期刊文献+

基于码分多址复用的双重加密可逆信息隐藏 被引量:2

Double-level encryption reversible data hiding based on code division multiple access
在线阅读 下载PDF
导出
摘要 针对多数密文域可逆信息隐藏算法嵌入容量小、加密算法单一的问题,提出一种双重加密的方法,并利用码分多址复用(CDMA)的思想嵌入秘密信息。加密时将图像分块,先对像素块进行多粒度置乱加密,再对块中每个像素的中间2位用流密码加密。信息嵌入采用码分多址的思想,选取k个长为4的相互正交的矩阵嵌入k层秘密信息,利用矩阵的正交性实现秘密信息多层嵌入,在提高嵌入容量的同时保证了对像素点的较小改变。对不满足嵌入条件的像素块嵌入伪比特,可避免使用位置图。拥有信息提取密钥的合法接收者可以提取秘密信息;拥有图像解密密钥可以近似恢复原始图像;拥有两种密钥既可提取秘密信息又可无损恢复原始图像。实验结果表明,512×512灰度图像Lena在峰值信噪比(PSNR)大于36 d B时最大嵌入容量133 313 bit。所提算法增强了加密图像安全性,在保证可逆性的同时大大提高密文域可逆信息隐藏嵌入容量。 Aiming at enhancing the embedded capacity and enriching the available encryption algorithm of reversible data hiding in encrypted domain,a new scheme was proposed by adopting double-level encryption methods and embedding the secret information based on Code Division Multiple Access(CDMA).The image was first divided into blocks and a multi-granularity encryption was introduced.The order of the block is scrambled in a coarse granularity.The middle of each pixel in the block was encrypted by a stream cipher.Data embedding is based on CDMA,k mutually orthogonal matrices were selected to carry the secret data.The image was first divided into blocks,which were scrambled by introducing multi-granularity encryption,then 2 bits in the middle of each pixel in blocks were encrypted by a stream cipher.Based on the idea of CDMA,k mutually orthogonal matrices of 4 bits were selected to carry k-level secret information.The orthogonal matrices can guarantee the multi-level embedding and improve the embedding capacity.The pseudo bit was embedded into the blocks that cannot meet the embedding condition.The secret data could be extracted by using the extraction key;the original image could be approximately recovered by using the image decryption key;with both of the keys,the original image could be recovered losslessly.Experimental results show that,when the Peak Signal-to-Noise Ratio(PSNR)of gray Lena image of 512×512 pixels is higher than 36 dB,the maximum embedded capacity of the proposed scheme is 133 313 bit.The proposed scheme improves the security of encrypted images and greatly enhances the embedded capacity of reversible information in ciphertext domain while ensuring the reversibility.
作者 王建平 张敏情 李天雪 马双棚 WANG Jianping;ZHANG Minqing;LI Tianxue;MA Shuangpeng(Key Laboratory of Network and Information Security Under the Armed Police Force,Engineering University of the Chinese Armed Police Force,Xi'an Shaanxi 710086,China)
出处 《计算机应用》 CSCD 北大核心 2018年第4期1023-1028,1035,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61379152 61403417)~~
关键词 双重加密 可逆信息隐藏 码分多址复用 可分离操作 double-level encryption reversible data hiding Code Division Multiple Access(CDMA) separable operation
作者简介 通信作者电子邮箱wjwangjianping@163.com,王建平(1992—),男,河南平顶山人,硕士研究生,主要研究方向信息安全、信息隐藏。;张敏情(1967—),女,陕西西安人,教授,博士,主要研究方向:密码学、信息隐藏。;李天雪(1993—),男,河南商丘人,硕士研究生,主要研究方向:信息安全、信息隐藏。;马双棚(1990—),男,河南许昌人,硕士研究生,主要研究方向:信息安全、密码学。
  • 相关文献

参考文献3

二级参考文献37

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1834

同被引文献19

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部