11 | 9.000 |
125 | 649,392 | 158 | 175 | 5 | 5 | 7 | 2.667 | 512 | 512 | 8 | 8 | 8 | 5.500 |
126 | 461,460 | 79 | 80 | 4 | 4 | 5 | 1.667 | 256 | 294 | 6 | 7 | 7 | 3.722 |
127 | 199,209 | 40 | 45 | 3 | 3 | 5 | 1.111 | 128 | 150 | 5 | 5 | 6 | 2.389 |
128 | 123,106 | 20 | 27 | 3 | 3 | 3 | 0.667 | 64 | 64 | 4 | 4 | 4 | 1.500 |
129 | 83,390 | 10 | 12 | 2 | 2 | 3 | 0.556 | 32 | 36 | 3 | 3 | 4 | 0.944 |
130 | 51,408 | 5 | 6 | 1 | 2 | 3 | 0.389 | 16 | 18 | 2 | 3 | 3 | 0.611 |
131 | 41,206 | 3 | 3 | 1 | 1 | 3 | 0.222 | 8 | 12 | 2 | 2 | 3 | 0.556 |
132 | 17,509 | 2 | 2 | 1 | 1 | 2 | 0.167 | 4 | 4 | 1 | 2 | 2 | 0.333 |
133 | 4421 | 1 | 1 | 1 | 1 | 1 | 0 | 2 | 2 | 1 | 1 | 2 | 0.167 |
≥134 | 0 | - | - | - | - | - | - | - | - | - | - | ||
An example of random index permutation, where
i | k | Exchange | 1st | 2nd | 3rd | 4th | 5th | 6th | 7th | 8th |
---|---|---|---|---|---|---|---|---|---|---|
Original index |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | ||
1 |
|
(3, 8) | 1 | 2 | 8 | 4 | 5 | 6 | 7 | 3 |
2 |
|
(4, 7) | 1 | 2 | 8 | 7 | 5 | 6 | 4 | 3 |
3 |
|
(1, 6) | 6 | 2 | 8 | 7 | 5 | 1 | 4 | 3 |
4 |
|
(5, 7) | 6 | 2 | 8 | 5 | 7 | 1 | 4 | 3 |
5 |
|
(5, 6) | 5 | 2 | 8 | 6 | 7 | 1 | 4 | 3 |
6 |
|
(2, 8) | 5 | 8 | 2 | 6 | 7 | 1 | 4 | 3 |
7 |
|
No change | 5 | 8 | 2 | 6 | 7 | 1 | 4 | 3 |
Permuted index |
5 | 8 | 2 | 6 | 7 | 1 | 4 | 3 |
An example of inverse random index permutation, where
j | k | Exchange | 1st | 2nd | 3rd | 4th | 5th | 6th | 7th | 8th |
---|---|---|---|---|---|---|---|---|---|---|
Input index |
5 | 8 | 2 | 6 | 7 | 1 | 4 | 3 | ||
1 |
|
No change | 5 | 8 | 2 | 6 | 7 | 1 | 4 | 3 |
2 |
|
(8, 2) | 5 | 2 | 8 | 6 | 7 | 1 | 4 | 3 |
3 |
|
(5, 6) | 6 | 2 | 8 | 5 | 7 | 1 | 4 | 3 |
4 |
|
(5, 7) | 6 | 2 | 8 | 7 | 5 | 1 | 4 | 3 |
5 |
|
(6, 1) | 1 | 2 | 8 | 7 | 5 | 6 | 4 | 3 |
6 |
|
(4, 7) | 1 | 2 | 8 | 4 | 5 | 6 | 7 | 3 |
7 |
|
(3, 8) | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
Inverse index permutation results: |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
Embedding capacity and quality assessment of the stego images before encryption.
