Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reversible data hiding method in homomorphic encryption domain based on code division multiplexing and value expansion

A code division multiplexing and homomorphic encryption technology, applied in the field of information hiding, can solve the problems that adjacent pixels do not meet the preprocessing and embedded secret information conditions, and the image embedding capacity and quality have not been significantly improved, so as to improve the quality. Effect

Active Publication Date: 2018-01-16
江苏羽驰区块链科技研究院有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the difference extension method is used, some adjacent pixels do not meet the conditions of preprocessing and embedding secret information
Therefore, although this method reduces data expansion and improves the running time efficiency of the algorithm, the image embedding capacity and quality have not been significantly improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reversible data hiding method in homomorphic encryption domain based on code division multiplexing and value expansion
  • Reversible data hiding method in homomorphic encryption domain based on code division multiplexing and value expansion
  • Reversible data hiding method in homomorphic encryption domain based on code division multiplexing and value expansion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] attached Figure 2A-2E are five original images as carrier images in Embodiment 1 of the present invention, with Figures 3A-3E is the image obtained after direct decryption in Embodiment 1 of the present invention, with Figures 4A-4E It is the image restored by Embodiment 1 of the present invention. Figure 2A-Figure 2E The five original images are all standard images with a pixel value of 512×512, and the Figure 2A-Figure 2E The five original images are used as carrier images, using the reversible information hiding method in the homomorphic encryption domain based on code division multiplexing and value expansion provided by the present invention, when the chip sequence length l=2, the experimental results of the value expansion parameter k=1 like Figures 3A-3E , 4A-4E shown. At this time, the embedding capacity of the image has reached 2bpp, and the image quality PSNR is 46.37dB, 46.36dB, 46.37dB, 46.72dB and 46.73dB respectively. It can be seen from the abo...

Embodiment 2

[0086] attached Figure 5 It is a relationship diagram between embedding capacity and image quality obtained by using an original image as a carrier image in Embodiment 2 of the present invention. In this embodiment, a standard image with a pixel size of 512×512 is used as a carrier image, and the homomorphic encryption domain reversible information hiding method based on code division multiplexing and value expansion provided by the present invention is adopted. When the chip sequence length l=2, Value expansion parameter k=1, 2, the relationship between the obtained embedded capacity payload and image quality PSNR is as follows Figure 5 shown. At the same time, with Wuet al.2016 (X.T.Wu, B.Chen J.Wei, Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer, J.Vis.Commun.ImageRepresent.41(2016)58-64.), Shui et al.2015 (C.W.Shui, Y.C.Chen, W.Hong, Encrypted image-based reversible data hiding with public key cryptography from differe...

Embodiment 3

[0088] attached Image 6 is a histogram of the influence of chip sequence length and value extension parameters on the maximum embedding capacity of an image in Embodiment 3 of the present invention. like Image 6 As shown, in the process of hiding the secret information, if only the method of code division multiplexing is adopted, as shown in the figure, when l=2 and l=4, the maximum embedding capacity is respectively 1bpp and 3bpp; The reversible information hiding method of homomorphic encryption domain based on code division multiplexing and value expansion, that is, on the basis of code division multiplexing, also adopts the method of value expansion, as shown in the figure l=2, k=1, the maximum embedding capacity is 2bpp.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data hiding, and particularly relates to a reversible data hiding method in a homomorphic encryption domain based on code division multiplexing and value expansion. The reversible data hiding method in the homomorphic encryption domain based on code division multiplexing and value expansion comprises the following steps of pre-processing an originalimage and secret information; generating a key pair; encrypting a host signal and encrypting embedded data; embedding data; and extracting data and restoring the image. Embedding capacity and qualityof a carrier image are improved, and the image and embedded data are reversible completely.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a method for reversible information hiding in a homomorphic encryption domain based on code division multiplexing and value expansion. Background technique [0002] For some special fields of information hiding, such as medical and military images, in addition to lossless extraction of secret information, it is also necessary to restore the original image losslessly. With the advent of the cloud computing era, people often upload images to the cloud for storage or processing. However, while these technologies are developing, they also raise issues of image content security and privacy protection. For example, images uploaded to the cloud may contain basic personal information of users and important information of their units. Images must therefore be encrypted before being uploaded to the cloud. At the same time, in order to authenticate the source of the encrypted i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/16G06F21/60G06F21/62G06T1/00
Inventor 陈先意仲海东陈盛孙星明
Owner 江苏羽驰区块链科技研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products