独立高容量半色调图像信息隐藏算法
Independent High-Capacity Halftone Image Information Hiding Algorithm
摘要: 为了解决Shamir(t, n)门限方案在秘密共享时,未能充分利用多项式系数和共享份额的问题,本文设计了一种独立高容量半色调图像信息隐藏算法。利用多项式的常数项和一次项系数隐藏秘密图像,共享份额隐藏份额编号或者用户信息等单个共享份额信息。利用二次项系数隐藏版权信息或者防伪信息。单个共享份额和达到门限数量的多个共享份额都可以进行认证。实验表明,该算法可分离秘密图像和多个共享份额的信息,实现多种信息的可逆隐藏,并且利用单个份额隐藏单个份额的特有信息。该算法增加了信息的种类和嵌入容量。对于Shamir(3, 5)门限共享,嵌入率可以达到3.5 bpp。
Abstract: In order to solve the problem of Shamir(t, n) threshold scheme not fully utilizing polynomial coefficients and shared shares during secret sharing, an independent high-capacity halftone image information hiding algorithm was designed in this paper. Using the constant term and first-order coefficient of polynomials to hide secret images, sharing shares to hide individual shared share information, such as share numbers or user information. Using quadratic coefficients to hide copyright or anti-counterfeiting information. Single shared shares and multiple shared shares that reach the threshold can be authenticated. Experiments have shown that this algorithm can separate secret images and information from multiple shared shares, achieve reversible hiding of multiple types of information, and utilize a single share to hide unique information of a single share. This algorithm increases the variety and embedding capacity of information. For Shamir(3, 5) threshold sharing, the embedding rate can reach 3.5 bpp.
文章引用:秦定武, 丁海洋. 独立高容量半色调图像信息隐藏算法[J]. 软件工程与应用, 2024, 13(4): 461-474. https://doi.org/10.12677/sea.2024.134048

参考文献

[1] Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef
[2] Thien, C. and Lin, J. (2002) Secret Image Sharing. Computers & Graphics, 26, 765-770. [Google Scholar] [CrossRef
[3] 荣辉桂, 莫进侠, 常炳国, 等. 基于Shamir秘密共享的密钥分发与恢复算法[J]. 通信学报, 2015, 36(3): 64-73.
[4] Chen, Y., Hung, T., Hsieh, S. and Shiu, C. (2019) A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms. IEEE Transactions on Information Forensics and Security, 14, 3332-3343. [Google Scholar] [CrossRef
[5] Shiu, C., Chen, Y. and Hong, W. (2015) Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Difference Expansion. Signal Processing: Image Communication, 39, 226-233. [Google Scholar] [CrossRef
[6] Wu, X., Weng, J. and Yan, W. (2018) Adopting Secret Sharing for Reversible Data Hiding in Encrypted Images. Signal Processing, 143, 269-281. [Google Scholar] [CrossRef
[7] Chen, B., Lu, W., Huang, J., Weng, J. and Zhou, Y. (2020) Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders. IEEE Transactions on Dependable and Secure Computing, 2020, 1. [Google Scholar] [CrossRef
[8] 周能, 张敏情, 刘蒙蒙. 基于秘密共享的同态加密图像可逆信息隐藏算法[J]. 科学技术与工程, 2020, 20(19): 7780-7786.
[9] 王泽曦, 张敏情, 柯彦, 等. 基于图像秘密共享的密文域可逆信息隐藏算法[J]. 计算机应用, 2022, 42(5): 1480-1489.
[10] 温文媖, 简云鹏, 方玉明, 等. 结合区块链的可认证医疗图像共享方案[J]. 小型微型计算机系统, 2022, 43(11): 2354-2360.
[11] Ding, H. (2022) Secure Separable Reversible Data Hiding of Halftone Image in Blockchain. The Journal of China Universities of Posts and Telecommunications, 29, 85-96.
[12] Mignotte, M. (1983) How to Share a Secret. Cryptography, Burg Feuerstein, 29 March-2 April 1982, 371-375. [Google Scholar] [CrossRef
[13] Asmuth, C. and Bloom, J. (1983) A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory, 29, 208-210. [Google Scholar] [CrossRef
[14] 闫伟齐, 齐东旭. 基于中国剩余定理的图像分存方法[J]. 北方工业大学学报, 2000(1): 6-9.
[15] Ke, Y., Zhang, M., Zhang, X., Liu, J., Su, T. and Yang, X. (2022) A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem. IEEE Transactions on Circuits and Systems for Video Technology, 32, 2469-2481. [Google Scholar] [CrossRef
[16] 陈维启, 张珍珍, 李祯祯, 等. 基于CRT的无损高效门限彩色图像秘密共享信息隐藏算法[J]. 计算机系统应用, 2022, 31(5): 269-276.
[17] Xiong, L., Han, X. and Yang, C. (2021) CP-PSIS: CRT and Polynomial-Based Progressive Secret Image Sharing. Signal Processing, 185, Article ID: 108064. [Google Scholar] [CrossRef
[18] Li, L., Lu, Y., Liu, L., Sun, Y. and Wang, J. (2022) Practical Secret Image Sharing Based on the Chinese Remainder Theorem. Mathematics, 10, Article 1959. [Google Scholar] [CrossRef