Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding

被引:28
作者
Yu, Chunqiang [1 ,2 ]
Zhang, Xianquan [1 ,2 ]
Qin, Chuan [3 ]
Tang, Zhenjun [1 ,2 ]
机构
[1] Guangxi Normal Univ, Key Lab Educ Blockchain & Intelligent Technol, Minist Educ, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Minist Educ, Guilin 541004, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
Reversible image hiding; iterative encryption; image sharing; high payload; hybrid coding; DIFFERENCE; SCHEME;
D O I
10.1109/TCSVT.2023.3270882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security. To address this issue, we propose a new RDHEI method using Chinese remainder theorem-based secret sharing (CRTSS) and hybrid coding. Specifically, a hybrid coding is first proposed for RDH to achieve high embedding capacity. At the content owner side, a novel iterative encryption is designed to conduct block based encryption for perfectly preserving the spatial correlation of original blocks in their encrypted blocks. Then, the CRTSS with the constraints is exploited to generate multiple encrypted image shares, in which spatial correlations of the encrypted blocks are also preserved. Meanwhile, the CRTSS provides good security properties for the proposed method. Since there are strong spatial correlations in the blocks of each share, the data-hider can exploit the proposed hybrid coding to perform data embedding for improving capacity. On the receiver side, even if some shares are corrupted/missing, the original image can be losslessly recovered as long as enough uncorrupted marked shares are obtained. Experiment results show that the proposed RDHEI method outperforms some state-of-the-art methods, including some secret sharing (SS) based methods in terms of embedding capacity.
引用
收藏
页码:6443 / 6458
页数:16
相关论文
共 54 条
  • [1] A MODULAR APPROACH TO KEY SAFEGUARDING
    ASMUTH, C
    BLOOM, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
  • [2] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [3] Bas P., 2017, IMAGE DATABASE BOWS
  • [4] High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation
    Cao, Xiaochun
    Du, Ling
    Wei, Xingxing
    Meng, Dan
    Guo, Xiaojie
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) : 1132 - 1143
  • [5] Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders
    Chen, Bing
    Lu, Wei
    Huang, Jiwu
    Weng, Jian
    Zhou, Yicong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 978 - 991
  • [6] High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement
    Chen, Kaimeng
    Chang, Chin-Chen
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 58 : 334 - 344
  • [7] A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms
    Chen, Yu-Chi
    Hung, Tsung-Hsuan
    Hsieh, Sung-Hsien
    Shiu, Chih-Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3332 - 3343
  • [8] High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping
    Du, Yang
    Yin, Zhaoxia
    Zhang, Xinpeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1420 - 1433
  • [9] Effective reversible data hiding in encrypted image with adaptive encoding strategy
    Fu, Yujie
    Kong, Ping
    Yao, Heng
    Tang, Zhenjun
    Qin, Chuan
    [J]. INFORMATION SCIENCES, 2019, 494 : 21 - 36
  • [10] An Improved Reversible Data Hiding in Encrypted Images Using Side Match
    Hong, Wien
    Chen, Tung-Shou
    Wu, Han-Yan
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) : 199 - 202