Journal of Guangxi Normal University(Natural Science Edition) ›› 2024, Vol. 42 ›› Issue (2): 1-15.doi: 10.16088/j.issn.1001-6600.2023062701

    Next Articles

Research Progress and Technical Difficulties of Reversible Data Hiding in Encrypted Domain

TU Guangsheng1, KONG Yongjun1*, SONG Zhechao2, YE Kang3   

  1. 1. Key Laboratory of Network and Information Security of Chinese People Armed Police Force (Engineering University of CAPF), Xi’an Shaanxi 710086, China;
    2. Fujian Corps of CAPF, Fuzhou Fujian 350000, China;
    3. Chongqing Corps of CAPF, Chongqing 400000, China
  • Received:2023-06-27 Revised:2023-10-10 Published:2024-04-22

Abstract: Reversible data hiding in encrypted domain combines the dual advantages of encryption technology and data hiding technology, aiming to achieve privacy protection of data content on public channels,and reversible data embedding, so as to cope with the increasingly complex application requirements in the cloud environment. The research significance of reversible data hiding in encrypted domain is discussed from four application scenarios: encrypted data management, covert communication of intelligence, military collaborative operations, and technological integration innovation. Then, the reversible data hiding in encrypted domain is classified according to the operation relationship between data embedding and data encryption, and the technological development under different embed-ding frameworks is also reviewed. Furthermore, technical difficulties of reversible data hiding in encrypted domain are analyzed from four aspects, including embedding performance improvement, separability implementation, image encryption security, and application requirements for cloud environment. Finally, subsequent research directions are analyzed and prospected.

Key words: information security, reversible data hiding, cloud environment, image processing, encrypted domain

