基于NTRU密文域图像可逆双水印算法的研究
Research on Image Reversible Double Watermarking Algorithm in Ciphertext Domain Based on NTRU
摘要: 本文基于NTRU密码算法对数字图像和字符串信息进行加密处理,利用NTRU密码算法的同态特性,实现不同用户在不同阶段对同一数字作品信息进行两次密文域水印信息嵌入;接收者对含水印的密文图像进行NTRU解密算法处理,能够恢复出原始作品信息和两次嵌入的水印信息。通过对比发现该算法能够完全恢复原始作品信息和嵌入的水印信息,能够达到预期效果。同时该算法基于后量子密码算法,可以对抗量子计算机的攻击,而且水印信息的嵌入量更大,能嵌入双方水印信息,嵌入和提取相互不受干扰和影响。
Abstract: In this paper, the digital image and string information are encrypted based on NTRU cryptographic algorithm. Using the homomorphic characteristics of NTRU cryptographic algorithm, different users can embed the watermark information in the ciphertext domain twice in different stages; the receiver can recover the original work information and the watermark information embedded twice by processing the ciphertext image with NTRU decryption algorithm. Through comparison, it is found that the algorithm can completely restore the original work information and embedded watermark information, and can achieve the expected effect. At the same time, the algorithm is based on post quantum cryptography algorithm, which can resist the attack of quantum computer, and the embedding amount of watermark information is larger. It can embed watermark information of both sides, and the embedding and extraction are not disturbed and affected by each other.
文章引用:张腾鲛, 李子臣. 基于NTRU密文域图像可逆双水印算法的研究[J]. 软件工程与应用, 2022, 11(3): 504-515. https://doi.org/10.12677/SEA.2022.113053

参考文献

[1] 傅楚君, 兰胜坤. 基于DCT变换的数字水印算法[J]. 网络安全技术与应用, 2020(7): 49-51.
[2] 胡坤, 李聪, 胡建平, 王小超, 杜玲, 王红飞. 基于BEMD与DCT的彩色图像多重水印鲁棒算法[J/OL]. 北京航空航天大学学报, 1-16.[CrossRef
[3] 王东东, 王福明. 基于LSB数字水印算法的研究与实现[J]. 山西电子技术, 2014(5): 76-77.
[4] Zhang, X. (2011) Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters, 18, 255-258. [Google Scholar] [CrossRef
[5] Chen, Y.C., Shiu, C.W. and Horng, G. (2014) Encrypted Signal-Based Reversible Data Hiding with Public Key Cryptosystem. Journal of Visual Communication and Image Representation, 25, 1164-1170. [Google Scholar] [CrossRef
[6] Ke, Y., Zhang, M. and Su, T. (2016) A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE. Journal of Computer Research & Development, 53, 2307-2322.
[7] Zhou, N., Zhang, M.Q., Zhou, H.N., et al. (2020) Reversible Data Hiding Algorithm in Encrypted Domain Based on NTRU. Science Technology and Engineering, 20, 13285-13294. (in Chinese)
[8] Zhou, N., Zhang, M., Wang, H., et al. (2020) Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access, 8, 81412-81424.
[9] 项世军, 罗欣荣, 石书协. 一种同态加密域图像可逆水印算法[J]. 计算机学报, 2016, 39(3): 571-581.
[10] Paillier, P. (1999) Public-Key Cryptosystems Based on Discrete Logarithms Residues. Advances in Cryptology-Eu- rocrypt’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2-6 May 1999, 223-238.
[11] Brakerski, Z. and Vaikuntanathan, V. (2014) Efficient Fully Homomorphic Encryption from (Standard) Lwe. 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97-106.
[12] Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. STOC, 9, 169-178. [Google Scholar] [CrossRef
[13] Fan, J. and Vercauteren, F. (2012) Somewhat Practical Fully Homomorphic Encryption. Iacr Cryptology ePrint Archive, 2012, 144.
[14] Hoffstein, J., Pipher, J. and Silverman, J.H. (1998) NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P., (Ed.), Algorithmic Number Theory, Springer, Heidelberg. [Google Scholar] [CrossRef
[15] Wu, H.T., Cheung, Y., Yang, Z., et al. (2019) A High-Capacity Reversible Data Hiding Method for Homomorphic Encrypted Images. Journal of Visual Communication and Image Representation, 62, 87-96. [Google Scholar] [CrossRef
[16] Ajtai, M. (1996) Generating Hard Instances of Lattice Problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, 1996, 99-108. [Google Scholar] [CrossRef
[17] Regev, O. (2009) On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. Journal of the ACM, 56, 1-40. [Google Scholar] [CrossRef
[18] Li, Z.C., Zhang, J.M., Yang, Y.T., et al. (2018) A Fully Homomorphic Encryption Scheme Based on NTRU. Agta Electronica Sinca, 46, 938-944. (in Chinese)