中国邮电高校学报(英文版) ›› 2022, Vol. 29 ›› Issue (2): 85-96.doi: 10. 19682/ j. cnki. 1005-8885. 2022. 0002
To realize the distributed storage and management of a secret halftone image in blockchain, a secure separable reversible data hiding (RDH) of halftone image in blockchain (SSRDHB) was proposed. A secret halftone image can be used as the original image to generate multiple share images which can be distributed storage in each point of blockchain, and additional data can be hidden to achieve management of each share image. Firstly, the secret halftone image was encrypted through Zu Chongzhi (ZUC) algorithm by using the encryption key (EK). Secondly, the method of using odd or even of share data was proposed to hide data, and a share dataset can be generated by using polynomial operation. Thirdly, multiple share images can be obtained through selecting share data, and different additional data can be hidden through controlling odd or even of share data, and additional data can be protected by using data-hiding key (DK). After sharing process, if the receiver has both keys, the halftone image can be recovered and additional data can be revealed, and two processes are separable. Experiment results show that multiple share images hidden additional data can be obtained through SSRDHB, and the halftone image can be recovered with 100% by picking any part of share images, and one additional data can be revealed with 100% by picking any one share image.
 SHAO Q F, ZHANG Z, ZHU Y C, et al. Survey of enterprise blockchains. Journal of Software, 2019, 30(9): 2571 -2592 (in Chinese).
 OU D H, WU X T, DAI L, et al. Improved tagged visual cryptograms by using random grids. Proceedings of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW’13), 2013, Oct 1 - 4, Auckland, New Zealand. LNCS 8389. Berlin, Germany: Springe, 2014: 79 -94.
 HOU Y C, QUAN Z Y, TSAI C F, et al. Block-based progressive visual secret sharing. Information Sciences, 2013, 233: 290 - 304.
 DING H Y. High quality ( k,n) visual cryptography based on secret sharing. Application Research of Computers, 2019, 36(8): 2449 -2453 (in Chinese).
 YAN X H, WANG S, NIU X M, et al. Halftone visual cryptography with minimum auxiliary black pixels and uniform
image quality. Digital Signal Processing, 2015, 38: 53 -65.
 DING H Y, LI Z C, BI W. (k,n) halftone visual cryptography based on Shamir’s secret sharing. The Journal of China Universities of Posts and Telecommunications, 2018, 25(2): 60 -76.
 BAYER B E. An optimum method for two-level rendition of continuous-tone pictures. Proceedings of the 1973 IEEE
International Communication Conference: Vol 1, 1973, Jun 11 -13, Seattle, WA, USA. Piscataway, NJ, USA: IEEE, 1973:
26. 11 -26. 15.
 ULICHNEY R. The void-and-cluster method for dither array generation. Proceedings of the SPIE, 1993, 1913: 332 -343.
 JARVIS J F, JUDICE C N, NINKE W H. A survey of techniques for the display of continuous-tone pictures on bilevel displays. Computer Graphics and Image Processing, 1976, 5(1): 13 -40.
 LI X. Edge-directed error diffusion halftoning. IEEE Signal Processing Letters, 2006, 13(11): 688 -690.
 KNUTH D E. Digital halftones by dot diffusion. ACM Transactions on Graphics, 1987, 6(4): 245 -273.
 GUO J M, LIU Y F. Improved dot diffusion by diffused matrix and class matrix co-optimization. IEEE Transactions on Image Processing, 2009, 18(8): 1804 -1816.
 LIU Y F, GUO J M. New class tiling design for dot-diffused halftoning. IEEE Transactions on Image Processing, 2013, 22(3): 1199 -1208.
 GOYAL P, GUPTA M, STAELIN C, et al. Clustered-dot halftoning with direct binary search. IEEE Transactions on Image Processing, 2012, 21(2): 473 -487.
 GUO J M, LIU Y F, CHANG J Y. High efficient direct binary search using multiple lookup tables. Proceedings of the 19th IEEE International Conference on Image Processing, 2012, Sept 30 - Oct 3, Orlando, FL, USA. Piscataway, NJ, USA: IEEE, 2012: 813 -816.
 ZHANG X J, ALLEBACH J P. Quad-interleaved block level parallel direct binary search algorithm. Proceedings of the 2016 IS&T International Symposium on Electronic Imaging Science and Technology, 2016, Feb 14 - 18, San Francisco, CA, USA. Morehouse Lane Red Hook, NY, USA: Curran Associates Inc, 2016: 1 -6.
 LIAN S, DING H Y, LI Z C. Research on reversible watermarking algorithms in image encryption domain based on ZUC algorithms. Proceedings of the 3rd International Conference on Mechanical and Electronics Engineering ( ICMEE’19 ), 2019, Nov 29 - 30, Chongqing, China. Taiyuan, China: Clausius Scientific Press, China Office, 2019: 147 -155.
 State Cryptography Administration. ZUC strearm cipher algorithm, part 2: the ZUC-based confidentiality algorithm. GM/ T 0001. 2 - 2012. Beijing, China: China Standards Press, 2002 ( in Chinese).
 ZHANG X P. Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 2011, 18(4): 255 -258.
 LI F Y, LI J G. Reversible information hiding in encrypted image based on block rotation. Journal of Shanghai University of Electric Power, 2018, 34(1): 46 -52 (in Chinese).
 HUANG M X, HE H J, CHEN F. Separable reversible data hiding in encrypted image against ciphertext-only attack. Journal of Computer-Aided Design & Computer Graphics, 2020, 32 (6): 874 -882 (in Chinese).
 KIM C, SHIN D, LENG L, et al. Separable reversible data hiding in encrypted halftone image. Displays, 2018, 55: 71 -79.
|No related articles found!|