Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism

08/20/2022
by   Yan Ke, et al.
0

Considering the prospects of public key embedding (PKE) mechanism in active forensics on the integrity or identity of ciphertext for distributed deep learning security, two reversible data hiding in encrypted domain (RDH-ED) algorithms with PKE mechanism are proposed, in which all the elements of the embedding function shall be open to the public, while the extraction function could be performed only by legitimate users. The first algorithm is difference expansion in single bit encrypted domain (DE-SBED), which is optimized from the homomorphic embedding framework based on the bit operations of DE in spatial domain. DE-SBED is suitable for the ciphertext of images encrypted from any single bit encryption and learning with errors (LWE) encryption is selected in this paper. Pixel value ordering is introduced to reduce the distortion of decryption and improve the embedding rates (ER). To apply to more flexible applications, public key recoding on encryption redundancy (PKR-ER) algorithm is proposed. Public embedding key is constructed by recoding on the redundancy from the probabilistic decryption of LWE. It is suitable for any plaintext regardless of the type of medium or the content. By setting different quantization rules for recoding, decryption and extraction functions are separable. No distortion exists in the directly decrypted results of the marked ciphertext and ER could reach over 1.0 bits per bit of plaintext. Correctness and security of the algorithms are proved theoretically by deducing the probability distributions of ciphertext and quantization variable. Experimental results demonstrate the performances in correctness, one-way attribute of security and efficiency of the algorithms.

READ FULL TEXT
research
04/29/2019

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain

This paper proposes a fully homomorphic encryption encapsulated differen...
research
09/25/2020

A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on sym...
research
12/06/2019

Reversible Data Hiding in Encrypted Images Using MSBs Modulation and Histogram Modification

This paper presents a reversible data hiding in encrypted image that emp...
research
12/06/2019

Reversible Data Hiding in Encrypted Images Using MSBs Integration and Histogram Modification

This paper presents a reversible data hiding in encrypted image that emp...
research
02/19/2019

Effectiveness of Crypto-Transcoding for H.264/AVC and HEVC Video Bit-streams

To avoid delays arising from a need to decrypt a video prior to transcod...
research
03/16/2022

Encrypted Operator Computing: an alternative to Fully Homomorphic Encryption

We introduce a new approach to computation on encrypted data – Encrypted...
research
03/13/2023

The Realizations of Steganography in Encrypted Domain

With the popularization and application of privacy protection technologi...

Please sign up or login with your details

Forgot password? Click here to reset