A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on symmetric or public key encryption are mainly applied to the security of end-to-end communication. Aimed at providing reliable technical supports for multi-party security scenarios, a separable RDH-ED scheme for secret image sharing based on Chinese remainder theorem (CRT) is presented. In the application of (t, n) secret image sharing, the image is first shared into n different shares of ciphertext. Only when not less than t shares obtained, can the original image be reconstructed. In our scheme, additional data could be embedded into the image shares. To realize data extraction from the image shares and the reconstructed image separably, two data hiding methods are proposed: one is homomorphic difference expansion in encrypted domain (HDE-ED) that supports data extraction from the reconstructed image by utilizing the addition homomorphism of CRT secret sharing; the other is difference expansion in image shares (DE-IS) that supports the data extraction from the marked shares before image reconstruction. Experimental results demonstrate that the proposed scheme could not only maintain the security and the threshold function of secret sharing system, but also obtain a better reversibility and efficiency compared with most existing RDH-ED algorithms. The maximum embedding rate of HDE-ED could reach 0.5000 bits per pixel and the average embedding rate of DE-IS is 0.0545 bits per bit of ciphertext.

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[3]  Jian Weng,et al.  Adopting secret sharing for reversible data hiding in encrypted images , 2018, Signal Process..

[4]  Bing Chen,et al.  Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer , 2016, J. Vis. Commun. Image Represent..

[5]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Di Xiao,et al.  Reversible data hiding in encrypted images using cross division and additive homomorphism , 2015, Signal Process. Image Commun..

[7]  W. Marsden I and J , 2012 .

[8]  Yang Li,et al.  Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding , 2017, Signal Process..

[9]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[10]  Pabbu Buchaiah,et al.  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2018 .

[11]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[12]  Sung-Hsien Hsieh,et al.  A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms , 2019, IEEE Transactions on Information Forensics and Security.

[13]  M. R. Sayankar,et al.  Secret sharing scheme for group authentication — A review , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[14]  Xiaoyuan Yang,et al.  A multilevel reversible data hiding scheme in encrypted domain based on LWE , 2018, J. Vis. Commun. Image Represent..

[15]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[16]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[17]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[18]  Zahra Ahmadian,et al.  Linear Subspace Cryptanalysis of Harn’s Secret Sharing-Based Group Authentication Scheme , 2018, IEEE Transactions on Information Forensics and Security.

[19]  Jiwu Huang,et al.  Reversible data hiding in Paillier cryptosystem , 2016, J. Vis. Commun. Image Represent..

[20]  Gang Qu,et al.  Memristors for Secret Sharing-Based Lightweight Authentication , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[21]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS and WPA , 2013 .

[22]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[23]  Dipankar Dasgupta,et al.  Shamir's Secret Sharing for Authentication without Reconstructing Password , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).

[25]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Ming-Chun Chien,et al.  Secret image sharing using (t,n) threshold scheme with lossless recovery , 2012, 2012 5th International Congress on Image and Signal Processing.

[27]  Tingting Su,et al.  Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[29]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[30]  Dana Ron,et al.  Chinese remaindering with errors , 1999, STOC '99.

[31]  Yun-Qing Shi,et al.  Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Arka Rai Choudhuri,et al.  Two Round Information-Theoretic MPC with Malicious Security , 2019, IACR Cryptol. ePrint Arch..

[33]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[34]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[35]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[36]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[37]  Jiwu Huang,et al.  New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[39]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[40]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS , 2013, USENIX Security Symposium.

[41]  Yicong Zhou,et al.  Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing , 2017, IEEE Transactions on Image Processing.

[42]  Zhihua Xia,et al.  High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption , 2018, IEEE Access.

[43]  Yu-Chi Chen,et al.  Encrypted image-based reversible data hiding with public key cryptography from difference expansion , 2015, Signal Process. Image Commun..

[44]  Jia Liu,et al.  Separable Multiple Bits Reversible Data Hiding in Encrypted Domain , 2016, IWDW.

[45]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.