计算机科学 ›› 2022, Vol. 49 ›› Issue (12): 368-373.doi: 10.11896/jsjkx.220600139

• 信息安全 • 上一篇    下一篇

基于混沌YOLO v4的共享图像选择性加密方法

张国梅1, 马琳娟2, 张福泉2, 李庆珍3   

  1. 1 广州理工学院计算机科学与工程学院 广州510540
    2 北京理工大学计算机学院 北京100081
    3 中国政法大学数据法治研究院 北京102249
  • 收稿日期:2022-06-15 修回日期:2022-07-25 发布日期:2022-12-14
  • 通讯作者: 张国梅(158060029@qq.com)
  • 基金资助:
    国家自然科学基金(61601189);广东省普通高校科研项目(2019KTSCX243,2021ZDZX1070)

Selective Shared Image Encryption Method Based on Chaotic System and YOLO v4

ZHANG Guo-mei1 MA Lin-juan2, ZHANG Fu-quan2, LI Qing-zhen3   

  1. 1 School of Computer Science and Engineering,Guangzhou Institute of Science and Technology,Guangzhou 510540,China
    2 School of Computer Science & Technology,Beijing Institute of Technology,Beijing 100081,China
    3 Institute of Data Rule of Law,China University of Political Science and Law,Beijing 102249,China
  • Received:2022-06-15 Revised:2022-07-25 Published:2022-12-14
  • About author:ZHANG Guo-mei,born in 1979,postgraduate,lecturer.Her main research interests include visual processing,graphics processing,virtual reality technology and application.
  • Supported by:
    National Natural Science Foundation of China(61601189) and Scientific Research Projects of Colleges in Guangdong Province(2019KTSCX243,2021ZDZX1070).

摘要: 针对社交平台共享图像的信息安全问题,提出了基于混沌YOLO v4和用户选择感兴趣区域(ROI)的图像加密方案。首先,利用YOLO v4自动检测图像中的目标,提供要加密的候选包围框;然后,利用cosine和polynomial映射的线性组合加密算法对用户选定的图像区域进行加密,使得只有合法授权用户才能访问共享图像的敏感信息。通过密钥发放和授权机制,实现对第三方转发图像中敏感信息的保护。实验统计和安全分析结果证明,所提方案能够抵御各种攻击,提供高度安全性,且处理速度能够满足在线用户的实时需求。

关键词: 图像加密, 共享图像, 混沌映射, YOLO v4, 感兴趣区域

Abstract: Aiming at the information security problem of sharing images on social platforms,a selective region of interest(ROI) image encryption scheme based on YOLO v4 and hybrid chaotic map encryption is proposed.By utilizing YOLO v4,the uploaded image is automatically detected and the candidate bounding boxes to be encrypted are provided.Then the image areas selected by user are encrypted with the proposed hybrid encryption algorithm combining cosine and polynomial mapping,so that only legally authorized users can access the sensitive information of the shared image.Through the secret key issuing and authorization mecha-nism,the protection of sensitive information of the image forwarded by a third party is realized.Statistical and security analysis results prove that the proposed scheme can resist various attacks,and the processing speed can meet the real-time needs of online users.

Key words: Image encryption, Shared image, Chaotic map, YOLO v4, Region of interest

中图分类号: 

