|
广西师范大学学报(自然科学版) ›› 2024, Vol. 42 ›› Issue (2): 1-15.doi: 10.16088/j.issn.1001-6600.2023062701
• • 下一篇
涂广升1, 孔咏骏1*, 宋哲超2, 叶康3
TU Guangsheng1, KONG Yongjun1*, SONG Zhechao2, YE Kang3
摘要: 密文域可逆信息隐藏技术融合了加密技术和信息隐藏技术的双重优势,旨在实现公开信道上数据内容的隐私保护和信息的可逆嵌入功能,以应对云环境下日益复杂的用户应用需求。本文从密态数据管理、情报隐蔽通信、军事协同作战、技术融合创新4个应用场景分析密文域可逆信息隐藏的研究价值,根据信息嵌入与数据加密的操作关系对密文域可逆信息隐藏分类,对不同嵌入框架下的技术发展进行阐述和总结。同时,从嵌入性能提升、可分离性实现、图像的加密安全性、满足云环境下的应用需求4个方面对密文域可逆信息隐藏的技术难点进行剖析,并对后续研究方向进行分析和展望。
中图分类号: TP309.7
[1] MAO Y Y, YOU C S, ZHANG J, et al. A survey on mobile edge computing: the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017, 19(4): 2322-2358. DOI: 10.1109/COMST.2017.2745201. [2] YAN K, LUO G C, ZHENG X, et al. A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-sensing[J]. IEEE Access, 2019, 7: 77541-77554. DOI: 10.1109/ACCESS.2019.2921274. [3] WU D P, SI S S, WU S E, et al. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J]. IEEE Internet of Things Journal, 2018, 5(4): 2958-2970. DOI: 10.1109/JIOT.2017.2768073. [4] ZHOU J, CAO Z F, DONG X L, et al. Security and privacy for cloud-based IoT: challenges[J]. IEEE Communications Magazine, 2017, 55(1): 26-33. DOI: 10.1109/MCOM.2017.1600363CM. [5] GE X R, YU J, ZHANG H L, et al. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 490-504. DOI: 10.1109/TDSC.2019.2896258. [6] LIANG X Q, YAN Z, CHEN X F, et al. Game theoretical analysis on encrypted cloud data deduplication[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5778-5789. DOI: 10.1109/TII.2019.2920402. [7] SUN J F, XIONG H, ZHANG H, et al. Mobile access and flexible search over encrypted cloud data in heterogeneous systems[J]. Information Sciences, 2020, 507: 1-15. DOI: 10.1016/j.ins.2019.08.026. [8] 柯彦, 张敏情, 刘佳, 等. 密文域可逆信息隐藏综述[J]. 计算机应用, 2016, 36(11): 3067-3076, 3092. DOI: 10.11772/j.issn.1001-9081.2016.11.3067. [9] KUMAR S, GUPTA A, WALIA G S. Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges[J]. Applied Intelligence, 2022, 52(7): 7373-7406. DOI: 10.1007/s10489-021-02789-2. [10] 殷赵霞. 面向隐私保护的数字图像隐写方法研究[D]. 合肥: 安徽大学, 2014. [11] 俞春强, 邓方舟, 张显全, 等. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32. DOI: 10.16088/j.issn.1001-6600.2018.02.004. [12] KONG P, FU D, LI X R, et al. Reversible data hiding in encrypted medical DICOM image[J]. Multimedia Systems, 2021, 27(3): 303-315. DOI: 10.1007/s00530-020-00739-5. [13] KITTAWI N, AL-HAJ A. Reversible data hiding using bit flipping and histogram shifting[J]. Multimedia Tools and Applications, 2022, 81(9): 12441-12458. DOI: 10.1007/s11042-022-12364-7. [14] PUTEAUX P, ONG S Y, WONG K S, et al. A survey of reversible data hiding in encrypted images: the first 12 years[J]. Journal of Visual Communication and Image Representation, 2021, 77: 103085. DOI: 10.1016/j.jvcir.2021.103085. [15] LI J, MA R H, GUAN H B. TEES: an efficient search scheme over encrypted data on mobile cloud[J]. IEEE Transactions on Cloud Computing, 2017, 5(1): 126-139. DOI: 10.1109/TCC.2015.2398426. [16] 武晓帅, 徐明, 乔通, 等. 图像空域可逆信息隐藏研究进展[J]. 中国图象图形学报, 2022, 27(1): 125-149. DOI: 10.11834/jig.210292. [17] 李名. 信息熵视角下的密文图像信息隐藏研究[D]. 重庆: 重庆大学, 2014. [18] SUN Y, ZHANG X. A kind of covert channel analysis method based on trusted pipeline[C]// 2011 International Conference on Electrical and Control Engineering. Piscataway, NJ: IEEE, 2011: 5660-5663. DOI: 10.1109/ICECENG.2011.6058071. [19] 王玮, 王位, 石峰, 等. 美国海军数字化转型战略综述[J]. 舰船科学技术, 2021, 43(23): 170-175. DOI: 10.3404/j.issn.1672-7649.2021.12.031. [20] 赵国宏. 作战云体系结构研究[J]. 指挥与控制学报, 2015, 1(3): 292-295. [21] 程学旗, 靳小龙, 王元卓, 等. 大数据系统和分析技术综述[J]. 