Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU

被引:14
作者
Zhou, Neng [1 ]
Zhang, Minqing [1 ]
Wang, Han [1 ]
Ke, Yan [1 ]
Di, Fuqiang [1 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Key Lab Network & Informat Secur Chinese People A, Xian 710086, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Reversible data hiding; encrypted domain; public key cryptosystem; homomorphic property; number theory research unit (NTRU); IMAGES;
D O I
10.1109/ACCESS.2020.2990903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, and high security. It is very suitable for wireless confidential data networks and authentication systems. Combined with reversible data hiding technology, a separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU is proposed. The image owner directly divides the cover-image into groups of a reference pixel and adjacent pixels. Then, the grouped image is encrypted by NTRU. Finally, the encrypted image is uploaded to the data hider. The encrypted image is divided into groups by the same grouping method as the image owner. After that, the data hider calculates absolute differences of adjacent pixels in each group to obtain histogram of the absolute differences. The additional data can be embedded into the encrypted image by shifting histogram of the absolute differences. After receiving the encrypted image with hidden data, the receiver can either use the data hiding key to directly extract the additional data from encrypted domain to obtain the encrypted image, or use the private key and data hiding key to extract the additional data from plaintext domain to get the cover-image. Experimental results show that our scheme has higher security and better embedding performance comparing with other state-of-the-art works.
引用
收藏
页码:81412 / 81424
页数:13
相关论文
共 36 条
  • [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [2] Barton J.M., 1997, United States Patent, Patent No. 5646997
  • [3] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170
  • [4] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [5] Molecular behaviors in thin film lubrication-Part three: Superlubricity attained by polar and nonpolar molecules
    Ge, Xiangyu
    Halmans, Tobias
    Li, Jinjin
    Luo, Jianbin
    [J]. FRICTION, 2019, 7 (06) : 625 - 636
  • [6] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [7] Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
  • [8] DE-Based Reversible Data Hiding With Improved Overflow Location Map
    Hu, Yongjian
    Lee, Heung-Kyu
    Li, Jianwei
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2009, 19 (02) : 250 - 260
  • [9] Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting
    Jia, Yujie
    Yin, Zhaoxia
    Zhang, Xinpeng
    Luo, Yonglong
    [J]. SIGNAL PROCESSING, 2019, 163 : 238 - 246
  • [10] Exploring steganography: Seeing the unseen
    Johnson, NF
    Jajodia, S
    [J]. COMPUTER, 1998, 31 (02) : 26 - +