Advanced Search
Volume 38 Issue 2
Feb.  2016
Turn off MathJax
Article Contents
ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702
Citation: ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702

Reversible Steganography in Encrypted Domain Based on LWE

doi: 10.11999/JEIT150702
Funds:

The National Natural Science Foundation of China (61379152, 61272492)

  • Received Date: 2015-06-08
  • Rev Recd Date: 2015-09-11
  • Publish Date: 2016-02-19
  • This paper proposes a novel scheme of reversible steganography in encrypted domain based on Learning With Errors (LWE). The original data is encrypted by the cryptographic algorithms with LWE. Then additional data could be embedded into the cipher text. With embedded cipher text, the additional data can be extracted by using data-hiding key, and the original data can be recovered by using encryption key, and the processes of extraction and decryption are separable. By deducing the error probability of the scheme, the standard deviation of noise sequence which directly related to the schemes correctness is mainly discussed, and reasonable range of the standard deviation is obtained by experiments. The probability distribution function of the embedded cipher text is deduced, that proves the embedded cipher text is not detective. The proposed scheme based on encrypted domain can apply to different kinds of media vehicle such as text, image or audio. Experimental results demonstrate that the proposed scheme can not only achieve statistical security without degrading the quality of encryption or data embedding, but realize that 1 bit original data can maximally load 1 bit additional data in encrypted domain.
  • loading
  • ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
    TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
    DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4): 1779-1790.
    CACIULA I and COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
    ZHANG W, HU X, LI X, et al. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
    JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
    LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
    CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
    KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
    MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.
    ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
    MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562.
    YU J, ZHU G, LI X, et al. Digital Forensics and Watermarking: An Improved Algorithm for Reversible Data Hiding in Encrypted Image[M]. Berlin Heidelberg, Springer- Verlag, 2014: 384-394.
    LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2): 325-328.
    WU X and SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11): 387-400
    陈嘉勇, 王超, 张卫明, 等. 安全的密文域图像隐写术[J]. 电子与信息学报, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J. 1146.2011.01240.
    WANG J H, WANG C, ZHANG W M et al. A secure image steganographic method in encrypted domain[J]. Journal of Electronics Information Technology, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J.1146.2011.01240.
    REGEV O. On lattices, learning with errors, random linear codes and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Couputing, New York, USA, 2005: 84-93.
    余位驰. 格基规约理论及其在密码设计中的应用[D]. [博士论文], 成都: 西南交通大学, 2005.
    GORDON R D. Values of Mills ratio of area to bounding ordinate and of the normal probability integral for large values of the argument[J]. The Annals of Mathematical Statistics, 1941(12): 364-366
    LYUBASHEVSKY V, PEIKERT C, and REGEV O. On ideal lattices and learning with errors over rings[C]: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. French Riviera, 2010: 1-23.
    ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security. 2012, 7(2): 826-832.
    ZHANG X, QIAN Z, FENG G, et al. Efficient reversible data hiding in encrypted image[J]. Journal of Visual Communication and Image Representation, 2014, (25)2: 322-328.
    AJTAI M. Generating hard instances of lattice problems[C]. Complexity of Computations and Proofs, Dept. Math., Seconda University Napoli, Caserta, Italy, 2004: 1-32.
    吴立强. 基于格的密码体制研究[D]. [硕士论文], 西安: 武警工程大学, 2012.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1583) PDF downloads(964) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return