软件学报, 2014, 25(9): 1889-1908. DOI: 10.13328/j.cnki.jos.004674. [22] YAN Z, WANG M J, LI Y X, et al. Encrypted data management with deduplication in cloud computing[J]. IEEE Cloud Computing, 2016, 3(2): 28-35. DOI: 10.1109/MCC.2016.29. [23] JUNG K H. A survey of reversible data hiding methods in dual images[J]. IETE Technical Review, 2016, 33(4): 441-452. DOI: 10.1080/02564602.2015.1102099. [24] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[C]// Proceedings of SPIE Volume 6819: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Bellingham, WA: SPIE, 2008: 68191E. DOI: 10.1117/12.766754. [25] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. DOI: 10.1109/LSP.2011.2114651. [26] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4): 199-202. DOI: 10.1109/LSP.2012.2187334. [27] ZHOU J T, SUN W W, DONG L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3): 441-452. DOI: 10.1109/TCSVT.2015.2416591. [28] ZHANG X P, QIAN Z X, FENG G R, et al. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328. DOI: 10.1016/j.jvcir.2013.11.001. [29] ZHANG X P, WANG Z C, YU J, et al. Reversible visible watermark embedded in encrypted domain[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 826-830. DOI: 10.1109/ChinaSIP.2015.7230520. [30] ZHENG S L, LI D D, HU D H, et al. Lossless data hiding algorithm for encrypted images with high capacity[J]. Multimedia Tools and Applications, 2016, 75(21): 13765-13778. DOI: 10.1007/s11042-015-2920-y. [31] OU B, LI X L, ZHANG W M. PVO-based reversible data hiding for encrypted images[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 831-835. DOI: 10.1109/ChinaSIP.2015.7230521. [32] HUANG F J, HUANG J W, SHI Y Q. New framework for reversible data hiding in encrypted domain[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2777-2789. DOI: 10.1109/TIFS.2016.2598528. [33] TANG Z J, XU S J, YAO H, et al. Reversible data hiding with differential compression in encrypted image[J]. Multimedia Tools and Applications, 2019, 78(8): 9691-9715. DOI: 10.1007/s11042-018-6567-3. [34] DI F Q, HUANG F J, ZHANG M Q, et al. Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding[J]. Multimedia Tools and Applications. 2018, 77(16): 20917-20935. DOI: 10.1007/s11042-017-5498-8. [35] GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. DOI: 10.1109/TCSVT.2018.2863029. [36] WANG Y M, HE W G. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022, 24: 1288-1298. DOI: 10.1109/TMM.2021.3062699. [37] CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. DOI: 10.1016/j.jvcir.2014.04.003. [38] CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. DOI: 10.1109/TDSC.2020.3011923. [39] XIANG Y P, XIAO D, ZHANG R, et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer[J]. Information Sciences, 2020, 545: 188-206. DOI: 10.1016/j.ins.2020.08.019. [40] MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562. DOI: 10.1109/TIFS.2013.2248725. [41] ZHANG W M, MA K D, YU N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127. DOI: 10.1016/j.sigpro.2013.06.023. [42] MATHEW T, WILSCY M. Reversible data hiding in encrypted images by active block exchange and room reservation[C]// 2014 International Conference on Contemporary Computing and Informatics (IC3I), Piscataway NJ: IEEE, 2014: 839-844. DOI: 10.1109/IC3I.2014.7019628. [43] YI S, ZHOU Y C. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. DOI: 10.1109/TMM.2018.2844679. [44] WU Y Q, XIANG Y Z, GUO Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. DOI: 10.1109/TMM.2019.2952979. [45] YU C Q, ZHANG X Q, ZHANG X P, et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(2): 451-466. DOI: 10.1109/TCSVT.2021.3062947. [46] ZHANG Y, YANG B, NIU X M. Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006, 17(2): 59-65. [47] NGUYEN T S, CHANG C C, CHANG W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing: Image Communication, 2016, 44: 84-91. DOI: 10.1016/j.image.2016.03.010. [48] XIANG S J, LUO X R. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28(11): 3099-3110. DOI: 10.1109/TCSVT.2017.2742023. [49] CAO X C, DU L, WEI X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5): 1132-1143. DOI: 10.1109/TCYB.2015.2423678. [50] QIU Y Q, YING Q C, YANG Y Y, et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(9): 5874-5887. DOI: 10.1109/TCSVT.2022.3163905. [51] PUTEAX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. DOI: 10.1109/TIFS.2018.2799381. [52] PUTEAX P, PUECH W. EPE-based huge-capacity reversible data hiding in encrypted images[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630788. [53] PUYANG Y, YIN Z X, QIAN Z X. Reversible data hiding in encrypted images with two-MSB prediction[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630785. [54] PUTEAUX P, PUECH W. A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021, 23: 636-650. DOI: 10.1109/TMM.2020.2985537. [55] YIN Z X, XIANG Y Z, ZHANG X P. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. DOI: 10.1109/TMM.2019.2936314. [56] 张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354-360. DOI: 10.11999/JEIT150702. [57] 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444. [58] 柯彦, 张敏情, 张英男. 可分离的密文域可逆信息隐藏[J]. 计算机应用研究, 2016, 33(11): 3476-3479. DOI: 10.3969/j.issn.1001-3695.2016.11.061. [59] 柯彦, 张敏情, 项文. 加密域的可分离四进制可逆信息隐藏算法[J]. 科学技术与工程, 2016, 16(27): 58-64. DOI: 10.3969/j.issn.1671-1815.2016.27.010. [60] 柯彦, 张敏情, 刘佳. 可分离的加密域十六进制可逆信息隐藏[J]. 计算机应用, 2016, 36(11): 3082-3087. DOI: 10.11772/j.issn.1001-9081.2016.11.3082. [61] KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain[C]// Digital Forensics and Watermarking: LNCS Volume 10082. Cham: Springer International Publishing AG, 2017: 470-484. DOI: 10.1007/978-3-319-53465-7_35. [62] KE Y, ZHANG M Q, LIU J, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133-144. DOI: 10.1016/j.jvcir.2018.05.002. [63] HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing: Image Communication, 2020, 80: 115632. DOI: 10.1016/j.image.2019.115632. [64] WU H T, CHEUNG Y M, YANG Z Y, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87-96. DOI: 10.1016/j.jvcir.2019.04.015. [65] KE Y, ZHANG M Q, LIU J, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2353-2365. DOI: 10.1109/TCSVT.2019.2963393. [66] SHANNON C E. A mathematical theory of communication[J]. Bell Labs Technical Journal, 1948, 27(4): 379-423. DOI: 10.1002/j.1538-7305.1948.tb01338.x. [67] DRAGOI I C, COLTUC D. On the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 187-189. DOI: 10.1109/TIFS.2020.3006382. [68] PUTEAUX P, PUECH W. Rebuttal: on the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2445-2446. DOI: 10.1109/TIFS.2021.3055630. [69] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150. DOI: 10.13328/j.cnki.jos.004820. [70] 施巍松, 孙辉, 曹杰, 等. 边缘计算: 万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5): 907-924. DOI: 10.7544/issn1000-1239.2017.20160941. [71] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83. DOI: 10.3724/SP.J.1001.2011.03958. [72] 林文敏. 云环境下大数据服务及其关键技术研究[D]. 南京: 南京大学, 2015. |
[1] | 肖宇庭, 吕晓琪, 谷宇, 刘传强. 基于拆分残差网络的糖尿病视网膜病变分类[J]. 广西师范大学学报(自然科学版), 2024, 42(1): 91-101. |
[2] | 梁钰婷, 罗玉玲, 张顺生. 基于压缩感知的混沌图像加密研究综述[J]. 广西师范大学学报(自然科学版), 2022, 40(5): 49-58. |
[3] | 周戎龙,罗玉玲,闭金杰,岑明灿,丘森辉,廖志贤. 图像并行加密算法在手持设备上的应用研究[J]. 广西师范大学学报(自然科学版), 2019, 37(3): 60-70. |
[4] | 孙容海, 施林甫, 黄丽艳, 唐振军, 俞春强. 基于图像插值和参考矩阵的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2019, 37(2): 90-104. |
[5] | 俞春强, 邓方舟, 张显全, 唐振军, 陈艳, 何南. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32. |
[6] | 俞春强, 付睿, 陈艳, 雷芸, 张显全, 王晓云. 基于信息隐藏的图像感兴趣区域保护算法[J]. 广西师范大学学报(自然科学版), 2016, 34(2): 67-73. |
|
版权所有 © 广西师范大学学报(自然科学版)编辑部 地址:广西桂林市三里店育才路15号 邮编:541004 电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn 本系统由北京玛格泰克科技发展有限公司设计开发 |