A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

被引:0
|
作者
Jiang, Chao [1 ,2 ]
Zhang, Minqing [1 ,2 ]
Kong, Yongjun [1 ,2 ]
Jiang, Zongbao [1 ,2 ]
Di, Fuqiang [1 ,2 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian 710018, Peoples R China
[2] Key Lab PAP Cryptol & Informat Secur, Xian 710018, Peoples R China
基金
中国国家自然科学基金;
关键词
reversible data hiding; encrypted image; secret sharing; multilevel identities; hierarchical authorization structure; DOMAIN;
D O I
10.3390/math12142262
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users' identity classes. To address this issue, this paper proposes a hierarchical authorization structure embedding scheme based on secret image sharing (SIS) and users' hierarchical identities. In the first embedding, the polynomial coefficient redundancy generated in the encryption process of the SIS is utilized by the image owner. For the second, the participants are categorized into two parts. One is core users with adaptive difference reservation embedding, and the other is ordinary users with pixel bit replacement embedding. At the time of reconstruction, more than one core user must provide pixel differences, which grants more privileges to core users. The experimental results demonstrate that the average embedding rate (ER) of the test images is 4.3333 bits per pixel (bpp) in the (3, 4) threshold scheme. Additionally, the reconstructed image achieves a PSNR of +infinity and an SSIM of 1. Compared to existing high-performance RDH-ED schemes based on secret sharing, the proposed scheme with a larger ER maintains strong security and reversibility. Moreover, it is also suitable for multiple embeddings involving multilevel participant identities. In conclusion, the results underscore the efficacy of our technique in achieving both security and performance objectives within a complex distributed setting.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Reversible data hiding in encrypted images based on secret sharing and hierarchical embedding
    Ren, Yu
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [2] Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing
    Zhang Minqing
    Wang Zexi
    Ke Yan
    Kong Yongjun
    Di Fuqiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4337 - 4347
  • [3] Adopting secret sharing for reversible data hiding in encrypted images
    Wu, Xiaotian
    Weng, Jian
    Yan, WeiQi
    SIGNAL PROCESSING, 2018, 143 : 269 - 281
  • [4] Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images
    Hua, Zhongyun
    Wang, Yanxiang
    Yi, Shuang
    Zheng, Yifeng
    Liu, Xingyu
    Chen, Yongyong
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3669 - 3686
  • [5] Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(28)
    Qin, Chuan
    Jiang, Chanyu
    Mo, Qun
    Yao, Heng
    Chang, Chin-Chen
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (04) : 1928 - 1941
  • [6] A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem
    Ke, Yan
    Zhang, Minqing
    Zhang, Xinpeng
    Liu, Jia
    Su, Tingting
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (04) : 2469 - 2481
  • [7] Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding
    Yu, Chunqiang
    Zhang, Xianquan
    Qin, Chuan
    Tang, Zhenjun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (11) : 6443 - 6458
  • [8] Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing
    Yu, Haoyang
    Zhang, Junwei
    Xiang, Zixiao
    Liu, Biao
    Feng, Huamin
    SENSORS, 2023, 23 (10)
  • [9] A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms
    Chen, Yu-Chi
    Hung, Tsung-Hsuan
    Hsieh, Sung-Hsien
    Shiu, Chih-Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3332 - 3343
  • [10] A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction
    Shi, Hui
    Zhou, Ziyi
    Qin, Jianhao
    Geng, Jianing
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41525 - 41553