Computer Science ›› 2023, Vol. 50 ›› Issue (8): 294-303.doi: 10.11896/jsjkx.220800245

• Information Security • Previous Articles     Next Articles

Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition

LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui   

  1. School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,China
  • Received:2022-08-26 Revised:2022-12-11 Online:2023-08-15 Published:2023-08-02
  • About author:LIU Dingcai,born in 1997,postgra-duate.His main research interest is reversible data hiding in homomorphic encryption domain.
    WU Haotian,born in 1980,Ph.D,asso-ciate professor.His main research in-terests include reversible information hiding,privacy preservation,password guessing and blockchain.
  • Supported by:
    National Natural Science Foundation of China(61772208) and Natural Science Foundation of Guangdong Pro-vince(2021A1515011798).

Abstract: With the rapid development of cloud computing techniques and demand of privacy preservation,reversible data hiding(RDH) in homomorphic encrypted domain has become a hot research topic.Most of the existing RDH schemes in encrypted domain exploit correlations between adjacent pixels and redundancy in images,whose applications are limited.To improve applicabi-lity and embedding capacity,a new RDH scheme in NTRU encrypted domain based on polynomial partitioning is proposed.It divides the polynomial space in NTRU cryptosystem,which can be applied to multiple encrypted media content for data hiding.Part of the space is used to represent the original plaintext,while the rest space is used to hide the hidden data.The receiver can retrieve part of the hidden data directly from the ciphertext,while the rest hidden data can be extracted after decryption and the original plaintext can be correctly restored.In our experiments,grayscale images and text files are chosen to verify feasibility of the proposed scheme.Experimental results show that a maximum of N-8 bits can be hidden into a ciphertext for a plaintext represented with 8 bits,where N is a parameter used in NTRU cryptosystem.When N is set to 503,at most 495 bits can be hidden in a ciphertext while the plaintext can be exactly recovered.Compared with the existing schemes,the proposed scheme has higher embedding capacity and better applicability.

Key words: Reversible data hiding, NTRU cryptosystem, Polynomial partition, Lossless recovery, Embedding capacity

CLC Number: 

  • TP391
[1]SHI Y Q,LI X L,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237.
[2]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[3]NI Z C,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
[4]PUECH W,CHAUMONT M,STRAUSS O.A reversible datahiding method for encrypted images[C]//Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.SPIE,2008:534-542.
[5]HUANG F J,HUANG J W,SHI Y Q.New framework for reversible data hiding in encrypted domain[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2777-2789.
[6]PUTEAUX P,PUECH W.An efficient msb prediction-basedmethod for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681.
[7]YI S,ZHOU Y C.Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J].IEEE Transactions on Multimedia,2018,21(1):51-64.
[8]YIN Z X,PENG Y Y,XIANG Y Z.Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J].IEEE Transactions on Dependable and Secure Computing,2020,19(2):992-1002.
[9]WANG Y M,CAI Z C,HE W G.High capacity reversible data hiding in encrypted image based on intra-block lossless compression[J].IEEE Transactions on Multimedia,2020,23:1466-1473.
[10]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive msb prediction[J].IEEE Transactions on Multimedia,2021,24:1288-1298.
[11]YANG Y L,HE H J,CHEN F,et al.Reversible data hiding of image encrypted based on prediction error adaptive coding[J].Journal of Computer Research and Development,2021,58(6):1340-1350.
[12]ZHANG X P,LONG J,WANG Z C,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Transactions on Circuits and Systems for Video Technology,2015,26(9):1622-1631.
[13]XIANG S J,LUO X R.Efficient reversible data hiding in en-crypted image with public key cryptosystem[J].EURASIP Journal on Advances in Signal Processing,2017,2017(1):1-13.
[14]XIONG L Z,DONG D P,XIA Z H,et al.High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption[J].IEEE Access,2018,6:60635-60644.
[15]ZHOU N,ZHANG M Q,WANG H,et al.Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU[J].IEEE Access,2020,8:81412-81424.
[16]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Reversible data hiding in homomorphic encrypted images without preproces-sing[C]//International Workshop on Information Security Application.Springer,2019:141-154.
[17]WU H T,CHEUNG Y M,ZHUANG Z W,et al.Lossless datahiding in encrypted images compatible with homomorphic proces-sing[J].IEEE Transactions on Cybernetic,2022,53(6):3688-3701.
[18]CHEN B,WU X T,LU W,et al.Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism[J].Signal Processing,2019,164:48-57.
[19]ZHOU N,ZHANG M Q,TANG H Q,et al.Reversible data hi-ding algorithm in encrypted domain based on NTRU[J].Science Technology and Engineering.2020,20(32):10.
[20]REGEV O.On lattices,learning with errors,random linearcodes,and cryptography[J].Journal of the ACM(JACM),2009,56(6):1-40.
[21]PAILLIER P.Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Sprin-ger,1999:223-238.
[22]BRAKERSKI Z,GENTRY C,VAIKUNTANATHAN V.(Le-veled) Fully homomorphic encryption without bootstrapping[J].ACM Transactions on Computation Theory(TOCT),2014,6(3):1-36.
[23]HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:A ring-based public key cryptosystem[C]//International Algorithmic Number Theory Symposium.Springer,1998:267-288.
[24]FRIDRICH J,GOLJAN M,LISONEK,et al.Writing on wet paper[J].IEEE Transactions on Signal Processing,2005,53(10):3923-3935.
[25]BONEH D,GOH E J,NISSIM K.Evaluating 2-dnf formulas on ciphertexts[C]//Theory of Cryptography Conference.Springer,2005:325-341.
[26]ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472.
[27]WANG C,YAO H N,WANG B N,et al.Process in quantum computing cryptography attacks[J].Chinese Journal of Computers.2020,43(9):1691-1707.
[28]AJTAI M.Generating hard instances of lattice problems[C]//Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing.1996:99-108.
[29]SHORP W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM Review,1999,41(2):303-332.
[1] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[2] MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305.
[3] LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua. Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain [J]. Computer Science, 2018, 45(8): 151-155.
[4] XIANG Yu-dong and WU Gui-xing. Pixel Prediction Based Reversible Data Hiding Scheme for Image [J]. Computer Science, 2018, 45(2): 189-196.
[5] ZHANG Yao, PAN Feng, SHEN Jun-wei and LI Ning-bo. Adaptive Post-type Steganography Algorithm Based on MP3 [J]. Computer Science, 2016, 43(8): 114-117.
[6] XIE Jian-quan,XIE Qing and HUANG Da-zu. Image Information Hiding Algorithm with High Security Based on Run-length [J]. Computer Science, 2014, 41(3): 172-175.
[7] LUO Jian-gao and HAN Guo-qiang. Reversible Data Hiding Based on Full Context Prediction [J]. Computer Science, 2013, 40(Z11): 219-223.
[8] . Reversible Data Hiding Based on Reference Pixel of Block [J]. Computer Science, 2012, 39(2): 47-51.
[9] . Content-based Reversible Steganographic Method for Multimodal Biometrics [J]. Computer Science, 2012, 39(11): 70-74.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!