JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 1-8,18.doi: 10.6040/j.issn.1671-9352.2.2019.021

    Next Articles

Reversible data hiding in homomorphic encrypted domain based on Paillier

Min-qing ZHANG(),Neng ZHOU*(),Meng-meng LIU,Han WANG,Yan KE   

  1. Key Laboratory of Network and Information Security under Chinese People Armed Police Force (PAP), College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, Shaanxi, China
  • Received:2019-09-05 Online:2020-03-20 Published:2020-03-27
  • Contact: Neng ZHOU E-mail:api_zmq@126.com;zn_2019@163.com

Abstract:

Based on the homomorphism and probability characteristics of Paillier cryptosystem, a reversible data hiding in homomorphic encrypted domain based on Paillier is proposed. First, the original image is divided into blocks. The pixel groups randomly selected by the image owner have one reference pixel and eight target pixels. Least significant bits (LSBs) of reference pixel and all bits of target pixel are self-embedded into other parts of the image by a method of RDH. In order to avoid overflow when embedding data, LSBs of the reference pixel are reset to zero before encryption. The encrypted reference pixel replaces the target pixels surrounding it, thereby constructing mirror central ciphertext. In a set of mirroring central ciphertext, the data hider embeds data in the LSBs of the target pixels by homomorphic addition, while the reference pixel remains unchanged. The receiver can directly extract the extra information by modular multiplication inverse between the target pixels and the corresponding reference pixel or directly extract the secret information by plaintext subtraction and can restore the original image without loss. The experimental results show that the average embedding rate of the algorithm is 0.18 bpp (bit per pixel) under the premise of ensuring the quality of the directly decrypted image.

Key words: reversible data hiding, homomorphic encrypted domain, Paillier, mirroring central ciphertext

CLC Number: 

  • TP391

Fig.1

Overall framework of the proposed algorithm"

Fig.2

Image partition and self-reversible embedding"

Fig.3

n=3 is used as an example to illustrate the algorithm flow"

Fig.4

Test images used in the algorithm of this paper"

Table 1

Embedding capacity and PSNR values under different n"

图像 嵌入容量/bit 峰值信噪比/dB
n=1 n=2 n=3 n=4
5 460 45.77 46.49 48.54 47.31
10 920 40.67 41.37 46.41 42.10
16 380 37.62 38.26 45.01 39.07
21 840 35.51 36.09 42.56 36.99
Lena 32 760 32.55 33.19 40.16 34.26
43 680 30.60 31.30 34.75 32.57
65 520 28.14 29.04 33.36 30.73
76 440 27.35 28.37 33.00 30.23
5 460 46.47 47.70 52.48 49.77
10 920 43.13 44.35 49.41 46.49
16 380 40.97 42.27 47.44 44.41
21 840 39.32 40.73 46.12 42.82
F-16 32 760 37.03 38.52 41.23 40.81
43 680 35.52 37.14 39.88 38.50
65 520 33.41 34.99 38.92 37.30
76 440 32.57 34.16 37.12 36.57

Table 2

Embedding capacity and PSNR values under n=3"

嵌入容量/bit 峰值信噪比/dB
Lena F-16 Baboon Hill Lake Man
5 460 48.54 52.48 40.69 52.87 44.67 48.01
10 920 46.41 49.41 38.83 49.38 42.65 45.13
16 380 45.01 47.44 37.14 47.13 39.17 44.36
21 840 42.56 46.12 35.69 45.04 37.48 41.62
32 760 40.16 41.23 33.09 44.78 35.02 39.81
43 680 34.75 39.88 32.14 42.33 32.75 35.75
65 520 33.36 38.92 31.75 41.16 31.49 34.89
76 440 33.00 37.12 28.61 40.94 30.61 32.13

Table 3

Performance comparison of reversible data hiding in homomorphic encrypted domain"

算法 特征
生成和利用冗余 额外数据扩展 可分离 信息嵌入次数 信息嵌入过程计算复杂度 加密域中信息保护机制
文献[4] VRBE 1 O(k) Paillier同态和概率机制
文献[6] VRBE 1 O(k) Paillier同态和概率机制
文献[1] VRIE 1 O(k) R-LWE同态机制
文献[12] VRAE 2 O(k3) WPC编码机制
文献[8] VRBE 1 O(k) Paillier同态和概率机制
文献[7] VRBE 1 O(k) Paillier同态和概率机制
本文算法 VRBE 1 O(k) Paillier同态和概率机制

