Reversible Steganography in Encrypted Domain Based on LWE
ZHANG Minqing KE Yan SU Tingting
(Key Laboratory of Network and Information Security Under the Armed Police Force Department of Electronic Technology, Engineering University of the Chinese Armed Police Force, Xi’an 710086, China)
该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据实现了提取过程与解密过程的可分离。通过推导方案在解密与提取信息过程中出错的概率,得到直接影响方案正确性的参数为所选噪声的标准差,实验获得并验证了标准差的合理取值区间;通过推导嵌入后密文的分布函数,分析密文统计特征的变化情况,论证了嵌入密文的隐藏信息的不可感知性。该方案是在密文域进行的可逆隐写,与原始载体无关,适用于文本、图片、音频等各类载体。实验仿真结果表明该方案不仅能够保证可逆隐写的可靠性与安全性,而且1 bit明文在密文域最大可负载1 bit隐藏信息。
This paper proposes a novel scheme of reversible steganography in encrypted domain based on Learning With Errors (LWE). The original data is encrypted by the cryptographic algorithms with LWE. Then additional data could be embedded into the cipher text. With embedded cipher text, the additional data can be extracted by using data-hiding key, and the original data can be recovered by using encryption key, and the processes of extraction and decryption are separable. By deducing the error probability of the scheme, the standard deviation of noise sequence which directly related to the scheme’s correctness is mainly discussed, and reasonable range of the standard deviation is obtained by experiments. The probability distribution function of the embedded cipher text is deduced, that proves the embedded cipher text is not detective. The proposed scheme based on encrypted domain can apply to different kinds of media vehicle such as text, image or audio. Experimental results demonstrate that the proposed scheme can not only achieve statistical security without degrading the quality of encryption or data embedding, but realize that 1 bit original data can maximally load 1 bit additional data in encrypted domain.
张敏情,柯彦,苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354-360.
ZHANG Minqing, KE Yan, SU Tingting. Reversible Steganography in Encrypted Domain Based on LWE. JEIT, 2016, 38(2): 354-360.
ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
[2]
TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems Video Technology, 2003, 13(8): 890-896.
[3]
DRAGOI L and COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4): 1779-1790.
[4]
CACIULA I and COLTUC D. Improved control for low bit-rate reversible watermarking[C]. IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, 2014: 7425-7429.
[5]
ZHANG W, HU X, LI X, et al. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 2(7): 2775-2785.
[6]
JARALI A and RAO J. Unique LSB compression data hiding method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3): 17-21.
[7]
LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems Video Technology, 2007, 17(6): 774-778.
[8]
CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
[9]
KURIBAYASHI M and TANAKA H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2129-2139.
[10]
MEMON N and WONG P W. A buyer-seller watermarking protocol[J]. IEEE Transactions on Image Processing, 2001, 10(4): 643-649.
[11]
ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258.
[12]
MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562.
[13]
YU J, ZHU G, LI X, et al. Digital Forensics and Watermarking: An Improved Algorithm for Reversible Data Hiding in Encrypted Image[M]. Berlin Heidelberg, Springer- Verlag, 2014: 384-394.
[14]
LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2): 325-328.
[15]
WU X and SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(11): 387-400
WANG J H, WANG C, ZHANG W M et al. A secure image steganographic method in encrypted domain[J]. Journal of Electronics & Information Technology, 2012, 34(7): 1721-1726. doi: 10.3724/SP.J.1146.2011.01240.
[17]
REGEV O. On lattices, learning with errors, random linear codes and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Couputing, New York, USA, 2005: 84-93.
REGEV O. The learning with errors problem[OL]. http:// www.cs.tau.ac.il/~odedr/papers/lwesurvey. pdf, 2010.
[20]
GORDON R D. Values of Mills’ ratio of area to bounding ordinate and of the normal probability integral for large values of the argument[J]. The Annals of Mathematical Statistics, 1941(12): 364-366
[21]
LYUBASHEVSKY V, PEIKERT C, and REGEV O. On ideal lattices and learning with errors over rings[C]: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. French Riviera, 2010: 1-23.
[22]
ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security. 2012, 7(2): 826-832.
[23]
ZHANG X, QIAN Z, FENG G, et al. Efficient reversible data hiding in encrypted image[J]. Journal of Visual Communication and Image Representation, 2014, (25)2: 322-328.
[24]
AJTAI M. Generating hard instances of lattice problems[C]. Complexity of Computations and Proofs, Dept. Math., Seconda University Napoli, Caserta, Italy, 2004: 1-32.