您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2020, Vol. 55 ›› Issue (3): 1-8,18.doi: 10.6040/j.issn.1671-9352.2.2019.021

•   •    下一篇

基于Paillier的同态加密域可逆信息隐藏

张敏情(),周能*(),刘蒙蒙,王涵,柯彦   

  1. 武警工程大学密码工程学院, 网络与信息安全武警部队重点实验室, 陕西 西安 710086
  • 收稿日期:2019-09-05 出版日期:2020-03-20 发布日期:2020-03-27
  • 通讯作者: 周能 E-mail:api_zmq@126.com;zn_2019@163.com
  • 作者简介:张敏情(1967—),女,教授,博士,研究方向为信息安全和信息隐藏. E-mail:api_zmq@126.com
  • 基金资助:
    国家自然科学基金资助项目;(61379152);国家自然科学基金资助项目;(61872384)

Reversible data hiding in homomorphic encrypted domain based on Paillier

Min-qing ZHANG(),Neng ZHOU*(),Meng-meng LIU,Han WANG,Yan KE   

  1. Key Laboratory of Network and Information Security under Chinese People Armed Police Force (PAP), College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, Shaanxi, China
  • Received:2019-09-05 Online:2020-03-20 Published:2020-03-27
  • Contact: Neng ZHOU E-mail:api_zmq@126.com;zn_2019@163.com

摘要:

利用Paillier密码体制的同态和概率特性,提出了一种基于Paillier的同态加密域可逆信息隐藏。首先对原始图像分块,图像所有者随机选择的像素组中有一个参考像素和8个目标像素,将参考像素的最低有效位和目标像素的所有比特通过可逆信息隐藏的方法自嵌入到图像的其他部分中,参考像素的最低有效位在加密前置0避免嵌入数据时溢出,加密的参考像素替代像素组中围绕它的目标像素,从而构造出镜像中心密文。在一组镜像中心密文中,数据嵌入者通过同态加法在目标像素的最低有效位嵌入额外信息,而参考像素保持不变。接收者可直接在目标像素和对应的参考像素之间进行模乘法逆元提取额外信息,或者在直接解密后通过明文减法提取额外信息并能无损还原原始图像。实验结果表明:在保证直接解密图像质量的前提下算法平均嵌入率为0.18 bpp (bit per pixel)。

关键词: 可逆信息隐藏, 同态加密域, Paillier, 镜像中心密文

Abstract:

Based on the homomorphism and probability characteristics of Paillier cryptosystem, a reversible data hiding in homomorphic encrypted domain based on Paillier is proposed. First, the original image is divided into blocks. The pixel groups randomly selected by the image owner have one reference pixel and eight target pixels. Least significant bits (LSBs) of reference pixel and all bits of target pixel are self-embedded into other parts of the image by a method of RDH. In order to avoid overflow when embedding data, LSBs of the reference pixel are reset to zero before encryption. The encrypted reference pixel replaces the target pixels surrounding it, thereby constructing mirror central ciphertext. In a set of mirroring central ciphertext, the data hider embeds data in the LSBs of the target pixels by homomorphic addition, while the reference pixel remains unchanged. The receiver can directly extract the extra information by modular multiplication inverse between the target pixels and the corresponding reference pixel or directly extract the secret information by plaintext subtraction and can restore the original image without loss. The experimental results show that the average embedding rate of the algorithm is 0.18 bpp (bit per pixel) under the premise of ensuring the quality of the directly decrypted image.

Key words: reversible data hiding, homomorphic encrypted domain, Paillier, mirroring central ciphertext

中图分类号: 

  • TP391

图1

所提算法总体框架"

图2

图像分块和自可逆嵌入"

图3

以n=3为例说明算法流程"

图4

本文算法所用的测试图像"

表1

不同n下的嵌入容量和峰值信噪比"

图像 嵌入容量/bit 峰值信噪比/dB
n=1 n=2 n=3 n=4
5 460 45.77 46.49 48.54 47.31
10 920 40.67 41.37 46.41 42.10
16 380 37.62 38.26 45.01 39.07
21 840 35.51 36.09 42.56 36.99
Lena 32 760 32.55 33.19 40.16 34.26
43 680 30.60 31.30 34.75 32.57
65 520 28.14 29.04 33.36 30.73
76 440 27.35 28.37 33.00 30.23
5 460 46.47 47.70 52.48 49.77
10 920 43.13 44.35 49.41 46.49
16 380 40.97 42.27 47.44 44.41
21 840 39.32 40.73 46.12 42.82
F-16 32 760 37.03 38.52 41.23 40.81
43 680 35.52 37.14 39.88 38.50
65 520 33.41 34.99 38.92 37.30
76 440 32.57 34.16 37.12 36.57

表2

当n=3时的嵌入容量和峰值信噪比"

嵌入容量/bit 峰值信噪比/dB
Lena F-16 Baboon Hill Lake Man
5 460 48.54 52.48 40.69 52.87 44.67 48.01
10 920 46.41 49.41 38.83 49.38 42.65 45.13
16 380 45.01 47.44 37.14 47.13 39.17 44.36
21 840 42.56 46.12 35.69 45.04 37.48 41.62
32 760 40.16 41.23 33.09 44.78 35.02 39.81
43 680 34.75 39.88 32.14 42.33 32.75 35.75
65 520 33.36 38.92 31.75 41.16 31.49 34.89
76 440 33.00 37.12 28.61 40.94 30.61 32.13

