期刊文献+

基于LWE的密文域可逆信息隐藏 被引量:22

Reversible Steganography in Encrypted Domain Based on LWE
下载PDF
导出
摘要 该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据实现了提取过程与解密过程的可分离。通过推导方案在解密与提取信息过程中出错的概率,得到直接影响方案正确性的参数为所选噪声的标准差,实验获得并验证了标准差的合理取值区间;通过推导嵌入后密文的分布函数,分析密文统计特征的变化情况,论证了嵌入密文的隐藏信息的不可感知性。该方案是在密文域进行的可逆隐写,与原始载体无关,适用于文本、图片、音频等各类载体。实验仿真结果表明该方案不仅能够保证可逆隐写的可靠性与安全性,而且1 bit明文在密文域最大可负载1 bit隐藏信息。 This paper proposes a novel scheme of reversible steganography in encrypted domain based on Learning With Errors(LWE). The original data is encrypted by the cryptographic algorithms with LWE. Then additional data could be embedded into the cipher text. With embedded cipher text, the additional data can be extracted by using data-hiding key, and the original data can be recovered by using encryption key, and the processes of extraction and decryption are separable. By deducing the error probability of the scheme, the standard deviation of noise sequence which directly related to the scheme's correctness is mainly discussed, and reasonable range of the standard deviation is obtained by experiments. The probability distribution function of the embedded cipher text is deduced, that proves the embedded cipher text is not detective. The proposed scheme based on encrypted domain can apply to different kinds of media vehicle such as text, image or audio. Experimental results demonstrate that the proposed scheme can not only achieve statistical security without degrading the quality of encryption or data embedding, but realize that 1 bit original data can maximally load 1 bit additional data in encrypted domain.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第2期354-360,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61379152 61272492)~~
关键词 信息安全 密文域可逆隐写 LWE(Learning With Errors) Information security Reversible steganography in encrypted domain Lattice LWE(Learning With Errors)
  • 相关文献

参考文献24

  • 1ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
  • 2TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
  • 3DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEETransactions on Image Processing, 2014, 23(4): 1779-1790.
  • 4CACIULA I a:ld COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
  • 5ZHANG W, HU X, LI X, et al. Recursive histograzn modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
  • 6JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
  • 7LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
  • 8CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 9KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
  • 10MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.

二级参考文献19

  • 1Gentry C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 2009 ACM Symposium on Theory of Computing, STOC'09, NY, USA, 2009: 169-178.
  • 2Dijk M V, Gentry C, Halevi S, et al.. Fully homomorphic encryption using ideal lattices[C]. Proceedings of in Advances in Cryptology - EUROCRYPT, Riviera, French, 2010, LNCS 6110: 24-43.
  • 3Cancellaro M, Battisti F, Carli M, et al.. A commutative digital image watermarking and encryption method in the tree structured haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 4Kundur D and Karthik K. Video fingerprinting and encryption principles for digital rights management[J]. 1EEE Multimedia, 2004, 92(6): 918-932.
  • 5Memon N and Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4): 643-649.
  • 6Zhang X. Reversible data hiding in encrypted image[J]. IEEESignal Processing Letters, 2011, 18(4): 255-258.
  • 7Sun Y and Zhang Xing. A kind of covert channel analysis method based on trusted pipeline[C]. 2011 International Conference on Electrical and Control Engineering (ICECE), Yichang, China, 2011: 5660-5663.
  • 8Zhang X, Zhang W, and Wang S. Efficient double-layered steganographic embedding[J]. IET Electronics Letters, 2007, 43(8): 482-483.
  • 9Filler T, Judas J, and Pridrich J. Minimizing embedding impact in steganography using trellis-coded quantization[C]. Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, USA, 2009, (5): 1-14.
  • 10Fridrich J, Goljan M, and Soukal D. Efficient wet paper codes[C]. Proceedings of 7th International Workshop on Information Hiding, Barcelona, Spain, 2005, LNCS 3727: 204-218.

共引文献18

同被引文献95

  • 1Zhang X P. Reversible data hiding in encrypted image. IEEE Signal Processing Letters,2011 ; 18 (4) : 255-258.
  • 2Barni M, Kalker T, Katzenbeisser S. Inspiring new research in the field of signal processing in the encrypted domain. IEEE Signal Pro- cessing Magazine, 2013; 30(2) : 16:16.
  • 3Zhang X P. Separable reversible data hiding in encrypted image. IEEE Transactions on information forensics and security, 2012; 7 (2) :826-832.
  • 4Tian J. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits Systems, Video Technology, 2003 ; 13 (8) : 890-896.
  • 5Dragoi L, Coltuc D. Local-prediction-based difference expansion re- versible watermarking. IEEE Transactions. Image Processing,2014; 23(4) : 1779-1790.
  • 6Caciula I, Coltuc D. Improved control for low bit-rate reversible wa- termarking. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014:7425-7429.
  • 7Zhang W, Hu X, Li X, et al. Recursive histogram modification: es-tablishing equivalency between reversible data hiding and lossless data compression. IEEE Transaction Image Processing, 2013 ; 22 ( 7 ) : 2775-2785.
  • 8Jarali A, Rao J. Unique LSB compression data hiding method. Inter- national Journal of Emerging Science and Engineering,2013 ; 2 ( 3 ) : 17-21.
  • 9Cancellaro M, Battisti F, Carli M, et al. A commutative digital im- age watermarking and encryption method in the tree structured Haar- transform domain. Signal Processing : Image Communication, 2011 ; 26(1) : 1-12.
  • 10Zhao B, Kou W, Li H, et al. Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. Information Sciences, 2010 ; 180(23) : 4672-4684.

引证文献22

二级引证文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部