  • TP309
[1]RATHORE S,SHARMA P K,LOIA V,et al.Social network security:Issues,challenges,threats,and solutions[J].Information Sciences,2017,42(1):43-69.
[2]LI L,XIE Y,LIU Y,et al.Exploiting opticalchaos for colorimage encryption and secure resource sharing in cloud[J].IEEE Photonics Journal,2019,11(3):1-12.
[3]REN H,NIU S Z,WANG M S,et al.Homomorphic and commutative fragile zero-watermarking based on SVD[J].Computer Science,2022,49(3):70-76.
[4]YU F,GONG X H,WANG S H.Cryptanalysis of medical image encryption algorithm using high-speed scrambling and pixel adaptive diffusion[J].Computer Science,2020,47(2):276-280.
[5]LI J Q,ZHOU J,DI X Q.Learning optical image encryptionscheme based on CycleGAN[J].Journal of Jilin University(Engineering and Technology Edition),2021,51(3):1060-1066.
[6]LI F P,LIU J B,WANG G Y,et al.An image encryption algorithm based on chaos set[J].Journal of Electronics & Information Technology,2020,42(4):981-987.
[7]TANG J,YU Z,LIU L.A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption[J].Multimedia Tools and Applications,2019,78(17):24765-24788.
[8]WEI L S,HU X C,CHEN Q Q,et al.A color image encryption algorithm based on new chaos and matrix convolution operation[J].Computer Engineering and Science,2020,42(1):80-88.
[9]LIU L,MIAO S.A new simple one-dimensional chaotic map and its application for image encryption[J].Multimedia Tools and Applications,2018,77(16):21445-21462.
[10]WANG X,FENG L,LI R,et al.A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model[J].Nonlinear Dynamics,2019,95(4):2797-2824.
[11]WEI C J,LI G D.Encryption algorithm of video images combining hyper-chaotic system and logistic mapping[J].Computer Engineering,2022,48(5):263-271.
[12]TRSOR L O,SUMBWANYAMBE M.A selective image en-cryption scheme based on 2d DWT,Henon map and 4d Qi hyper-chaos[J].IEEE Access,2019,7(1):103463-103472.
[13]XUE H,DU J,LI S,et al.Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets[J].Optics & Laser Technology,2018,106(1):506-516.
[14]KRISHNAMOORTHI R,MURALI P.A selective image en-cryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices[J].Multimedia Tools and Applications,2017,76(1):1217-1246.
[15]ZHANG L D,DENG C.Multi-scale fusion of YOLOv3 crowd mask wearing detection method[J].Computer Engineering and Applications,2021,57(16):283-290.
[16]ZHU H,QI W,GE J,et al.Analyzing devaney chaos of a sine-cosine compound function system[J].International Journal of Bifurcation and Chaos,2018,28(14):176-188.
[17]GE J X,LAN L,QI W T,et al.Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption[J].Journal of Computer Applications,2019,39(1):239-244.
[18]LIAO X,HAHSMI M A,HAIDER R.An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos[J].Optik-International Journal for Light and Electron Optics,2018,153(2):117-134.
[19]QAYYUM A,AHMAD J,BOULILA W,et al.Chaos-basedconfusion and diffusion of image pixels using dynamic substitution[J].IEEE Access,2020,8(1):140876-140895.
[1] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[2] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[3] 刘奇, 陈红梅, 罗川.
基于改进的蝗虫优化算法的红细胞供应预测方法
Method for Prediction of Red Blood Cells Supply Based on Improved Grasshopper Optimization Algorithm
计算机科学, 2021, 48(2): 224-230. https://doi.org/10.11896/jsjkx.200600016
[4] 金雨芳, 吴祥, 董辉, 俞立, 张文安.
基于改进YOLO v4的安全帽佩戴检测算法
Improved YOLO v4 Algorithm for Safety Helmet Wearing Detection
计算机科学, 2021, 48(11): 268-275. https://doi.org/10.11896/jsjkx.200900098
[5] 班多晗, 吕鑫, 王鑫元.
基于一维混沌映射的高效图像加密算法
Efficient Image Encryption Algorithm Based on 1D Chaotic Map
计算机科学, 2020, 47(4): 278-284. https://doi.org/10.11896/jsjkx.190600059
[6] 禹峰,龚馨慧,王世红.
基于快速置换和可选择像素扩散的医疗图像加密算法的安全性分析
Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion
计算机科学, 2020, 47(2): 276-280. https://doi.org/10.11896/jsjkx.190100051
[7] 樊英, 张达敏, 陈忠云, 王依柔, 徐航, 王栎桥.
基于改进乌鸦算法的车载网络频谱分配方案
Spectrum Allocation Scheme of Vehicular Ad Hoc Networks Based on Improved Crow Search Algorithm
计算机科学, 2020, 47(12): 273-278. https://doi.org/10.11896/jsjkx.190900199
[8] 丁荣莉, 李杰, 张曼, 刘艳丽, 伍伟.
基于S-HOG的遥感图像舰船目标检测
Ship Target Detection in Remote Sensing Image Based on S-HOG
计算机科学, 2020, 47(11A): 248-252. https://doi.org/10.11896/jsjkx.191200090
[9] 田军锋, 彭静静, 左宪禹, 葛强, 范明虎.
基于循环移位和多混沌映射的图像加密算法
Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps
计算机科学, 2020, 47(10): 327-331. https://doi.org/10.11896/jsjkx.190800003
[10] 柴锐, 薛凡, 曾建潮, 秦品乐.
一种医学肾动态显像自动化定量评估方法
Automatic Quantitative Evaluation Approach for Medical Renal Dynamic Imaging
计算机科学, 2019, 46(8): 321-326. https://doi.org/10.11896/j.issn.1002-137X.2019.08.053
[11] 何霞, 汤一平, 王丽冉, 陈朋, 袁公萍.
基于Faster RCNNH的多任务分层图像检索技术
Multitask Hierarchical Image Retrieval Technology Based on Faster RCNNH
计算机科学, 2019, 46(3): 303-313. https://doi.org/10.11896/j.issn.1002-137X.2019.03.045
[12] 王丽娟, 李国东, 吕冬梅.
基于动态参数控制的混沌系统图像加密算法
Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control
计算机科学, 2019, 46(11A): 469-472.
[13] 韩雪娟, 李国东, 王思秀.
基于Logistic和超混沌结合的加密算法
Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos
计算机科学, 2019, 46(11A): 477-482.
[14] 赵方正, 李成海, 刘晨, 宋亚飞.
超混沌彩色图像加密算法优化及安全性分析
Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm
计算机科学, 2019, 46(11A): 483-487.
[15] 王松伟, 陈建华.
基于智能卡的扩展混沌映射异步认证密钥协商协议
Chaotic Mapping Asynchronous Authentication Key Agreement Scheme with Smart-cards
计算机科学, 2019, 46(1): 175-181. https://doi.org/10.11896/j.issn.1002-137X.2019.01.027
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!