CN115242930A - Cipher text domain extreme prediction double-layer reversible information hiding method based on secret sharing - Google Patents

Cipher text domain extreme prediction double-layer reversible information hiding method based on secret sharing Download PDF

Info

Publication number
CN115242930A
CN115242930A CN202210580640.9A CN202210580640A CN115242930A CN 115242930 A CN115242930 A CN 115242930A CN 202210580640 A CN202210580640 A CN 202210580640A CN 115242930 A CN115242930 A CN 115242930A
Authority
CN
China
Prior art keywords
secret information
formula
secret
layer
prediction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210580640.9A
Other languages
Chinese (zh)
Other versions
CN115242930B (en
Inventor
石慧
周梓怡
耿佳宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning Normal University
Original Assignee
Liaoning Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning Normal University filed Critical Liaoning Normal University
Priority to CN202210580640.9A priority Critical patent/CN115242930B/en
Publication of CN115242930A publication Critical patent/CN115242930A/en
Application granted granted Critical
Publication of CN115242930B publication Critical patent/CN115242930B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a cipher text domain extreme prediction double-layer reversible information hiding method based on secret sharing, which comprises the steps of firstly carrying out full bit plane decomposition on a carrier image, proposing an additive secret sharing strategy based on a bit plane to enable cipher text images to be shared by multiple parties, proposing a name-removing mechanism to process secret information, realizing lossless recovery and extraction by utilizing the sharing of other two parties under the condition that one party shares traitors, and realizing the cipher text domain double-layer information hiding strategy through extreme prediction; at a receiving end, the secret information is extracted and recovered in a lossless mode by using a contrast prediction error, a threshold value and a name-divisible mechanism, and the lossless recovery of the original image is realized through corresponding inverse transformation and special properties of additive secret sharing. The invention has the advantages of strong safety, high embedding capacity, high image quality, reversibility and the like.

