期刊文献+

基于多项式秘密共享的图像密文域可逆信息隐藏 被引量:5

Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing
下载PDF
导出
摘要 针对密文域可逆信息隐藏在多用户场景下算法嵌入率低、载体图像容灾性能较弱等问题,该文提出一种基于多项式秘密共享的图像密文域可逆信息隐藏方案。通过将图像分割成多幅影子图像并存储在不同的用户端,可以增强图像的容灾性,为了实现额外信息在图像重构前后提取的可分离性,该方案包括两种嵌入算法:算法1在图像分割的过程中,将额外信息嵌入多项式的冗余系数中得到含有额外信息的影子图像,该算法支持在图像重构之后提取额外信息;算法2针对图像分割后的任一影子图像,利用秘密共享的加法同态特性实施嵌入,该算法支持直接从影子图像中提取额外信息。实验在不同门限方案和影子图像压缩率的条件下进行测试,当压缩率为50%时,(3,4)门限方案的嵌入率达4.18 bpp(bit per pixel),(3,5)门限方案的嵌入率达3.78 bpp。结果表明,两种嵌入算法分别支持从影子图像与重构图像中提取额外信息,实现了方案的可分离性;与现有方案相比,所提算法嵌入率较高、计算复杂度较低,具有较强的实用性。 In order to solve the problems of low embedding rate of reversible data hiding in encrypted domain with multi-users and weak disaster tolerance of cover image,a reversible data hiding in encrypted images based on polynomial secret sharing scheme is proposed.The cover image is divided into multiple shadow images and stored to multiple users,so that the image disaster tolerance can be enhanced.Separability is achieved by combining two embedding algorithms,where Algorithm 1 embeds additional data into the redundancy coefficients of the polynomial during the process of image sharing to generate shadow images containing additional data,which can extract data after image reconstruction;Algorithm 2,for any shadow image,embeds additional data by using the additive homomorphism of secret sharing,which supports extracting additional data directly from the shadow image.Experiments are performed in different threshold and shadow image compression rates.When the compression rate is 50%,the embedding rate reaches 4.18 bit per pixel(bpp)for the(3,4)threshold scheme and 3.78 bpp for the(3,5)threshold scheme.The results show that the algorithms support extracting additional data from the shadow images and the reconstructed images respectively,which achieves the separability of the scheme.The proposed scheme has a higher embedding rate and lower computational complexity than the existing schemes,and is more practical.
作者 张敏情 王泽曦 柯彦 孔咏骏 狄富强 ZHANG Minqing;WANG Zexi;KE Yan;KONG Yongjun;DI Fuqiang(College of Cryptography Engineering,Engineering University of PAP,Xi’an 710086,China;Key Laboratory of PAP for Cryptology and Information Security,Xi’an 710086,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2022年第12期4337-4347,共11页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61872384,62102450,62102451)。
关键词 信息安全 可逆信息隐藏 图像秘密共享 密文域 多用户 Information security Reversible data hiding Secret image sharing Encrypted domain Multiple data-hiders
  • 相关文献

参考文献2

二级参考文献48

  • 1朱从旭,李力,陈志刚.基于多维混沌系统组合的图像加密新算法[J].计算机工程,2007,33(2):142-144. 被引量:31
  • 2廖晓峰,肖迪,陈勇,等.混沌密码学原理及应用[M].北京:科学出版社,2009.
  • 3PISARCHIK A N, ZANIN M. Image encryption with cha-otically coupled chaotic maps[J]. Physics Letters, 2008, 372: 2645-2652.
  • 4GAO T G, CHEN Z Q. Image encryption base on a new total shuffiing algorithm[J]. Chaos, Solitons & Fractals, 2008, 38: 213-220.
  • 5GUAN Z H, HUANG F J, GUAN W 1. Chaos based image encryption algorithm[J]. Physics Letters A, 2005, 346(1-3): 153-157.
  • 6SEMPERE V, ALBERO T, SILVESTRE 1. Analysis of communication alternatives in a heterogeneous network for a supervision and control system[J]. Computer Communications, 2006, 29(8): 1133-1145.
  • 7TENNY R, TSIMRING L S, LARRY I, et al, Using distributed nonlinear dynamics for public key encryption[J]. Physical Review Letters, 2003, 90(4): 047903.
  • 8KOCAREV L, TASEV Z. Public-key encryption based on Chebyshev maps[A]. Proceedings of the IEEE International Symposium on Circuits and Systems[C]. 2003,1(3): 28-31.
  • 9WANG X Y, LEI Y. A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models[J]. Optics Communications, 2012, 285(20): 4033-4042.
  • 10TENG L, WANG X Y. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive[J]. Optics Communications, 2012, 285(20): 4048-4054.

共引文献81

同被引文献37

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部