ID | Name | Resolution | Capacity |
|
MSE (RGB) | TM PSNR | TM SSIM | TM Q-Index |
---|---|---|---|---|---|---|---|---|
1 | Apartment | 2048 × 1536 | 24,225,583 | 7.701 | 17.609 | 51.895 | 0.999918 | 0.996560 |
2 | AtriumNight | 760 × 1016 | 5,831,456 | 7.552 | 3.445 | 51.714 | 0.999786 | 0.999928 |
3 | bigFogMap | 751 × 1130 | 6,630,761 | 7.813 | 4.118 | 50.342 | 0.999629 | 0.997726 |
4 | dani_belgium | 1025 × 769 | 6,054,383 | 7.681 | 4.499 | 51.053 | 0.999689 | 0.998506 |
5 | dani_cathedral | 767 × 1023 | 5,924,398 | 7.550 | 4.723 | 49.988 | 0.999584 | 0.998657 |
6 | dani_synagogue | 1025 × 769 | 6,388,178 | 8.105 | 5.418 | 47.352 | 0.999364 | 0.999867 |
7 | Desk | 644 × 874 | 4,247,692 | 7.547 | 6.515 | 45.386 | 0.999687 | 0.990792 |
8 | Display1000 | 2048 × 1536 | 23,962,622 | 7.618 | 4.041 | 50.545 | 0.999950 | 0.998025 |
9 | memorial | 512 × 768 | 2,979,918 | 7.578 | 3.900 | 42.611 | 0.999242 | 0.997763 |
10 | Montreal | 2048 × 1536 | 23,637,108 | 7.514 | 3.183 | 49.552 | 0.999869 | 0.999894 |
11 | MtTamWest | 1214 × 732 | 6,563,231 | 7.386 | 6.274 | 50.149 | 0.999601 | 1.000000 |
12 | nave | 720 × 480 | 2,639,315 | 7.637 | 42.353 | 46.835 | 0.998883 | 0.996546 |
13 | rosette | 720 × 480 | 2,597,575 | 7.516 | 45.546 | 47.052 | 0.998770 | 0.994346 |
14 | Spheron3 | 2149 × 1074 | 18,556,270 | 8.040 | 16.753 | 40.906 | 0.998803 | 0.998281 |
15 | SpheronNapaValley | 3025 × 2129 | 51,250,510 | 7.958 | 5.321 | 43.923 | 0.999597 | 1.000000 |
16 | SpheronNice | 2981 × 1165 | 28,677,186 | 8.258 | 5.341 | 43.411 | 0.999470 | 0.999264 |
17 | SpheronPriceWestern | 3272 × 1280 | 32,678,515 | 7.803 | 4.570 | 51.209 | 0.999936 | 0.998134 |
18 | SpheronSiggraph2001 | 1329 × 1289 | 12,676,596 | 7.400 | 3.634 | 49.223 | 0.999822 | 0.998210 |
19 | StillLife | 1240 × 846 | 8,002,655 | 7.629 | 25.401 | 32.602 | 0.989207 | 0.997025 |
20 | Tree | 928 × 906 | 6,922,330 | 8.233 | 35.164 | 50.494 | 0.999914 | 0.998838 |
NIST test results for 2D-SLMM with the initial values
No | Test Type | p-Value | Result | No | Test Type | p-Value | Result |
---|---|---|---|---|---|---|---|
1 | Frequency | 0.931466 | Pass | 9 | Maurer’s universal statistical | 0.307327 | Pass |
2 | Block frequency | 0.926042 | Pass | 10 | Linear complexity | 0.917021 | Pass |
3 | Runs | 0.652705 | Pass | 11 | Serial | 0.880/0.508 | Pass |
4 | Longest run of ones in a block | 0.966102 | Pass | 12 | Approximate entropy | 0.422853 | Pass |
5 | Binary matrix rank | 0.483810 | Pass | 13 | Cummulative sums (forward) | 0.969889 | Pass |
6 | Spectral | 0.308390 | Pass | 14 | Cummulative sums (reverse) | 0.925027 | Pass |
7 | Non-overlapping template matching | 0.055807 | Pass | 15 | Random excursions | 0.650265 | Pass |
8 | Overlapping template matching | 0.477088 | Pass | 16 | Random excursions variant | 0.288640 | Pass |
Variance of Histogram (VOH) and
Channel | VOH | χ2 Value | ||
---|---|---|---|---|
Plain | Encrypted | Plain | Encrypted | |
R | 2,707,096.750 | 1653.078 | 451,182.792 | 275.513 |
G | 3,589,377.078 | 1633.258 | 598,229.513 | 272.210 |
B | 15,759,698.078 | 1692.586 | 2,626,616.346 | 282.098 |
E | 104,124,933.656 | 1552.016 | 17,354,155.610 | 258.669 |
Adjacent correlation coefficients for the test image “memorial”.
Channel | Plaintext Image | Encrypted Image | ||||
---|---|---|---|---|---|---|
H | V | D | H | V | D | |
R | 0.869519 | 0.886546 | 0.806847 | −0.001245 | 0.000738 | −0.001069 |
G | 0.849231 | 0.871814 | 0.780838 | 0.001059 | 0.000908 | −0.001039 |
B | 0.857073 | 0.877966 | 0.788200 | 0.001848 | 0.003866 | −0.002014 |
Shannon entropy values of the image “memorial” in the plain and encrypted images.
