Image privacy preservation scheme based on QR code and reversible visible watermarking

被引:0
|
作者
Yao Y. [1 ]
Wang F. [1 ]
Yan W. [1 ]
Yu N. [1 ]
机构
[1] School of Information Science and Technology, University of Science and Technology of China, Hefei
来源
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Privacy preservation; QR code; Reversible data hiding; Visible watermarking;
D O I
10.11959/j.issn.1000-436x.2019220
中图分类号
学科分类号
摘要
With the privacy leakage problem of image delivery in networks, an image privacy preservation scheme based on QR code and reversible visible watermarking was proposed. In order to preserve the privacy information including shooting time, shooting location and detailed description, the encrypted privacy information was stored in cloud platforms and corresponding universal resource locator was generated firstly. Secondly, the universal resource locator was encoded as the QR code and it was embedded into the cover image using reversible visible watermarking. Therefore, the access control for privacy information could be achieved. The visual perceptual model was utilized to select adaptive watermark embedding parameters to balance watermark visibility and marked image quality. Experimental results demonstrate that the good visual quality of marked images can be obtained and the embedded QR code can be correctly decoded. The proposed scheme can guarantee marked image quality and reduce the risk of private information leakage. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:65 / 75
页数:10
相关论文
共 26 条
  • [1] Li F.H., Li H., Jia Y., Et al., Privacy computing: concept, connotation and its research trend, Journal on Communications, 37, 4, pp. 1-11, (2016)
  • [2] The 43rd China statistical report on internet development
  • [3] Li W.H., Cao J., Li H., Privacy self-correlation privacy-preserving scheme in LBS, Journal on Communications, 40, 5, pp. 57-66, (2019)
  • [4] Wang X.Y., Niu B., Li F.H., Et al., Risk assessing and privacy-preserving scheme for privacy leakage in APP, Journal on Communications, 40, 5, pp. 13-23, (2019)
  • [5] Yan W.B., Yao Y.Z., Zhang W.M., Et al., Privacy-preserving scheme for logistics systems based on 2D code and information hiding, Chinese Journal of Network and Information Security, 3, 11, pp. 22-28, (2017)
  • [6] Mohanty S.P., Ramakrishnan K.R., Kankanhalli M.S., A DCT domain visible watermarking technique for images, International Conference on Multimedia and Expo, pp. 1029-1032, (2000)
  • [7] Shi Y.Q., Li X., Zhang X., Et al., Reversible data hiding: advances in the past two decades, IEEE Access, 4, pp. 3210-3237, (2016)
  • [8] Hu Y., Jeon B., Reversible visible watermarking and lossless recovery of original images, IEEE Transactions on Circuits and Systems for Video Technology, 16, 11, pp. 1423-1429, (2006)
  • [9] Yip S.K., Au O.C., Ho C.W., Et al., Lossless visible watermarking, International Conference on Multimedia and Expo, pp. 853-856, (2006)
  • [10] Tsai H.M., Chang L.W., A high secure reversible visible watermarking scheme, International Conference on Multimedia and Expo, pp. 2106-2109, (2007)