计算机科学 ›› 2022, Vol. 49 ›› Issue (3): 70-76.doi: 10.11896/jsjkx.210800015

• 新兴分布式计算技术与系统* 上一篇    下一篇

基于奇异值分解的同态可交换脆弱零水印研究

任花1, 牛少彰1, 王茂森2, 岳桢3, 任如勇1   

  1. 1 北京邮电大学计算机学院 北京100876
    2 东南数字经济发展研究院 浙江 衢州324000
    3 河南师范大学现代教育技术中心 河南 新乡453007
  • 收稿日期:2021-07-31 修回日期:2021-12-06 出版日期:2022-03-15 发布日期:2022-03-15
  • 通讯作者: 牛少彰(szniu@bupt.edu.cn)
  • 作者简介:(renhuahtu@163.com)
  • 基金资助:
    国家自然科学基金(61370195);国家自然科学基金联合基金(U1536121)

Homomorphic and Commutative Fragile Zero-watermarking Based on SVD

REN Hua1, NIU Shao-zhang1, WANG Mao-sen2, YUE Zhen3, REN Ru-yong1   

  1. 1 School of Computer,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Southeast Digital Economic Development Institute,Quzhou,Zhejiang 324000,China
    3 Modern Educational Technology Center,Henan Normal University,Xinxiang,Henan 453007,China
  • Received:2021-07-31 Revised:2021-12-06 Online:2022-03-15 Published:2022-03-15
  • About author:REN Hua,born in 1992,Ph.D,is a member of China Computer Federation.Her main research interests include reversible data hiding in encrypted images and image authentication.
    NIU Shao-zhang,born in 1965,Ph.D,professor,Ph.D supervisor.His main research interests include digital forensics and data hiding.
  • Supported by:
    National Natural Science Foundation of China(61370195) and Joint Funds of the National Natural Science Foundation of China(U1536121).

摘要: 现有的水印和加密方案大多难以确保水印和加密过程的交换性以及受保护图像的视觉质量,这些方案的水印嵌入和加密过程固定且对受保护图像的内容进行了或多或少的修改,很少有方案在不影响受保护图像内容质量的前提下完成水印和加密过程的交换。因此,提出了一种基于奇异值分解的同态可交换脆弱零水印方案。在发送端,内容所有者采取同态加密对原始图像内容进行加密,加密和水印生成两个阶段互不影响,可以分别从加密图像和原始宿主图像生成零水印信息。在接收端,合法接收者先进行图像解密,再在解密的图像内容上进行水印检测,通过提取的水印信息可以检测和定位水印图像的蓄意篡改区域。实验结果表明,零水印的引入不会造成图像灰度值的改变,在确保交换性的同时可以完美定位图像篡改区域。

关键词: 脆弱性, 交换性, 零水印, 奇异值分解, 同态加密

Abstract: Most of the existing watermarking and encryption schemes are difficult to ensure the commutativity of watermarking and encryption as well as the visual quality of the protected image.These schemes complete watermark embedding and image encryption processes in a fixed order,and they modify the protected image content more or less.Few of them complete the commutativity of watermarking and encryption process without affecting the quality of the protected image content.Therefore,a homomorphic and commutative fragile zero-watermarking based on SVD (singular value decomposition) is proposed.At the sender side,the content owner adopts homomorphic modular encryption to encrypt the original image content,and the two stages of image encryption and watermarking generation do not affect each other.The zero-watermarking information can be generated from the encrypted image and the original host image,respectively.At the receiver end,the legitimate receiver first decrypts the image and then performs watermarking detection on the decrypted image content,and the extracted watermarking information can detect and locate the deliberately tampered area of the watermarked image.Experimental results confirm that the use of zero-watermarking will not lead to gray level value alteration of the image content,and the deliberately tampered area of the watermarked image can be located perfectly while ensuring the commutativity.