Description

Cipher text domain extreme prediction double-layer reversible information hiding method based on secret sharing
Technical Field
The invention belongs to the field of multimedia information security, and particularly relates to a cipher text domain extreme prediction double-layer reversible information hiding method based on secret sharing.
Background
In recent years, the openness and the sharability of networks have promoted the rapid development of network multimedia, and 5G networks provide better network capability for multimedia information transmission and simultaneously bring great threats and challenges, such as malicious tampering, illegal copying, privacy disclosure and other problems, so that it is very important to protect the security of multimedia data, and preventing the leakage of multimedia information has become a research hotspot. The ciphertext domain Reversible information Hiding (RDHEI) can hide information while protecting Image content from being leaked, a user can decrypt the Image content according to the type of a possessed secret key and the requirement of the user, extract the hidden information and restore an original Image in a lossless mode, and the method is a cross research hotspot of information Hiding, multimedia technology and ciphertext signal processing.
The original RDHEI algorithm was to make Room After the image was encrypted, i.e. ciphertext reversible information hiding based on the VRAE (changing Room After Encryption) framework and symmetric Encryption. As early as 2008, puech et al concealed additional information in each block by segmenting the encrypted image, and finally completed information extraction and image restoration using the local standard deviation of the image pixels. However, this method has not been of interest to researchers, until 2012, zhang encrypts the original image using stream cipher and then divides the encrypted image into blocks of the same size, hiding the additional information by flipping the LSBs of some of the pixels in the block.
With the continuous improvement of data security requirements at home and abroad, ciphertext domain reversible information hiding algorithms based on symmetric Encryption and RRBE (responding from Before Encryption) framework and public key/homomorphic Encryption are generally concerned by scholars. Puteaus et al propose that the information hiding of the ciphertext domain does not need to consider the problem of image visual quality after encryption and hiding, and therefore the highest bitplane replacement of the image is adopted to embed the additional information, and therefore a higher effective load is obtained.
However, the VRAE-based framework has its own limitations, for example, some may have an error rate in data extraction or image recovery, cannot realize complete reversibility, and some may not be separable in the information extraction and image recovery processes; the algorithm based on the symmetric encryption and the RRBE framework has the problems of limited capacity and the like.
Disclosure of Invention
The invention aims to solve the problems in the prior art and provides a secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method.
The technical solution of the invention is as follows: a secret sharing based ciphertext domain extreme prediction double-layer reversible information hiding method is sequentially carried out according to the following steps:
step 1, preprocessing an original carrier image:
step 1.1, traversing all pixels in an original carrier image with the dimension of H multiplied by W, marking the pixel point with the pixel value of 0 as 0, and marking the non-0 pixel point as 1 to obtain an LM (Levenberg-Marquard) image;
step 1.2, traversing all pixels in an original carrier image with the dimension of H multiplied by W, setting a 0-value pixel as 1, and obtaining a carrier image X with the pixel range of [1, 255 ];
step 2, encrypting the carrier image X by additive secret sharing
Step 2.1 Each pixel X of the support image X is processed according to the formula (1-4) l (i, j) is divided into three sections: x is the number of h High order bit part, x m Middle-order part and x l A lower-order bit portion in which i ∈ [1,H ]],j∈[1,W],α∈(0,7),β∈(0,7),α+β≤7;
x(i,j)=x h (i,j)×2 α +x m (i,j)×2 β +x l (i,j) (1)
Figure BDA0003663617600000021
Figure BDA0003663617600000022
x l (i,j)=x(i,j)-x h (i,j)×2 α -x m (i,j)×2 β (4)
The x is expressed according to the formula (5-6) h High order bit portion and x l And (3) low-order bit part exchange:
x h =x l ×2 a (5)
x l =x h ÷2 a (6)
step 2.2 according to the disclosureFormula (7-9), separating x h High order bit portion, x m Middle-order part, x l Low order bit portions randomly partitioned into
Figure BDA0003663617600000023
Wherein r is from {1,2,3, …, r max },r max Is a positive integer;
Figure BDA0003663617600000024
Figure BDA0003663617600000025
Figure BDA0003663617600000026
step 2.3 will
Figure BDA0003663617600000027
Re-randomly combining according to the formula (10) to generate n shared encrypted carriers share n Where n is the {1,2,3, …, r max },
Figure BDA0003663617600000028
The upper corner marks r are respectively in the set {1,2,3, …, r max Get the value and mark r in the same order position can not be repeated, i.e. r in the same order position is not equal to r +1 not equal to … not equal to r max
Figure BDA0003663617600000029
Step 3 encrypting the secret information using a mechanism for name removal
Step 3.1 generates a random number sequence L as long as the secret information matrix YD of size g × L according to the formula (11) 1 Where k is equal to {1,2,3 …, g × l },0 < x 0 Less than 1,3.5699456 less than or equal to 4 mu, selecting x 0 Mu is stored as a secret key K 1
x k+1 =μx k (1-x k ) (11)
Step 3.2 transform the range of values in the random number sequence to [0, 255] according to equation (12)]Then, converting the transformed one-dimensional random sequence into a two-dimensional matrix M with the size equal to that of the secret information matrix, namely, gxl; and store K 2 K in the formula (14) 2 The random key is a positive integer;
Figure BDA0003663617600000031
step 3.3, converting the two-dimensional matrix M and the secret information matrix YD into binary systems, then carrying out bitwise XOR operation, and finally converting the binary systems subjected to XOR into decimal systems;
step 3.4, the two-dimensional matrix subjected to the exclusive or operation is converted into a one-dimensional sequence YD' with the length of p based on S-shaped traversal, wherein p = g × l and is an even number;
step 3.5 connect LM map with one-dimensional sequence YD' = { d = { 1 ,d 2 ,...,d p D is generated by connection and is split into two equal parts according to a formula (13), and the two equal parts are respectively D ω And D δ
Figure BDA0003663617600000032
The length of D for u;
D=D ω +D δ (13)
step 3.6 preparation of D according to equation (14) ω And D δ Generating third party secret information D according to bit XOR ξ
Figure BDA0003663617600000033
Step 4 double-layer embedding strategy
Step 4.1 selects four known points f (0,0), f (1,0), f (0,1), f (1, 10) as reference pixels, and uses the share as a bilinear interpolation method according to formula (15) n Extended to obtain eshare n ,:
f(x,y)=f(0,0)(1-x)(1-y)+f(1,0)x(1-y)+f(0,1)(1-x)y+f(1,1)xy (15)
Step 4.2 using extreme prediction technique to correct eshare n Making a prediction using an overestimated predictor p + And underestimation predictor p - Respectively to eshare n Performing extreme prediction to generate
Figure BDA0003663617600000034
And
Figure BDA0003663617600000035
and calculates a prediction error e according to the formula (16-21) + (i ', j') and e - (i ', j '), i ' e [0,2H ] in equation (18-23)],j′∈[0,2W]:
Figure BDA0003663617600000036
Figure BDA0003663617600000037
Figure BDA0003663617600000039
Figure BDA0003663617600000038
Figure BDA0003663617600000041
Figure BDA0003663617600000048
Wherein, c q Surrounding pixels representing a prediction target pixel are used to generate a prediction value,q∈{0,1,2…,q max },q max The number of surrounding pixels used for prediction;
step 4.3 generating a pair of asymmetric prediction error histograms, wherein the overestimated prediction error values generate a right-biased histogram H + Generating left-hand histogram H by underestimating prediction error value -
Step 4.4 according to the formulas (22) and (23), the double-layer embedding is completed based on histogram translation, and a right-biased histogram H is utilized + Secret sharing of eshare contained after embedding of the first layer' n Using left-hand histogram H - The secret sharing after the second layer embedding is eshare n (ii) a Wherein s is 1 Is a first layer of embedded secret information, s 2 Is a second layer of embedded secret information, s 1 And s 2 Is formed by D ξ Is divided equally to obtain + And T - Respectively, a right-biased histogram H + And left-hand offset histogram H - Peak point of, z + Is the zero value point on the left side of the peak value point of the right-hand histogram closest to the peak value point, z - Is the zero value point on the right side of the peak value point of the left partial histogram closest to the peak value point:
Figure BDA0003663617600000042
Figure BDA0003663617600000043
step 4.5 repeat the operations of steps 4.2-4.4 until the traversal is completed with eshare n All of the pixels of (1).
The secret information extraction and the carrier image recovery are sequentially carried out according to the following steps:
step 5.1, according to the formulas (17), (19) and (21), the received dense shared image eshare ″ n Underestimating the prediction error, and recording the prediction error value as e -′ (i ', j'), the predicted value is recorded as
Figure BDA0003663617600000044
Step 5.2 Using the sum of (24) and
Figure BDA0003663617600000045
extracting secret information s 'embedded in second layer' 2
Figure BDA0003663617600000046
Step 5.3, the second layer pixel value reshare' is restored according to the formula (25) n
Figure BDA0003663617600000047
Repeating the steps 5.1-5.3 until all secret information of the second layer is extracted and the reshare' is completely recovered n The aforementioned reshare n Equivalent to eshare' n
Step 5.4 Pair of reshare ″, according to equations (16) (18) and (20) n Performing overestimation on the prediction error, and recording the prediction error value as e + ' (i ', j '), and the predicted value is recorded as
Figure BDA0003663617600000051
Step 5.5 based on equation (26) and the calculated
Figure BDA0003663617600000052
Extracting first layer embedded secret information s' 1
Figure BDA0003663617600000053
Step 5.6 recovers the first layer secret information pixel value reshare 'according to formula (27)' n
Figure BDA0003663617600000054
Repeating steps 5.4-5.6 until all secret information of the first layer is extracted and reshare 'is completely recovered' n ,reshare′ n Equivalent to eshare n I.e. not embedding a dense image;
step 5.7 recovery of secret information
S 'extracted' 1 And s' 2 Respectively arranging and connecting according to the extraction sequence to obtain D ξ 、D ω 、D δ D is ω And D δ Combining to obtain D; sharing is distributed to different users, and only 2 users provide respective sharing together, the initial secret can be reconstructed;
(1) If hidden D ω Using the other two shares to extract secret information D ξ And D δ To give out D ω The secret information D is recovered according to equation (28):
Figure BDA0003663617600000055
(2) If hidden D δ Using the other two shares to extract secret information D ξ And D ω To give out D δ The secret information D is recovered according to the formula (29):
Figure BDA0003663617600000056
(3) If hidden D ξ With other two shares sharing the extracted secret information D ω And D δ Merging, and recovering the secret information D according to the formula (30):
D=D ω +D δ (30)
step 5.8, splitting D to obtain an LM (mean squared error) graph and secret information YD ', traversing YD' according to a S-shaped traversal sequence, and converting the YD 'into a matrix YD' with the size of g multiplied by l;
step 5.9 Using the decryption Key K 1 And K 2 Generating a matrix M' according to the steps 3.1 and 3.2;
step 5.10 executing bitwise XOR operation on YD 'and M' to generate decrypted secret information YD;
Figure BDA0003663617600000061
step 5.11 extraction of all reshare' n (2 i '-1,2j' -1) pixel points are rearranged to obtain share n Where i' is E [1,2H],j′∈[1,2W];
Step 5.12 merge share according to formula (32) n Recovering the carrier image RX, where i ∈ [1,H ∈ [ ]],j∈[1,W];
rx(i,j)=share 1 (i,j)+share 2 (i,j)+share 3 (i,j) (32)
Step 5.13, separating the RX bit planes by using the formula (1-4), and exchanging the high order and the low order by using the formula (5-6) to recover the carrier image X;
and 5.14, changing the pixel value of the corresponding position in the X marked as 0 in the LM picture into 0 by using the LM picture, and completely recovering the original carrier image.
The invention firstly carries out full bit plane decomposition on a carrier image, proposes an additive secret sharing strategy based on a bit plane to enable a ciphertext image to be shared by multiple parties, and simultaneously proposes a name-removing mechanism to process secret information, so that under the condition that one party shares traitors, the lossless recovery and extraction can still be realized by utilizing the sharing of other two parties, and in addition, a double-layer information hiding strategy of a ciphertext domain is realized through extreme prediction; at a receiving end, the secret information is extracted and recovered in a lossless mode by using a contrast prediction error, a threshold value and a name-divisible mechanism, and the lossless recovery of the original image is realized through corresponding inverse transformation and special properties of additive secret sharing. The invention has the advantages of strong safety, high embedding capacity, high image quality, reversibility and the like.
Drawings
FIG. 1 is a flow chart of the method of the present invention for embedding secret information.
Fig. 2 is a schematic diagram of dividing a bit plane and encrypting a carrier image according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of interpolating an extended ciphertext image according to an embodiment of the present invention.
FIG. 4 is a schematic diagram of an embodiment of an interpolation extended share 1 Schematic representation of (a).
Fig. 5a is a right-biased histogram of prediction errors according to an embodiment of the present invention.
Fig. 5b is a left-biased histogram of prediction errors according to an embodiment of the present invention.
FIG. 6 is a diagram illustrating the completion of dual-layer embedding based on histogram shifting according to an embodiment of the present invention.
Fig. 7 is a schematic diagram of extracting secret information and recovering a carrier image according to an embodiment of the present invention.
FIG. 8 is a schematic diagram of a downsampled interpolated image according to an embodiment of the present invention.
FIG. 9a is a diagram of a raw carrier according to an embodiment of the present invention.
Fig. 9b is a diagram of a split bit plane effect according to an embodiment of the present invention.
Fig. 9c is a share effect diagram according to an embodiment of the present invention.
FIG. 9d is a diagram illustrating interpolation effects according to an embodiment of the present invention.
FIG. 9e is a graph showing the effect of embedding density according to the embodiment of the present invention.
Fig. 9f is a diagram of the effect of restoring the carrier image according to the embodiment of the present invention.
FIG. 10a is a pixel correlation scatter plot of a Lena original image according to an embodiment of the present invention.
FIG. 10b is a diagram of a ciphertext image share according to an embodiment of the present invention 1 A pixel correlation scatter plot.
FIG. 10c is a diagram of a ciphertext image share according to an embodiment of the present invention 2 A pixel correlation scatter plot.
FIG. 10d is a diagram of a ciphertext image share according to an embodiment of the present invention 3 A pixel correlation scatter plot.
Fig. 11 is a difference image of a watermark and an extracted watermark according to an embodiment of the present invention.
FIG. 12 is a NIQE measurement versus bar graph of an original image and a recovered image according to an embodiment of the present invention.
Detailed Description
The invention discloses a secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method which is shown in figure 1 and sequentially comprises the following steps:
step 1, preprocessing an original carrier image:
step 1.1, traversing all pixels in the original carrier image with the dimension of H multiplied by W as shown in FIG. 9a, marking the pixel point with the pixel value of 0 as 0, and marking the non-0 pixel point as 1 to obtain an LM (edge weighted mean) image;
step 1.2, in order to avoid underflow (overflow cannot be generated in the invention), traversing all pixels in the original carrier image with the dimension of H multiplied by W, setting a pixel with a value of 0 as 1, and obtaining a carrier image X with a pixel range of [1, 255 ];
step 2, encrypting the carrier image X by additive secret sharing
Step 2.1 Each pixel X of the support image X is processed according to the formula (1-4) l (i, j) is divided into three sections: x is the number of h High order bit part, x m Middle-order part and x l A lower-order bit portion in which i ∈ [1,H ]],j∈[1,W],α∈(0,7),β∈(0,7),α+β≤7;
x(i,j)=x h (i,j)×2 α +x m (i,j)×2 β +x l (i,j) (1)
Figure BDA0003663617600000071
Figure BDA0003663617600000072