Channel | Plaintext Image | Encrypted Image |
---|---|---|
Red | 6.96112745 | 7.99949461 |
Green | 6.91334510 | 7.99950031 |
Blue | 5.46477440 | 7.99948285 |
Exponent | 2.85423907 | 7.99949461 |
NPCR and UACI values for the stego encrypted test image, “memorial”.
Channel | NPCR (%) | UACI (%) |
---|---|---|
R | 99.60586548 | 33.46571998 |
G | 99.62015788 | 33.46139127 |
B | 99.60901896 | 33.46733462 |
E | 99.60657756 | 33.46112799 |
A comparison of our scheme with the current state-of-the-art works.
Algorithm | Proposed | [ |
[ |
[ |
[ |
[ |
[ |
[ |
[ |
[ |
[ |
---|---|---|---|---|---|---|---|---|---|---|---|
Year | 2022 | 2022 | 2022 | 2020 | 2019 | 2017 | 2016 | 2012 | 2011 | 2011 | 2009 |
Format | OpenEXR | RGBE | RGBE | RGBE | RGBE | OpenEXR | RGBE | RGBE | RGBE | LogLuv | RGBE |
ER (bpp) | 7.30~9.29 | 6.19~7.03 | 1.07~2.34 | 0.490–2.292 | 1.90~2.43 | 2.433~20.002 | 0.1391–0.1472 | 0.1340–0.1373 | 0.1256–0.1281 | 26.0 | 5.04~9.70 |
PSNR | 32.60–51.90 | N.A. | 61.39–75.66 | 50.65–51.77 | 35.96–39.36 | 45.12–82.32 | N.A. | N.A. | N.A. | 30.47–37.00 | 30.00–40.00 |
SSIM | 0.9943–1.0000 | N.A. | 0.9994–0.9999 | 0.8542–0.9954 | N.A. | 0.7572–0.9999 | N.A. | N.A. | N.A. | N.A. | N.A. |
Encryption | Yes | Yes | No | No | No | No | No | No | No | No | No |
NIST Test | Yes | No | No | No | No | No | No | No | No | No | No |
Adaptive | Yes | No | No | Yes | No | Yes | No | No | Yes | No | Yes |
Prediction | Yes | No | No | No | No | No | No | No | No | No | No |
User Req. | Yes | No | No | No | No | No | No | No | No | No | No |
Constructive | Yes | No | No | No | No | No | No | No | No | No | No |
Evaluation | Six Metrics | Visual | - | - | - | - | - | - | - | - | - |
Security | High | Low | - | - | - | - | - | - | - | - | - |
References
1. Reinhard, E.; Ward, G.; Pattanaik, S.; Debevec, P.; Heidrich, W.; Myszkowski, K. High Dynamic Range Imaging, Acquisition, Display, and Image-Based Lighting; 2nd ed. Morgan Kaufmann: Burlington, VT, USA, 2010.
2. Kim, M.; Kautz, J. Consistent tone reproduction. Proceedings of the 10th IASTED International Conference on Computer Graphics and Imaging, (CGIM 2008); Innsbruck, Austria, 13–15 February 2008; pp. 152-159.
3. Ward, G.J. The RADIANCE lighting simulation and rendering system. Proceedings of the 21st Annual Conference on Computer Graphics and Interactive Techniques; Orlando, FL, USA, 24–29 July 1994; pp. 459-472. [DOI: https://dx.doi.org/10.1145/192161.192286]
4. Larson, G.W. LogLuv encoding for full-gamut, high-dynamic range images. J. Graph. Tools; 1998; 3, pp. 15-31. [DOI: https://dx.doi.org/10.1080/10867651.1998.10487485]