Key words: Commutative, Fragility, Homomorphic encryption, SVD, Zero-watermarking

中图分类号: 

  • TP391
[1]LI M,REN H,ZHANG E,et al.A VQ-Based Joint Fingerprin-ting and Decryption Scheme for Secure and Efficient Image Distribution [J/OL].Security and Communication Networks.https://www.hindawi.com/journals/scn/2018/4313769/.
[2]YANG C F,LUO X Y,LU J C,et al.Extracting Hidden Messages of MLSB Steganography Based on Optimal Stego Subset[J].Science China Information Sciences,2018,61(11):237-239.
[3]XIANG L,LI Y,HAO W,et al.Reversible Natural LanguageWatermarking Using Synonym Substitution and Arithmetic Coding[J].Computers,Materials and Continua,2018,55(3):541-559.
[4]QIN C,JI P,ZHANG X,et al.Fragile Image Watermarking with Pixel-wise Recovery Based on Overlapping Embedding Strategy[J].Signal Processing,2017,138:280-293.
[5]SUBRAMANYAM A V,EMMANUEL S,KANKANHALLI M S.Robust Watermarking of Compressed and Encrypted JPEG2000 Images[J].International Journal of Computer Trends &Tech-nology,2013,4(3):703-716.
[6]LIU S,HENNELLY B M,GUO C,et al.Robustness of Double Random Phase Encoding Spread-space Spread-Spectrum Watermarking Technique[J].Signal Processing,2015,109:345-361.
[7]MA K,ZHANG W,ZHAO X,et al.Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J].IEEE Transactions on Information Forensics and Security,2014,8(3):553-562.
[8]CANCELLARO M,BATTISTI F,CARLI M,et al.A Commu-tative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain[J].Signal Processing:Image Communication,2011,26(1):1-12.
[9]JIANG L,XU Z,XU Y.Commutative Encryption and Watermarking Based on Orthogonal Decomposition[J].Multimedia Tools and Applications,2014,70(3):1617-1635.
[10]LIAN S.Quasi-commutative Watermarking and Encryption for Secure Media Content Distribution[J].Multimedia Tools and Applications,2009,43(1):91-107.
[11]LI M,XIAO D,ZHU Y,et al.Commutative Fragile Zero-watermarking and Encryption for Image Integrity Protection[J].Multimedia Tools and Applications,2019,78(16):22727-22742.
[12]AIHAB K,AFAQ H S.A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations [J/OL].The Scientific World Journal.https://www.hindawi.com/journals/tswj/2013/796726/.
[13]TANG X,MA Z F,NIU X X,et al.Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm[J].Chinese Journal of Electronics,2015,24(3):492-497.
[14]NAZARI M,SHARIF A,MOLLAEEFAR M.An ImprovedMethod for Digital Image Fragile Watermarking Based on Chao-tic Maps[J].Multimedia Tools and Applications,2017,76(15):16107-16123.
[15]THANH T M,TANAKA K.An Image Zero-watermarking Algorithm Based on the Encryption of Visual Map Feature with Watermark Information[J].Multimedia Tools and Applications,2007 76(11):13455-13471.
[16]WANG C P,WANG X Y,CHEN X J,et al.Robust Zero-watermarking Algorithm Based on Polar Complex Exponential Transform and Logistic Mapping[J].Multimedia Tools and Applications,2017,76(24):26355-26376.
[17]WANG C,WANG X,XIA Z,et al.Ternary Radial HarmonicFourier Moments Based Robust Stereo Image Zero-watermar-king Algorithm[J].Information Sciences,2019,470:109-120.