x l (i,j)=x(i,j)-x h (i,j)×2 α -x m (i,j)×2 β (4)
The x is expressed according to the formula (5-6) h High order bit portion and x l And (3) low-order bit part exchange:
x h =x l ×2 a (5)
x l =x h ÷2 a (6)
in the embodiment of the present invention, the variables have the following values of α =5 and β =3, and fig. 9b showsThe separation bit plane effect diagram of the embodiment of the invention is x from left to right h High order bit part, x m Intermediate order part and x l A lower order bit portion.
This embodiment takes as an example a 3 × 3 pixel block having pixel values 219, 218, 216, 217, 218, 213, 219, and 215 as shown in fig. 2.
Taking the pixel value 219 in fig. 2 as an example, the upper three bits of the 8 bits of the binary sequence of the pixel are divided into a high-order part, the lower three bits are divided into a low-order part, and the remaining two middle bits are divided into a middle-order part:
(219) 10 =(11011011) 2
(11011011) 2 =(110) 2 ×2 5 +(11) 2 ×2 3 +(011) 2
the pixel value (219) 10 =(11011011) 2 Higher order (110) 2 And (011) 2 Exchange, obtain (01111110) 2
Step 2.2 according to the formula (7-9), the separated x h High order bit part, x m Middle-order part, x l Low order bit portion randomly partitioned into
Figure BDA0003663617600000081
Wherein r is from {1,2,3, …, r max },r max Is a positive integer;
Figure BDA0003663617600000082
Figure BDA0003663617600000083
Figure BDA0003663617600000084
the embodiment of the invention selects r E {1,2,3};
with the pixel values in FIG. 2219 as an example, (219) 10 =(11011011) 2 Generating 6 random factors not greater than 0.5 to rand 1 =0.2145、rand 2 =0.0094、rand 3 =0.2624、rand 4 =0.0907、rand 5 =0.1796、rand 6 =0.2034 as an example, where rand 1 And rand 2 For dividing the higher order part, rand 3 And rand 4 For dividing the medium-order part, rand 5 And rand 6 For splitting the low order part, as follows:
Figure BDA0003663617600000085
Figure BDA0003663617600000086
Figure BDA0003663617600000087
step 2.3 will
Figure BDA0003663617600000088
Re-randomly combining according to the formula (10) to generate n shared encrypted carriers share n Where n is ∈ {1,2,3},
Figure BDA0003663617600000089
the upper corner marks r are respectively in the set {1,2,3, …, r max Get the value and mark r in the same order position can not be repeated, i.e. r in the same order position is not equal to r +1 not equal to … not equal to r max
Figure BDA00036636176000000810
Specifically, the random combination can be performed again according to the following formula:
Figure BDA00036636176000000811
Figure BDA00036636176000000812
Figure BDA0003663617600000091
taking pixel 219 in FIG. 2 as an example, (219) 10 =(11011011) 2 Generating share 1 、share 2 And share 3 As follows:
Figure BDA0003663617600000092
Figure BDA0003663617600000093
Figure BDA0003663617600000094
fig. 9c is a share effect diagram according to an embodiment of the present invention.
Share three shares 1 、share 2 、share 3 And distributed to three third party embedders.
It should be noted that the invention uses additive secret sharing to make three parts of the pixel value evenly distributed to keep the property of additive secret sharing, and the invention shares different from other schemes based on secret sharing which share the image pixel independently, sharing a plurality of pixels at one time improves the efficiency, reduces the data expansion, random segmentation and random combination, the double random superposition can further improve the security, and uses random number in the sharing process, therefore, the encryption method of the invention is a system with randomness and uncertainty, encrypts the image twice, the generated encrypted images are completely different, and the invention has a capability of resisting many potential attacks.
Tables 1-4 show that eight gray images of Lena, babon, barbarbara, pepper, jetplane, boat, house, and Island with 256 × 256 size are used as experimental data to respectively perform sharp of original image and ciphertext image 1 、share 2 And share 3 And (5) performing correlation coefficient analysis. As can be seen from table 1, the correlation coefficient is about 0.9, which indicates that there is a high correlation between adjacent pixels in the original image, and any pixel easily leaks information of its neighboring pixels, and an attacker can often predict the gray value of the neighboring pixels by using the characteristic, thereby realizing the prediction of the entire plaintext image. As can be seen from tables 2 to 4, most of the correlation coefficients are lower than 0.1, which indicates that the ciphertext share breaks the strong correlation of the plaintext, and thus, the ciphertext share has higher security. In addition, fig. 10a shows a pixel correlation scatter diagram of Lena original image according to an embodiment of the present invention, which is mainly concentrated on diagonal lines, indicating that the correlation of the original image is high; FIGS. 10b-d respectively show ciphertext image share according to an embodiment of the present invention 1 ,share 2 And image share 3 The prime correlation scatter diagrams are respectively uniform, and show that the secret sharing correlation is low and the safety is high.
TABLE 1
Figure BDA0003663617600000095
Figure BDA0003663617600000101
TABLE 2
Figure BDA0003663617600000102
TABLE 3
Figure BDA0003663617600000103
TABLE 4
Figure BDA0003663617600000104
Step 3 encrypting the secret information using a renameable mechanism
Step 3.1 generates a random number sequence L as long as the secret information matrix YD of size g × L according to the formula (11) 1 Where k is equal to {1,2,3 …, g × l },0 < x 0 Less than 1,3.5699456 less than or equal to 4 mu, selecting x 0 Mu is stored as a secret key K 1
x k+1 =μx k (1-x k ) (11)
Step 3.2 transform the range of values in the random number sequence to [0, 255] according to equation (12)]Then, converting the transformed one-dimensional random sequence into a two-dimensional matrix M with the size equal to that of the secret information matrix, namely, gxl; and store K 2 K in the formula (14) 2 The random key is a positive integer;
Figure BDA0003663617600000105
step 3.3, converting the two-dimensional matrix M and the secret information matrix YD into binary systems, then carrying out bitwise XOR operation, and finally converting the binary systems subjected to XOR into decimal systems;
in the embodiment of the present invention, g =2,l =3,p =6, and the secret information matrix is 2 × 3 in size
Figure BDA0003663617600000111
For example, a two-dimensional matrix of the same size
Figure BDA0003663617600000112
XOR to obtain the encrypted secret information
Figure BDA0003663617600000113
The details are as follows:
Figure BDA0003663617600000114
step 3.4, the two-dimensional matrix subjected to the exclusive or operation is converted into a one-dimensional sequence YD' with the length of p based on S-shaped traversal, wherein p = g × l and is an even number;
specifically, the exclusive-or two-dimensional matrix is converted into a one-dimensional sequence YD' {132, 235, 120, 48, 211, 139} with a length of 6 based on a sigmoid traversal;
step 3.5 connect LM map with one-dimensional sequence YD' = { d = { 1 ,d 2 ,...,d p D is generated by connection and is split into two equal parts according to a formula (13), and the two equal parts are respectively D ω And D δ
Figure BDA0003663617600000115
The length of D for u;
D=D ω +D δ (13)
in the embodiment of the present invention, LM = {219, 218}, YD' = {132, 235, 120, 48, 211, 139}, and p =6, and the LM map is connected to secret information as D = {219, 218, 132, 235, 120, 48, 211, 139} and split into two equal parts by length, D = {219, 218, 132, 235, 120, 48, 211, 139}, and D = ω = {219, 218, 132, 235} and D δ ={120,48,211,139};
Step 3.6 preparation of D according to equation (14) ω And D δ Generating third party secret information D according to bit XOR ξ
Figure BDA0003663617600000116
In particular, {219, 218, 132, 235} and {120, 48, 211, 139} are converted into binary and bitwise XOR-ed to generate alternative secret information D ξ The two shares and the generated alternative secret information are respectively embedded into three shares share 1 、share 2 、share 3 Performing the following steps;
Figure BDA0003663617600000117
it should be noted that the conventional RDHEI scheme focuses on a data hiding device, and if only one encrypted image is lost or damaged, the original secret information cannot be recovered, and the named removal mechanism designed by the present invention allows traitors of one shared data hiding party to a certain extent, and can recover all secret information without loss by performing an exclusive-or operation using the secret information extracted from the other two shares, and has certain robustness, and the principle is as follows (A, B, C represents three parties, respectively):
Figure BDA0003663617600000121