CLC Number:  TP309.7
[1] MAO Y Y, YOU C S, ZHANG J, et al. A survey on mobile edge computing: the communication perspective[J]. IEEE Communications Surveys & Tutorials, 2017, 19(4): 2322-2358. DOI: 10.1109/COMST.2017.2745201.
[2] YAN K, LUO G C, ZHENG X, et al. A comprehensive location-privacy-awareness task selection mechanism in mobile crowd-sensing[J]. IEEE Access, 2019, 7: 77541-77554. DOI: 10.1109/ACCESS.2019.2921274.
[3] WU D P, SI S S, WU S E, et al. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J]. IEEE Internet of Things Journal, 2018, 5(4): 2958-2970. DOI: 10.1109/JIOT.2017.2768073.
[4] ZHOU J, CAO Z F, DONG X L, et al. Security and privacy for cloud-based IoT: challenges[J]. IEEE Communications Magazine, 2017, 55(1): 26-33. DOI: 10.1109/MCOM.2017.1600363CM.
[5] GE X R, YU J, ZHANG H L, et al. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 490-504. DOI: 10.1109/TDSC.2019.2896258.
[6] LIANG X Q, YAN Z, CHEN X F, et al. Game theoretical analysis on encrypted cloud data deduplication[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5778-5789. DOI: 10.1109/TII.2019.2920402.
[7] SUN J F, XIONG H, ZHANG H, et al. Mobile access and flexible search over encrypted cloud data in heterogeneous systems[J]. Information Sciences, 2020, 507: 1-15. DOI: 10.1016/j.ins.2019.08.026.
[8] 柯彦, 张敏情, 刘佳, 等. 密文域可逆信息隐藏综述[J]. 计算机应用, 2016, 36(11): 3067-3076, 3092. DOI: 10.11772/j.issn.1001-9081.2016.11.3067.
[9] KUMAR S, GUPTA A, WALIA G S. Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges[J]. Applied Intelligence, 2022, 52(7): 7373-7406. DOI: 10.1007/s10489-021-02789-2.
[10] 殷赵霞. 面向隐私保护的数字图像隐写方法研究[D]. 合肥: 安徽大学, 2014.
[11] 俞春强, 邓方舟, 张显全, 等. 一种基于多预测值分类的可逆信息隐藏算法[J]. 广西师范大学学报(自然科学版), 2018, 36(2): 24-32. DOI: 10.16088/j.issn.1001-6600.2018.02.004.
[12] KONG P, FU D, LI X R, et al. Reversible data hiding in encrypted medical DICOM image[J]. Multimedia Systems, 2021, 27(3): 303-315. DOI: 10.1007/s00530-020-00739-5.
[13] KITTAWI N, AL-HAJ A. Reversible data hiding using bit flipping and histogram shifting[J]. Multimedia Tools and Applications, 2022, 81(9): 12441-12458. DOI: 10.1007/s11042-022-12364-7.
[14] PUTEAUX P, ONG S Y, WONG K S, et al. A survey of reversible data hiding in encrypted images: the first 12 years[J]. Journal of Visual Communication and Image Representation, 2021, 77: 103085. DOI: 10.1016/j.jvcir.2021.103085.
[15] LI J, MA R H, GUAN H B. TEES: an efficient search scheme over encrypted data on mobile cloud[J]. IEEE Transactions on Cloud Computing, 2017, 5(1): 126-139. DOI: 10.1109/TCC.2015.2398426.
[16] 武晓帅, 徐明, 乔通, 等. 图像空域可逆信息隐藏研究进展[J]. 中国图象图形学报, 2022, 27(1): 125-149. DOI: 10.11834/jig.210292.
[17] 李名. 信息熵视角下的密文图像信息隐藏研究[D]. 重庆: 重庆大学, 2014.
[18] SUN Y, ZHANG X. A kind of covert channel analysis method based on trusted pipeline[C]// 2011 International Conference on Electrical and Control Engineering. Piscataway, NJ: IEEE, 2011: 5660-5663. DOI: 10.1109/ICECENG.2011.6058071.
[19] 王玮, 王位, 石峰, 等. 美国海军数字化转型战略综述[J]. 舰船科学技术, 2021, 43(23): 170-175. DOI: 10.3404/j.issn.1672-7649.2021.12.031.
[20] 赵国宏. 作战云体系结构研究[J]. 指挥与控制学报, 2015, 1(3): 292-295.
[21] 程学旗, 靳小龙, 王元卓, 等. 大数据系统和分析技术综述[J]. 软件学报, 2014, 25(9): 1889-1908. DOI: 10.13328/j.cnki.jos.004674.
[22] YAN Z, WANG M J, LI Y X, et al. Encrypted data management with deduplication in cloud computing[J]. IEEE Cloud Computing, 2016, 3(2): 28-35. DOI: 10.1109/MCC.2016.29.
[23] JUNG K H. A survey of reversible data hiding methods in dual images[J]. IETE Technical Review, 2016, 33(4): 441-452. DOI: 10.1080/02564602.2015.1102099.
[24] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[C]// Proceedings of SPIE Volume 6819: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Bellingham, WA: SPIE, 2008: 68191E. DOI: 10.1117/12.766754.
[25] ZHANG X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. DOI: 10.1109/LSP.2011.2114651.
[26] HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4): 199-202. DOI: 10.1109/LSP.2012.2187334.
[27] ZHOU J T, SUN W W, DONG L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3): 441-452. DOI: 10.1109/TCSVT.2015.2416591.
[28] ZHANG X P, QIAN Z X, FENG G R, et al. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328. DOI: 10.1016/j.jvcir.2013.11.001.
[29] ZHANG X P, WANG Z C, YU J, et al. Reversible visible watermark embedded in encrypted domain[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 826-830. DOI: 10.1109/ChinaSIP.2015.7230520.