表3

同态加密域可逆信息隐藏算法性能对比"

算法 特征
生成和利用冗余 额外数据扩展 可分离 信息嵌入次数 信息嵌入过程计算复杂度 加密域中信息保护机制
文献[4] VRBE 1 O(k) Paillier同态和概率机制
文献[6] VRBE 1 O(k) Paillier同态和概率机制
文献[1] VRIE 1 O(k) R-LWE同态机制
文献[12] VRAE 2 O(k3) WPC编码机制
文献[8] VRBE 1 O(k) Paillier同态和概率机制
文献[7] VRBE 1 O(k) Paillier同态和概率机制
本文算法 VRBE 1 O(k) Paillier同态和概率机制

图5

图像Lena的PSNR性能对比图"

图6

图像F-16的PSNR性能对比图"

1 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444
KE Yan , ZHANG Minqing , SU Tingting . A novel multiple bits reversible data hiding in encrypted domain based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444
2 BARTON J M. Method and apparatus for embedding authentication information within digital data[P]. U.S. Patent 5646997.1997-07-08.
3 ZHANG Xinpeng . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18 (4): 255- 258.
doi: 10.1109/LSP.2011.2114651
4 CHEN Yuchi , SHIU Chihwei , HORNG Gwoboa . Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25 (5): 1164- 1170.
doi: 10.1016/j.jvcir.2014.04.003
5 PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1999: 223-238.
6 SHIU Chihwei , CHEN Yuchi , HONG Wien . Encrypted image-based reversible data hiding with public key cryptography from difference expansion[J]. Signal Processing: Image Communication, 2015, 39 (4): 226- 233.
7 张敏情, 李天雪, 狄富强, 等. 基于Paillier同态公钥加密系统的可逆信息隐藏算法[J]. 郑州大学学报(理学版), 2018, 50 (1): 8- 14.
ZHANG Minqing , LI Tianxue , DI Fuqiang , et al. Reversible data hiding algorithm based on Paillier homomorphic public key encryption system[J]. Journal of Zhengzhou University (Natural Science Edition), 2018, 50 (1): 8- 14.
8 XIANG Shijun , LUO Xinrong . Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28 (11): 3099- 3110.
doi: 10.1109/TCSVT.2017.2742023
9 MA Kede , ZHANG Weiming , ZHAO Xianfeng , et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (3): 553- 562.
doi: 10.1109/TIFS.2013.2248725
10 LUO Lixin , CHEN Zhenyong , CHEN Ming , et al. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5 (1): 187- 193.
doi: 10.1109/TIFS.2009.2035975
11 杨晓元, 魏立线. 计算机密码学[M]. 西安: 西安交通大学出版社, 2015: 77- 85.
YANG Xiaoyuan , WEI Lixian . Computer cryptography[M]. Xi'an: Xi'an Jiaotong University Press, 2015: 77- 85.
12 ZHANG Xinpeng , LONG Jing , WANG Zichi , et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26 (9): 1622- 1631.
doi: 10.1109/TCSVT.2015.2433194
[1] 罗欣荣, 项世军. 基于整数变换的加密图像可逆信息隐藏算法[J]. 山东大学学报(理学版), 2016, 51(9): 76-83.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 罗斯特,卢丽倩,崔若飞,周伟伟,李增勇*. Monte-Carlo仿真酒精特征波长光子在皮肤中的传输规律及光纤探头设计[J]. J4, 2013, 48(1): 46 -50 .
[2] 郭兰兰1,2,耿介1,石硕1,3,苑飞1,雷丽1,杜广生1*. 基于UDF方法的阀门变速关闭过程中的#br# 水击压强计算研究[J]. 山东大学学报(理学版), 2014, 49(03): 27 -30 .
[3] 史开泉. 信息规律智能融合与软信息图像智能生成[J]. 山东大学学报(理学版), 2014, 49(04): 1 -17 .
[4] 何海伦, 陈秀兰*. 变性剂和缓冲系统对适冷蛋白酶MCP-01和中温蛋白酶BP-01构象影响的圆二色光谱分析何海伦, 陈秀兰*[J]. 山东大学学报(理学版), 2013, 48(1): 23 -29 .
[5] 孙小婷1,靳岚2*. DOSY在寡糖混合物分析中的应用[J]. J4, 2013, 48(1): 43 -45 .
[6] 王碧玉,曹小红*. 算子矩阵的Browder定理的摄动[J]. 山东大学学报(理学版), 2014, 49(03): 90 -95 .
[7] 李敏1,2,李歧强1. 不确定奇异时滞系统的观测器型滑模控制器[J]. 山东大学学报(理学版), 2014, 49(03): 37 -42 .
[8] 马媛媛, 孟慧丽, 徐久成, 朱玛. 基于粒计算的正态粒集下的格贴近度[J]. 山东大学学报(理学版), 2014, 49(08): 107 -110 .
[9] 胡明娣1,2,折延宏1,王敏3. L3*系统中逻辑度量空间的拓扑性质[J]. J4, 2010, 45(6): 86 -90 .
[10] 田学刚, 王少英. 算子方程AXB=C的解[J]. J4, 2010, 45(6): 74 -80 .