Lossless Data Hiding Based on Homomorphic Cryptosystem

被引:25
|
作者
Zheng, Shuli [1 ]
Wang, Yuzhao [1 ]
Hu, Donghui [1 ]
机构
[1] Hefei Univ Techonol, Sch Comp Sci & Informat, Hefei 230009, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Distortion; Media; Ciphers; Data mining; Cloud computing; Streaming media; Homomorphic cryptography; reversible data hiding; lossless data hiding; HALF-TONE IMAGES; ENCRYPTION;
D O I
10.1109/TDSC.2019.2913422
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud server, reversible data hiding in encrypted domain has received widespread attention for management of encrypted media. Most of existing reversible data hiding methods are based on stream ciphers, which are mainly concerned with data storage security. While homomorphic ciphers focus on data processing security, which is popular in cloud and other third-party platforms. Reversible data hiding with homomorphic cryptography has been an active topic in the research filed. In this paper, we propose a new lossless data hiding method based on homomorphic cryptosystem. After a content owner generates encrypted media with homomorphic ciphers, a data hider embeds secret data by establishing a mapping between secret bits and losslessly modifying encrypted media. At the receiver side, the embedded data is extracted from encrypted domain with a little auxiliary message. And original media is recovered by directly decrypting marked encrypted media. During the embedding process, the modification of encrypted media does not change the corresponding original media owing to homomorphic and probabilistic properties. Thus, no distortion is introduced in the whole procedures of data embedding. And directly decrypted media containing embedded data is the same as the original media. Meanwhile, the proposed method achieves a high embedding rate through efficient mapping and skillful use of expanded pixel values. The experimental results show that compared with state-of-the-art methods, the proposed method has higher embedding rate without distortion.
引用
收藏
页码:692 / 705
页数:14
相关论文
共 50 条
  • [21] High capacity lossless data hiding based on histogram modification
    Fallahpour, M.
    Sedaaghi, M. H.
    [J]. IEICE ELECTRONICS EXPRESS, 2007, 4 (07): : 205 - 210
  • [22] Lossless Data Hiding Scheme Based on Adjacent Pixel Difference
    Li, Zhuo
    Chen, Xiaoping
    Pan, Xuezeng
    Zeng, Xianting
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 588 - 592
  • [23] Lossless data hiding for VQ indices based on neighboring correlation
    Lee, Jiann-Der
    Chiou, Yaw-Hwang
    Guo, Jing-Ming
    [J]. INFORMATION SCIENCES, 2013, 221 : 419 - 438
  • [24] Lossless Data Hiding with Genetic-Based Hybrid Prediction
    Huang, Hsiang-Cheh
    Wang, Ting-Hsuan
    Chang, Feng-Cheng
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2013, : 5 - 8
  • [25] Robust lossless data hiding scheme
    Zeng, Xian-ting
    Pan, Xue-zeng
    Ping, Ling-di
    Li, Zhuo
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (02): : 101 - 110
  • [26] Lossless data hiding based on difference expansion and difference shifting
    Institute of Computer Graphics and Image Processing, Department of Mathematics, Zhejiang University, Hangzhou 310027, China
    不详
    [J]. Jilin Daxue Xuebao (Gongxueban), 4 (1071-1074):
  • [27] Lossless data hiding for VQ indices based on neighboring correlation
    Lee, Jiann-Der
    Chiou, Yaw-Hwang
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE 2010), 2010, : 1668 - 1673
  • [28] Lossless data hiding in JPEG bitstream
    Qian, Zhenxing
    Zhang, Xinpeng
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 309 - 313
  • [29] Robust lossless data hiding scheme
    Xian-ting ZENG1
    [J]. Frontiers of Information Technology & Electronic Engineering, 2010, (02) : 101 - 110
  • [30] A Lossless Data Hiding Scheme Based on VQ Index Frequency
    Bai, Junlan
    Chang, Chin-Chen
    Zhu, Ce
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (06): : 1297 - 1310