Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain

被引:8
作者
Li, Jingxuan [1 ]
Liang, Xingyuan [1 ]
Dai, Ceyu [1 ]
Xiang, Shijun [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Guangdong, Peoples R China
关键词
reversible data hiding; DGHV; public key cryptosystem; information entropy; cloud computing; IMAGES; DIFFERENCE; EXPANSION;
D O I
10.3390/e21070625
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper proposes a reversible data hiding scheme by exploiting the DGHV fully homomorphic encryption, and analyzes the feasibility of the scheme for data hiding from the perspective of information entropy. In the proposed algorithm, additional data can be embedded directly into a DGHV fully homomorphic encrypted image without any preprocessing. On the sending side, by using two encrypted pixels as a group, a data hider can get the difference of two pixels in a group. Additional data can be embedded into the encrypted image by shifting the histogram of the differences with the fully homomorphic property. On the receiver side, a legal user can extract the additional data by getting the difference histogram, and the original image can be restored by using modular arithmetic. Besides, the additional data can be extracted after decryption while the original image can be restored. Compared with the previous two typical algorithms, the proposed scheme can effectively avoid preprocessing operations before encryption and can successfully embed and extract additional data in the encrypted domain. The extensive testing results on the standard images have certified the effectiveness of the proposed scheme.
引用
收藏
页数:14
相关论文
共 30 条
[1]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[2]  
[Anonymous], 1978, FDN SEC COMPUT
[3]   Reversible data hiding in encrypted images with private-key homomorphism and public-key homomorphism [J].
Chen, Bing ;
Wu, Xiaotian ;
Wei, Yun-Shan .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 57 :272-282
[4]   Block-based reversible data hiding with multi-round estimation and difference alteration [J].
Chen, Yueh-Hong ;
Huang, Hsiang-Cheh ;
Lin, Chuan-Chang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13679-13704
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   Lossless data embedding for all image formats [J].
Fridrich, J ;
Goljan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :572-583
[7]   Reversible data hiding for high quality images using modification of prediction errors [J].
Hong, Wien ;
Chen, Tung-Shou ;
Shiu, Chih-Wei .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (11) :1833-1842
[8]  
Hu Y, 2010, IEEE T MULTIMEDIA, V10, P1500, DOI DOI 10.1109/TMM.2008.2007341
[9]   Reversible data hiding based on prediction error expansion using adjacent pixels [J].
Kumar, Manoj ;
Agrawal, Smita .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3703-3712
[10]   When an attacker meets a cipher-image in 2018: A year in review [J].
Li, Chengqing ;
Zhang, Yun ;
Xie, Eric Yong .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48