期刊文献+

基于同态加密系统的图像鲁棒可逆水印算法 被引量:15

Robust and Reversible Image Watermarking Algorithm in Homomorphic Encrypted Domain
在线阅读 下载PDF
导出
摘要 同态加密技术可用于保护数据隐私并允许对密文数据进行算术操作,在云计算安全上有着很好的应用前景.针对云计算中的隐私保护和数据安全等问题,提出了一种基于同态加密系统的图像鲁棒可逆水印算法,主要思想为:(1)对原始图像进行分块和利用Paillier加密系统进行加密得到密文图像;(2)在加密域中,通过模乘法逆元MMI(modular multiple inverse)方法和查询相应的密文映射表得到每个密文分块的统计量,然后利用同态特性对统计量进行直方图平移来嵌入水印信息;(3)在接收方,可从含水印的密文图像的统计量直方图中完整地提取水印,并可通过对统计量进行与嵌入过程相反的直方图平移操作来恢复原始密文图像;(4)含水印的密文图像在直接解密后可从其统计量直方图中完整地提取水印信息和恢复原始图像;(5)解密后的含水印图像在受到一定程度的攻击后(如JPEG/JPEG 2000压缩和叠加高斯噪声等),水印仍能正确提取.该算法实现了在不对原始图像进行预处理的情况下可直接在加密后的密文图像中嵌入水印,并可分别在加密域或明文域提取水印和恢复原始密文图像或原始明文图像,而且嵌入的水印对常见的图像处理操作具有一定的鲁棒性.实验仿真结果验证了该算法的有效性. Homomorphic encryption technique can be used for protection of data privacy,and some algebraic operations can be implemented on the ciphertext data.This is very useful in the field of cloud computing security,such as analyzing and processing the encrypted data in cloud without exposing the content of data.Addressing privacy protection and data security problems in cloud computing,this paper proposes a robust and reversible image watermarking algorithm in homomorphic encrypted domain.The algorithm includes five aspects:(1)The original image is divided into a number of non-overlapping blocks and each pixel in a block is encrypted with Paillier cryptosystem to obtain the encrypted image;(2)The statistical values of the encrypted blocks can be retrieved in encrypted domain by employing modular multiplicative inverse(MMI)method and looking for a mapping table.After that,watermark information can be reversibly embedded into encrypted image by shifting the histogram of the statistical values with the homomorphic property of Paillier cryptosystem;(3)On the receiver side,the marked histogram of the watermarked and encrypted image can be obtained for extraction of the watermark from the marked histogram.The encrypted image can be restored by inverse operations of histogram shifting in the embedding phase;(4)The marked histogram can be obtained from the directly decrypted image.This is followed by the watermark extraction and restoration of original image;(5)The watermark can still be extracted correctly under some attacks(such as JPEG/JPEG2000 compression and additive Gaussian noise)to some extent on the watermarked and decrypted image.The proposed method achieves embedding information bits directly into the encrypted image without preprocessing operations on the original image,and can extract the watermark and restore the encrypted image in encrypted domain or the original image in plaintext domain after decryption.Besides,the watermark is robust to those common image processing operations.The experimental results have shown the validity of the proposed scheme.
作者 项世军 杨乐 XIANG Shi-Jun;YANG Le(Department of Electronic Engineering, School of Information Science and Technology, Ji'nan University, Guangzhou 510632, China;State Key Laboratory of Information Security (Institute of Information Engineering, The Chinese Academy of Sciences), Beijing 100093, China)
出处 《软件学报》 EI CSCD 北大核心 2018年第4期957-972,共16页 Journal of Software
基金 国家自然科学基金(61772234 61272414) 信息安全国家重点实验室开放课题基金(2016-MS-07)~~
关键词 同态加密 鲁棒可逆水印 隐私保护 数据安全 云计算 homomorphic encryption robust and reversible watermarking privacy protection data security cloud computing
  • 相关文献

参考文献3

二级参考文献50

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:341
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1136

同被引文献81

引证文献15

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部