Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (5): 1480-1489.DOI: 10.11772/j.issn.1001-9081.2021050823
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
					
						                                                                                                                                                                                                                                                    Zexi WANG1,2, Minqing ZHANG1,2( ), Yan KE1,2, Yongjun KONG1,2
), Yan KE1,2, Yongjun KONG1,2
												  
						
						
						
					
				
Received:2021-05-19
															
							
																	Revised:2021-09-22
															
							
																	Accepted:2021-10-14
															
							
							
																	Online:2022-03-08
															
							
																	Published:2022-05-10
															
							
						Contact:
								Minqing ZHANG   
													About author:WANG Zexi, born in 1997,M. S. candidate. His research interestsinclude information security,data hiding.Supported by:
        
                   
            王泽曦1,2, 张敏情1,2( ), 柯彦1,2, 孔咏骏1,2
), 柯彦1,2, 孔咏骏1,2
                  
        
        
        
        
    
通讯作者:
					张敏情
							作者简介:王泽曦(1997—),男,江苏徐州人,硕士研究生,主要研究方向:信息安全、信息隐藏基金资助:CLC Number:
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG. Reversible data hiding algorithm in encrypted domain based on secret image sharing[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
王泽曦, 张敏情, 柯彦, 孔咏骏. 基于图像秘密共享的密文域可逆信息隐藏算法[J]. 《计算机应用》唯一官方网站, 2022, 42(5): 1480-1489.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021050823
| 变量 | 说明 | 
|---|---|
| 原始图像 | |
| 图像加密密钥 | |
| 数据隐藏密钥 | |
| 密文图像 | |
| 第i个参与者属性标签 | |
| 密文图像的第i块像素对 | |
| 第j个参与者的第i块携密密文 | |
| 第j个参与者的第i块携密密文像素对 | |
| 第j个参与者携密密文图像 | 
Tab. 1 Variables and their descriptions
| 变量 | 说明 | 
|---|---|
| 原始图像 | |
| 图像加密密钥 | |
| 数据隐藏密钥 | |
| 密文图像 | |
| 第i个参与者属性标签 | |
| 密文图像的第i块像素对 | |
| 第j个参与者的第i块携密密文 | |
| 第j个参与者的第i块携密密文像素对 | |
| 第j个参与者携密密文图像 | 
| 4.00 | 2.67 | 2.00 | 1.60 | |
| — | 5.33 | 4.00 | 3.20 | |
| — | — | 6.00 | 4.80 | |
| — | — | — | 6.40 | 
Tab. 2 Maximum embedding rates under different threshold parameters
| 4.00 | 2.67 | 2.00 | 1.60 | |
| — | 5.33 | 4.00 | 3.20 | |
| — | — | 6.00 | 4.80 | |
| — | — | — | 6.40 | 
| 算法 | 加密方式 | 时间复杂度 | ||
|---|---|---|---|---|
| 信息嵌入 | 信息提取 | 图像恢复 | ||
| 文献[ | 流加密 | |||
| 文献[ | 流加密 | |||
| 文献[ | 流加密 | |||
| 文献[ | LWE加密 | |||
| 文献[ | Paillier加密 | |||
| 文献[ | Paillier加密 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 本文算法 | 秘密共享 | |||
Tab. 3 Time complexities of different encryption methods
| 算法 | 加密方式 | 时间复杂度 | ||
|---|---|---|---|---|
| 信息嵌入 | 信息提取 | 图像恢复 | ||
| 文献[ | 流加密 | |||
| 文献[ | 流加密 | |||
| 文献[ | 流加密 | |||
| 文献[ | LWE加密 | |||
| 文献[ | Paillier加密 | |||
| 文献[ | Paillier加密 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 文献[ | 秘密共享 | |||
| 本文算法 | 秘密共享 | |||
| 1 | SHI Y Q, LI X L, ZHANG X P, et al. Reversible data hiding: advances in the past two decades [J]. IEEE Access, 2016, 4: 3210-3237. 10.1109/access.2016.2573308 | 
| 2 | 柯彦,张敏情,刘佳,等.密文域可逆信息隐藏综述[J].计算机应用,2016,36(11):3067-3076,3092. 10.11772/j.issn.1001-9081.2016.11.3067 | 
| KE Y, ZHANG M Q, LIU J, et al. Overview on reversible data hiding in encrypted domain [J]. Journal of Computer Applications, 2016, 36(11): 3067-3076, 3092. 10.11772/j.issn.1001-9081.2016.11.3067 | |
| 3 | ZHANG X P. Reversible data hiding in encrypted image [J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. 10.1109/lsp.2011.2114651 | 
| 4 | ZHANG X P. Separable reversible data hiding in encrypted image [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826-832. 10.1109/tifs.2011.2176120 | 
| 5 | GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. 10.1109/tcsvt.2018.2863029 | 
| 6 | 顼聪,王兴田,陶永鹏.基于高阶位平面冗余的可逆信息隐藏方法[J].计算机应用,2022,42(1):171-177. | 
| XU C, WANG X T, TAO Y P. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022,42(1): 171-177. | |
| 7 | MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2014, 8(3): 553-562. | 
| 8 | CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266. 10.1109/tip.2004.840686 | 
| 9 | THODI D M, RODRIGUEZ J J. Prediction-error based reversible watermarking [C]// Proceedings of the 2004 International Conference on Image Processing. Piscataway: IEEE, 2004: 1549-1552. | 
| 10 | PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. 10.1109/TIFS.2018.2799381 | 
| 11 | KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain [C]// Proceedings of the 2016 International Workshop on Digital Watermarking, LNCS 10082. Cham: Springer, 2016: 470-484. | 
| 12 | 柯彦,张敏情,苏婷婷.基于R-LWE的密文域多比特可逆信息隐藏算法[J].计算机研究与发展,2016,53(10):2307-2322. 10.7544/issn1000-1239.2016.20160444 | 
| KE Y, ZHANG M Q, SU T T. A novel multiple bits reversible data hiding in encrypted domain based on R-LWE [J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. 10.7544/issn1000-1239.2016.20160444 | |
