Citation: | ZHANG Minqing, WANG Zexi, KE Yan, KONG Yongjun, DI Fuqiang. Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing[J]. Journal of Electronics & Information Technology, 2022, 44(12): 4337-4347. doi: 10.11999/JEIT211054 |
[1] |
SHI Yunqing, LI Xiaolong, ZHANG Xinpeng, et al. Reversible data hiding: Advances in the past two decades[J]. IEEE Access, 2016, 4: 3210–3237. doi: 10.1109/ACCESS.2016.2573308
|
[2] |
PUECH W, CHAUMONT M, and STRAUSS O. A reversible data hiding method for encrypted images[C]. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, United States, 2008: 68191E.
|
[3] |
ZHANG Xinpeng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255–258. doi: 10.1109/LSP.2011.2114651
|
[4] |
ZHANG Xinpeng. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 826–832. doi: 10.1109/TIFS.2011.2176120
|
[5] |
CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253–266. doi: 10.1109/TIP.2004.840686
|
[6] |
CHEN C C, CHANG C C, and CHEN Kaimeng. High-capacity reversible data hiding in encrypted image based on huffman coding and differences of high nibbles of pixels[J]. Journal of Visual Communication and Image Representation, 2021, 76: 103060. doi: 10.1016/j.jvcir.2021.103060
|
[7] |
THODI D M and RODRIGUEZ J J. Prediction-error based reversible watermarking[C]. 2004 International Conference on Image Processing, Singapore, 2004: 1549–1552.
|
[8] |
PUTEAUX P and PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670–1681. doi: 10.1109/TIFS.2018.2799381
|
[9] |
WU Haotian, YANG Zhiyuan, CHEUNG Y M, et al. High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction[J]. IEEE Access, 2019, 7: 62361–62371. doi: 10.1109/ACCESS.2019.2916355
|
[10] |
WESTFELD A. F5—a steganographic algorithm: High capacity despite better steganalysis[C]. The 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001: 289–302.
|
[11] |
WU Haotian, CHEUNG Y M, YANG Zhiyuan, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87–96. doi: 10.1016/j.jvcir.2019.04.015
|
[12] |
张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354–360. doi: 10.11999/JEIT150702
ZHANG Minqing, KE Yan, and SU Tingting. Reversible steganography in encrypted domain based on LWE[J]. Journal of Electronics &Information Technology, 2016, 38(2): 354–360. doi: 10.11999/JEIT150702
|
[13] |
KE Yan, ZHANG Minqing, LIU Jia, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133–144. doi: 10.1016/j.jvcir.2018.05.002
|
[14] |
HUANG Delu and WANG Jianjun. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing Image Communication, 2020, 80: 115632. doi: 10.1016/j.image.2019.115632
|
[15] |
CHEN Y C, SHIU C W, and HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164–1170. doi: 10.1016/j.jvcir.2014.04.003
|
[16] |
WU Xiaotian, CHEN Bing, and WENG Jian. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer[J]. Journal of Visual Communication and Image Representation, 2016, 41: 58–64. doi: 10.1016/j.jvcir.2016.09.005
|
[17] |
WU Xiaotian, WENG Jian, and YAN Weiqi. Adopting secret sharing for reversible data hiding in encrypted images[J]. Signal Processing, 2018, 143: 269–281. doi: 10.1016/j.sigpro.2017.09.017
|
[18] |
CHEN Yuchi, HUNG T H, HSIEH S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12): 3332–3343. doi: 10.1109/TIFS.2019.2914557
|
[19] |
KE Yan, ZHANG Minqing, ZHANG Xinpeng, et al. A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4): 2469–2481. doi: 10.1109/TCSVT.2021.3081575
|
[20] |
CHEN Bing, LU Wei, HUANG Jiwu, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978–991. doi: 10.1109/TDSC.2020.3011923
|
[21] |
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176
|
[22] |
THIEN C C and LIN J C. Secret image sharing[J]. Computers & Graphics, 2002, 26(5): 765–770. doi: 10.1016/S0097-8493(02)00131-0
|
[23] |
FRIDRICH J and SOUKAL D. Matrix embedding for large payloads[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3): 390–395. doi: 10.1109/TIFS.2006.879281
|
[24] |
邓晓衡, 廖春龙, 朱从旭, 等. 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014, 35(3): 216–223. doi: 10.3969/j.issn.1000-436x.2014.03.025
DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216–223. doi: 10.3969/j.issn.1000-436x.2014.03.025
|
[25] |
ZHANG Xinpeng, LONG Jing, WANG Zichi, et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9): 1622–1631. doi: 10.1109/TCSVT.2015.2433194
|