期刊文献+

基于密码反馈秘密共享的大容量密文域可逆隐藏 被引量:1

High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
下载PDF
导出
摘要 为提高分布式环境下密文域可逆信息隐藏算法的安全性、鲁棒性和嵌入率,提出了一种基于密码反馈秘密共享的多重嵌入算法。首先,利用秘密共享加密过程中产生的多项式冗余系数进行嵌入;其次,利用秘密共享的同态加性对秘密份额二次嵌入。实验结果表明,所提算法利用反馈机制提高了秘密共享的扩散特性从而增强了算法安全性和鲁棒性,在(3,4)和(3,5)门限下,嵌入率分别为6.00 bpp和4.80 bpp。所提算法具有安全性高、完全可逆、嵌入率较大等特点;算法嵌入率不受载体图像影响,仅与算法参数选择有关。 To improve the security,robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment,a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly,the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly,the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the(3,4)and(3,5)threshold,the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability,but also obtain a better embedding capacity.Meanwhile,the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.
作者 张敏情 姜超 狄富强 蒋宗宝 张雄 ZHANG Minqing;JIANG Chao;DI Fuqiang;JIANG Zongbao;ZHANG Xiong(College of Cryptography Engineering,Engineering University of PAP,Xi’an 710086,China;Key Laboratory of PAP for Cryptology and Information Security,Xi’an 710086,China)
出处 《通信学报》 EI CSCD 北大核心 2023年第9期48-57,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.62272478,No.62102450,No.61872384,No.62102451,No.62202496)。
关键词 信息隐藏 可逆 密文图像 秘密共享 密码反馈 data hiding reversible encrypted image secret sharing cipher-feedback
  • 相关文献

参考文献11

二级参考文献59

  • 1吴燕仙,何妮.拉格朗日插值公式的完全展开[J].通化师范学院学报,2007,28(2):10-12. 被引量:6
  • 2ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
  • 3TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
  • 4DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEETransactions on Image Processing, 2014, 23(4): 1779-1790.
  • 5CACIULA I a:ld COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
  • 6ZHANG W, HU X, LI X, et al. Recursive histograzn modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
  • 7JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
  • 8LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
  • 9CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 10KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.

共引文献82

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部