期刊文献+

基于国密加性同态的医学影像可逆信息隐藏方法

National cryptographic algorithm and additive homomorphism based scheme for reversible data hiding in medical images
下载PDF
导出
摘要 医学影像共享是医疗信息云共享中最重要的部分,因为医疗信息80%以上是医学影像,但信息共享面临数据安全、隐私保护和信息检索等问题。虽然已有很多密文域可逆信息隐藏(RDH-EI,Reversible Data Hiding in Encrypted Image)方案,但一般不能直接应用于DICOM医学影像上。为了满足云服务中DICOM文件的隐私保护和信息检索需求,文章提出一种基于ZUC加性同态和多层差值直方图平移的DICOM图像RDH-EI方案。所提方案不改变DICOM文件格式,不增加文件大小,且图像解密和信息提取可分离。实验结果表明,所提出的方案具有良好的灵活性和计算效率,是一种适用云共享的RDH-EI方案。 Medical image sharing is the most important part of medical information cloud sharing because more than 80% of medical information is medical image,but information sharing faces the problems of data sccurity,privacy protection and data retrieval.Although there are many reversible data hiding in cncrypted image(RDH-EI)schemes,they cannot be directly applied to DICOM medical images.In order to meet the privacy protection and data retrieval requirements of DICOM files in cloud scervices,the paper proposes an RDH-EI scheme for DICOM images based on ZUC additive homomorphism and multi-layerdifference histogram shifting.The proposed scheme does not change the DICOM file format or increase the file size,and the image decryption and information extraction are separable.The experimental results show that the proposed scheme has good flexibility and computational efficiency,which is an RDH-EI scheme suitable for cloud sharing.
作者 郑梓劲 宋志刚 杨文琴 李代松 郑绍华 ZHENG Zijin;SONG Zhigang;YANG Wenqin;LI Daisong;YANG Xiao;ZHENG Shao-hua(School of Physics and Infomation Engineering of Fuzhou University,Fuzhou,350108,China;The Academy of Digital China(Fujian)of Fuzhou University,Fuzhou,350108,China)
出处 《长江信息通信》 2024年第3期1-6,共6页 Changjiang Information & Communications
基金 福建省自然科学基金项目(No.2020J01472) 福建省科技计划项目(No.3952022C0029) 福建省教育厅项目(No.JAT200039)。
关键词 可逆信息隐藏 DICOM ZUC算法 加性同态 多层差值直方图平移 reversible data hiding DICOM ZUC algorithm additive homomorphism multilayer difference histogram shifting
  • 相关文献

参考文献5

二级参考文献30

  • 1李太勇,贾华丁,吴江.基于三维混沌序列的数字图像加密算法[J].计算机应用,2006,26(7):1652-1654. 被引量:30
  • 2RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978: 169-179.
  • 3GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
  • 4PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt, 1999: 223-238.
  • 5DAMGARD I, JURIK M. A generalisation, a simplification and some applications of paiUier' s probabilistic public-key system[J]. Public Key Cryptography, 2001: 119-136.
  • 6BONEH D, GOH E, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C]//Second Theory of Cryptography Conference, Cambridge, 2005, 325-341.
  • 7GENTRY C. Fully homomorphic encryption using ideal lattices[J]. Proc Stoc, 2009, 2011, (4):169-178.
  • 8SMART N P, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[C]//13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010: 420-443.
  • 9STEHLE D, STEINFELD R. Faster fully homomorphic encryption[C]//16th International Conference on the Theory and Application of Cryptology and Information Security, 2010: 377-394.
  • 10BRAKERSKI Z, VAIKUNTANATHAN V. Fully homomorphic encryption from ring-LWE and security for key dependent messages[C]//31st Annual Cryptology Conference, Santa, 2011, 505-524.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部