Figure BDA0003663617600000122
Figure BDA0003663617600000123
and if one bit in the original secret information changes, the third party secret information also changes, so that the expansion characteristic is realized, and the safety is further improved.
Step 4 Dual-layer embedding strategy
Step 4.1 as shown in fig. 3, four known points f (0,0), f (1,0), f (0,1), f (1, 10) are selected as reference pixels, and the share is interpolated according to the bilinear interpolation method of formula (15) n Extended to obtain eshare n ,:
f(x,y)=f(0,0)(1-x)(1-y)+f(1,0)x(1-y)+f(0,1)(1-x)y+f(1,1)xy (15)
In the embodiment of the present invention, as shown in fig. 4, for example, using 2 × 2 pixel blocks, the share is interpolated by bilinear interpolation 1 Expanding to obtain eshare 1 Wherein the four reference pixel values are respectively: 48. 35, 18, 32, the interpolated pixels are as follows:
Figure BDA0003663617600000124
Figure BDA0003663617600000125
Figure BDA0003663617600000126
it is worth noting that the image interpolation improves the correlation among pixels in the image, and meanwhile, the histogram also has obvious peak points, and the embedding capability is well improved.
Step 4.2 using extreme prediction technique to correct eshare n Making a prediction using an overestimated predictor p + And underestimation predictor p - Respectively to eshare n Performing extreme prediction to generate
Figure BDA0003663617600000127
And
Figure BDA0003663617600000128
and calculates a prediction error e according to the formula (18-23) + (i ', j') and e - (i ', j '), i ' e [0,2H ] in formula (18-23)],j′∈[0,2W]:
Figure BDA0003663617600000129
Figure BDA00036636176000001210
Figure BDA00036636176000001211
Figure BDA00036636176000001212
Figure BDA00036636176000001213
Figure BDA00036636176000001214
Wherein, c q Surrounding pixels representing the prediction target pixel are used to generate a prediction value, q ∈ {0,1,2 …, q ∈ [ ], {0,1,2 … } max },q max The number of surrounding pixels used for prediction;
example q of the invention max Taking 4, c1, c2, c3 and c4 as x (i-1,j-1), x (i-1,j), x (i-1, j + 1) and x (i, j-1) respectively;
in the embodiment of the invention, the eshare subjected to extreme prediction technology 1 Prediction was performed with eshare in FIG. 4 1 (2,2) pixel value 33 pixel example, using overestimate predictor and underestimate predictor for eshare 1 (2,2) extreme prediction to generate
Figure BDA0003663617600000131
And
Figure BDA0003663617600000132
and calculates a prediction error e + (2,2) and e - (2,2), as follows:
Figure BDA0003663617600000133
Figure BDA0003663617600000134
e + (2,2)=0
e - (2,2)=-15
FIG. 9d is a diagram illustrating interpolation effects according to an embodiment of the present invention.
Step 4.3 generating a pair of asymmetric prediction error histograms, wherein the overestimated prediction error values generate a right-biased histogram H + Generating left-hand histogram H by underestimating prediction error value -
Specifically, as shown in fig. 5, a pair of asymmetric prediction error histograms are generated using a pair of prediction error values, and fig. 5a is a right-biased histogram H + FIG. 5b is a left-hand histogram H -
Step 4.4 according to the formulas (22) and (23), the double-layer embedding is completed based on histogram translation, and a right-biased histogram H is utilized + Secret sharing of eshare contained after embedding of the first layer' n Using left-hand histogram H - The secret sharing after the second layer embedding is eshare n (ii) a Wherein s is 1 Is a first layer of embedded secret information, s 2 Is a second layer of embedded secret information, s 1 And s 2 Is formed by D ξ Is divided equally to obtain + And T - Respectively, a right-biased histogram H + And left-hand histogram H - Peak point of, z + Is the zero value point on the left side of the peak value point of the right-hand histogram closest to the peak value point, z - Is the zero value point on the right side of the peak value point of the left partial histogram closest to the peak value point:
Figure BDA0003663617600000135
Figure BDA0003663617600000136
in the embodiment of the invention, the pixel with the pixel value of 33 in the second row and the second column in FIG. 6 is taken as an example, eshare' 1 Is a secret share after the first embedding, eshare 1 Is secret sharing after the second embedding, s 1 =1 is the first bit, s, in which the secret information is embedded 2 Is the second bit, T, in which secret information is embedded + =T - =0,z + =-17,z - =17:
e + (2,2)=0
eshare′ 1 (2,2)=33-1
e - (2,2)=-15
eshare″ 1 (2,2)=32
Step 4.5 repeat the operations of steps 4.2-4.4 until the traversal is completed with eshare n All of the pixels of (1).
FIG. 9e is a schematic diagram illustrating the embedding effect of the embodiment of the present invention.
Specifically, 1bit of secret information is embedded into a right-leaning prediction error histogram (the number of pixels on the right side of a peak value is more than that of pixels on the left side of the peak value), a prediction error value is compared with a threshold value, and if the prediction error value is equal to the threshold value, a pixel value is modified to be embedded into the secret information; if the prediction error value is smaller than the threshold value and larger than the nearest zero point on the left side of the peak value, the pixel value is reduced by one, and in other cases, the pixel value is unchanged; similarly, 1bit of secret information is embedded into a left inclination prediction error histogram (the number of pixels on the left side of the peak value is more than that of pixels on the right side of the peak value), the prediction error value is compared with a threshold value, and if the prediction error value is equal to the threshold value, the pixel value is modified and the secret information is embedded; if the prediction error value is larger than the threshold value and smaller than the nearest zero point on the right side of the peak value, the pixel value is added with one, and otherwise, the pixel value is unchanged. Repeating the process until the secret information is completely embedded to obtain the ciphertext image containing the secret.
The invention adopts an extreme prediction method to embed the secret data, and can obtain larger embedding rate for a plurality of natural images. Table 5 shows the embedded capacity of the experiment of the embodiment of the present invention compared with the related method, and it can be seen that the present invention has a larger capacity than the related method, about 7 times more than the other methods in capacity.
TABLE 5
Figure BDA0003663617600000141
It is worth noting that the present invention only shifts the side with the least number of pixels, frees up embedding space for secret information, and employs a bi-directional embedding strategy to take full advantage of redundant information in the image. Compared with the traditional method for embedding the secret information by the prediction error histogram, which needs to move the pixels at two sides of the peak value and vacates an embedding space for the secret information, the method has the advantages of less moving pixel amount, less influence on the image and better performance in a capacity distortion control task.
The secret information extraction and the carrier image recovery of the embodiment of the invention are sequentially carried out according to the following steps:
step 5.1 is to receive the dense shared image eshare ″' according to the formulas (17), (19) and (21) n Underestimating the prediction error, and recording the prediction error value as e -′ (i ', j'), the predicted value is recorded as
Figure BDA0003663617600000151
Specifically, as shown in FIG. 7, the figure shows eshare ″) 1 (2,2) as an example, the prediction error value is calculated: e.g. of the type - ′(2,2)=-16;
Step 5.2 Using the sum of (24) and
Figure BDA0003663617600000152
extracting second layer embedded secret information s' 2
Figure BDA0003663617600000153
Specifically, as shown in FIG. 7, eshare ″', which is shown in the figure 1 (2,2) for example, S is extracted first by traversing the dense image according to the reverse order of the embedding order, the reverse S 2 If the current pixel value minus the underestimation prediction value is equal to the threshold value, the secret information is 0, if the current pixel value minus the underestimation prediction value is equal to the threshold value plus 1, the secret information is 1, otherwise, no information is hidden:
Figure BDA0003663617600000154
Figure BDA0003663617600000155
thus, the secret information is not hidden in the second layer of embedding within the current pixel.
Step 5.3, the second layer pixel value reshare' is restored according to the formula (25) n
Figure BDA0003663617600000156
Specifically, as shown in FIG. 7, eshare ″ 1 (2,2) for example, the second layer pixel values are restored:
