计算机科学 ›› 2023, Vol. 50 ›› Issue (8): 294-303.doi: 10.11896/jsjkx.220800245

• 信息安全 • 上一篇    下一篇

基于多项式划分的NTRU加密域可逆数据隐藏方案

刘定财, 吴昊天, 庄振威, 何军辉   

  1. 华南理工大学计算机科学与工程学院 广州 510006
  • 收稿日期:2022-08-26 修回日期:2022-12-11 出版日期:2023-08-15 发布日期:2023-08-02
  • 通讯作者: 吴昊天(wuht@scut.edu.cn)
  • 作者简介:(ldc971022@163.com)
  • 基金资助:
    国家自然科学基金(61772208);广东省自然科学基金(2021A1515011798)

Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition

LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui   

  1. School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,China
  • Received:2022-08-26 Revised:2022-12-11 Online:2023-08-15 Published:2023-08-02
  • About author:LIU Dingcai,born in 1997,postgra-duate.His main research interest is reversible data hiding in homomorphic encryption domain.
    WU Haotian,born in 1980,Ph.D,asso-ciate professor.His main research in-terests include reversible information hiding,privacy preservation,password guessing and blockchain.
  • Supported by:
    National Natural Science Foundation of China(61772208) and Natural Science Foundation of Guangdong Pro-vince(2021A1515011798).

摘要: 随着云计算技术的发展和隐私保护的需要,同态加密域中的可逆数据隐藏已成为一项研究热点。加密域可逆数据隐藏方案大多利用了图像中像素点之间的相关性及冗余,适用范围受到了一定的限制。为了提高数据隐藏方案的适用性和嵌入容量,针对NTRU(Number Theory Research Unit)加密系统,提出了一种基于多项式划分的可逆数据隐藏方案。该方案将NTRU加密系统中的多项式空间划分为用于表示原始载体的明文段和用于隐藏数据的数据隐藏段,可用于在多种加密的数字媒体中隐藏数据。接收者可以从密文中直接提取一部分隐藏的数据,并能从解密得到的明文中提取另一部分隐藏的数据,并无损地恢复原始明文。在实验部分,分别以灰度图像和文本为例,对所提算法的可行性进行验证。实验结果表明,对于一个以8比特表示的明文值,其密文中最多可以隐藏N-8比特的数据,其中N为NTRU加密系统中的参数;当N取503时,在一个密文中最多可以隐藏495比特的数据,并能无损地恢复出原始明文值。与现有的同类方案相比,该方案所提的NTRU域可逆数据隐藏算法具有较高的嵌入容量和较强的适用性。

关键词: 可逆数据隐藏, NTRU加密系统, 多项式划分, 无损恢复, 嵌入容量

Abstract: With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit correlations between adjacent pixels and redundancy in images,whose applications are limited.To improve applicabi-lity and embedding capacity,a new RDH scheme in NTRU encrypted domain based on polynomial partitioning is proposed.It divides the polynomial space in NTRU cryptosystem,which can be applied to multiple encrypted media content for data hiding.Part of the space is used to represent the original plaintext,while the rest space is used to hide the hidden data.The receiver can retrieve part of the hidden data directly from the ciphertext,while the rest hidden data can be extracted after decryption and the original plaintext can be correctly restored.In our experiments,grayscale images and text files are chosen to verify feasibility of the proposed scheme.Experimental results show that a maximum of N-8 bits can be hidden into a ciphertext for a plaintext represented with 8 bits,where N is a parameter used in NTRU cryptosystem.When N is set to 503,at most 495 bits can be hidden in a ciphertext while the plaintext can be exactly recovered.Compared with the existing schemes,the proposed scheme has higher embedding capacity and better applicability.

Key words: Reversible data hiding, NTRU cryptosystem, Polynomial partition, Lossless recovery, Embedding capacity

中图分类号: 

  • TP391
[1]SHI Y Q,LI X L,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237.
[2]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[3]NI Z C,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
[4]PUECH W,CHAUMONT M,STRAUSS O.A reversible datahiding method for encrypted images[C]//Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.SPIE,2008:534-542.
[5]HUANG F J,HUANG J W,SHI Y Q.New framework for reversible data hiding in encrypted domain[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2777-2789.
[6]PUTEAUX P,PUECH W.An efficient msb prediction-basedmethod for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681.
[7]YI S,ZHOU Y C.Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J].IEEE Transactions on Multimedia,2018,21(1):51-64.
[8]YIN Z X,PENG Y Y,XIANG Y Z.Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J].IEEE Transactions on Dependable and Secure Computing,2020,19(2):992-1002.
[9]WANG Y M,CAI Z C,HE W G.High capacity reversible data hiding in encrypted image based on intra-block lossless compression[J].IEEE Transactions on Multimedia,2020,23:1466-1473.
[10]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive msb prediction[J].IEEE Transactions on Multimedia,2021,24:1288-1298.
[11]YANG Y L,HE H J,CHEN F,et al.Reversible data hiding of image encrypted based on prediction error adaptive coding[J].Journal of Computer Research and Development,2021,58(6):1340-1350.
[12]ZHANG X P,LONG J,WANG Z C,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Transactions on Circuits and Systems for Video Technology,2015,26(9):1622-1631.
[13]XIANG S J,LUO X R.Efficient reversible data hiding in en-crypted image with public key cryptosystem[J].EURASIP Journal on Advances in Signal Processing,2017,2017(1):1-13.
[14]XIONG L Z,DONG D P,XIA Z H,et al.High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption[J].IEEE Access,2018,6:60635-60644.
[15]ZHOU N,ZHANG M Q,WANG H,et al.Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU[J].IEEE Access,2020,8:81412-81424.
[16]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Reversible data hiding in homomorphic encrypted images without preproces-sing[C]//International Workshop on Information Security Application.Springer,2019:141-154.
[17]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Lossless datahiding in encrypted images compatible with homomorphic proces-sing[J].IEEE Transactions on Cybernetic,2022,53(6):3688-3701.
[18]CHEN B,WU X T,LU W,et al.Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism[J].Signal Processing,2019,164:48-57.
[19]ZHOU N,ZHANG M Q,TANG H Q,et al.Reversible data hi-ding algorithm in encrypted domain based on NTRU[J].Science Technology and Engineering.2020,20(32):10.
[20]REGEV O.On lattices,learning with errors,random linearcodes,and cryptography[J].Journal of the ACM(JACM),2009,56(6):1-40.
[21]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Sprin-ger,1999:223-238.
[22]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) Fully homomorphic encryption without bootstrapping[J].ACM Transactions on Computation Theory(TOCT),2014,6(3):1-36.
[23]HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:A ring-based public key cryptosystem[C]//International Algorithmic Number Theory Symposium.Springer,1998:267-288.
[24]FRIDRICH J,GOLJAN M,LISONEK,et al.Writing on wet paper[J].IEEE Transactions on Signal Processing,2005,53(10):3923-3935.
[25]BONEH D,GOH E J,NISSIM K.Evaluating 2-dnf formulas on ciphertexts[C]//Theory of Cryptography Conference.Springer,2005:325-341.
[26]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472.
[27]WANG C,YAO H N,WANG B N,et al.Process in quantum computing cryptography attacks[J].Chinese Journal of Computers.2020,43(9):1691-1707.
[28]AJTAI M.Generating hard instances of lattice problems[C]//Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing.1996:99-108.
[29]SHORP W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM Review,1999,41(2):303-332.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!