| 13 | HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process [J]. Signal Processing: Image Communication, 2020, 80: Article No.115632. 10.1016/j.image.2019.115632 | 
| 14 | CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. 10.1016/j.jvcir.2014.04.003 | 
| 15 | ZHANG X P, LONG J, WANG Z C, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622-1631. 10.1109/tcsvt.2015.2433194 | 
| 16 | WU X T, WENG J, YAN W Q, et al. Adopting secret sharing for reversible data hiding in encrypted images [J]. Signal Processing, 2018, 143: 269-281. 10.1016/j.sigpro.2017.09.017 | 
| 17 | CHEN Y C, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms [J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332-3343. 10.1109/tifs.2019.2914557 | 
| 18 | 周能,张敏情,刘蒙蒙.基于秘密共享的同态加密图像可逆信息隐藏算法[J].科学技术与工程,20(19):7780-7786. | 
| ZHOU N, ZHANG M Q, LIU M M. Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing [J]. Science Technology and Engineering, 2020, 20(19): 7780-7786. | |
| 19 | CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. | 
| 20 | KE Y, ZHANG M Q, ZHANG X P, et al. Reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469-2481. 10.1109/tcsvt.2021.3081575 | 
| 21 | SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. 10.1145/359168.359176 | 
| 22 | THIEN C C, LIN J C. Secret image sharing [J]. Computers and Graphics, 2002, 26(5): 765-770. 10.1016/s0097-8493(02)00131-0 | 
| 23 | 荣辉桂,莫进侠,常炳国,等.基于Shamir秘密共享的密钥分发与恢复算法[J].通信学报,2015,36(3):265-274. 10.11959/j.issn.1000-436x.2015083 | 
| RONG H G, MO J X, CHANG B G, et al. Key distribution and recovery algorithm based on Shamir’s secret sharing [J]. Journal on Communications, 2015, 36(3): 265-274. 10.11959/j.issn.1000-436x.2015083 | |
| 24 | 吴燕仙,何妮.拉格朗日插值公式的完全展开[J].通化师范学院学报,2007,28(2):10-12. 10.3969/j.issn.1008-7974.2007.02.003 | 
| WU Y X, HE N. Complete expansion of Lagrange interpolation formula [J]. Journal of Tonghua Teachers College, 2007, 28(2): 10-12. 10.3969/j.issn.1008-7974.2007.02.003 | 
| [1] | Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG. Efficient reversible data hiding scheme based on two-dimensional modulo operations [J]. Journal of Computer Applications, 2024, 44(6): 1880-1888. | 
| [2] | Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing [J]. Journal of Computer Applications, 2024, 44(3): 780-787. | 
| [3] | Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN. Network intrusion detection model based on efficient federated learning algorithm [J]. Journal of Computer Applications, 2023, 43(4): 1169-1175. | 
| [4] | Hongliang TIAN, Ping GE, Mingjie XIAN. Distribution network operation exception management mechanism based on blockchain [J]. Journal of Computer Applications, 2023, 43(11): 3504-3509. | 
| [5] | Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG. Medical image privacy protection based on thumbnail encryption and distributed storage [J]. Journal of Computer Applications, 2023, 43(10): 3149-3155. | 
| [6] | Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN. Reversible data hiding in encrypted image based on multi-objective optimization [J]. Journal of Computer Applications, 2022, 42(6): 1716-1723. | 
| [7] | Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG. High-capacity reversible data hiding in encrypted videos based on histogram shifting [J]. Journal of Computer Applications, 2022, 42(11): 3633-3638. | 
| [8] | Cong XU, Xingtian WANG, Yongpeng TAO. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022, 42(1): 171-177. | 
| [9] | MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan. Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability [J]. Journal of Computer Applications, 2021, 41(8): 2232-2241. | 
| [10] | XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai. Public welfare time bank system based on blockchain technology [J]. Journal of Computer Applications, 2019, 39(7): 2156-2161. | 
| [11] | LUO Xiaofeng, YANG Xingchun, HU Yong. Improved decision diagram for attribute-based access control policy evaluation and management [J]. Journal of Computer Applications, 2019, 39(12): 3569-3574. | 
| [12] | CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei. Android permission management and control scheme based on access control list mechanism [J]. Journal of Computer Applications, 2019, 39(11): 3316-3322. | 
| [13] | CAI Xue, YANG Yang, XIAO Xingxing. Reversible data hiding method based on texture partition for medical images [J]. Journal of Computer Applications, 2018, 38(8): 2293-2300. | 
| [14] | LI Tianxue, ZHANG Minqing, WANG Jianping, MA Shuangpeng. Reversible data hiding algorithm based on pixel value order [J]. Journal of Computer Applications, 2018, 38(8): 2311-2315. | 
| [15] | LI Zhaobin, LI Weilong, WEI Zhanzhen, LIU Mengtian. Research and implementation of key module of data security processing mechanism in software defined network [J]. Journal of Computer Applications, 2018, 38(7): 1929-1935. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||