Advanced Search
Volume 44 Issue 12
Dec.  2022
Turn off MathJax
Article Contents
ZHANG Minqing, WANG Zexi, KE Yan, KONG Yongjun, DI Fuqiang. Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing[J]. Journal of Electronics & Information Technology, 2022, 44(12): 4337-4347. doi: 10.11999/JEIT211054
Citation: ZHANG Minqing, WANG Zexi, KE Yan, KONG Yongjun, DI Fuqiang. Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing[J]. Journal of Electronics & Information Technology, 2022, 44(12): 4337-4347. doi: 10.11999/JEIT211054

Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing

doi: 10.11999/JEIT211054
Funds:  The National Natural Science Foundation of China (61872384, 62102450, 62102451)
  • Received Date: 2021-09-29
  • Accepted Date: 2022-05-05
  • Rev Recd Date: 2022-04-18
  • Available Online: 2022-05-08
  • Publish Date: 2022-12-16
  • In order to solve the problems of low embedding rate of reversible data hiding in encrypted domain with multi-users and weak disaster tolerance of cover image, a reversible data hiding in encrypted images based on polynomial secret sharing scheme is proposed. The cover image is divided into multiple shadow images and stored to multiple users, so that the image disaster tolerance can be enhanced. Separability is achieved by combining two embedding algorithms, where Algorithm 1 embeds additional data into the redundancy coefficients of the polynomial during the process of image sharing to generate shadow images containing additional data, which can extract data after image reconstruction; Algorithm 2, for any shadow image, embeds additional data by using the additive homomorphism of secret sharing, which supports extracting additional data directly from the shadow image. Experiments are performed in different threshold and shadow image compression rates. When the compression rate is 50%, the embedding rate reaches 4.18 bit per pixel (bpp) for the (3, 4) threshold scheme and 3.78 bpp for the (3, 5) threshold scheme. The results show that the algorithms support extracting additional data from the shadow images and the reconstructed images respectively, which achieves the separability of the scheme. The proposed scheme has a higher embedding rate and lower computational complexity than the existing schemes, and is more practical.
  • loading
  • [1]
    SHI Yunqing, LI Xiaolong, ZHANG Xinpeng, et al. Reversible data hiding: Advances in the past two decades[J]. IEEE Access, 2016, 4: 3210–3237. doi: 10.1109/ACCESS.2016.2573308
    [2]
    PUECH W, CHAUMONT M, and STRAUSS O. A reversible data hiding method for encrypted images[C]. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, United States, 2008: 68191E.
    [3]
    ZHANG Xinpeng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255–258. doi: 10.1109/LSP.2011.2114651
    [4]
    ZHANG Xinpeng. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826–832. doi: 10.1109/TIFS.2011.2176120
    [5]
    CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253–266. doi: 10.1109/TIP.2004.840686
    [6]
    CHEN C C, CHANG C C, and CHEN Kaimeng. High-capacity reversible data hiding in encrypted image based on huffman coding and differences of high nibbles of pixels[J]. Journal of Visual Communication and Image Representation, 2021, 76: 103060. doi: 10.1016/j.jvcir.2021.103060
    [7]
    THODI D M and RODRIGUEZ J J. Prediction-error based reversible watermarking[C]. 2004 International Conference on Image Processing, Singapore, 2004: 1549–1552.
    [8]
    PUTEAUX P and PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670–1681. doi: 10.1109/TIFS.2018.2799381
    [9]
    WU Haotian, YANG Zhiyuan, CHEUNG Y M, et al. High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction[J]. IEEE Access, 2019, 7: 62361–62371. doi: 10.1109/ACCESS.2019.2916355
    [10]
    WESTFELD A. F5—a steganographic algorithm: High capacity despite better steganalysis[C]. The 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001: 289–302.
    [11]
    WU Haotian, CHEUNG Y M, YANG Zhiyuan, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87–96. doi: 10.1016/j.jvcir.2019.04.015
    [12]
    张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354–360. doi: 10.11999/JEIT150702

    ZHANG Minqing, KE Yan, and SU Tingting. Reversible steganography in encrypted domain based on LWE[J]. Journal of Electronics &Information Technology, 2016, 38(2): 354–360. doi: 10.11999/JEIT150702
    [13]
    KE Yan, ZHANG Minqing, LIU Jia, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133–144. doi: 10.1016/j.jvcir.2018.05.002
    [14]
    HUANG Delu and WANG Jianjun. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing Image Communication, 2020, 80: 115632. doi: 10.1016/j.image.2019.115632
    [15]
    CHEN Y C, SHIU C W, and HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164–1170. doi: 10.1016/j.jvcir.2014.04.003
    [16]
    WU Xiaotian, CHEN Bing, and WENG Jian. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer[J]. Journal of Visual Communication and Image Representation, 2016, 41: 58–64. doi: 10.1016/j.jvcir.2016.09.005
    [17]
    WU Xiaotian, WENG Jian, and YAN Weiqi. Adopting secret sharing for reversible data hiding in encrypted images[J]. Signal Processing, 2018, 143: 269–281. doi: 10.1016/j.sigpro.2017.09.017
    [18]
    CHEN Yuchi, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332–3343. doi: 10.1109/TIFS.2019.2914557
    [19]
    KE Yan, ZHANG Minqing, ZHANG Xinpeng, et al. A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469–2481. doi: 10.1109/TCSVT.2021.3081575
    [20]
    CHEN Bing, LU Wei, HUANG Jiwu, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978–991. doi: 10.1109/TDSC.2020.3011923
    [21]
    SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176
    [22]
    THIEN C C and LIN J C. Secret image sharing[J]. Computers & Graphics, 2002, 26(5): 765–770. doi: 10.1016/S0097-8493(02)00131-0
    [23]
    FRIDRICH J and SOUKAL D. Matrix embedding for large payloads[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3): 390–395. doi: 10.1109/TIFS.2006.879281
    [24]
    邓晓衡, 廖春龙, 朱从旭, 等. 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014, 35(3): 216–223. doi: 10.3969/j.issn.1000-436x.2014.03.025

    DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216–223. doi: 10.3969/j.issn.1000-436x.2014.03.025
    [25]
    ZHANG Xinpeng, LONG Jing, WANG Zichi, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622–1631. doi: 10.1109/TCSVT.2015.2433194
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(6)

    Article Metrics

    Article views (852) PDF downloads(134) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return