A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem

被引:46
作者
Ke, Yan [1 ]
Zhang, Minqing [1 ]
Zhang, Xinpeng [2 ]
Liu, Jia [1 ]
Su, Tingting [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ PAP, Sch Cryptog Engn, Xian 710086, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200000, Peoples R China
基金
中国国家自然科学基金;
关键词
Reversible data hiding in encrypted domain; secret image sharing; difference expansion; Chinese remainder theorem;
D O I
10.1109/TCSVT.2021.3081575
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or public key encryption are mainly applied in the scenarios of end-to-end communication. To provide security guarantees for the multi-party scenarios, a RDH-ED scheme for secret image sharing based on Chinese remainder theorem (CRT) is presented. In the application of (t, n) secret image sharing, an image is first shared into n different shares of ciphertext. Only when not less than t shares obtained, can the image he reconstructed. In our scheme, additional data could be embedded into the image shares. To realize data extraction from the image shares and the reconstructed image separably, two data hiding methods are proposed: one is homomorphic difference expansion in encrypted domain (HDE-ED) that supports data extraction from the reconstructed image by utilizing the addition homomorphism of CRT secret sharing; the other is difference expansion in image shares (DE-IS) that supports the data extraction from the marked shares before image reconstruction. Experimental results demonstrate that the proposed scheme could not only maintain the security and the threshold function of secret sharing system, but also obtain a better reversibility and efficiency compared with most existing RDH-ED algorithms. The maximum embedding rate of HDE-ED could reach 0.500 bits per pixel and the average embedding rate of DE-IS could reach 0.4652 bits per pixel.
引用
收藏
页码:2469 / 2481
页数:13
相关论文
共 43 条
[1]   Linear Subspace Cryptanalysis of Harn's Secret Sharing-Based Group Authentication Scheme [J].
Ahmadian, Zahra ;
Jamshidpour, Sadegh .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) :502-510
[2]  
AlFardan N., 2013, On the Security of RC4 in TLS and WPA
[3]   Two Round Information-Theoretic MPC with Malicious Security [J].
Ananth, Prabhanjan ;
Choudhuri, Arka Rai ;
Goel, Aarushi ;
Jain, Abhishek .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 :532-561
[4]   Memristors for Secret Sharing-Based Lightweight Authentication [J].
Arafin, Md Tanvir ;
Qu, Gang .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (12) :2671-2683
[5]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[6]   Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing [J].
Bao, Long ;
Yi, Shuang ;
Zhou, Yicong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (12) :5618-5631
[7]   A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms [J].
Chen, Yu-Chi ;
Hung, Tsung-Hsuan ;
Hsieh, Sung-Hsien ;
Shiu, Chih-Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) :3332-3343
[8]   Encrypted signal-based reversible data hiding with public key cryptosystem [J].
Chen, Yu-Chi ;
Shiu, Chih-Wei ;
Horng, Gwoboa .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1164-1170
[9]  
Chien MC, 2012, 2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), P1325, DOI 10.1109/CISP.2012.6469950
[10]   Chinese remaindering with errors [J].
Goldreich, O ;
Ron, D ;
Sudan, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1330-1338