计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 250900081-8.doi: 10.11896/jsjkx.250900081

• 信息安全 • 上一篇    

基于量子安全和脆弱水印的图像篡改检测与自恢复算法

陈鸿祥1, 陈果1, 张辉1, 吴美琪1, 丁萁琦1, 罗合1, 王昊1, 谷林明1, 罗惠恒2, 王景晗2   

  1. 1 中国长江电力股份有限公司 武汉 430014
    2 中国三峡武汉科创园 武汉 430000
  • 出版日期:2025-11-15 发布日期:2025-11-10
  • 通讯作者: 陈鸿祥(chen_hongxiang@ctg.com.cn)
  • 基金资助:
    中国长江电力股份有限公司科研项目(1623020020)

Image Tampering Detection and Self-recovery Algorithm Based on Quantum-secure and FragileWatermarking

CHEN Hongxiang1, CHEN Guo1, ZHANG Hui1, WU Meiqi1, DING Qiqi1, LUO He1, WANG Hao1, GU Linming1, LUO Huiheng2, WANG Jinghan2   

  1. 1 China Yangtze Power Co.,Ltd.,Wuhan 430014,China
    2 China Three Gorges Wuhan Science and Technology Innovation Park,Wuhan 430000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Scientific Research Project of China Yangtze Power Co.,Ltd.(1623020020).

摘要: 在电力系统的远程监控与无人值守巡检应用中,图像已成为记录与传输缺陷信息的重要媒介。然而,经由公开信道传输的图像数据极易受到恶意篡改与伪造,严重威胁系统安全与故障响应效率。为此,文中提出了一种适用于电力通信场景的图像篡改检测与自恢复算法。该算法基于量子随机数生成器构造完美哈希,用于生成具备高随机性与不可预测性的认证模型,以提高其抗篡改能力;同时结合图像块级匹配策略和SPIHT编码算法生成认证与恢复数据;然后,将这些数据作为脆弱水印嵌入到原始的通信图像中,以实现篡改区域的精确定位和自恢复,其中嵌入密钥采用量子密钥分发协议进行安全共享,可有效防止关键参数在传输过程中的泄露或篡改。在标准图像数据集上进行实验,结果表明所提方法在篡改检测精度、自恢复效果、安全性、嵌入容量与图像质量等方面均优于现有方案,适用于电力图像传输的完整性保护与可信认证需求。

关键词: 篡改检测, 图像恢复, 脆弱水印, 量子安全, 完美哈希

Abstract: In the context of remote monitoring and unattended inspection in power systems,images have become a crucial medium for recording and transmitting defect information.However,when transmitted over public channels,these images are highly susceptible to malicious tampering and forgery,posing serious threats to system security and fault response efficiency.To address this issue,this paper proposes an image tamper detection and self-recovery method tailored for power communication scenarios.The proposed approach constructs a perfect hashing-based authentication model using a quantum random number generator,ensuring high randomness and unpredictability to enhance resistance against tampering.It further integrates a block-level image matching strategy and a SPIHT encoding algorithm to generate both authentication and recovery data.These data are embedded into the original communication image as fragile watermarks,enabling precise localization and recovery of tampered regions.The embedding key is securely shared via a quantum key distribution protocol,effectively preventing key leakage or manipulation during transmission.Experimental results on standard image datasets demonstrate that the proposed method outperforms existing schemes in terms of tamper detection accuracy,recovery performance,security,embedding capacity,and visual quality,making it well-suited for integrity protection and trusted authentication of power image transmission.

Key words: Tamper detection, Image recovery, Fragile watermarking, Quantum security, Perfect hash

中图分类号: 

