A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms

被引:64
作者
Chen, Yu-Chi [1 ]
Hung, Tsung-Hsuan [2 ]
Hsieh, Sung-Hsien [3 ]
Shiu, Chih-Wei [4 ]
机构
[1] Yuan Ze Univ, Dept Comp Sci & Engn, Taoyuan 320, Taiwan
[2] Natl Chung Shan Inst Sci & Technol, Informat Management Ctr, Taoyuan 325, Taiwan
[3] Acad Sinica, Inst Informat Sci, Taipei 115, Taiwan
[4] Natl Taitung Univ, Dept Educ Ind & Digital Media, Taitung 950, Taiwan
关键词
Reversible data hiding; image privacy; encryption; multi-secret sharing; security;
D O I
10.1109/TIFS.2019.2914557
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Reversible data hiding in encrypted images (RDHEI) has been introduced for preserving image privacy and data embedding. RDHEI usually imolves three parties, namely, the image provider, data hider, and receiver. On the security with key setting, there are three categories: share independent secret keys (SIK), shared one key (SOK), and share no secret keys (SNK). In SIK, the image provider and data hider must respectively and independently share secret keys with the receiver, whereas in SNK, no secret key is shared. However, the literature works proposed SNK-type schemes by using homomorphic encryption (with exorbitant computation cost). In this paper, we address the SOK setting, where only the image provider shares a secret key with the receiver, and the data hider can embed a secret message without any knowledge of this key. To realize our SOK scheme in a simple manner, we propose a new technique by using multi-secret sharing as the underlying encryption, which indeed induces a blow-up issue of the key size. For preserving the efficiency of the key size, we apply a compression by using lightweight cryptographic algorithms. Then, we demonstrate our SOK scheme based on the proposed techniques, and show effectiveness, efficiency, and security by experiments and analysis.
引用
收藏
页码:3332 / 3343
页数:12
相关论文
共 33 条
  • [1] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170
  • [2] Franklin M., 1992, Proceedings of the Twenty-Fourth Annual ACM Symposium on the Theory of Computing, P699, DOI 10.1145/129712.129780
  • [3] Invertible authentication watermark for JPEG images
    Fridrich, J
    Goljan, M
    Du, R
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2001, : 223 - 227
  • [4] An Improved Reversible Data Hiding in Encrypted Images Using Side Match
    Hong, Wien
    Chen, Tung-Shou
    Wu, Han-Yan
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) : 199 - 202
  • [5] Adaptive reversible data hiding method based on error energy control and histogram shifting
    Hong, Wien
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (02) : 101 - 108
  • [6] A local variance-controlled reversible data hiding method using prediction and histogram-shifting
    Hong, Wien
    Chen, Tung-Shou
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (12) : 2653 - 2663
  • [7] New Framework for Reversible Data Hiding in Encrypted Domain
    Huang, Fangjun
    Huang, Jiwu
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2777 - 2789
  • [8] A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System
    Jung, Seung-Won
    Le Thanh Ha
    Ko, Sung-Jea
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 95 - 98
  • [9] Universal data embedding in encrypted domain
    Karim, Mustafa S. Abdul
    Wong, KokSheik
    [J]. SIGNAL PROCESSING, 2014, 94 : 174 - 182
  • [10] On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
    Khelifi, Fouad
    [J]. SIGNAL PROCESSING, 2018, 143 : 336 - 345