Figure BDA0003663617600000157
reshare″ 1 (2,2)=32
repeating the steps 5.1-5.3 until all secret information of the second layer is extracted and the reshare' is completely recovered n ,reshare″ n Equivalent to eshare' n
Step 5.4 Pair of reshare ″, according to equations (16) (18) and (20) n Performing overestimation on the prediction error, and recording the prediction error value as e +′ (i ', j'), the predicted value is recorded as
Figure BDA0003663617600000158
Specifically, as shown in FIG. 7, the residual ″' in the figure 1 (2,2) as an example, the prediction error value is calculated: e.g. of the type +′ (2,2)=-1;
Step 5.5 based on equation (26) and calculated
Figure BDA0003663617600000159
Extracting first layer embedded secret information s' 1
Figure BDA0003663617600000161
Specifically, as shown in FIG. 7, the term "reshare 1 (2,2) for example, if the current pixel value minus the overestimated prediction value is equal to the threshold, the secret information is 0, if it is, the secret information is 0Equal to the threshold plus one, the secret information is 1.
Figure BDA0003663617600000162
s′ 1 =1
Step 5.6 recovers the first layer secret information pixel value reshare 'according to formula (27)' n
Figure BDA0003663617600000163
Specifically, as shown in FIG. 7, reshare 'is used' 1 (2,2) for example, recovery of eshare without secret information 1 Pixel value of (a):
Figure BDA0003663617600000164
reshare′ 1 (2,2)=32+1
repeating steps 5.4-5.6 until all secret information of the first layer is extracted and reshare 'is completely recovered' n ,reshare′ n Equivalent to eshare n I.e. non-embedded image, fig. 9f is a diagram of the effect of recovering the carrier image according to the embodiment of the present invention;
step 5.7 recovery of secret information
S 'extracted' 1 And s' 2 Respectively arranging and connecting according to the extraction sequence to obtain D ξ 、D ω 、D δ D is ω And D δ Combining to obtain D; sharing is distributed to different users, and only 2 users provide respective sharing together, the initial secret can be reconstructed;
(1) If hidden D ω Using the other two shares to extract secret information D ξ And D δ To give out D ω The secret information D is recovered according to equation (28):
Figure BDA0003663617600000165
specifically, eshare ″' is extracted 2 And eshare 3 The hidden secret information in the table is decoded by XOR operation to obtain eshare 1 In the hidden secret information
Figure BDA0003663617600000166
Recombining D, D = {219, 218, 132, 235, 120, 48, 211, 139};
(2) If hidden D δ Using the other two shares to extract secret information D ξ And D ω To give out D δ The secret information D is recovered according to the formula (29):
Figure BDA0003663617600000171
specifically, eshare ″' is extracted 1 And eshare 3 In the secret information, the eshare decoded by XOR operation 2 In the hidden secret information
Figure BDA0003663617600000172
Recombining into secret information D: d = {219, 218, 132, 235, 120, 48, 211, 139};
(3) If hidden D ξ With other two shares sharing the extracted secret information D ω And D δ Merging, and recovering the secret information D according to the formula (30):
D=D ω +D δ (30)
specifically, directly set {219, 218, 132, 235} + {120, 48, 211, 139} = {219, 218, 132, 235, 120, 48, 211, 139};
it is worth noting that the invention creates an anonymous mechanism for secret information, which is capable of resisting collusion analysis, and in case of traitor with one data hiding party, the secret information can be completely recovered by using the secret information extracted from other two shares, thereby improving the security and reliability of the invention. Fig. 11 shows a difference image of the watermark and the extracted watermark according to the embodiment of the present invention, and BER =0, which indicates that the present invention can implement lossless extraction.
Step 5.8, splitting D to obtain an LM (mean squared error) graph and secret information YD ', traversing YD' according to a S-shaped traversal sequence, and converting the YD 'into a matrix YD' with the size of g multiplied by l;
Figure BDA0003663617600000173
step 5.9 Using the decryption Key K 1 And K 2 Generating a matrix M' according to the steps 3.1 and 3.2;
step 5.10 executing bitwise XOR operation on YD 'and M' to generate decrypted secret information YD;
Figure BDA0003663617600000174
in particular, the amount of the solvent to be used,
Figure BDA0003663617600000175
step 5.11 extraction of all reshare' n (2 i '-1,2j' -1) pixel points are rearranged to obtain share n Where i' is E [1,2H],j′∈[1,2W];
Specifically, as shown in FIG. 8, reshare 'is taken' n (1,1)、reshare′ n (1,3)、reshare′ n (3,1)、reshare′ n (3,3);
Step 5.12 merge share according to formula (32) n Recovering the carrier image RX, where i ∈ [1,H ∈ [ ]],j∈[1,W];
rx(i,j)=share 1 (i,j)+share 2 (i,j)+share 3 (i,j) (32)
By using the special property of additive secret sharing, the carrier image can be directly and quickly recovered by directly adding the distributed n shares without separating bit planes and recovering high, middle and low order parts,
step 5.13, separating the RX bit planes by using the formula (1-4), and exchanging the high order and the low order by using the formula (5-6) to recover the carrier image X;
specifically, pixel value (126) 10 =(01111110) 2 Higher order (011) 2 And (110) 2 Exchange to give (11011011) 2
x h =(110) 2 ×2 5
x l =(011) 2 ÷2 5
And 5.14, changing the pixel value of the corresponding position in the X marked as 0 in the LM picture into 0 by using the LM picture, and completely recovering the original carrier image.
FIG. 12 shows a NIQE measurement versus bar graph of an original image and a restored image, which are identical, indicating that lossless restoration can be achieved by the present invention.
It should be noted that since data embedding and image encryption are independent, data extraction and image reconstruction are separable.
The invention provides an additive secret sharing mechanism, a name-removing mechanism, an extreme prediction mechanism and a ciphertext domain double-layer reversible embedding strategy, and has the advantages of high safety, large capacity and high image quality. Since each step of the encryption and embedding process is reversible, the present invention can fully recover the embedded data and the original image without data distortion.
Table 6 shows comparison of the encryption and decryption theoretical time complexity of the secret sharing and the related methods, and in general, the encryption and decryption computation complexity of the present invention is O (n), which is lower than that of other related documents, indicating that the encryption scheme proposed by the present invention has higher efficiency. Table 7 shows the actual run-time comparison, and it can be seen that even though the dual-layer embedding strategy is implemented, the average time for embedding 1bit is 0.000002, which is lower than that of other related references, indicating that the embedding efficiency of the present invention is high.
TABLE 6
Figure BDA0003663617600000181
TABLE 7
Figure BDA0003663617600000191
Reference documents:
[1]Manikandan V M,Zhang Y D.An adaptive pixel mapping based approach for reversible data hiding in encrypted images[J].Signal Processing:Image C ommunication,116690,2022.
[2]Chen Y C,Hung T H,Hsieh S H,et al.A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic a lgorithms[J].IEEE Transactions on Information Forensics and Security,14(12):3332-3343,2019.
[3]S.Xiang and X.Luo,″Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group,″in IEEE Transactiohs on Circuits an d Systems for Video Technology,vol.28,no.11,pp.3099-3110,Nov.2018.
[4]Z.Tang,S.Xu,D.Ye,J.Wang,X.Zhang,C.Yu,Real-time reversible d atahiding with shifting block histogram of pixel differences in encrypted image,J.Real-Time Image Process,16(3),709-724,2019.
[5]L.Xiong,Z.Xu,Y.-Q.Shi,An integer wavelet transform based scheme f or reversible data hiding in encrypted images,Multidimens.Syst.Signal Proces s,29(3),1191-1202,2018.
[6]S.Agrawal,M.Kumar,Mean value based reversible data hiding in encryp ted images,Optik-Int.J.Light Electron Opt,130,922-934,2017.
[7]M.Li,Y.Li,Histogram shifting in encrypted images with public key cryp tosystem for reversible data hiding,Signal Process,130,190-196,2017
[8]S.Xiang,X.Luo,“Reversible data hiding in homomorphic encrypted dom ain by mirroring ciphertext group,”IEEE Trans.Circuits Syst.Video Technol.,vol.28,pp.3099-3110,Nov.2018.
[9]X.Wu,J.Weng,and W.Yan,“Adopting secret sharing for reversible data hiding in encrypted images,”Signal Process.,vol.143,pp.269-281,2018.
[10]Y Ke,M.Zhang,J.Liu,T.Su,and X.Yang,“Fully Homomorphic Encry ption Encapsulated Difference Expansion for Reversible DataHiding in Encrypte d Domain,”IEEE Transactions on Circuits and Systems for Video Technology,vol.30,pp.2353-2365,2020.

