《计算机应用》唯一官方网站 ›› 2022, Vol. 42 ›› Issue (5): 1480-1489.DOI: 10.11772/j.issn.1001-9081.2021050823

• 网络空间安全 • 上一篇    下一篇

基于图像秘密共享的密文域可逆信息隐藏算法

王泽曦1,2, 张敏情1,2(), 柯彦1,2, 孔咏骏1,2   

  1. 1.网络与信息安全武警部队重点实验室(武警工程大学),西安 710086
    2.武警工程大学 密码工程学院,西安 710086
  • 收稿日期:2021-05-19 修回日期:2021-09-22 接受日期:2021-10-14 发布日期:2022-03-08 出版日期:2022-05-10
  • 通讯作者: 张敏情
  • 作者简介:王泽曦(1997—),男,江苏徐州人,硕士研究生,主要研究方向:信息安全、信息隐藏
    张敏情(1967—),女,陕西西安人,教授,博士,主要研究方向:密码学、信息隐藏 api_zmq@126.com
    柯彦(1991—),男,河南南阳人,博士,主要研究方向: 信息安全、密码学、信息隐藏
    孔咏骏(1990—),男,江苏江阴人,博士研究生,主要研究方向:信息安全、信息隐藏。
  • 基金资助:
    国家自然科学基金资助项目(61872384)

Reversible data hiding algorithm in encrypted domain based on secret image sharing

Zexi WANG1,2, Minqing ZHANG1,2(), Yan KE1,2, Yongjun KONG1,2   

  1. 1.Key Laboratory of PAP for Cryptology and Information Security (Engineering University of PAP),Xi’an Shaanxi 710086,China
    2.College of Cryptographic Engineering,Engineering University of PAP,Xi’an Shaanxi 710086,China
  • Received:2021-05-19 Revised:2021-09-22 Accepted:2021-10-14 Online:2022-03-08 Published:2022-05-10
  • Contact: Minqing ZHANG
  • About author:WANG Zexi, born in 1997,M. S. candidate. His research interestsinclude information security,data hiding.
    ZHANG Minqing, Minqing,born in 1967,Ph. D.,professor. Her research interests include cryptology,data hiding.
    KE Yan, born in 1991,Ph. D. His research interests includeinformation security,cryptology,data hiding.
    KONG Yongjun, born in 1990,Ph. D. candidate. His researchinterests include information security,data hiding.
  • Supported by:
    National Natural Science Foundation of China(61872384)

摘要:

针对当前密文域可逆信息隐藏算法嵌入秘密信息后的携密密文图像的容错性与抗灾性不强,一旦遭受攻击或损坏就无法重构原始图像与提取秘密信息的问题,提出了一种基于图像秘密共享的密文域可逆信息隐藏算法,并分析了该算法在云环境下的应用场景。首先,将加密图像分割成大小相同的n份不同携密密文图像。然后,在分割的过程中将拉格朗日插值多项式中的随机量作为冗余信息,并建立秘密信息与多项式各项系数间的映射关系。最后,通过修改加密过程的内置参数,实现秘密信息的可逆嵌入。当收集k份携密密文图像时,可无损地恢复原始图像与提取秘密信息。实验结果表明,所提算法具有计算复杂度低、嵌入容量大和完全可逆等特点。在(3,4)门限方案中,所提算法的最大嵌入率可达4 bpp;在(4,4)门限方案中,其最大嵌入率可达6 bpp。所提算法充分发挥了秘密共享方案的容灾特性,在不降低秘密共享安全性的基础上,增强了携密密文图像的容错性与抗灾性,提高了算法的嵌入容量与云环境应用场景下的容灾能力,保证了载体图像与秘密信息的安全。

关键词: 信息安全, 图像秘密共享, 可逆信息隐藏, 数据容灾, 密文域

Abstract:

The current reversible data hiding algorithms in encrypted domain have the problems that the ciphertext images carrying secret have poor fault tolerance and disaster resistance after embedding secret data, once attacked or damaged, the original image cannot be reconstructed and the secret data cannot be extracted. In order to solve the problems, a new reversible data hiding algorithm in encrypted domain based on secret image sharing was proposed, and its application scenarios in cloud environment were analyzed. Firstly, the encrypted image was divided into n different ciphertext images carrying secret with the same size. Secondly, in the process of segmentation, the random quantities in Lagrange interpolation polynomial were taken as redundant information, and the mapping relationship between secret data and each polynomial coefficient was established. Finally, the reversible embedding of the secret data was realized by modifying the built-in parameters of the encryption process. When k ciphertext images carrying secret were collected, the original image was able to be fully recovered and the secret data was able to be extracted. Experimental results show that, the proposed algorithm has the advantages of low computational complexity, large embedding capacity and complete reversibility. In the (3,4) threshold scheme, the maximum embedding rate of the proposed algorithm is 4 bit per pixel (bpp), and in the (4,4) threshold scheme, the maximum embedding rate of the proposed algorithm is 6 bpp. The proposed algorithm gives full play to the disaster recovery characteristic of secret sharing scheme. Without reducing the security of secret sharing, the proposed algorithm enhances the fault tolerance and disaster resistance of ciphertext images carrying secret, improves the embedding capacity of algorithm and the disaster recovery ability in the application scenario of cloud environment, and ensures the security of carrier image and secret data.

Key words: information security, secret image sharing, reversible data hiding, data disaster recovery, encrypted domain

中图分类号: