Journal on Communications ›› 2023, Vol. 44 ›› Issue (9): 48-57.doi: 10.11959/j.issn.1000-436x.2023170
• Papers • Previous Articles
Minqing ZHANG1,2, Chao JIANG1,2, Fuqiang DI1,2, Zongbao JIANG1,2, Xiong ZHANG1,2
Revised:
2023-08-14
Online:
2023-09-01
Published:
2023-09-01
Supported by:
CLC Number:
Minqing ZHANG, Chao JIANG, Fuqiang DI, Zongbao JIANG, Xiong ZHANG. High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing[J]. Journal on Communications, 2023, 44(9): 48-57.
"
算法 | k=3 | k=4 | k=5 | k=6 | |||||||||||
n=3 | n=4 | n=5 | n=4 | n=5 | n=6 | n=5 | n=6 | n=7 | n=6 | n=7 | n=8 | ||||
文献[ | 5.30 | 4.00 | 3.20 | 6.00 | 4.80 | 4.00 | 6.40 | 5.33 | 4.57 | 6.67 | 5.71 | 5.00 | |||
文献[ | — | 4.18 | 3.78 | — | 5.38 | 4.85 | — | 6.18 | 5.61 | — | 6.56 | — | |||
本文算法(m=2) | 4.00 | 3.00 | 2.40 | 4.00 | 3.20 | 2.67 | 4.00 | 3.33 | 2.86 | 4.00 | 3.43 | 3.00 | |||
本文算法(m=1) | 8.00 | 6.00 | 4.80 | 8.00 | 6.40 | 5.33 | 8.00 | 6.67 | 5.71 | 8.00 | 6.86 | 6.00 |
[1] | SHI Y Q , LI X L , ZHANG X P ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4: 3210-3237. |
[2] | PUECH W , CHAUMONT M , STRAUSS O . A reversible data hiding method for encrypted images[C]// Proceedings of the International Society for Optical Engineering. Bellingham:SPIE Press,2008, 6819: 534-542. |
[3] | ZHOU J T , SUN W W , DONG L ,et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016,26(3): 441-452. |
[4] | ZHANG X P . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011,18(4): 255-258. |
[5] | ZHANG X P . Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 826-832. |
[6] | CHEN Y C , SHIU C W , HORNG G . Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication & Image Representation, 2014,25(5): 1164-1170. |
[7] | ZHANG X P , LONG J , WANG Z C ,et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016,26(9): 1622-1631. |
[8] | 王继军, 孙泽锐, 李国祥 . 图像抛物线插值空间大容量可逆信息隐藏算法[J]. 电子学报, 2019,47(1): 8. |
WANG J J , SUN Z R , LI G X . High capacity reversible data hiding algorithm based on parabolic interpolation space[J]. Acta Electronica Sinica, 2019,47(1): 8. | |
[9] | YU C Q , ZHANG X Q , ZHANG X P ,et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021,32(2): 451-466. |
[10] | YANG Y L , HE H J , CHEN F ,et al. Reversible data hiding in encrypted images based on time-varying Huffman coding table[J]. IEEE Transactions on Multimedia, 2023,PP(99): 1-12. |
[11] | MA K D , ZHANG W M , ZHAO X F ,et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(3): 553-562. |
[12] | PUTEAUX P , PUECH W . An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018,13(7): 1670-1681. |
[13] | XIANG S J , LUO X R . Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018,28(11): 3099-3110. |
[14] | 李天雪, 张敏情, 狄富强 ,等. 基于位平面分割的密文域可逆信息隐藏算法[J]. 计算机应用研究, 2018,35(9): 6. |
LI T X , ZHANG M Q , DI F Q ,et al. Cryptographic domain reversible data hiding algorithm based on bit plane segmentation[J]. Application Research of Computers, 2018,35(9): 6. | |
[15] | PUTEAUX P , PUECH W . A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021,23: 636-650. |
[16] | 吴友情, 郭玉堂, 汤进 ,等. 基于自适应哈夫曼编码的密文可逆信息隐藏算法[J]. 计算机学报, 2021,44(4): 846-858. |
WU Y Q , GUO Y T , TANG J ,et al. Reversible data hiding in encrypted images using adaptive Huffman encoding strategy[J]. Chinese Journal of Computers, 2021,44(4): 846-858. | |
[17] | WANG Y M , CAI Z C , HE W G . High capacity reversible data hiding in encrypted image based on intra-block lossless compression[J]. IEEE Transactions on Multimedia, 2021,23: 1466-1473. |
[18] | 吴友情, 马文静, 殷赵霞 ,等. 基于预测误差位平面压缩的密文图像可逆信息隐藏[J]. 通信学报, 2022,43(8): 12. |
WU Y Q , MA W J , YIN Z X ,et al. Reversible data hiding in encrypted image based on bit-plane compression of prediction error[J]. Journal of Communications, 2022,43(8): 12. | |
[19] | 马文静, 吴友情, 殷赵霞 . 自适应编码的高容量密文可逆信息隐藏算法[J]. 软件学报, 2022,33(12): 4746-4757. |
MA W J , WU Y Q , YIN Z X . High-capacity reversible data hiding in encrypted images using adaptive encoding[J]. Journal of Software, 2022,33(12): 4746-4757. | |
[20] | ZOU H , CHEN G . Reversible data hiding in encrypted image with local-correlation-based classification and adaptive encoding strategy[J]. Signal Processing, 2023,205:1108847. |
[21] | 张敏情, 柯彦, 苏婷婷 . 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016,38(2): 7. |
ZHANG M Q , KE Y , SU T T . Reversible steganography in encrypted domain based on LWE[J]. Journal of Electronics & Information Technology, 2016,38(2): 7. | |
[22] | 柯彦, 张敏情, 苏婷婷 . 基于 R-LWE 的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016,53(10): 2307-2322. |
KE Y , ZHANG M Q , SU T T . A novel multiple bits reversible data hiding in encrypted domain based on R-LWE[J]. Journal of Computer Research and Development, 2016,53(10): 2307-2322. | |
[23] | HUANG D , WANG J . High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing Image Communication, 2019,80:115632. |
[24] | KE Y , ZHANG M Q , LIU J ,et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8): 2353-2365. |
[25] | SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613. |
[26] | WU X T , WENG J , YAN W Q . Adopting secret sharing for reversible data hiding in encrypted images[J]. Signal Processing, 2018,143: 269-281. |
[27] | 周能, 张敏情, 林文兵 . 基于秘密共享的可分离密文域可逆信息隐藏算法[J]. 计算机工程, 2020,46(10): 112-119. |
ZHOU N , ZHANG M Q , LIN W B . Separable reversible information hiding algorithm in encrypted domain based on secret sharing[J]. Computer Engineering, 2020,46(10): 112-119. | |
[28] | 周能, 张敏情, 刘蒙蒙 . 基于秘密共享的同态加密图像可逆信息隐藏算法[J]. 科学技术与工程, 2020,20(19): 7. |
ZHOU N , ZHANG M Q , LIU M M . Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing[J]. Science Technology and Engineering, 2020,20(19): 7. | |
[29] | KE Y , ZHANG M Q , ZHANG X P ,et al. A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(4): 2469-2481. |
[30] | QIN C , GAO S Y , JIANG C Y ,et al. Reversible data hiding in encrypted images based on Chinese remainder theorem and secret sharing mechanism[C]// Proceedings of the 2021 3rd International Conference on Big-data Service and Intelligent Computation. New York:ACM Press, 2021: 23-32. |
[31] | 王泽曦, 张敏情, 柯彦 ,等. 基于图像秘密共享的密文域可逆信息隐藏算法[J]. 计算机应用, 2022,42(5): 1480-1489. |
WANG Z X , ZHANG M Q , KE Y ,et al. Reversible data hiding algorithm in encrypted domain based on secret image sharing[J]. Journal of Computer Applications, 2022,42(5): 1480-1489. | |
[32] | QIN C , CHANYU J , MO Q ,et al. Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(2?)[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(4): 1928-1941. |
[33] | HUA Z Y , WANG Y X , YI S ,et al. Reversible data hiding in encrypted images using cipher-feedback secret sharing[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(8): 4968-4982. |
