Yijie Lin , Chia-Chen Lin , Ching-Chun Chang , Chin‐Chen Chang
{"title":"将信息隐藏在具有(t, n)秘密共享的加密图像中,用于物联网和云服务","authors":"Yijie Lin , Chia-Chen Lin , Ching-Chun Chang , Chin‐Chen Chang","doi":"10.1016/j.jisa.2025.104137","DOIUrl":null,"url":null,"abstract":"<div><div>Privacy and security concerns have emerged with the rapid advancement of information technology and the exponential growth in data storage and cloud services. This paper addresses these issues in the context of the Internet of Things (IoT) and cloud services. Focusing on reversible data hiding in encrypted images (RDHEI), the study presents an innovative scheme based on (<em>t, n</em>) secret sharing using an expandable magic matrix-based data hiding, which offers flexible security levels. The scheme is designed to withstand hacker attacks by effectively dispersing risks through secret sharing, dividing the data into multiple shares. This ensures that leaking fewer than <em>t</em> shares does not compromise the entire data and provides a flexible parameter scheme. The use of the expandable magic matrix enhances both the embedding capacity and security, demonstrating the robustness of the proposed RDHEI scheme in protecting data in the digital age. Furthermore, our approach encrypts images at the IoT gateway rather than at the cloud server, enabling content owners to assert ownership claims—an ability not available in previous schemes. Experimental results confirm that our scheme maintains a constant concealment capacity of up to 4 bits per pixel (bpp), while safeguarding the confidentiality of the hidden data and preserving the randomness of the generated shares.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104137"},"PeriodicalIF":3.7000,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hiding information in encrypted images with (t, n) secret sharing for IoT and cloud services\",\"authors\":\"Yijie Lin , Chia-Chen Lin , Ching-Chun Chang , Chin‐Chen Chang\",\"doi\":\"10.1016/j.jisa.2025.104137\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Privacy and security concerns have emerged with the rapid advancement of information technology and the exponential growth in data storage and cloud services. This paper addresses these issues in the context of the Internet of Things (IoT) and cloud services. Focusing on reversible data hiding in encrypted images (RDHEI), the study presents an innovative scheme based on (<em>t, n</em>) secret sharing using an expandable magic matrix-based data hiding, which offers flexible security levels. The scheme is designed to withstand hacker attacks by effectively dispersing risks through secret sharing, dividing the data into multiple shares. This ensures that leaking fewer than <em>t</em> shares does not compromise the entire data and provides a flexible parameter scheme. The use of the expandable magic matrix enhances both the embedding capacity and security, demonstrating the robustness of the proposed RDHEI scheme in protecting data in the digital age. Furthermore, our approach encrypts images at the IoT gateway rather than at the cloud server, enabling content owners to assert ownership claims—an ability not available in previous schemes. Experimental results confirm that our scheme maintains a constant concealment capacity of up to 4 bits per pixel (bpp), while safeguarding the confidentiality of the hidden data and preserving the randomness of the generated shares.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"93 \",\"pages\":\"Article 104137\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001747\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001747","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Hiding information in encrypted images with (t, n) secret sharing for IoT and cloud services
Privacy and security concerns have emerged with the rapid advancement of information technology and the exponential growth in data storage and cloud services. This paper addresses these issues in the context of the Internet of Things (IoT) and cloud services. Focusing on reversible data hiding in encrypted images (RDHEI), the study presents an innovative scheme based on (t, n) secret sharing using an expandable magic matrix-based data hiding, which offers flexible security levels. The scheme is designed to withstand hacker attacks by effectively dispersing risks through secret sharing, dividing the data into multiple shares. This ensures that leaking fewer than t shares does not compromise the entire data and provides a flexible parameter scheme. The use of the expandable magic matrix enhances both the embedding capacity and security, demonstrating the robustness of the proposed RDHEI scheme in protecting data in the digital age. Furthermore, our approach encrypts images at the IoT gateway rather than at the cloud server, enabling content owners to assert ownership claims—an ability not available in previous schemes. Experimental results confirm that our scheme maintains a constant concealment capacity of up to 4 bits per pixel (bpp), while safeguarding the confidentiality of the hidden data and preserving the randomness of the generated shares.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.