Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (5): 1480-1489.DOI: 10.11772/j.issn.1001-9081.2021050823
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Zexi WANG1,2, Minqing ZHANG1,2(), Yan KE1,2, Yongjun KONG1,2
Received:
2021-05-19
Revised:
2021-09-22
Accepted:
2021-10-14
Online:
2022-03-08
Published:
2022-05-10
Contact:
Minqing ZHANG
About author:
WANG Zexi, born in 1997,M. S. candidate. His research interestsinclude information security,data hiding.Supported by:
王泽曦1,2, 张敏情1,2(), 柯彦1,2, 孔咏骏1,2
通讯作者:
张敏情
作者简介:
王泽曦(1997—),男,江苏徐州人,硕士研究生,主要研究方向:信息安全、信息隐藏基金资助:
CLC Number:
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG. Reversible data hiding algorithm in encrypted domain based on secret image sharing[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
王泽曦, 张敏情, 柯彦, 孔咏骏. 基于图像秘密共享的密文域可逆信息隐藏算法[J]. 《计算机应用》唯一官方网站, 2022, 42(5): 1480-1489.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021050823
变量 | 说明 |
---|---|
原始图像 | |
图像加密密钥 | |
数据隐藏密钥 | |
密文图像 | |
第i个参与者属性标签 | |
密文图像的第i块像素对 | |
第j个参与者的第i块携密密文 | |
第j个参与者的第i块携密密文像素对 | |
第j个参与者携密密文图像 |
Tab. 1 Variables and their descriptions
变量 | 说明 |
---|---|
原始图像 | |
图像加密密钥 | |
数据隐藏密钥 | |
密文图像 | |
第i个参与者属性标签 | |
密文图像的第i块像素对 | |
第j个参与者的第i块携密密文 | |
第j个参与者的第i块携密密文像素对 | |
第j个参与者携密密文图像 |
4.00 | 2.67 | 2.00 | 1.60 | |
— | 5.33 | 4.00 | 3.20 | |
— | — | 6.00 | 4.80 | |
— | — | — | 6.40 |
Tab. 2 Maximum embedding rates under different threshold parameters
4.00 | 2.67 | 2.00 | 1.60 | |
— | 5.33 | 4.00 | 3.20 | |
— | — | 6.00 | 4.80 | |
— | — | — | 6.40 |
算法 | 加密方式 | 时间复杂度 | ||
---|---|---|---|---|
信息嵌入 | 信息提取 | 图像恢复 | ||
文献[ | 流加密 | |||
文献[ | 流加密 | |||
文献[ | 流加密 | |||
文献[ | LWE加密 | |||
文献[ | Paillier加密 | |||
文献[ | Paillier加密 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
本文算法 | 秘密共享 |
Tab. 3 Time complexities of different encryption methods
算法 | 加密方式 | 时间复杂度 | ||
---|---|---|---|---|
信息嵌入 | 信息提取 | 图像恢复 | ||
文献[ | 流加密 | |||
文献[ | 流加密 | |||
文献[ | 流加密 | |||
文献[ | LWE加密 | |||
文献[ | Paillier加密 | |||
文献[ | Paillier加密 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
文献[ | 秘密共享 | |||
本文算法 | 秘密共享 |
1 | SHI Y Q, LI X L, ZHANG X P, et al. Reversible data hiding: advances in the past two decades [J]. IEEE Access, 2016, 4: 3210-3237. 10.1109/access.2016.2573308 |
2 | 柯彦,张敏情,刘佳,等.密文域可逆信息隐藏综述[J].计算机应用,2016,36(11):3067-3076,3092. 10.11772/j.issn.1001-9081.2016.11.3067 |
KE Y, ZHANG M Q, LIU J, et al. Overview on reversible data hiding in encrypted domain [J]. Journal of Computer Applications, 2016, 36(11): 3067-3076, 3092. 10.11772/j.issn.1001-9081.2016.11.3067 | |
3 | ZHANG X P. Reversible data hiding in encrypted image [J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. 10.1109/lsp.2011.2114651 |
4 | ZHANG X P. Separable reversible data hiding in encrypted image [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826-832. 10.1109/tifs.2011.2176120 |
5 | GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. 10.1109/tcsvt.2018.2863029 |
6 | 顼聪,王兴田,陶永鹏.基于高阶位平面冗余的可逆信息隐藏方法[J].计算机应用,2022,42(1):171-177. |
XU C, WANG X T, TAO Y P. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022,42(1): 171-177. | |
7 | MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2014, 8(3): 553-562. |
8 | CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266. 10.1109/tip.2004.840686 |
9 | THODI D M, RODRIGUEZ J J. Prediction-error based reversible watermarking [C]// Proceedings of the 2004 International Conference on Image Processing. Piscataway: IEEE, 2004: 1549-1552. |
10 | PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. 10.1109/TIFS.2018.2799381 |
11 | KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain [C]// Proceedings of the 2016 International Workshop on Digital Watermarking, LNCS 10082. Cham: Springer, 2016: 470-484. |
12 | 柯彦,张敏情,苏婷婷.基于R-LWE的密文域多比特可逆信息隐藏算法[J].计算机研究与发展,2016,53(10):2307-2322. 10.7544/issn1000-1239.2016.20160444 |
KE Y, ZHANG M Q, SU T T. A novel multiple bits reversible data hiding in encrypted domain based on R-LWE [J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. 10.7544/issn1000-1239.2016.20160444 | |
13 | HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process [J]. Signal Processing: Image Communication, 2020, 80: Article No.115632. 10.1016/j.image.2019.115632 |
14 | CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. 10.1016/j.jvcir.2014.04.003 |
15 | ZHANG X P, LONG J, WANG Z C, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622-1631. 10.1109/tcsvt.2015.2433194 |