[34] | HUA Z Y , WANG Y X , YI S ,et al. Matrix-based secret sharing for reversible data hiding in encrypted images[J]. IEEE Transactions on Dependable and Secure Computing, 2023,20(5): 3669-3686. |
[35] | 张敏情, 王泽曦, 柯彦 ,等. 基于多项式秘密共享的图像密文域可逆信息隐藏[J]. 电子与信息学报, 2022,44(12): 4337-4347. |
ZHANG M Q , WANG Z X , KE Y ,et al. Reversible data hiding in encrypted images based on polynomial secret sharing[J]. Journal of Electronics & Information Technology, 2022,44(12): 4337-4347. | |
[36] | QIU Y Q , YING Q C , YANG Y Y ,et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(9): 5874-5887. |
[1] | Youqing WU, Wenjing MA, Zhaoxia YIN, Yinyin PENG, Xinpeng ZHANG. Reversible data hiding in encrypted image based on bit-plane compression of prediction error [J]. Journal on Communications, 2022, 43(8): 219-230. |
[2] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[3] | Hai LIU, Youliang TIAN, Ying TANG, Jianbing Ni, Jianfeng MA. Design models of secret reconstruction towards rational users [J]. Journal on Communications, 2021, 42(11): 54-65. |
[4] | Jinbo XIONG,Renwan BI,Qianxin CHEN,Ximeng LIU. Towards edge-collaborative,lightweight and secure region proposal network [J]. Journal on Communications, 2020, 41(10): 188-201. |
[5] | Yuan XU,Chao YANG,Li YANG. Single password authentication method for remote user based on mobile terminal assistance [J]. Journal on Communications, 2019, 40(2): 174-187. |
[6] | Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU. Image privacy preservation scheme based on QR code and reversible visible watermarking [J]. Journal on Communications, 2019, 40(11): 65-75. |
[7] | Yanshuo ZHANG,Wenjing LI,Lei CHEN,Wei BI,Tao YANG. Verifiable special threshold secret sharing scheme based on eigenvalue [J]. Journal on Communications, 2018, 39(8): 169-175. |
[8] | Wenxian JIANG,Zhenxing ZHANG,Jingjing WU. Reversible digital watermarking-based protocol for data integrity in wireless sensor network [J]. Journal on Communications, 2018, 39(3): 118-127. |
[9] | Xin LIU,Qiuliang XU,Bin ZHANG,Bo ZHANG. k-times attribute-based authentication scheme using direct anonymous attestation [J]. Journal on Communications, 2018, 39(12): 113-133. |
[10] | En ZHANG,Yaoyao PEI,Jiao DU. RLWE-based ciphertext-policy attribute proxy re-encryption [J]. Journal on Communications, 2018, 39(11): 129-137. |
[11] | Fang QI,Yanmei LI,Zhe TANG. Revocable and traceable key-policy attribute-based encryption scheme [J]. Journal on Communications, 2018, 39(11): 63-69. |
[12] | Jianwu LIANG,Xiaoshu LIU,Zi CHENG. Quantum secret sharing with graph states based on Chinese remainder theorem [J]. Journal on Communications, 2018, 39(10): 72-78. |
[13] | En ZHANG,Kui GENG,Wei JIN,Yong-jun LI,Yun-qing SUN,Feng-hua LI. Cloud outsourcing secret sharing scheme against covert adversaries [J]. Journal on Communications, 2017, 38(5): 57-65. |
[14] | Quan-hua ZHAO,Xue SHI,Yu WANG,Yu LI. Remote sensing image segmentation based on spatially constrained Gaussian mixture model with unknown class number [J]. Journal on Communications, 2017, 38(2): 34-43. |
[15] | Jian-gao LUO,Guo-qiang HAN,Yan WO. Novel reversible data hiding based on difference expansion [J]. Journal on Communications, 2016, 37(2): 54-63. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|