Reversible Steganography in Encrypted Domain Based on LWE
Funds:
The National Natural Science Foundation of China (61379152, 61272492)
-
摘要: 該文提出了一種基于LWE(Learning With Errors)算法的密文域可逆隱寫方案,利用LWE公鑰密碼算法對數(shù)據(jù)加密,用戶在密文中嵌入隱藏信息,對于嵌入信息后的密文,用戶使用隱寫密鑰可以有效提取隱藏信息,使用解密密鑰可以無差錯恢復(fù)出加密前數(shù)據(jù)實現(xiàn)了提取過程與解密過程的可分離。通過推導(dǎo)方案在解密與提取信息過程中出錯的概率,得到直接影響方案正確性的參數(shù)為所選噪聲的標準差,實驗獲得并驗證了標準差的合理取值區(qū)間;通過推導(dǎo)嵌入后密文的分布函數(shù),分析密文統(tǒng)計特征的變化情況,論證了嵌入密文的隱藏信息的不可感知性。該方案是在密文域進行的可逆隱寫,與原始載體無關(guān),適用于文本、圖片、音頻等各類載體。實驗仿真結(jié)果表明該方案不僅能夠保證可逆隱寫的可靠性與安全性,而且1 bit明文在密文域最大可負載1 bit隱藏信息。
-
關(guān)鍵詞:
- 信息安全 /
- 密文域可逆隱寫 /
- 格 /
- LWE (Learning With Errors)
Abstract: This paper proposes a novel scheme of reversible steganography in encrypted domain based on Learning With Errors (LWE). The original data is encrypted by the cryptographic algorithms with LWE. Then additional data could be embedded into the cipher text. With embedded cipher text, the additional data can be extracted by using data-hiding key, and the original data can be recovered by using encryption key, and the processes of extraction and decryption are separable. By deducing the error probability of the scheme, the standard deviation of noise sequence which directly related to the schemes correctness is mainly discussed, and reasonable range of the standard deviation is obtained by experiments. The probability distribution function of the embedded cipher text is deduced, that proves the embedded cipher text is not detective. The proposed scheme based on encrypted domain can apply to different kinds of media vehicle such as text, image or audio. Experimental results demonstrate that the proposed scheme can not only achieve statistical security without degrading the quality of encryption or data embedding, but realize that 1 bit original data can maximally load 1 bit additional data in encrypted domain. -
ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896. DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4): 1779-1790. CACIULA I and COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429. ZHANG W, HU X, LI X, et al. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785. JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21. LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778. CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12. KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139. MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649. ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562. YU J, ZHU G, LI X, et al. Digital Forensics and Watermarking: An Improved Algorithm for Reversible Data Hiding in Encrypted Image[M]. Berlin Heidelberg, Springer- Verlag, 2014: 384-394. LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2): 325-328. WU X and SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11): 387-400 陳嘉勇, 王超, 張衛(wèi)明, 等. 安全的密文域圖像隱寫術(shù)[J]. 電子與信息學(xué)報, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J. 1146.2011.01240. WANG J H, WANG C, ZHANG W M et al. A secure image steganographic method in encrypted domain[J]. Journal of Electronics Information Technology, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J.1146.2011.01240. REGEV O. On lattices, learning with errors, random linear codes and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Couputing, New York, USA, 2005: 84-93. 余位馳. 格基規(guī)約理論及其在密碼設(shè)計中的應(yīng)用[D]. [博士論文], 成都: 西南交通大學(xué), 2005. GORDON R D. Values of Mills ratio of area to bounding ordinate and of the normal probability integral for large values of the argument[J]. The Annals of Mathematical Statistics, 1941(12): 364-366 LYUBASHEVSKY V, PEIKERT C, and REGEV O. On ideal lattices and learning with errors over rings[C]: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. French Riviera, 2010: 1-23. ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security. 2012, 7(2): 826-832. ZHANG X, QIAN Z, FENG G, et al. Efficient reversible data hiding in encrypted image[J]. Journal of Visual Communication and Image Representation, 2014, (25)2: 322-328. AJTAI M. Generating hard instances of lattice problems[C]. Complexity of Computations and Proofs, Dept. Math., Seconda University Napoli, Caserta, Italy, 2004: 1-32. 吳立強. 基于格的密碼體制研究[D]. [碩士論文], 西安: 武警工程大學(xué), 2012. -
計量
- 文章訪問數(shù): 1642
- HTML全文瀏覽量: 188
- PDF下載量: 966
- 被引次數(shù): 0