Claims (2)

1. a secret sharing based ciphertext domain extreme prediction double-layer reversible information hiding method is characterized by comprising the following steps in sequence:
step 1, preprocessing an original carrier image:
step 1.1, traversing all pixels in an original carrier image with the dimension of H multiplied by W, marking the pixel point with the pixel value of 0 as 0, and marking the non-0 pixel point as 1 to obtain an LM (Levenberg-Marquard) image;
step 1.2, traversing all pixels in an original carrier image with the dimension of H multiplied by W, setting a 0-value pixel as 1, and obtaining a carrier image X with the pixel range of [1, 255 ];
step 2, encrypting the carrier image X by additive secret sharing
Step 2.1 Each pixel X of the support image X is processed according to the formula (1-4) l (i, j) is divided into three sections: x is the number of h High order bit part, x m Intermediate order part and x l A lower-order bit portion in which i ∈ [1,H ]],j∈[1,W],α∈(0,7),β∈(0,7),α+β≤7;
x(i,j)=x h (i,j)×2 α +x m (i,j)×2 β +x l (i,j) (1)
Figure FDA0003663617590000011
Figure FDA0003663617590000012
x l (i,j)=x(i,j)-x h (i,j)×2 α -x m (i,j)×2 β (4)
The x is expressed according to the formula (5-6) h High order bit portion and x l And (3) low-order bit part exchange:
x h =x l ×2 a (5)
x l =x h ÷2 a (6)
step 2.2 according to the formula (7-9), the separated x h High order bit part, x m Middle-order part, x l Low order bit portions randomly partitioned into
Figure FDA0003663617590000013
Wherein r ∈ {1,2,3, …, r max },r max Is a positive integer;
Figure FDA0003663617590000014
Figure FDA0003663617590000015
Figure FDA0003663617590000016
step 2.3 will
Figure FDA0003663617590000017
Re-randomly combining according to the formula (10) to generate n shared encrypted carriers share n Where n is the {1,2,3, …, r max },
Figure FDA0003663617590000018
The upper corner marks r are respectively in the set {1,2,3, …, r max Get the value and mark r in the same order position can not be repeated, i.e. r in the same order position is not equal to r +1 not equal to … not equal to r max
Figure FDA0003663617590000021
Step 3 encrypting the secret information using a mechanism for name removal
Step 3.1 generates a random number sequence L as long as the secret information matrix YD of size g × L according to the formula (11) 1 Where k is equal to {1,2,3 …, g × l },0 < x 0 Less than 1,3.5699456 less than or equal to 4 mu, selecting x 0 Mu is stored as a secret key K 1
x k+1 =μx k (1-x k ) (11)
Step 3.2 transform the range of values in the random number sequence to [0, 255] according to equation (12)]Then, the transformed one-dimensional random sequence is converted into a two-dimensional matrix M with the size equal to that of the secret information matrix, namely, gxl; and store K 2 K in the formula (14) 2 The random key is a positive integer;
Figure FDA0003663617590000022
step 3.3, converting the two-dimensional matrix M and the secret information matrix YD into binary systems, then carrying out bitwise XOR operation, and finally converting the binary systems subjected to XOR into decimal systems;
step 3.4, the two-dimensional matrix subjected to the exclusive or operation is converted into a one-dimensional sequence YD' with the length of p based on S-shaped traversal, wherein p = g × l and is an even number;
step 3.5 connect LM map with one-dimensional sequence YD' = { d = { 1 ,d 2 ,...,d p Connecting to generate D and splitting the D into two equal parts according to a formula (13), wherein D is the number of D ω And D δ
Figure FDA0003663617590000023
The length of D for u;
D=D ω +D δ (13)
step 3.6 preparation of D according to equation (14) ω And D δ Generating third party secret information D according to bit XOR ξ
Figure FDA0003663617590000024
Step 4 Dual-layer embedding strategy
Step 4.1 selects four known points f (0,0), f (1,0), f (0,1), f (1, 10) as reference pixels, and uses the share as a bilinear interpolation method according to formula (15) n Extended to obtain eshare n ,:
f(x,y)=f(0,0)(1-x)(1-y)+f(1,0)x(1-y)+f(0,1)(1-x)y+f(1,1)xy (15)
Step 4.2 using extreme prediction technique to correct eshare n Making a prediction using an overestimated predictor p + And underestimation predictor p - Respectively to eshare n Performing extreme prediction to generate
Figure FDA0003663617590000025
And
Figure FDA0003663617590000026
and calculates a prediction error e according to the formula (16-21) + (i ', j') and e - (i ', j '), i ' e [0,2H ] in equation (18-23)],j′∈[0,2W]:
Figure FDA0003663617590000027
Figure FDA0003663617590000028
Figure FDA0003663617590000031
Figure FDA0003663617590000032
Figure FDA0003663617590000033
Figure FDA0003663617590000034
Wherein, c q Surrounding pixels representing the prediction target pixel are used to generate a prediction value, q ∈ {0,1,2 …, q ∈ [ ], {0,1,2 … } max },q max The number of surrounding pixels used for prediction;
step 4.3 generating a pair of asymmetric prediction error histograms, wherein the overestimated prediction error values generate a right-biased histogram H + Generating left-hand histogram H by underestimating prediction error value -
Step 4.4 according to the formulas (22) and (23), the double-layer embedding is completed based on histogram translation, and a right-biased histogram H is utilized + Secret sharing of eshare contained after embedding of the first layer' n Using left-hand histogram H - The secret sharing after the second layer embedding is eshare n (ii) a Wherein s is 1 Is the first layer of embedded secret information, s 2 Is a second layer of embedded secret information, s 1 And s 2 Is formed by D ξ Is divided equally to obtain + And T - Respectively, a right-biased histogram H + And left-hand histogram H - Peak point of, z + Is the zero value point on the left side of the peak value point of the right-hand histogram closest to the peak value point, z - Is the zero value point on the right side of the peak value point of the left partial histogram closest to the peak value point:
Figure FDA0003663617590000035
Figure FDA0003663617590000036
step 4.5 repeat the operations of steps 4.2-4.4 until the traversal is completed with eshare n All of the pixels of (1).
2. The secret sharing based ciphertext domain extreme prediction double-layer reversible information hiding method according to claim 1, wherein the secret information extraction and the carrier image recovery are sequentially performed according to the following steps:
step 5.1, according to the formulas (17), (19) and (21), the received dense shared image eshare ″ n Underestimating the prediction error, and recording the prediction error value as e -′ (i ', j'), and the predicted value is recorded as
Figure FDA0003663617590000037
Step 5.2 Using the sum of (24) and
Figure FDA0003663617590000038
extracting secret information s 'embedded in second layer' 2
Figure FDA0003663617590000041
Step 5.3, the second layer pixel value reshare' is restored according to the formula (25) n
Figure FDA0003663617590000042
Repeating the steps 5.1-5.3 until all secret information of the second layer is extracted and the reshare' is completely recovered n The aforementioned reshare n Equivalent to eshare' n
Step 5.4 Pair of reshare ″, according to equations (16) (18) and (20) n Performing overestimation on the prediction error, and recording the prediction error value as e +′ (i ', j'), the predicted value is recorded as
Figure FDA0003663617590000043
Step 5.5 based on equation (26) and the calculated
Figure FDA0003663617590000044
Extracting first layer embedded secret information s' 1
Figure FDA0003663617590000045
Step 5.6 recovers the first layer secret information pixel value reshare 'according to formula (27)' n
Figure FDA0003663617590000046
Repeating steps 5.4-5.6 until all secret information of the first layer is extracted and reshare 'is completely recovered' n ,reshare′ n Equivalent to eshare n I.e. not embedding a dense image;
step 5.7 recovery of secret information
S 'extracted' 1 And s' 2 Respectively arranging and connecting according to the extraction sequence to obtain D ξ 、D ω 、D δ D, mixing ω And D δ Combining to obtain D; sharing is distributed to different users, and only 2 users provide respective sharing together, the initial secret can be reconstructed;
(1) If hidden D ω Using the other two shares to extract secret information D ξ And D δ Is solved to obtain D ω The secret information D is recovered according to equation (28):
Figure FDA0003663617590000047
(2) If hidden D δ Using the other two shares to extract secret information D ξ And D ω To give out D δ The secret information D is recovered according to the formula (29):
Figure FDA0003663617590000048
(3) If hidden D ξ With other two shares sharing the extracted secret information D ω And D δ Merging, and recovering the secret information D according to the formula (30):
D=D ω +D δ (30)
step 5.8, splitting D to obtain an LM (mean squared error) graph and secret information YD ', traversing YD' according to a S-shaped traversal sequence, and converting the YD 'into a matrix YD' with the size of g multiplied by l;
step 5.9 Using the decryption Key K 1 And K 2 Generating a matrix M' according to the steps 3.1 and 3.2;
step 5.10 executing bitwise XOR operation on YD 'and M' to generate decrypted secret information YD;
Figure FDA0003663617590000051
step 5.11 extraction of all reshare' n (2 i '-1,2j' -1) pixel points are rearranged to obtain share n Where i' is E [1,2H],j′∈[1,2W];
Step 5.12 merge share according to formula (32) n Recovering the carrier image RX, where i ∈ [1,H ∈ [ ]],j∈[1,W];
rx(i,j)=share 1 (i,j)+share 2 (i,j)+share 3 (i,j) (32)
Step 5.13, separating the RX bit plane by using a formula (1-4), exchanging high and low orders by using a formula (5-6), and recovering a carrier image X;
and 5.14, changing the pixel value of the corresponding position in the X marked as 0 in the LM picture into 0 by using the LM picture, and completely recovering the original carrier image.
CN202210580640.9A 2022-05-26 2022-05-26 Secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method Active CN115242930B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210580640.9A CN115242930B (en) 2022-05-26 2022-05-26 Secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210580640.9A CN115242930B (en) 2022-05-26 2022-05-26 Secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method

