计算机科学 ›› 2023, Vol. 50 ›› Issue (8): 294-303.doi: 10.11896/jsjkx.220800245
刘定财, 吴昊天, 庄振威, 何军辉
LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui
摘要: 随着云计算技术的发展和隐私保护的需要,同态加密域中的可逆数据隐藏已成为一项研究热点。加密域可逆数据隐藏方案大多利用了图像中像素点之间的相关性及冗余,适用范围受到了一定的限制。为了提高数据隐藏方案的适用性和嵌入容量,针对NTRU(Number Theory Research Unit)加密系统,提出了一种基于多项式划分的可逆数据隐藏方案。该方案将NTRU加密系统中的多项式空间划分为用于表示原始载体的明文段和用于隐藏数据的数据隐藏段,可用于在多种加密的数字媒体中隐藏数据。接收者可以从密文中直接提取一部分隐藏的数据,并能从解密得到的明文中提取另一部分隐藏的数据,并无损地恢复原始明文。在实验部分,分别以灰度图像和文本为例,对所提算法的可行性进行验证。实验结果表明,对于一个以8比特表示的明文值,其密文中最多可以隐藏N-8比特的数据,其中N为NTRU加密系统中的参数;当N取503时,在一个密文中最多可以隐藏495比特的数据,并能无损地恢复出原始明文值。与现有的同类方案相比,该方案所提的NTRU域可逆数据隐藏算法具有较高的嵌入容量和较强的适用性。
中图分类号:
[1]SHI Y Q,LI X L,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237. [2]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [3]NI Z C,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362. [4]PUECH W,CHAUMONT M,STRAUSS O.A reversible datahiding method for encrypted images[C]//Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.SPIE,2008:534-542. [5]HUANG F J,HUANG J W,SHI Y Q.New framework for reversible data hiding in encrypted domain[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2777-2789. [6]PUTEAUX P,PUECH W.An efficient msb prediction-basedmethod for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681. [7]YI S,ZHOU Y C.Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J].IEEE Transactions on Multimedia,2018,21(1):51-64. [8]YIN Z X,PENG Y Y,XIANG Y Z.Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J].IEEE Transactions on Dependable and Secure Computing,2020,19(2):992-1002. [9]WANG Y M,CAI Z C,HE W G.High capacity reversible data hiding in encrypted image based on intra-block lossless compression[J].IEEE Transactions on Multimedia,2020,23:1466-1473. [10]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive msb prediction[J].IEEE Transactions on Multimedia,2021,24:1288-1298. [11]YANG Y L,HE H J,CHEN F,et al.Reversible data hiding of image encrypted based on prediction error adaptive coding[J].Journal of Computer Research and Development,2021,58(6):1340-1350. [12]ZHANG X P,LONG J,WANG Z C,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Transactions on Circuits and Systems for Video Technology,2015,26(9):1622-1631. [13]XIANG S J,LUO X R.Efficient reversible data hiding in en-crypted image with public key cryptosystem[J].EURASIP Journal on Advances in Signal Processing,2017,2017(1):1-13. [14]XIONG L Z,DONG D P,XIA Z H,et al.High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption[J].IEEE Access,2018,6:60635-60644. [15]ZHOU N,ZHANG M Q,WANG H,et al.Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU[J].IEEE Access,2020,8:81412-81424. [16]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Reversible data hiding in homomorphic encrypted images without preproces-sing[C]//International Workshop on Information Security Application.Springer,2019:141-154. [17]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Lossless datahiding in encrypted images compatible with homomorphic proces-sing[J].IEEE Transactions on Cybernetic,2022,53(6):3688-3701. [18]CHEN B,WU X T,LU W,et al.Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism[J].Signal Processing,2019,164:48-57. [19]ZHOU N,ZHANG M Q,TANG H Q,et al.Reversible data hi-ding algorithm in encrypted domain based on NTRU[J].Science Technology and Engineering.2020,20(32):10. [20]REGEV O.On lattices,learning with errors,random linearcodes,and cryptography[J].Journal of the ACM(JACM),2009,56(6):1-40. [21]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Sprin-ger,1999:223-238. [22]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) Fully homomorphic encryption without bootstrapping[J].ACM Transactions on Computation Theory(TOCT),2014,6(3):1-36. [23]HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:A ring-based public key cryptosystem[C]//International Algorithmic Number Theory Symposium.Springer,1998:267-288. [24]FRIDRICH J,GOLJAN M,LISONEK,et al.Writing on wet paper[J].IEEE Transactions on Signal Processing,2005,53(10):3923-3935. [25]BONEH D,GOH E J,NISSIM K.Evaluating 2-dnf formulas on ciphertexts[C]//Theory of Cryptography Conference.Springer,2005:325-341. [26]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472. [27]WANG C,YAO H N,WANG B N,et al.Process in quantum computing cryptography attacks[J].Chinese Journal of Computers.2020,43(9):1691-1707. [28]AJTAI M.Generating hard instances of lattice problems[C]//Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing.1996:99-108. [29]SHORP W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM Review,1999,41(2):303-332. |
|