{"title":"Two-stage reversible data hiding in encrypted domain with public key embedding mechanism","authors":"Yan Ke , Jia Liu , Yiliang Han","doi":"10.1016/j.sigpro.2025.109918","DOIUrl":null,"url":null,"abstract":"<div><div>Reversible data hiding in encrypted domain (RDH-ED) can perform encryption and data embedding to simultaneously fulfill the privacy protection and access control. The key distribution in current RDH-ED primarily follows a symmetric mechanism, resulting in limitations in key management and distribution. Therefore, public-key embedding (PKE) mechanism in RDH-ED is proposed to address the limitations, where embedding permission is open to the public while extracting is under control. Then a two-stage RDH-ED scheme with PKE mechanism is designed based on learning with errors (LWE) for images. The algorithm of the first stage is redundancy recoding in LWE encrypted domain (RR-LWE) for the ciphertext encrypted from any a pixel bit. Public embedding key is specially constructed. <span><math><mi>N</mi></math></span> bits data could be embedded per ciphertext. The algorithm of the second stage is difference expansion in LWE encrypted domain (DE-LWE) for the ciphertext of the entire image following RR-LWE. It transfers the bit operations of DE from spatial domain into LWE encrypted domain. We theoretically deduce the necessary conditions for embedding correctness and security. Experimental results demonstrate the outperformed effects in security and efficiency of the proposed algorithms. RR-LWE achieves an embedding capacity up to 24 bits per pixel (bpp) and DE-LWE further enhances that by approximately 0.5 bpp.</div></div>","PeriodicalId":49523,"journal":{"name":"Signal Processing","volume":"233 ","pages":"Article 109918"},"PeriodicalIF":3.4000,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Signal Processing","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0165168425000337","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Reversible data hiding in encrypted domain (RDH-ED) can perform encryption and data embedding to simultaneously fulfill the privacy protection and access control. The key distribution in current RDH-ED primarily follows a symmetric mechanism, resulting in limitations in key management and distribution. Therefore, public-key embedding (PKE) mechanism in RDH-ED is proposed to address the limitations, where embedding permission is open to the public while extracting is under control. Then a two-stage RDH-ED scheme with PKE mechanism is designed based on learning with errors (LWE) for images. The algorithm of the first stage is redundancy recoding in LWE encrypted domain (RR-LWE) for the ciphertext encrypted from any a pixel bit. Public embedding key is specially constructed. bits data could be embedded per ciphertext. The algorithm of the second stage is difference expansion in LWE encrypted domain (DE-LWE) for the ciphertext of the entire image following RR-LWE. It transfers the bit operations of DE from spatial domain into LWE encrypted domain. We theoretically deduce the necessary conditions for embedding correctness and security. Experimental results demonstrate the outperformed effects in security and efficiency of the proposed algorithms. RR-LWE achieves an embedding capacity up to 24 bits per pixel (bpp) and DE-LWE further enhances that by approximately 0.5 bpp.
期刊介绍:
Signal Processing incorporates all aspects of the theory and practice of signal processing. It features original research work, tutorial and review articles, and accounts of practical developments. It is intended for a rapid dissemination of knowledge and experience to engineers and scientists working in the research, development or practical application of signal processing.
Subject areas covered by the journal include: Signal Theory; Stochastic Processes; Detection and Estimation; Spectral Analysis; Filtering; Signal Processing Systems; Software Developments; Image Processing; Pattern Recognition; Optical Signal Processing; Digital Signal Processing; Multi-dimensional Signal Processing; Communication Signal Processing; Biomedical Signal Processing; Geophysical and Astrophysical Signal Processing; Earth Resources Signal Processing; Acoustic and Vibration Signal Processing; Data Processing; Remote Sensing; Signal Processing Technology; Radar Signal Processing; Sonar Signal Processing; Industrial Applications; New Applications.