一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

基于LWE的密文域可逆信息隱藏

張敏情 柯彥 蘇婷婷

張敏情, 柯彥, 蘇婷婷. 基于LWE的密文域可逆信息隱藏[J]. 電子與信息學(xué)報, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702
引用本文: 張敏情, 柯彥, 蘇婷婷. 基于LWE的密文域可逆信息隱藏[J]. 電子與信息學(xué)報, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702
ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702
Citation: ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE[J]. Journal of Electronics & Information Technology, 2016, 38(2): 354-360. doi: 10.11999/JEIT150702

基于LWE的密文域可逆信息隱藏

doi: 10.11999/JEIT150702
基金項目: 

國家自然科學(xué)基金(61379152, 61272492)

Reversible Steganography in Encrypted Domain Based on LWE

Funds: 

The National Natural Science Foundation of China (61379152, 61272492)

  • 摘要: 該文提出了一種基于LWE(Learning With Errors)算法的密文域可逆隱寫方案,利用LWE公鑰密碼算法對數(shù)據(jù)加密,用戶在密文中嵌入隱藏信息,對于嵌入信息后的密文,用戶使用隱寫密鑰可以有效提取隱藏信息,使用解密密鑰可以無差錯恢復(fù)出加密前數(shù)據(jù)實現(xiàn)了提取過程與解密過程的可分離。通過推導(dǎo)方案在解密與提取信息過程中出錯的概率,得到直接影響方案正確性的參數(shù)為所選噪聲的標準差,實驗獲得并驗證了標準差的合理取值區(qū)間;通過推導(dǎo)嵌入后密文的分布函數(shù),分析密文統(tǒng)計特征的變化情況,論證了嵌入密文的隱藏信息的不可感知性。該方案是在密文域進行的可逆隱寫,與原始載體無關(guān),適用于文本、圖片、音頻等各類載體。實驗仿真結(jié)果表明該方案不僅能夠保證可逆隱寫的可靠性與安全性,而且1 bit明文在密文域最大可負載1 bit隱藏信息。
  • ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
    TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
    DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4): 1779-1790.
    CACIULA I and COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
    ZHANG W, HU X, LI X, et al. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
    JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
    LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
    CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
    KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
    MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.
    ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
    MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562.
    YU J, ZHU G, LI X, et al. Digital Forensics and Watermarking: An Improved Algorithm for Reversible Data Hiding in Encrypted Image[M]. Berlin Heidelberg, Springer- Verlag, 2014: 384-394.
    LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2): 325-328.
    WU X and SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11): 387-400
    陳嘉勇, 王超, 張衛(wèi)明, 等. 安全的密文域圖像隱寫術(shù)[J]. 電子與信息學(xué)報, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J. 1146.2011.01240.
    WANG J H, WANG C, ZHANG W M et al. A secure image steganographic method in encrypted domain[J]. Journal of Electronics Information Technology, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J.1146.2011.01240.
    REGEV O. On lattices, learning with errors, random linear codes and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Couputing, New York, USA, 2005: 84-93.
    余位馳. 格基規(guī)約理論及其在密碼設(shè)計中的應(yīng)用[D]. [博士論文], 成都: 西南交通大學(xué), 2005.
    GORDON R D. Values of Mills ratio of area to bounding ordinate and of the normal probability integral for large values of the argument[J]. The Annals of Mathematical Statistics, 1941(12): 364-366
    LYUBASHEVSKY V, PEIKERT C, and REGEV O. On ideal lattices and learning with errors over rings[C]: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. French Riviera, 2010: 1-23.
    ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security. 2012, 7(2): 826-832.
    ZHANG X, QIAN Z, FENG G, et al. Efficient reversible data hiding in encrypted image[J]. Journal of Visual Communication and Image Representation, 2014, (25)2: 322-328.
    AJTAI M. Generating hard instances of lattice problems[C]. Complexity of Computations and Proofs, Dept. Math., Seconda University Napoli, Caserta, Italy, 2004: 1-32.
    吳立強. 基于格的密碼體制研究[D]. [碩士論文], 西安: 武警工程大學(xué), 2012.
  • 加載中
計量
  • 文章訪問數(shù):  1642
  • HTML全文瀏覽量:  188
  • PDF下載量:  966
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-06-08
  • 修回日期:  2015-09-11
  • 刊出日期:  2016-02-19

目錄

    /

    返回文章
    返回