5. OpenEXR. Available online: https://www.openexr.com (accessed on 29 September 2022).
6. Cerad-Company, X.; Parraga, C.A.; Otazu, X. Which tone-mapping operator is the best? A comparative study of perceptual quality. J. Opt. Soc. Am. A; 2018; 35, pp. 626-638. [DOI: https://dx.doi.org/10.1364/JOSAA.35.000626] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/29603951]
7. Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing; 2019; 335, pp. 299-326. [DOI: https://dx.doi.org/10.1016/j.neucom.2018.06.075]
8. Kacar, S.; Konyar, M.Z.; Cavusoglu, U. 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos. J. Inf. Secur. Appl.; 2022; 71, 103369. [DOI: https://dx.doi.org/10.1016/j.jisa.2022.103369]
9. Wu, H.-Y.; Chen, L.-H.; Ching, Y.-T. Block-based steganography method using optimal selection to reach high efficiency and capacity for palette images. Appl. Sci.; 2020; 10, 7820. [DOI: https://dx.doi.org/10.3390/app10217820]
10. Chen, Y.-H.; Chang, C.-C.; Lin, C.-C.; Wang, Z.-M. An adaptive reversible data hiding scheme using AMBTC and quantization level difference. Appl. Sci.; 2021; 11, 635. [DOI: https://dx.doi.org/10.3390/app11020635]
11. Cheng, Y.-M.; Wang, C.-M. A novel approach to steganography in high-dynamic-range images. IEEE Multimed.; 2009; 16, pp. 70-80. [DOI: https://dx.doi.org/10.1109/MMUL.2009.43]
12. Li, M.-T.; Huang, N.-C.; Wang, C.-M. A data hiding scheme for high dynamic range images. Int. J. Innov. Comput. Inf. Control; 2011; 7, pp. 2021-2035.
13. Chang, C.-C.; Nguyen, T.-S.; Lin, C.-C. A new distortion-free data embedding scheme for high-dynamic range images. Multimed. Tools Appl.; 2016; 75, pp. 145-163. [DOI: https://dx.doi.org/10.1007/s11042-014-2279-5]
14. Wang, Z.-H.; Lin, T.-Y.; Chang, C.-C.; Lin, C.-C. A novel distortion-free data hiding scheme for high dynamic range images. Proceedings of the Fourth International Conference on Digital Home; Guangzhou, China, 25 November 2012; pp. 33-38. [DOI: https://dx.doi.org/10.1109/ICDH.2012.49]
15. Yu, C.-M.; Wu, K.-C.; Wang, C.-M. A distortion-free data hiding scheme for high dynamic range images. Displays; 2011; 32, pp. 225-236. [DOI: https://dx.doi.org/10.1016/j.displa.2011.02.004]
16. Lin, Y.-T.; Wang, C.-M.; Chen, W.-S.; Lin, F.-P.; Lin, W. A novel data hiding algorithm for high dynamic range images. IEEE Trans. Multimed.; 2017; 19, pp. 196-211. [DOI: https://dx.doi.org/10.1109/TMM.2016.2605499]
17. He, X.; Zhang, W.; Zhang, H.; Ma, L.; Li, Y. Reversible data hiding for high dynamic range images using edge information. Multimed. Tools Appl.; 2019; 78, pp. 29137-29160. [DOI: https://dx.doi.org/10.1007/s11042-018-6589-x]
18. Gao, X.; Pan, Z.; Gao, E.; Fan, G. Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction. Signal Process.; 2020; 173, 107579. [DOI: https://dx.doi.org/10.1016/j.sigpro.2020.107579]
19. Tsai, Y.-Y.; Liu, H.-L.; Ying, C.-Y. Applying homogeneity index modification to high-capacity high-dynamic-range image authentication with distortion tolerance. Multimed. Tools Appl.; 2022; 81, pp. 24957-24976. [DOI: https://dx.doi.org/10.1007/s11042-022-12837-9]
20. Tsai, Y.-Y.; Liu, H.-L.; Kuo, P.-L.; Chan, C.-S. Extending multi-MSB prediction and Huffman coding for reversible data hiding in encrypted HDR Images. IEEE Access; 2022; 10, pp. 49347-49358. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3171578]
21. Wu, K.-C.; Wang, C.-M. Steganography using reversible texture synthesis. IEEE Trans. Image Process.; 2014; 24, pp. 130-139. [DOI: https://dx.doi.org/10.1109/TIP.2014.2371246]
22. Hsieh, K.-S.; Wang, C.-M. Constructive image steganography using example-based weighted color transfer. J. Inf. Secur. Appl.; 2022; 65, 103126. [DOI: https://dx.doi.org/10.1016/j.jisa.2022.103126]
23. Singh, K.N.; Singh, A.K. Towards integrating image encryption with compression: A survey. ACM Trans. Multimed. Comput. Commun. Appl.; 2022; 18, 89. [DOI: https://dx.doi.org/10.1145/3498342]
24. Zia, U.; McCartney, M.; Scotney, B.; Martinez, J.; Abu Tair, M.; Memon, J.; Sajjad, A. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int. J. Inf. Secur.; 2022; 21, pp. 917-935. [DOI: https://dx.doi.org/10.1007/s10207-022-00588-5]
25. Singh, M.; Singh, A.K. A comprehensive survey on encryption techniques for digital images. Multimed Tools Appl.; 2022; [DOI: https://dx.doi.org/10.1007/s11042-022-12791-6]
26. Kumari, M.; Gupta, S.; Sardana, P. A survey of image encryption algorithms. 3D Res.; 2017; 8, 37. [DOI: https://dx.doi.org/10.1007/s13319-017-0148-5]
27. Yan, J.-Y.; Chen, T.-H.; Lin, C.-H. Encryption in high dynamic range images for RGBE format. Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing; Beijing, China, 16–18 October 2013; pp. 493-496. [DOI: https://dx.doi.org/10.1109/IIH-MSP.2013.128]
28. Lin, K.-S.; Chen, T.-H.; Lin, C.-H.; Chang, S.-S. A tailor-made encryption scheme for high-dynamic range images. Adv. Intell. Syst. Comput.; 2014; 238, pp. 183-192. [DOI: https://dx.doi.org/10.1007/978-3-319-01796-9_19]
