Check patentability & draft patents in minutes with Patsnap Eureka AI!

Ciphertext domain reversible-data-hiding (RDH) method based on left and right shifting of histogram

A technology of information hiding and histogram, which is applied in image communication and key distribution, can solve the problems of high embedding rate, high reversible security, non-expansion or small expansion of encrypted data, and limited application breadth. The effect of high practical significance and good safety guarantee

Active Publication Date: 2019-04-12
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing reversible information hiding algorithms in the ciphertext domain are usually difficult to take into account the characteristics of high embedding rate, high reversibility, security and encrypted data do not expand or expand little, and usually focus on the research of image signals, which limits the breadth of application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext domain reversible-data-hiding (RDH) method based on left and right shifting of histogram
  • Ciphertext domain reversible-data-hiding (RDH) method based on left and right shifting of histogram
  • Ciphertext domain reversible-data-hiding (RDH) method based on left and right shifting of histogram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the method of the present invention will be further described in detail below in conjunction with specific implementation methods and accompanying drawings.

[0022] like figure 1 As shown, the ciphertext domain reversible information hiding method based on the left and right shift of the histogram of the present invention comprises the following steps:

[0023] Step 101, encryption stage: the content owner performs additive homomorphic encryption and scrambling encryption on the carrier according to the encryption key, generates a ciphertext carrier and sends it to the information hider. The specific steps are as follows:

[0024] A1. The carrier is divided into blocks, and the original carrier data stream with a length of R×C is stored as a matrix X, X={x r,c |r=1, 2,..., R, c=1, 2,..., C}, divide the matrix into I×J non-overlapping sub-blocks X i,j , X i,j ={...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a ciphertext domain reversible-data-hiding (RDH) method based on left and right shifting of a histogram. Full encryption under carrier non-extension is realized through additive homomorphic encryption and block scrambling encryption, left and right shifting of the prediction error histogram of a carrier is utilized for double embedding of information, and balancing of a high embedding rate of a ciphertext domain and reversibility is maintained. The method comprises: an encryption phase, wherein homomorphic encryption and scrambling encryption are carried out on the carrier by a content owner through encryption keys, and a ciphertext carrier is generated; an information hiding phase, wherein information embedding is carried out by an information hider through left and right shifting of the prediction error histogram according to embedding keys, and a cipher carrying ciphertext carrier is generated; and an information extraction and carrier decryption phase, wherein the encryption keys are used by a valid recipient to directly decrypt the cipher carrying ciphertext carrier, and a carrier which is highly similar to the original carrier can be obtained, or the encryption keys and the embedding keys are used by the valid recipient, and ciphertext information and the original carrier can be obtained without distortion. Compared with the prior art, the method has the advantages that a better security guarantee is provided while the ciphertext carrier is not expanded, an information embedding rate of up to 2 bit / bit can be provided on the premise of completereversibility, the carrier is not limited to images, the method has scalability for continuous multimedia carriers, and the method has higher practical significance.

Description

technical field [0001] The invention relates to the fields of signal encryption and information hiding, in particular to a method for reversible information hiding in a ciphertext domain based on the left and right translation of a histogram. Background technique [0002] Technologies such as third-party cloud storage provide great convenience for the access of digital information media, but also bring serious data security and privacy requirements. As an important branch of information hiding technology, reversible information hiding (RDH) can meet the requirements of information embedding and undistorted recovery carrier at the same time, and is suitable for scenarios with high requirements for data authentication, especially remote sensing applications, military communications, medical applications, multimedia management and other fields. Reversible information hiding in ciphertext domain (RDH-ED), as a combination of ciphertext signal processing technology and informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04N1/32G06T1/00
CPCG06T1/0021H04L9/0822H04L9/0861H04L9/0863H04N1/32272
Inventor 张茹刘建毅卢春景
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More