A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
Chao Jiang,
Minqing Zhang (),
Yongjun Kong,
Zongbao Jiang and
Fuqiang Di ()
Additional contact information
Chao Jiang: College of Cryptography Engineering, Engineering University of PAP, Xi’an 710018, China
Minqing Zhang: College of Cryptography Engineering, Engineering University of PAP, Xi’an 710018, China
Yongjun Kong: College of Cryptography Engineering, Engineering University of PAP, Xi’an 710018, China
Zongbao Jiang: College of Cryptography Engineering, Engineering University of PAP, Xi’an 710018, China
Fuqiang Di: College of Cryptography Engineering, Engineering University of PAP, Xi’an 710018, China
Mathematics, 2024, vol. 12, issue 14, 1-16
Abstract:
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes. To address this issue, this paper proposes a hierarchical authorization structure embedding scheme based on secret image sharing (SIS) and users’ hierarchical identities. In the first embedding, the polynomial coefficient redundancy generated in the encryption process of the SIS is utilized by the image owner. For the second, the participants are categorized into two parts. One is core users with adaptive difference reservation embedding, and the other is ordinary users with pixel bit replacement embedding. At the time of reconstruction, more than one core user must provide pixel differences, which grants more privileges to core users. The experimental results demonstrate that the average embedding rate (ER) of the test images is 4.3333 bits per pixel (bpp) in the (3, 4) threshold scheme. Additionally, the reconstructed image achieves a PSNR of +∞ and an SSIM of 1. Compared to existing high-performance RDH-ED schemes based on secret sharing, the proposed scheme with a larger ER maintains strong security and reversibility. Moreover, it is also suitable for multiple embeddings involving multilevel participant identities. In conclusion, the results underscore the efficacy of our technique in achieving both security and performance objectives within a complex distributed setting.
Keywords: reversible data hiding; encrypted image; secret sharing; multilevel identities; hierarchical authorization structure (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/12/14/2262/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/14/2262/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:14:p:2262-:d:1439020
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().