期刊文献+

安全的密文域图像隐写术 被引量:18

A Secure Image Steganographic Method in Encrypted Domain
在线阅读 下载PDF
导出
摘要 基于同态加密和双层隐写编码,该文提出一种安全的密文域图像隐写术,其可以达到传统明文隐写术的容量,并且在密文域和明文域均能有效抵抗隐写检测分析。首先结合自适应隐写术和湿纸编码技术,提出一种明文域双层隐写算法;其次,修正一种全同态加密算法,对载密图像进行加密;最后,在密文域上提取嵌入的信息。理论分析和实验结果表明:在加密/隐写密钥同时泄露、加密密钥泄露和密钥未泄露条件下,算法均具有较高的安全性。 A new secure image steganographic algorithm for encrypted domain steganography is proposed based on fully homomorphic encryption and double-layer embedding. The proposed method can reach the capacity of classical steganography while resist to statistical steganalysis both in plaintext domain and encrypted domain. At first, a novel double-layered embedding algorithm based on adaptive steganography and Wet Paper Codes(WPCs) is constructed for plaintext embedding. Then an fully homomorphic encryption algorithm is modified to encrypt the stego image. Finally, the embedding message is extracted in encrypted domain. The performance analysis and experimental results show that the steganographic security of the proposed method preserves well performance under several attacking conditions, including both steganographic/encrypted keys leakage, encrypted keys leakage and no keys leakage.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第7期1721-1726,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803155 61170234 60970141 60902102) 郑州市科技创新团队项目(10CXTD150)资助课题
关键词 隐写术 自适应编码 湿纸编码 同态加密 Steganography Adaptive coding Wet Paper Coding (WPC) Homomorphic encryption
  • 相关文献

参考文献19

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1086
  • 2Gentry C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 2009 ACM Symposium on Theory of Computing, STOC'09, NY, USA, 2009: 169-178.
  • 3Dijk M V, Gentry C, Halevi S, et al.. Fully homomorphic encryption using ideal lattices[C]. Proceedings of in Advances in Cryptology - EUROCRYPT, Riviera, French, 2010, LNCS 6110: 24-43.
  • 4Cancellaro M, Battisti F, Carli M, et al.. A commutative digital image watermarking and encryption method in the tree structured haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 5Kundur D and Karthik K. Video fingerprinting and encryption principles for digital rights management[J]. 1EEE Multimedia, 2004, 92(6): 918-932.
  • 6Memon N and Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4): 643-649.
  • 7Zhang X. Reversible data hiding in encrypted image[J]. IEEESignal Processing Letters, 2011, 18(4): 255-258.
  • 8Sun Y and Zhang Xing. A kind of covert channel analysis method based on trusted pipeline[C]. 2011 International Conference on Electrical and Control Engineering (ICECE), Yichang, China, 2011: 5660-5663.
  • 9Zhang X, Zhang W, and Wang S. Efficient double-layered steganographic embedding[J]. IET Electronics Letters, 2007, 43(8): 482-483.
  • 10Filler T, Judas J, and Pridrich J. Minimizing embedding impact in steganography using trellis-coded quantization[C]. Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, USA, 2009, (5): 1-14.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1085

同被引文献135

  • 1王伟,邓辉文.基于MFCC参数和VQ的说话人识别系统[J].仪器仪表学报,2006,27(z3):2253-2255. 被引量:30
  • 2林永和.基于IP技术的端对端通信网络安全模型分析设计[J].微计算机信息,2005,21(10X):1-2. 被引量:16
  • 3黄晓生.数字图像安全技术研究进展[J].华东交通大学学报,2006,23(1):82-86. 被引量:5
  • 4刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法[J].计算机工程,2006,32(17):230-232. 被引量:10
  • 5沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:365
  • 6Lee H G, Beng Jin Teoh A, Jung H G,et al.A secure biometric discretization scheme for face template protection[J].Future Generation Computer Systems, 2012,28(1) : 218-231.
  • 7Isobe -,Ohki T,Komatsu N.Security performance evalu- ation for biometric template protection techniques[J]. International Journal of Biometrics, 2013,5 ( 1 ) : 53-72.
  • 8Argones R E, Maiorana E, Alba Castro J L, et al.Biometric template protection using universal background models: an application to online signature[J].IEEE Transactions on Information Forensics and Security,2012,7(1) :269-282.
  • 9Zhu H H,He Q H,Tang H,et al.Voiceprint-biometric tem- plate design and authentication based on cloud computing security[C]//Proceedings of the International Conference on Cloud and Service Computing, Hong Kong, China, 2011 : 302-308.
  • 10Nagar A,Nandakumar K, Jain A K.A hybrid biometric cryptosystem for securing fingerprint minutiae templates[J]. Pattern Recognition Letters, 2010,31 (8) : 733-741.

引证文献18

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部