Publications (2)

Publication Number Publication Date
CN115242930A true CN115242930A (en) 2022-10-25
CN115242930B CN115242930B (en) 2023-07-07

Family

ID=83668477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210580640.9A Active CN115242930B (en) 2022-05-26 2022-05-26 Secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method

Country Status (1)

Country Link
CN (1) CN115242930B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007010862A (en) * 2005-06-29 2007-01-18 Kddi Corp Image distribution information generation device, and image distribution information compositing device
US20190213711A1 (en) * 2018-01-08 2019-07-11 National Kaohsiung University Of Science And Technology Color image authentication method based on palette compression technique
CN111654592A (en) * 2020-06-05 2020-09-11 中国矿业大学 Multi-image hiding method based on secret sharing
CN113190807A (en) * 2021-05-31 2021-07-30 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on image secret sharing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007010862A (en) * 2005-06-29 2007-01-18 Kddi Corp Image distribution information generation device, and image distribution information compositing device
US20190213711A1 (en) * 2018-01-08 2019-07-11 National Kaohsiung University Of Science And Technology Color image authentication method based on palette compression technique
CN111654592A (en) * 2020-06-05 2020-09-11 中国矿业大学 Multi-image hiding method based on secret sharing
CN113190807A (en) * 2021-05-31 2021-07-30 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on image secret sharing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周能;张敏情;林文兵;: "基于秘密共享的可分离密文域可逆信息隐藏算法", 计算机工程, vol. 46, no. 10, pages 112 - 119 *
张敏情;周能;刘蒙蒙;柯彦;: "同态加密域可逆信息隐藏技术研究", 信息网络安全, vol. 42, no. 08, pages 1480 - 1489 *

Also Published As

Publication number Publication date
CN115242930B (en) 2023-07-07

Similar Documents

Publication Publication Date Title
Qin et al. Reversible data hiding in encrypted image with separable capability and high embedding capacity
Wu et al. A high-capacity reversible data hiding method for homomorphic encrypted images
Wu et al. Reversible data hiding in Paillier cryptosystem
Lin et al. Invertible secret image sharing with steganography
Wang et al. Reversible data hiding in encrypted images with block-based adaptive MSB encoding
Wang et al. A path optional lossless data hiding scheme based on VQ joint neighboring coding
Patel et al. Lazy wavelet transform based steganography in video
CN109889687B (en) JPEG image bit stream encryption method based on alternating current statistical characteristic change
Xiang et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer
Chen et al. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map
Ma et al. Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform
CN114172630B (en) Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
Maurya et al. An extended visual cryptography technique for medical image security
Chen et al. Reversible watermarking for medical images using histogram shifting with location map reduction
Han et al. Reversible data hiding in encrypted image with local-correlation-based classification and adaptive encoding strategy
Jung High-capacity reversible data hiding method using block expansion in digital images
Gao et al. Double verifiable image encryption based on chaos and reversible watermarking algorithm
Liu et al. A reversible data hiding algorithm based on image camouflage and bit-plane compression
AU2021102700A4 (en) A system for reversible data hiding in encrypted images
Bhardwaj et al. An efficient reversible and secure patient data hiding algorithm for E-healthcare
CN115242930B (en) Secret sharing-based ciphertext domain extreme prediction double-layer reversible information hiding method
CN115190216A (en) Encryption image reversible data hiding and decrypting method based on prediction error map
Yang et al. Reversible data hiding in the spatial and frequency domains
Rohith et al. Reversible data embedding scheme in encrypted image using Arnold transform for satellite images
Ren et al. Reversible Data Hiding in Encrypted Images Based on Adaptive Predictionerror Label Map.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant