期刊文献+

可分离的密文域可逆信息隐藏 被引量:8

Separable reversible steganography in encrypted domain
在线阅读 下载PDF
导出
摘要 针对当前密文域可逆信息隐藏技术可分离性差、载体恢复存在较大失真的问题,提出了一种可分离的密文域可逆信息隐藏方案,通过对LWE(learning with errors)公钥密码算法加密后数据的再编码,实现在密文的可控冗余中嵌入隐藏信息;嵌入信息后,使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据,提取过程与解密过程可分离。理论推导论证了本方案信息提取过程与嵌入后明文解密过程的可分离性与结果的正确性,仿真实验结果表明与现有算法相比,方案在实现可分离的密文域可逆信息隐藏的基础上充分保证了密文域隐写后的可逆性,并且方案的实现与原始载体种类无关,适用性较强。 This paper proposed a novel scheme of separable reversible steganography in encrypted domain. Additional data can be embedded by recoding in the redundancy of cipher text. With embedded cipher text, the additional data can be extracted by using data-hiding key, and the original data can be recovered lossless by using encryption key, and the processes of extraction and decryption are separable. By deducing the error probability of the scheme, this paper mainly discussed parameters in the scheme which directly related to the scheme' s correctness, and obtained reasonable values of the parameters by experiments. The proposed scheme was based on encrypted domain, so it could apply to different kinds of media vehicle. Experimental results demonstrate that the proposed scheme can better guarantee the reversibility losslessly than the previous separable methods.
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3476-3479,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61379152 61272492)
关键词 信息安全 可逆信息隐藏 密文域 LWE information security reversible steganography encrypted domain LWE
  • 相关文献

参考文献20

  • 1Zhang Xinpeng. Reversible data hiding in encrypted image [ J ]. I EEE Signal Processing Letters ,2011,18 (4) :255- 258.
  • 2Barni M, Kalker T, Katzenbeisser S. Inspiring new research in the field of signal processing in the encrypted domain[ J]. IEEE Signal Pro- cessing Magazine ,2013,30 (2) : 16.
  • 3Tian J. Reversible data embedding using a difference expansion [ J ]. IEEE Trans on Circuits Systems Video Technology,2003,13 (8) :890-896.
  • 4Dragoi L, Coltuc D. Local-prediction-based difference expansion re- versible watermarking [ J ]. IEEE Trans on Image Processing, 2014,23 (4) : 1779-1790.
  • 5Caciula I, Coltuc D. Improved control for low bit-rate reversible water- marking[ C]//Proc of IEEE International Conference on Acoustics Speech and Signal Processing. 2014:7425-7429.
  • 6Zhang Weiming, Hu Xiaocheng, Li Xiaolong, et al. Recursive histo- gram modification: establishing equivalency between reversible data hiding and lossless data compression [ J]. IEEE Trans on Image Processing,2013,22 (7) :2775-2785.
  • 7Jarali A,Rao J. Unique LSB compression data hiding method[ J]. In- ternational Journal of Emerging Science and Engineering,2013, 2(3) :17-21.
  • 8Lian Shiguo, Liu Zhongxuan, Ren Zhen, et al. Commutative encryption and watermarking in video compression[ J]. IEEE Trans on Circuits and Systems for Video Technology,2007,17 (6) :774-778.
  • 9Cancellaro M, Battisti F, Carli M, et al. A commutative digital image watermarking and encryption method in the tree structured Haartrans- form domain [ J ]. Signal Processing: Image Communication, 2011,26(1 ) :1-12.
  • 10Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property [J]. IEEE Trans on Image Pro- cessing,2005,14(12) :2129-2139.

同被引文献62

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部