{"title":"基于中国剩余定理的加密图像可逆数据隐藏","authors":"Jiani Chen;Dawen Xu","doi":"10.1109/TCC.2025.3570327","DOIUrl":null,"url":null,"abstract":"To deal with the development of the distributed server, this article proposes a new method for reversible data hiding in encrypted images based on the Chinese Remainder Theorem (CRT), encrypting and sharing one image to multiple data hiders through <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing. First, an original image is divided into the most significant bit (MSB) compression area and the least significant bit (LSB) area by utilizing the spatial correlation. The <inline-formula><tex-math>$l$</tex-math></inline-formula>-MSB layers are predicted to obtain prediction errors, and these prediction errors are compressed by Huffman coding. Then according to the value of <inline-formula><tex-math>$k$</tex-math></inline-formula>, CRT and secret sharing scheme are performed on the <inline-formula><tex-math>$(8-l)$</tex-math></inline-formula>-LSB layers to generate the shared bitstream. Finally, <inline-formula><tex-math>$n$</tex-math></inline-formula> encrypted images for sharing consist of MSB compression bitstreams and shared bitstreams, whose size is adjusted based on <inline-formula><tex-math>$k$</tex-math></inline-formula> value. Each data hider can independently embed secret data after having one of the encrypted images, while the receiver can recover the original image only after receiving <inline-formula><tex-math>$k$</tex-math></inline-formula> or more encrypted images. Experimental results show that the proposed algorithm not only provides a large embedding space for secret data, but is also able to complete the inverse operation of data hiding and realize the lossless recovery of the original image with <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"821-836"},"PeriodicalIF":5.0000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem\",\"authors\":\"Jiani Chen;Dawen Xu\",\"doi\":\"10.1109/TCC.2025.3570327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To deal with the development of the distributed server, this article proposes a new method for reversible data hiding in encrypted images based on the Chinese Remainder Theorem (CRT), encrypting and sharing one image to multiple data hiders through <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing. First, an original image is divided into the most significant bit (MSB) compression area and the least significant bit (LSB) area by utilizing the spatial correlation. The <inline-formula><tex-math>$l$</tex-math></inline-formula>-MSB layers are predicted to obtain prediction errors, and these prediction errors are compressed by Huffman coding. Then according to the value of <inline-formula><tex-math>$k$</tex-math></inline-formula>, CRT and secret sharing scheme are performed on the <inline-formula><tex-math>$(8-l)$</tex-math></inline-formula>-LSB layers to generate the shared bitstream. Finally, <inline-formula><tex-math>$n$</tex-math></inline-formula> encrypted images for sharing consist of MSB compression bitstreams and shared bitstreams, whose size is adjusted based on <inline-formula><tex-math>$k$</tex-math></inline-formula> value. Each data hider can independently embed secret data after having one of the encrypted images, while the receiver can recover the original image only after receiving <inline-formula><tex-math>$k$</tex-math></inline-formula> or more encrypted images. Experimental results show that the proposed algorithm not only provides a large embedding space for secret data, but is also able to complete the inverse operation of data hiding and realize the lossless recovery of the original image with <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing.\",\"PeriodicalId\":13202,\"journal\":{\"name\":\"IEEE Transactions on Cloud Computing\",\"volume\":\"13 3\",\"pages\":\"821-836\"},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2025-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cloud Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11004437/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cloud Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11004437/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem
To deal with the development of the distributed server, this article proposes a new method for reversible data hiding in encrypted images based on the Chinese Remainder Theorem (CRT), encrypting and sharing one image to multiple data hiders through $(k,n)$-threshold secret sharing. First, an original image is divided into the most significant bit (MSB) compression area and the least significant bit (LSB) area by utilizing the spatial correlation. The $l$-MSB layers are predicted to obtain prediction errors, and these prediction errors are compressed by Huffman coding. Then according to the value of $k$, CRT and secret sharing scheme are performed on the $(8-l)$-LSB layers to generate the shared bitstream. Finally, $n$ encrypted images for sharing consist of MSB compression bitstreams and shared bitstreams, whose size is adjusted based on $k$ value. Each data hider can independently embed secret data after having one of the encrypted images, while the receiver can recover the original image only after receiving $k$ or more encrypted images. Experimental results show that the proposed algorithm not only provides a large embedding space for secret data, but is also able to complete the inverse operation of data hiding and realize the lossless recovery of the original image with $(k,n)$-threshold secret sharing.
期刊介绍:
The IEEE Transactions on Cloud Computing (TCC) is dedicated to the multidisciplinary field of cloud computing. It is committed to the publication of articles that present innovative research ideas, application results, and case studies in cloud computing, focusing on key technical issues related to theory, algorithms, systems, applications, and performance.