16 | WU X T, WENG J, YAN W Q, et al. Adopting secret sharing for reversible data hiding in encrypted images [J]. Signal Processing, 2018, 143: 269-281. 10.1016/j.sigpro.2017.09.017 |
17 | CHEN Y C, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms [J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332-3343. 10.1109/tifs.2019.2914557 |
18 | 周能,张敏情,刘蒙蒙.基于秘密共享的同态加密图像可逆信息隐藏算法[J].科学技术与工程,20(19):7780-7786. |
ZHOU N, ZHANG M Q, LIU M M. Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing [J]. Science Technology and Engineering, 2020, 20(19): 7780-7786. | |
19 | CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. |
20 | KE Y, ZHANG M Q, ZHANG X P, et al. Reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469-2481. 10.1109/tcsvt.2021.3081575 |
21 | SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. 10.1145/359168.359176 |
22 | THIEN C C, LIN J C. Secret image sharing [J]. Computers and Graphics, 2002, 26(5): 765-770. 10.1016/s0097-8493(02)00131-0 |
23 | 荣辉桂,莫进侠,常炳国,等.基于Shamir秘密共享的密钥分发与恢复算法[J].通信学报,2015,36(3):265-274. 10.11959/j.issn.1000-436x.2015083 |
RONG H G, MO J X, CHANG B G, et al. Key distribution and recovery algorithm based on Shamir’s secret sharing [J]. Journal on Communications, 2015, 36(3): 265-274. 10.11959/j.issn.1000-436x.2015083 | |
24 | 吴燕仙,何妮.拉格朗日插值公式的完全展开[J].通化师范学院学报,2007,28(2):10-12. 10.3969/j.issn.1008-7974.2007.02.003 |
WU Y X, HE N. Complete expansion of Lagrange interpolation formula [J]. Journal of Tonghua Teachers College, 2007, 28(2): 10-12. 10.3969/j.issn.1008-7974.2007.02.003 |
[1] | Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG. Efficient reversible data hiding scheme based on two-dimensional modulo operations [J]. Journal of Computer Applications, 2024, 44(6): 1880-1888. |
[2] | Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing [J]. Journal of Computer Applications, 2024, 44(3): 780-787. |
[3] | Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN. Network intrusion detection model based on efficient federated learning algorithm [J]. Journal of Computer Applications, 2023, 43(4): 1169-1175. |
[4] | Hongliang TIAN, Ping GE, Mingjie XIAN. Distribution network operation exception management mechanism based on blockchain [J]. Journal of Computer Applications, 2023, 43(11): 3504-3509. |
[5] | Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG. Medical image privacy protection based on thumbnail encryption and distributed storage [J]. Journal of Computer Applications, 2023, 43(10): 3149-3155. |
[6] | Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN. Reversible data hiding in encrypted image based on multi-objective optimization [J]. Journal of Computer Applications, 2022, 42(6): 1716-1723. |
[7] | Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG. High-capacity reversible data hiding in encrypted videos based on histogram shifting [J]. Journal of Computer Applications, 2022, 42(11): 3633-3638. |
[8] | Cong XU, Xingtian WANG, Yongpeng TAO. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022, 42(1): 171-177. |
[9] | MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan. Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability [J]. Journal of Computer Applications, 2021, 41(8): 2232-2241. |
[10] | XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai. Public welfare time bank system based on blockchain technology [J]. Journal of Computer Applications, 2019, 39(7): 2156-2161. |
[11] | LUO Xiaofeng, YANG Xingchun, HU Yong. Improved decision diagram for attribute-based access control policy evaluation and management [J]. Journal of Computer Applications, 2019, 39(12): 3569-3574. |
[12] | CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei. Android permission management and control scheme based on access control list mechanism [J]. Journal of Computer Applications, 2019, 39(11): 3316-3322. |
[13] | CAI Xue, YANG Yang, XIAO Xingxing. Reversible data hiding method based on texture partition for medical images [J]. Journal of Computer Applications, 2018, 38(8): 2293-2300. |
[14] | LI Tianxue, ZHANG Minqing, WANG Jianping, MA Shuangpeng. Reversible data hiding algorithm based on pixel value order [J]. Journal of Computer Applications, 2018, 38(8): 2311-2315. |
[15] | LI Zhaobin, LI Weilong, WEI Zhanzhen, LIU Mengtian. Research and implementation of key module of data security processing mechanism in software defined network [J]. Journal of Computer Applications, 2018, 38(7): 1929-1935. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||