A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

被引:0
|
作者
Jiang, Chao [1 ,2 ]
Zhang, Minqing [1 ,2 ]
Kong, Yongjun [1 ,2 ]
Jiang, Zongbao [1 ,2 ]
Di, Fuqiang [1 ,2 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian 710018, Peoples R China
[2] Key Lab PAP Cryptol & Informat Secur, Xian 710018, Peoples R China
基金
中国国家自然科学基金;
关键词
reversible data hiding; encrypted image; secret sharing; multilevel identities; hierarchical authorization structure; DOMAIN;
D O I
10.3390/math12142262
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users' identity classes. To address this issue, this paper proposes a hierarchical authorization structure embedding scheme based on secret image sharing (SIS) and users' hierarchical identities. In the first embedding, the polynomial coefficient redundancy generated in the encryption process of the SIS is utilized by the image owner. For the second, the participants are categorized into two parts. One is core users with adaptive difference reservation embedding, and the other is ordinary users with pixel bit replacement embedding. At the time of reconstruction, more than one core user must provide pixel differences, which grants more privileges to core users. The experimental results demonstrate that the average embedding rate (ER) of the test images is 4.3333 bits per pixel (bpp) in the (3, 4) threshold scheme. Additionally, the reconstructed image achieves a PSNR of +infinity and an SSIM of 1. Compared to existing high-performance RDH-ED schemes based on secret sharing, the proposed scheme with a larger ER maintains strong security and reversibility. Moreover, it is also suitable for multiple embeddings involving multilevel participant identities. In conclusion, the results underscore the efficacy of our technique in achieving both security and performance objectives within a complex distributed setting.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Reversible image reconstruction for reversible data hiding in encrypted images
    Liu, Zi-Long
    Pun, Chi-Man
    SIGNAL PROCESSING, 2019, 161 : 50 - 62
  • [32] Encrypted Image based Reversible Data hiding using Invertible Image Conversion
    Namkha, Stanzin
    Pattanayak, Himansu Sekhar
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 128 - 133
  • [33] High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
    Zhang M.
    Jiang C.
    Di F.
    Jiang Z.
    Zhang X.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (09): : 48 - 57
  • [34] Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing
    Jiang, Zongbao
    Zhang, Minqing
    Dong, Weina
    Jiang, Chao
    Di, Fuqiang
    APPLIED SCIENCES-BASEL, 2024, 14 (14):
  • [35] Reversible data hiding based on histogram and prediction error for sharing secret data
    Islamy, Chaidir Chalaf
    Ahmad, Tohari
    Ijtihadie, Royyana Muslim
    CYBERSECURITY, 2023, 6 (01)
  • [36] Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
    Zhou, Ziyi
    Wang, Chengyue
    Yan, Kexun
    Shi, Hui
    Pang, Xin
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2024, : 1250 - 1265
  • [37] Reversible data hiding based on histogram and prediction error for sharing secret data
    Chaidir Chalaf Islamy
    Tohari Ahmad
    Royyana Muslim Ijtihadie
    Cybersecurity, 6
  • [38] Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation
    Mo, Qun
    Yao, Heng
    Cao, Fang
    Chang, Zheng
    Qin, Chuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (01): : 119 - 133
  • [39] Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion
    Di, Fuqiang
    Zhang, Minqing
    Zhang, Yingnan
    Liu, Jia
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2018, 9 (04) : 76 - 96
  • [40] Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling
    Chen, Fan
    He, Hongjie
    Ma, Tinghuai
    Yan, Shu
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 162 - 174