29. Chen, T.-H.; Chang, S.-S. Image encryption on HDR images for OpenEXR Format. Int. J. Eng. Sci.; 2014; 4, pp. 19-23.
30. Chen, T.-H.; Yan, J.-Y. Commutative encryption and authentication for OpenEXR high dynamic range images. Multimed. Tools Appl.; 2021; 80, pp. 27807-27828. [DOI: https://dx.doi.org/10.1007/s11042-021-11002-y]
31. Li, W.; Yan, A.; Zhang, H. Novel multiple-image encryption scheme based on coherent beam combining and equal modulus decomposition. Appl. Sci.; 2021; 11, 9310. [DOI: https://dx.doi.org/10.3390/app11199310]
32. Liu, Z.; Guo, Q.; Xu, L.; Ahmad, M.A.; Liu, S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express; 2010; 18, pp. 12033-12043. [DOI: https://dx.doi.org/10.1364/OE.18.012033]
33. Hua, Z.; Zhou, Y.; Pun, C.-M.; Chen, C.L. Philip. 2D Sine Logistic modulation map for image encryption. Inf. Sci.; 2015; 297, pp. 80-94. [DOI: https://dx.doi.org/10.1016/j.ins.2014.11.018]
34.
35. Durstenfeld, R. Algorithm 235: Random permutation. Commun. ACM; 1964; 7, 420. [DOI: https://dx.doi.org/10.1145/364520.364540]
36. High Dynamic Range Image Examples. Available online: http://www.anyhere.com/gward/hdrenc/pages/originals.html (accessed on 28 October 2022).
37. Mantiuk, R.; Daly, S.; Kerofsky, L. Display adaptive tone mapping. ACM Trans. Graph.; 2008; 27, 110. [DOI: https://dx.doi.org/10.1145/1360612.1360667]
38. Bassham, L.E.; Rukhin, A.L.; Soto, J.; Nechvatal, J.R.; Smid, M.E.; Barker, E.B.; Leigh, S.D.; Levenson, M.; Vangel, M.; Banks, D.L. et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Technical Report National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010.
39. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J.; 1948; 27, pp. 379-423. [DOI: https://dx.doi.org/10.1002/j.1538-7305.1948.tb01338.x]
40. Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci.; 2013; 222, pp. 323-342. [DOI: https://dx.doi.org/10.1016/j.ins.2012.07.049]
41. Chen, G.; Mao, Y.; Chui, C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals; 2004; 21, pp. 749-761. [DOI: https://dx.doi.org/10.1016/j.chaos.2003.12.022]
42. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidisci. J. Sci. Technol. J. Select. Areas Telecommun.; 2011; 2, pp. 31-38.
43. Zhang, Y. Statistical test criteria for sensitivity indexes of image cryptosystems. Inf. Sci.; 2021; 550, pp. 313-328. [DOI: https://dx.doi.org/10.1016/j.ins.2020.10.026]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
High dynamic range (HDR) image data hiding and encryption has attracted much interest in recent years due the benefits of providing high quality realistic images and versatile applications, such as copyright protection, data integrity, and covert communication. In this paper, we propose a novel constructive and camouflaged adaptive data hiding and image encryption scheme for HDR images. Our algorithm disguises hidden messages when converting an original OpenEXR format to the RGBE encoding, which contains the Red, Green, and Blue color channels and an exponent E channel. During the conversion process, we determine an optimal base for each pixel by considering the user’s demands and the exponent E channel information to achieve adaptive message concealment. To prevent inappropriate access to the stego image, we perform the bit-level permutation and confusion using a 2D Sine Logistic modulation map with hyperchaotic behavior and a random permutation scheme with the time complexity of
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer