A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing

被引:0
|
作者
Jiang, Chao [1 ,2 ]
Zhang, Minqing [1 ,2 ]
Kong, Yongjun [1 ,2 ]
Jiang, Zongbao [1 ,2 ]
Di, Fuqiang [1 ,2 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian 710018, Peoples R China
[2] Key Lab PAP Cryptol & Informat Secur, Xian 710018, Peoples R China
基金
中国国家自然科学基金;
关键词
reversible data hiding; encrypted image; secret sharing; multilevel identities; hierarchical authorization structure; DOMAIN;
D O I
10.3390/math12142262
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users' identity classes. To address this issue, this paper proposes a hierarchical authorization structure embedding scheme based on secret image sharing (SIS) and users' hierarchical identities. In the first embedding, the polynomial coefficient redundancy generated in the encryption process of the SIS is utilized by the image owner. For the second, the participants are categorized into two parts. One is core users with adaptive difference reservation embedding, and the other is ordinary users with pixel bit replacement embedding. At the time of reconstruction, more than one core user must provide pixel differences, which grants more privileges to core users. The experimental results demonstrate that the average embedding rate (ER) of the test images is 4.3333 bits per pixel (bpp) in the (3, 4) threshold scheme. Additionally, the reconstructed image achieves a PSNR of +infinity and an SSIM of 1. Compared to existing high-performance RDH-ED schemes based on secret sharing, the proposed scheme with a larger ER maintains strong security and reversibility. Moreover, it is also suitable for multiple embeddings involving multilevel participant identities. In conclusion, the results underscore the efficacy of our technique in achieving both security and performance objectives within a complex distributed setting.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion
    Di, Fuqiang
    Zhang, Minqing
    Zhang, Yingnan
    Liu, Jia
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2018, 9 (04) : 76 - 96
  • [42] Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling
    Chen, Fan
    He, Hongjie
    Ma, Tinghuai
    Yan, Shu
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 162 - 174
  • [43] Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation
    Zhong, Siyao
    Lu, Yu
    Xiong, Xiangguang
    IEEE ACCESS, 2023, 11 : 108281 - 108294
  • [44] REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE BASED ON BLOCK HISTOGRAM SHIFTING
    Yin, Zhaoxia
    Abel, Andrew
    Zhang, Xinpeng
    Luo, Bin
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 2129 - 2133
  • [45] Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing
    Hua, Zhongyun
    Liu, Xingyu
    Zheng, Yifeng
    Yi, Shuang
    Zhang, Yushu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (03) : 1799 - 1814
  • [46] HIGH CAPACITY DATA HIDING IN REVERSIBLE SECRET SHARING
    Zhao, Zhenfei
    Chau, Ka-Yin
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6411 - 6421
  • [47] Reversible data hiding with differential compression in encrypted image
    Tang, Zhenjun
    Xu, Shijie
    Yao, Heng
    Qin, Chuan
    Zhang, Xianquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 9691 - 9715
  • [48] Reversible Data Hiding in Highly Secured Encrypted Image
    Devi, T. Arumuga Maria
    Sabitha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 59 - 62
  • [49] Reversible data hiding with differential compression in encrypted image
    Zhenjun Tang
    Shijie Xu
    Heng Yao
    Chuan Qin
    Xianquan Zhang
    Multimedia Tools and Applications, 2019, 78 : 9691 - 9715
  • [50] Separable reversible data hiding in encrypted halftone image
    Kim, Cheonshik
    Shin, Dongkyoo
    Leng, Lu
    Yang, Ching-Nung
    DISPLAYS, 2018, 55 : 71 - 79