  • TP391
[1]MADHUSHREE B,BASANTH K H B,CHENNAMMA H R.An exhaustive review of authentication,tamper detection with localization and recovery techniques for medical images[J].Multimedia Tools and Applications,2024,83(13):39779-39821.
[2]ALORAINI M,SHARIFZADEH M,SCHONFELD D.Sequential and patch analyses for object removal video forgery detection and localization[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(3):917-930.
[3]SHAIK A S,KARSH R K,ISLAM M,et al.A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication[J].Wireless Communications and Mobile Computing,2022,16(4):56-58.
[4]BAPPY J H,SIMONS C,NATARAJ L,et al.Hybrid LSTM and encoder-decoder architecture for detection of image forgeries[J].IEEE Transactions on Image Processing,2019,28(7):3286-3300.
[5]BHALERAO S,ANSARI I A,KUMAR A.A secure image watermarking for tamper detection and localization[J].Journal of Ambient Intelligence and Humanized Computing,2021,12(1):1057-1068.
[6]SINHAL R,ANSARI I A.Multipurpose image watermarking:ownership check,tamper detection and self-recovery[J].Circuits,Systems,and Signal Processing,2022,41(6):3199-3221.
[7]VAIDYA S P,KANDALA R N,CHANDRA M P,et al.A robust fragile watermarking approach for image tampering detection and restoration utilizing hybrid transforms[J].Scientific Reports,2025,15(1):1-24.
[8]AHMADI S B B,ZHANG G,RABBANI M,et al.An intelligent and blind dual color image watermarking for authentication and copyright protection[J].Applied Intelligence,2021,51(3):1701-1732.
[9]VAN S R G,TIRKEL A Z,OSBORNE C F.A digital water-mark[C]//Proceedings of 1st International Conference on Image Processing.1994:86-90.
[10]LIN P L,HSIEH C K,HUANG P W.A hierarchical digital watermarking method for image tamper detection and recovery[J].Pattern Recognition,2005,38(12):2519-2529.
[11]LEE T Y,LIN S D.Dual watermark for image tamper detection and recovery[J].Pattern Recognition,2008,41(11):3497-3506.
[12]QIN C,JI P,ZHANG X,et al.Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J].Signal Processing,2017,138:280-293.
[13]SARRESHTEDARI S,AKHAEE M A.A source-channel cod-ing approach to digital image protection and self-recovery[J].IEEE Transactions on Image Processing,2015,24(7):2266-2277.
[14]BOLOURIAN H B,TAHERINIA A H,MOHAJERZADEH A H.TRLG:Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA[J].Information Sciences,2019,486:204-230.
[15]SREENIVAS K,KAMAKSHIPRASAD V.Improved imagetamper localisation using chaotic maps and self-recovery[J].Journal of Visual Communication and Image Representation,2017,49:164-176.
[16]PRASAD S,PAL A K.A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy[J].Multimedia Tools and Applications,2020,79(3):1673-1705.
[17]LIU T,YUAN X.Adaptive feature calculation and diagonalmapping for successive recovery of tampered regions[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(7):2617-2630.
[18]CAO Y,ZHAO Y,WANG Q,et al.The evolution of quantum key distribution networks:On the road to the qinternet[J].IEEE Communications Surveys & Tutorials,2022,24(2):839-894.
[19]MANNALATHA V,MISHRA S,PATHAK A.A comprehensive review of quantum random number generators:Concepts,classification and the origin of randomness[J].Quantum Information Processing,2023,22(12):439-445.
[20]SPRUGNOLI R.Perfect hashing functions:a single probe retrie-ving method for static sets[J].Communications of the ACM,1977,20(11):841-850.
[21]DU M W,HSIEH T M,JEA K F,et al.The study of a new perfect hash scheme[J].IEEE Transactions on Software Engineering,1983,9(3):305-313.
[22]SHAPIRO J.Embedded image coding using zerotrees of wavelet coefficients[J].IEEE Transactions on Signal Processing,1993,41(12):3445-3462.
[23]SAID A,PEARLMAN W A.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Transactions on Circuits and Systems for Video Technology,1996,6(3):243-250.
[24]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(34):313-336.
[25]LIU Y X,YANG C N,SUN Q D,et al.Enhanced embedding capacity for the SMSD-based data-hiding method[J].Signal Processing:Image Communication,2019,78:216-222.
[26]HE W,CAI Z.Reversible data hiding based on dual pairwise prediction-error expansion[J].IEEE Transactions on Image Processing,2021,30:5045-5055.
[27]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141.
[28]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modification-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155.
[29]HAOUZIA A,NOUMEIR R.Methods for image authentica-tion:a survey[J].Multimedia Tools and Applications,2008,39(1):1-46.
[30]PENG Y,NIU X,FU L,et al.Image authentication scheme based on reversible fragile watermarking with two images[J].Journal of Information Security and Applications,2018,40:236-246.
[31]YIN Z,NIU X,ZHOU Z,et al.Improved reversible image authentication scheme[J].Cognitive Computation,2016,8(5):890-899.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!