[30] ZHENG S L, LI D D, HU D H, et al. Lossless data hiding algorithm for encrypted images with high capacity[J]. Multimedia Tools and Applications, 2016, 75(21): 13765-13778. DOI: 10.1007/s11042-015-2920-y.
[31] OU B, LI X L, ZHANG W M. PVO-based reversible data hiding for encrypted images[C]// 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). Piscataway NJ: IEEE, 2015: 831-835. DOI: 10.1109/ChinaSIP.2015.7230521.
[32] HUANG F J, HUANG J W, SHI Y Q. New framework for reversible data hiding in encrypted domain[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2777-2789. DOI: 10.1109/TIFS.2016.2598528.
[33] TANG Z J, XU S J, YAO H, et al. Reversible data hiding with differential compression in encrypted image[J]. Multimedia Tools and Applications, 2019, 78(8): 9691-9715. DOI: 10.1007/s11042-018-6567-3.
[34] DI F Q, HUANG F J, ZHANG M Q, et al. Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding[J]. Multimedia Tools and Applications. 2018, 77(16): 20917-20935. DOI: 10.1007/s11042-017-5498-8.
[35] GE H L, CHEN Y, QIAN Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8): 2285-2295. DOI: 10.1109/TCSVT.2018.2863029.
[36] WANG Y M, HE W G. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022, 24: 1288-1298. DOI: 10.1109/TMM.2021.3062699.
[37] CHEN Y C, SHIU C W, HORNG G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164-1170. DOI: 10.1016/j.jvcir.2014.04.003.
[38] CHEN B, LU W, HUANG J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 978-991. DOI: 10.1109/TDSC.2020.3011923.
[39] XIANG Y P, XIAO D, ZHANG R, et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer[J]. Information Sciences, 2020, 545: 188-206. DOI: 10.1016/j.ins.2020.08.019.
[40] MA K D, ZHANG W M, ZHAO X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553-562. DOI: 10.1109/TIFS.2013.2248725.
[41] ZHANG W M, MA K D, YU N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127. DOI: 10.1016/j.sigpro.2013.06.023.
[42] MATHEW T, WILSCY M. Reversible data hiding in encrypted images by active block exchange and room reservation[C]// 2014 International Conference on Contemporary Computing and Informatics (IC3I), Piscataway NJ: IEEE, 2014: 839-844. DOI: 10.1109/IC3I.2014.7019628.
[43] YI S, ZHOU Y C. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. DOI: 10.1109/TMM.2018.2844679.
[44] WU Y Q, XIANG Y Z, GUO Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. DOI: 10.1109/TMM.2019.2952979.
[45] YU C Q, ZHANG X Q, ZHANG X P, et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(2): 451-466. DOI: 10.1109/TCSVT.2021.3062947.
[46] ZHANG Y, YANG B, NIU X M. Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006, 17(2): 59-65.
[47] NGUYEN T S, CHANG C C, CHANG W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing: Image Communication, 2016, 44: 84-91. DOI: 10.1016/j.image.2016.03.010.
[48] XIANG S J, LUO X R. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28(11): 3099-3110. DOI: 10.1109/TCSVT.2017.2742023.
[49] CAO X C, DU L, WEI X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5): 1132-1143. DOI: 10.1109/TCYB.2015.2423678.
[50] QIU Y Q, YING Q C, YANG Y Y, et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(9): 5874-5887. DOI: 10.1109/TCSVT.2022.3163905.
[51] PUTEAX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. DOI: 10.1109/TIFS.2018.2799381.
[52] PUTEAX P, PUECH W. EPE-based huge-capacity reversible data hiding in encrypted images[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630788.
[53] PUYANG Y, YIN Z X, QIAN Z X. Reversible data hiding in encrypted images with two-MSB prediction[C]// 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Piscataway NJ: IEEE, 2018: 1-7. DOI: 10.1109/WIFS.2018.8630785.
[54] PUTEAUX P, PUECH W. A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021, 23: 636-650. DOI: 10.1109/TMM.2020.2985537.
[55] YIN Z X, XIANG Y Z, ZHANG X P. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. DOI: 10.1109/TMM.2019.2936314.
[56] 张敏情, 柯彦, 苏婷婷. 基于LWE的密文域可逆信息隐藏[J]. 电子与信息学报, 2016, 38(2): 354-360. DOI: 10.11999/JEIT150702.
[57] 柯彦, 张敏情, 苏婷婷. 基于R-LWE的密文域多比特可逆信息隐藏算法[J]. 计算机研究与发展, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444.
[58] 柯彦, 张敏情, 张英男. 可分离的密文域可逆信息隐藏[J]. 计算机应用研究, 2016, 33(11): 3476-3479. DOI: 10.3969/j.issn.1001-3695.2016.11.061.
[59] 柯彦, 张敏情, 项文. 加密域的可分离四进制可逆信息隐藏算法[J]. 科学技术与工程, 2016, 16(27): 58-64. DOI: 10.3969/j.issn.1671-1815.2016.27.010.
[60] 柯彦, 张敏情, 刘佳. 可分离的加密域十六进制可逆信息隐藏[J]. 计算机应用, 2016, 36(11): 3082-3087. DOI: 10.11772/j.issn.1001-9081.2016.11.3082.