[18]LIU R Z,TAN T N.An SVD-based watermarking scheme for protecting rightful ownership[J].IEEE Transactions on Multimedia,2002,4(1):121-128.
[19]WANG W B,LIU F L,GONG D F,et al.False Alarm Problem Analysis of Watermarking Method Based on Singular Value Decomposition[J].Computer Engineering,2020,46(11):273-278.
[20]WANG N,LI Z,CHENG X Y,et al.Video Dual Watermarking Algorithm Based on Mean Ratio and Compressive Sensing[J].Computer Engineering,2019,45(3):250-255,261.
[1] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[2] 秦小月, 黄汝维, 杨波.
基于素数幂次阶分圆环的NTRU型全同态加密方案
NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings
计算机科学, 2022, 49(5): 341-346. https://doi.org/10.11896/jsjkx.210300089
[3] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[4] 张小艳, 李秦伟, 付福杰.
基于数字承诺的区块链交易金额保密验证方法
Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment
计算机科学, 2021, 48(9): 324-329. https://doi.org/10.11896/jsjkx.200800123
[5] 王瑞锦, 唐榆程, 裴锡凯, 郭上铜, 张凤荔.
基于轻量级同态加密和零知识证明的区块链隐私保护方案
Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof
计算机科学, 2021, 48(11A): 547-551. https://doi.org/10.11896/jsjkx.201200138
[6] 李姝, 杨华, 宋波.
多层供应链网络中欠载失效和过载级联失效的协同演化研究
Study on Co-evolution of Underload Failure and Overload Cascading Failure in Multi-layer Supply Chain Network
计算机科学, 2021, 48(10): 351-358. https://doi.org/10.11896/jsjkx.200900144
[7] 杨云铄, 桑庆兵.
无需学习的无参考彩色噪声图像质量评价方法
No-reference Color Noise Images Quality Assessment Without Learning
计算机科学, 2020, 47(10): 161-168. https://doi.org/10.11896/jsjkx.190900051
[8] 李桂会,李晋江,范辉.
自适应匹配追踪图像去噪算法
Image Denoising Algorithm Based on Adaptive Matching Pursuit
计算机科学, 2020, 47(1): 176-185. https://doi.org/10.11896/jsjkx.181202280
[9] 王童, 马文平, 罗维.
基于区块链的信息共享及安全多方计算模型
Information Sharing and Secure Multi-party Computing Model Based on Blockchain
计算机科学, 2019, 46(9): 162-168. https://doi.org/10.11896/j.issn.1002-137X.2019.09.023
[10] 刘强,况晓辉,陈华,李响,李广轲.
一种基于程序切片相似度匹配的脆弱性发现方法
Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing
计算机科学, 2019, 46(7): 126-132. https://doi.org/10.11896/j.issn.1002-137X.2019.07.020
[11] 刘晴晴, 罗永龙, 汪逸飞, 郑孝遥, 陈文.
基于SVD填充的混合推荐算法
Hybrid Recommendation Algorithm Based on SVD Filling
计算机科学, 2019, 46(6A): 468-472.
[12] 杜秀丽, 左思铭, 邱少明.
基于图像灰度熵的自适应字典学习算法
Adaptive Dictionary Learning Algorithm Based on Image Gray Entropy
计算机科学, 2019, 46(5): 266-271. https://doi.org/10.11896/j.issn.1002-137X.2019.05.041
[13] 李孟天,胡斌.
基于批处理技术的RLWE全同态加密方案
RLWE-based Fully Homomorphic Encryption Scheme with Batch Technique
计算机科学, 2019, 46(3): 209-216. https://doi.org/10.11896/j.issn.1002-137X.2019.03.031
[14] 张琦, 柳玲, 文俊浩.
一种基于领域信任及不信任的奇异值分解推荐算法
Recommendation Algorithm with Field Trust and Distrust Based on SVD
计算机科学, 2019, 46(10): 27-31. https://doi.org/10.11896/jsjkx.190300388
[15] 张茗琪, 曹国, 陈强, 孙权森.
基于改进逆滤波的衍射成像光谱仪图像复原方法
Image Restoration Method Based on Improved Inverse Filtering for Diffractive Optic Imaging Spectrometer
计算机科学, 2019, 46(1): 86-93. https://doi.org/10.11896/j.issn.1002-137X.2019.01.013
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!