Fig.5

PSNR performance comparison on image of Lena"

Fig.6

PSNR performance comparison on image of F-16"

1 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444
KE Yan , ZHANG Minqing , SU Tingting . A novel multiple bits reversible data hiding in encrypted domain based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53 (10): 2307- 2322.
doi: 10.7544/issn1000-1239.2016.20160444
2 BARTON J M. Method and apparatus for embedding authentication information within digital data[P]. U.S. Patent 5646997.1997-07-08.
3 ZHANG Xinpeng . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18 (4): 255- 258.
doi: 10.1109/LSP.2011.2114651
4 CHEN Yuchi , SHIU Chihwei , HORNG Gwoboa . Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25 (5): 1164- 1170.
doi: 10.1016/j.jvcir.2014.04.003
5 PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1999: 223-238.
6 SHIU Chihwei , CHEN Yuchi , HONG Wien . Encrypted image-based reversible data hiding with public key cryptography from difference expansion[J]. Signal Processing: Image Communication, 2015, 39 (4): 226- 233.
7 张敏情, 李天雪, 狄富强, 等. 基于Paillier同态公钥加密系统的可逆信息隐藏算法[J]. 郑州大学学报(理学版), 2018, 50 (1): 8- 14.
ZHANG Minqing , LI Tianxue , DI Fuqiang , et al. Reversible data hiding algorithm based on Paillier homomorphic public key encryption system[J]. Journal of Zhengzhou University (Natural Science Edition), 2018, 50 (1): 8- 14.
8 XIANG Shijun , LUO Xinrong . Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28 (11): 3099- 3110.
doi: 10.1109/TCSVT.2017.2742023
9 MA Kede , ZHANG Weiming , ZHAO Xianfeng , et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (3): 553- 562.
doi: 10.1109/TIFS.2013.2248725
10 LUO Lixin , CHEN Zhenyong , CHEN Ming , et al. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5 (1): 187- 193.
doi: 10.1109/TIFS.2009.2035975
11 杨晓元, 魏立线. 计算机密码学[M]. 西安: 西安交通大学出版社, 2015: 77- 85.
YANG Xiaoyuan , WEI Lixian . Computer cryptography[M]. Xi'an: Xi'an Jiaotong University Press, 2015: 77- 85.
12 ZHANG Xinpeng , LONG Jing , WANG Zichi , et al. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26 (9): 1622- 1631.
doi: 10.1109/TCSVT.2015.2433194
[1] . Reversible data hiding in encrypted image based on an integer transform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 76-83.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LUO Si-te, LU Li-qian, CUI Ruo-fei, ZHOU Wei-wei, LI Zeng-yong*. Monte-Carlo simulation of photons transmission at alcohol wavelength in  skin tissue and design of fiber optic probe[J]. J4, 2013, 48(1): 46 -50 .
[2] GUO Lan-lan1,2, GENG Jie1, SHI Shuo1,3, YUAN Fei1, LEI Li1, DU Guang-sheng1*. Computing research of the water hammer pressure in the process of #br# the variable speed closure of valve based on UDF method[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 27 -30 .
[3] SHI Kai-quan. P-information law intelligent fusion and soft information #br# image intelligent generation[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(04): 1 -17 .
[4] HE Hai-lun, CHEN Xiu-lan* . Circular dichroism detection of the effects of denaturants and buffers on the conformation of cold-adapted protease MCP-01 and  mesophilic protease BP01[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 23 -29 .
[5] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[6] WANG Bi-yu, CAO Xiao-hong*. The perturbation for the Browder’s theorem of operator matrix#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 90 -95 .
[7] LI Min1,2, LI Qi-qiang1. Observer-based sliding mode control of uncertain singular time-delay systems#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 37 -42 .
[8] MA Yuan-yuan, MENG Hui-li, XU Jiu-cheng, ZHU Ma. Normal distribution of lattice close-degree based on granular computing[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 107 -110 .
[9] HU Ming-Di, SHE Yan-Hong, WANG Min. Topological properties of  three-valued   logic  metric space[J]. J4, 2010, 45(6): 86 -90 .
[10] TIAN Xue-gang, WANG Shao-ying. Solutions to the operator equation AXB=C[J]. J4, 2010, 45(6): 74 -80 .