3.1. Singular Value Decomposition of Random Matrices
Singular value decomposition (hereinafter referred to as SVD) is an algorithm widely used in the field of machine learning. It is used to calculate the pseudo-inverse of a matrix so as to solve linear least squares and least squares problems. It can be used not only for feature decomposition in a dimension reduction algorithm but also in a recommendation system, natural language processing, and other fields. SVD has important applications in many fields, such as digital image analysis and processing, background modeling, information security, etc. Singular value decomposition is a very basic operation algorithm in linear algebra matrix calculation. The main idea is to divide the original data matrix into three matrices, of which U and V are orthogonal matrices. Its main steps are divided into two steps:
Among them, each element of the matrix corresponds to an eigenvalue of matrix
A, and they are expressed in descending order; then, each column in matrix
U represents the right singular vector of matrix
A, and each column represents the left singular vector of matrix
A. Therefore, to sum up, the singular value decomposition of an ordinary matrix
A can be obtained as follows:
The decomposed 3 matrix structures are as follows:
Many algorithms have been proposed to achieve the singular value decomposition of matrices, but in the optimization problem of kernel norm minimization, it is generally only required to solve singular values greater than a certain threshold and their corresponding singular vectors. For this reason, it is very important to discover a simple and computationally efficient singular value decomposition algorithm.
Ultimately, the matrix rank minimization problem can be reduced to kernel norm minimization or weighted kernel norm minimization. The low-rank matrix recovery problem has been mentioned in many coding engineering and applied science fields, and rank minimization techniques have attracted extensive attention. Rank minimization is the key to low-rank solutions and is required in many mathematical models in computer vision and machine learning. It is quite difficult for us to solve such a problem and obtain complete and correct information from a bunch of information with wrong information or tainted information. Usually, such problems have certain sparse and low-rank properties. After the unremitting efforts of many researchers and repeated experiments, they finally concluded that under certain conditions, in order to transform the original problem into an easy-to-solve convex optimization problem, the researchers found that the corresponding relaxation transformation can be performed. In addition, this class of problems has a nice separable structure, which is a convex optimization problem. When dealing with large-scale data matrices, the kernel norm of matrix minimization is usually solved as follows:
The image encoding model uses the nuclear norm to relax the problem, which is the convex optimization of the rank function, so we use the nuclear norm to replace the rank function and transform to solve the following convex optimization problem:
In our practical application, the hidden problem of image coding needs to be considered, so the rank minimization problem also has various external interference noises, which is expressed as follows:
3.2. Image Coding Hiding
Today’s image transmission systems usually use the method of parameter sensor perception and image sensor combined with image transmission technology to complete the measurement of aircraft parameters. Compared with the image information, the image transmission data has a very small amount of data, and the use of a channel in communication with the ground leads to a waste of channels.
With the rapid increase of image transmission information and the increasing tension of channel resources, it is believed that the low-frequency and important image transmission information obtained with parameter sensors and the broadband image information obtained with image sensors are hybrid transmissions based on image hiding. In view of the separation of multi-sensor image transmission data at the receiving end and the large amount of image data information, the image transmission data obtained using a multi-sensor before mixed transmission is subject to frame synchronization preprocessing and image compression coding. The specific multichannel image transmission data mixed-transmission design scheme is shown in
Figure 2.
On this basis, the generalized model of image hiding is shown in
Figure 3. The general model of image hiding includes the embedding process, the transmission process, and the extraction process of the information to be hidden. The embedding process of image hiding should first preprocess the information
M to be hidden (such as encryption or spread spectrum, etc.) to obtain the processed message
M. Then, using the key
and hiding it into the image carrier C through a specific embedding algorithm, the hidden information
S is obtained. During the transmission process, the information
S may be illegally intercepted by a third party and re-sent after malicious processing. The receiver uses the extraction algorithm and the key
corresponding to the embedding algorithm to extract the hidden information from the hidden information
S to obtain the message
and then obtain the original message
M through de-preprocessing. In general, private key information is used to achieve hiding,
.
In the extraction process, the hiding technology that does not require the participation of the original image C is called blind information hiding technology; otherwise, it is called non-blind information hiding technology. In the actual experimental design, because the non-blind information hiding technology requires the original carrier C, it is more likely to attract the attention of others and waste channel resources. Within the in-depth research on image hiding technology, most of the focus is on blind information-hiding technology. The general model of image hiding is briefly introduced here, and the detailed implementation process will be further introduced in
Section 4.
Table 1 lists two alternative generalized Barker code sequences, in which the codewords are represented in octal format.
When , ;
When , ;
When , ;
When , ;
When , ;
When , ;
When , .
Table 2 is the specific image coding hidden data framing format, in which the first frame data only includes the system parameters and the number of sampling channels, and then each frame of data is packaged and encoded according to the second frame data format, 192 bit, and one frame of data includes 8-channel 12 bit analog quantity and 1-channel 8 bit digital quantity.
According to the data framing format in
Table 2, this paper uses multiple sets of Barker codes and mixed framing methods on the Matlab 2016 A to realize the preprocessing of image-coded signals. The specific coding design and implementation process are shown in
Figure 4.
At present, three operations of domain transformation, quantization, and encoding are included in all image coding concealment schemes, but the corresponding methods of the three operations adopted by the different coding schemes are different.
Figure 5 shows the key processing steps and core content of DCT-based coding.
It is calculated as follows:
In simple terms, the image coding concealment is an 8bit grayscale image; however, the image coding concealment has completely different characteristics and uses from texture images. First of all, in terms of the meaning of the pixel value, 0 represents the farthest from the human eye, and 255 represents the closest to the human eye, while the pixel value in the texture image represents the intensity or gray level of the light-sensing point at this point, which is the contrast between the image coding concealment and the texture image. Secondly, from the perspective of gray-level distribution, the gray-level distribution of the image coding concealment is obviously different from that of the texture image. Because depth information only represents the distance between the camera and the object, there is no obvious texture in the image coding concealment. The areas contained by an object have very similar gray levels, but there are obvious gray-level differences at the edges of the object. Finally, the image coding concealment and texture image are also very different in time continuity. The existing depth estimation algorithms and depth acquisition devices are not very accurate, which makes the inter-frame continuity of the image coding concealment significantly lower than that of texture video frames. The image display mode is shown in
Figure 6.