[61] KE Y, ZHANG M Q, LIU J. Separable multiple bits reversible data hiding in encrypted domain[C]// Digital Forensics and Watermarking: LNCS Volume 10082. Cham: Springer International Publishing AG, 2017: 470-484. DOI: 10.1007/978-3-319-53465-7_35.
[62] KE Y, ZHANG M Q, LIU J, et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE[J]. Journal of Visual Communication and Image Representation, 2018, 54: 133-144. DOI: 10.1016/j.jvcir.2018.05.002.
[63] HUANG D L, WANG J J. High-capacity reversible data hiding in encrypted image based on specific encryption process[J]. Signal Processing: Image Communication, 2020, 80: 115632. DOI: 10.1016/j.image.2019.115632.
[64] WU H T, CHEUNG Y M, YANG Z Y, et al. A high-capacity reversible data hiding method for homomorphic encrypted images[J]. Journal of Visual Communication and Image Representation, 2019, 62: 87-96. DOI: 10.1016/j.jvcir.2019.04.015.
[65] KE Y, ZHANG M Q, LIU J, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2353-2365. DOI: 10.1109/TCSVT.2019.2963393.
[66] SHANNON C E. A mathematical theory of communication[J]. Bell Labs Technical Journal, 1948, 27(4): 379-423. DOI: 10.1002/j.1538-7305.1948.tb01338.x.
[67] DRAGOI I C, COLTUC D. On the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 187-189. DOI: 10.1109/TIFS.2020.3006382.
[68] PUTEAUX P, PUECH W. Rebuttal: on the security of reversible data hiding in encrypted images by MSB prediction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2445-2446. DOI: 10.1109/TIFS.2021.3055630.
[69] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150. DOI: 10.13328/j.cnki.jos.004820.
[70] 施巍松, 孙辉, 曹杰, 等. 边缘计算: 万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5): 907-924. DOI: 10.7544/issn1000-1239.2017.20160941.
[71] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83. DOI: 10.3724/SP.J.1001.2011.03958.
[72] 林文敏. 云环境下大数据服务及其关键技术研究[D]. 南京: 南京大学, 2015.
[1] XIAO Yuting, LÜ Xiaoqi, GU Yu, LIU Chuanqiang. Classification of Diabetic Retinopathy Based on Split Residual Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(1): 91-101.
[2] LIANG Yuting, LUO Yuling, ZHANG Shunsheng. Review on Chaotic Image Encryption Based on Compressed Sensing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(5): 49-58.
[3] ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70.
[4] YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] YUAN Jingjing, ZHENG Yuzhao, XU Chenfeng, YIN Tingjie. Advances in Cytoplasmic Delivery Strategies for Non-Endocytosis-Dependent Biomolecules[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(1): 1 -8 .
[2] YANG Yangyang, ZHU Zhenting, YANG Cuiping, LI Shihao, ZHANG Shu, FAN Xiulei, WAN Lei. Research Progress of Anaerobic Digestion Pretreatment of Excess Activated Sludge Based on Bibliometric Analysis[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 16 -29 .
[3] XU Lunhui, LI Jinlong, LI Ruonan, CHEN Junyu. Missing Traffic Data Recovery for Road Network Based on Dynamic Generative Adversarial Network[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 30 -40 .
[4] YANG Hai, XIE Yaqin. Regional Energy Storage Allocation Strategy of 5G Base Station Based on Floyd Algorithm[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 41 -54 .
[5] YAN Wenwen, WEN Zhong, WANG Shuang, LI Guoxiang, WANG Boyu, WU Yi. AA-CAES Plant and Integrated Demand Response Based Wind Abandonment and Consumption Strategy for the Heating Period[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 55 -68 .
[6] GAN Youchun, WANG Can, HE Xuhui, ZHANG Yu, ZHANG Xuefei, WANG Fan, YU Yazhou. Joint Optimal Operation of Integrated Electricity-Hydrogen-Heat Energy System Based on Concentrating Solar Power Plant and Flexible Load[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 69 -83 .
[7] WANG Xuyang, WANG Changrui, ZHANG Jinfeng, XING Mengyi. Multimodal Sentiment Analysis Based on Cross-Modal Cross-Attention Network[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 84 -93 .
[8] WANG Weiduo, WANG Yisong, YANG Lei. Descriptive Solution of the Answer Set Programming for Cloud Resource Scheduling[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 94 -104 .
[9] YU Qian, CHEN Qingfeng, HE Naixu, HAN Zongzhao, LU Jiahui. Genetic Algorithm for Community Detection Accelerated by Matrix Operations[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 105 -119 .
[10] LONG Fang, CAI Jing, ZHU Yan. Analysis of Reliability in a Multicomponent Stress-Strength Model for Lomax Distribution under Progressive type-Ⅱ Hybrid Censoring[J]. Journal of Guangxi Normal University(Natural Science Edition), 2024, 42(2): 120 -130 .