Guodong Ye , Shoukang Liu , Xiuchun Xiao , Xiaoling Hunag
{"title":"Image hiding algorithm based on local binary pattern and compressive sensing","authors":"Guodong Ye , Shoukang Liu , Xiuchun Xiao , Xiaoling Hunag","doi":"10.1016/j.matcom.2025.05.005","DOIUrl":null,"url":null,"abstract":"<div><div>In recent years, with the rapid growth of digital communication, the protection of image privacy has become a critical concern. Traditional image encryption methods may attract attacker attention due to the noise-like appearance of cipher image. To address the theft risk to the private image, a novel three-dimensional chaotic map of Chebyshev coupled Logistic with Sine map (3D-CCLSM) is designed, and then an image hiding algorithm based on local binary pattern (LBP) and compressive sensing (CS) is proposed, named ImHALC. By integrating LBP-based texture feature extraction and CS-based image compression, ImHALC aims to enhance both the security and imperceptibility for steganographic image. Especially, LBP is taken to connect the plain image and keystream, resulting a high security for ImHALC. Firstly, in stage of keystream generation, texture information of the plain image is extracted by using LBP and seen as input of hash function SHA-256, to produce corresponding hash values. Then, these hash values are used to generate the initial value of 3D-CCLSM by a new designed key transformation model (KAM), so as to get the keystream for encryption. Secondly, in stage of image compression, a measurement matrix is constructed by above keystream, and CS is applied to the plain image to get measurements. Thirdly, in stage of image encryption, measurements are confused and diffused to produce a cipher image. Finally, in stage of embedding, an embedding method using integer wavelet transformation (IWT) and 2<sup>k</sup> correction is presented, so as to embed the secrets (i.e., cipher image) into a given carrier image to obtain hiding performance, i.e., forming a carrier image hiding secrets (CHS). In particular, the ImHALC can achieve the effect of blind extraction. After adopting a two-dimensional projection gradient algorithm with embedded decryption (2DPG-ED), the reconstruction quality for the plain image is good for test images.</div></div>","PeriodicalId":49856,"journal":{"name":"Mathematics and Computers in Simulation","volume":"237 ","pages":"Pages 316-334"},"PeriodicalIF":4.4000,"publicationDate":"2025-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Computers in Simulation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378475425001879","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, with the rapid growth of digital communication, the protection of image privacy has become a critical concern. Traditional image encryption methods may attract attacker attention due to the noise-like appearance of cipher image. To address the theft risk to the private image, a novel three-dimensional chaotic map of Chebyshev coupled Logistic with Sine map (3D-CCLSM) is designed, and then an image hiding algorithm based on local binary pattern (LBP) and compressive sensing (CS) is proposed, named ImHALC. By integrating LBP-based texture feature extraction and CS-based image compression, ImHALC aims to enhance both the security and imperceptibility for steganographic image. Especially, LBP is taken to connect the plain image and keystream, resulting a high security for ImHALC. Firstly, in stage of keystream generation, texture information of the plain image is extracted by using LBP and seen as input of hash function SHA-256, to produce corresponding hash values. Then, these hash values are used to generate the initial value of 3D-CCLSM by a new designed key transformation model (KAM), so as to get the keystream for encryption. Secondly, in stage of image compression, a measurement matrix is constructed by above keystream, and CS is applied to the plain image to get measurements. Thirdly, in stage of image encryption, measurements are confused and diffused to produce a cipher image. Finally, in stage of embedding, an embedding method using integer wavelet transformation (IWT) and 2k correction is presented, so as to embed the secrets (i.e., cipher image) into a given carrier image to obtain hiding performance, i.e., forming a carrier image hiding secrets (CHS). In particular, the ImHALC can achieve the effect of blind extraction. After adopting a two-dimensional projection gradient algorithm with embedded decryption (2DPG-ED), the reconstruction quality for the plain image is good for test images.
期刊介绍:
The aim of the journal is to provide an international forum for the dissemination of up-to-date information in the fields of the mathematics and computers, in particular (but not exclusively) as they apply to the dynamics of systems, their simulation and scientific computation in general. Published material ranges from short, concise research papers to more general tutorial articles.
Mathematics and Computers in Simulation, published monthly, is the official organ of IMACS, the International Association for Mathematics and Computers in Simulation (Formerly AICA). This Association, founded in 1955 and legally incorporated in 1956 is a member of FIACC (the Five International Associations Coordinating Committee), together with IFIP, IFAV, IFORS and IMEKO.
Topics covered by the journal include mathematical tools in:
•The foundations of systems modelling
•Numerical analysis and the development of algorithms for simulation
They also include considerations about computer hardware for simulation and about special software and compilers.
The journal also publishes articles concerned with specific applications of modelling and simulation in science and engineering, with relevant applied mathematics, the general philosophy of systems simulation, and their impact on disciplinary and interdisciplinary research.
The journal includes a Book Review section -- and a "News on IMACS" section that contains a Calendar of future Conferences/Events and other information about the Association.