计算机科学 ›› 2022, Vol. 49 ›› Issue (3): 70-76.doi: 10.11896/jsjkx.210800015
任花1, 牛少彰1, 王茂森2, 岳桢3, 任如勇1
REN Hua1, NIU Shao-zhang1, WANG Mao-sen2, YUE Zhen3, REN Ru-yong1
摘要: 现有的水印和加密方案大多难以确保水印和加密过程的交换性以及受保护图像的视觉质量,这些方案的水印嵌入和加密过程固定且对受保护图像的内容进行了或多或少的修改,很少有方案在不影响受保护图像内容质量的前提下完成水印和加密过程的交换。因此,提出了一种基于奇异值分解的同态可交换脆弱零水印方案。在发送端,内容所有者采取同态加密对原始图像内容进行加密,加密和水印生成两个阶段互不影响,可以分别从加密图像和原始宿主图像生成零水印信息。在接收端,合法接收者先进行图像解密,再在解密的图像内容上进行水印检测,通过提取的水印信息可以检测和定位水印图像的蓄意篡改区域。实验结果表明,零水印的引入不会造成图像灰度值的改变,在确保交换性的同时可以完美定位图像篡改区域。
中图分类号:
[1]LI M,REN H,ZHANG E,et al.A VQ-Based Joint Fingerprin-ting and Decryption Scheme for Secure and Efficient Image Distribution [J/OL].Security and Communication Networks.https://www.hindawi.com/journals/scn/2018/4313769/. [2]YANG C F,LUO X Y,LU J C,et al.Extracting Hidden Messages of MLSB Steganography Based on Optimal Stego Subset[J].Science China Information Sciences,2018,61(11):237-239. [3]XIANG L,LI Y,HAO W,et al.Reversible Natural LanguageWatermarking Using Synonym Substitution and Arithmetic Coding[J].Computers,Materials and Continua,2018,55(3):541-559. [4]QIN C,JI P,ZHANG X,et al.Fragile Image Watermarking with Pixel-wise Recovery Based on Overlapping Embedding Strategy[J].Signal Processing,2017,138:280-293. [5]SUBRAMANYAM A V,EMMANUEL S,KANKANHALLI M S.Robust Watermarking of Compressed and Encrypted JPEG2000 Images[J].International Journal of Computer Trends &Tech-nology,2013,4(3):703-716. [6]LIU S,HENNELLY B M,GUO C,et al.Robustness of Double Random Phase Encoding Spread-space Spread-Spectrum Watermarking Technique[J].Signal Processing,2015,109:345-361. [7]MA K,ZHANG W,ZHAO X,et al.Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J].IEEE Transactions on Information Forensics and Security,2014,8(3):553-562. [8]CANCELLARO M,BATTISTI F,CARLI M,et al.A Commu-tative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain[J].Signal Processing:Image Communication,2011,26(1):1-12. [9]JIANG L,XU Z,XU Y.Commutative Encryption and Watermarking Based on Orthogonal Decomposition[J].Multimedia Tools and Applications,2014,70(3):1617-1635. [10]LIAN S.Quasi-commutative Watermarking and Encryption for Secure Media Content Distribution[J].Multimedia Tools and Applications,2009,43(1):91-107. [11]LI M,XIAO D,ZHU Y,et al.Commutative Fragile Zero-watermarking and Encryption for Image Integrity Protection[J].Multimedia Tools and Applications,2019,78(16):22727-22742. [12]AIHAB K,AFAQ H S.A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations [J/OL].The Scientific World Journal.https://www.hindawi.com/journals/tswj/2013/796726/. [13]TANG X,MA Z F,NIU X X,et al.Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm[J].Chinese Journal of Electronics,2015,24(3):492-497. [14]NAZARI M,SHARIF A,MOLLAEEFAR M.An ImprovedMethod for Digital Image Fragile Watermarking Based on Chao-tic Maps[J].Multimedia Tools and Applications,2017,76(15):16107-16123. [15]THANH T M,TANAKA K.An Image Zero-watermarking Algorithm Based on the Encryption of Visual Map Feature with Watermark Information[J].Multimedia Tools and Applications,2007 76(11):13455-13471. [16]WANG C P,WANG X Y,CHEN X J,et al.Robust Zero-watermarking Algorithm Based on Polar Complex Exponential Transform and Logistic Mapping[J].Multimedia Tools and Applications,2017,76(24):26355-26376. [17]WANG C,WANG X,XIA Z,et al.Ternary Radial HarmonicFourier Moments Based Robust Stereo Image Zero-watermar-king Algorithm[J].Information Sciences,2019,470:109-120. [18]LIU R Z,TAN T N.An SVD-based watermarking scheme for protecting rightful ownership[J].IEEE Transactions on Multimedia,2002,4(1):121-128. [19]WANG W B,LIU F L,GONG D F,et al.False Alarm Problem Analysis of Watermarking Method Based on Singular Value Decomposition[J].Computer Engineering,2020,46(11):273-278. [20]WANG N,LI Z,CHENG X Y,et al.Video Dual Watermarking Algorithm Based on Mean Ratio and Compressive Sensing[J].Computer Engineering,2019,45(3):250-255,261. |
[1] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[2] | 秦小月, 黄汝维, 杨波. 基于素数幂次阶分圆环的NTRU型全同态加密方案 NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings 计算机科学, 2022, 49(5): 341-346. https://doi.org/10.11896/jsjkx.210300089 |
[3] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[4] | 张小艳, 李秦伟, 付福杰. 基于数字承诺的区块链交易金额保密验证方法 Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment 计算机科学, 2021, 48(9): 324-329. https://doi.org/10.11896/jsjkx.200800123 |
[5] | 王瑞锦, 唐榆程, 裴锡凯, 郭上铜, 张凤荔. 基于轻量级同态加密和零知识证明的区块链隐私保护方案 Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof 计算机科学, 2021, 48(11A): 547-551. https://doi.org/10.11896/jsjkx.201200138 |
[6] | 李姝, 杨华, 宋波. 多层供应链网络中欠载失效和过载级联失效的协同演化研究 Study on Co-evolution of Underload Failure and Overload Cascading Failure in Multi-layer Supply Chain Network 计算机科学, 2021, 48(10): 351-358. https://doi.org/10.11896/jsjkx.200900144 |
[7] | 杨云铄, 桑庆兵. 无需学习的无参考彩色噪声图像质量评价方法 No-reference Color Noise Images Quality Assessment Without Learning 计算机科学, 2020, 47(10): 161-168. https://doi.org/10.11896/jsjkx.190900051 |
[8] | 李桂会,李晋江,范辉. 自适应匹配追踪图像去噪算法 Image Denoising Algorithm Based on Adaptive Matching Pursuit 计算机科学, 2020, 47(1): 176-185. https://doi.org/10.11896/jsjkx.181202280 |
[9] | 王童, 马文平, 罗维. 基于区块链的信息共享及安全多方计算模型 Information Sharing and Secure Multi-party Computing Model Based on Blockchain 计算机科学, 2019, 46(9): 162-168. https://doi.org/10.11896/j.issn.1002-137X.2019.09.023 |
[10] | 刘强,况晓辉,陈华,李响,李广轲. 一种基于程序切片相似度匹配的脆弱性发现方法 Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing 计算机科学, 2019, 46(7): 126-132. https://doi.org/10.11896/j.issn.1002-137X.2019.07.020 |
[11] | 刘晴晴, 罗永龙, 汪逸飞, 郑孝遥, 陈文. 基于SVD填充的混合推荐算法 Hybrid Recommendation Algorithm Based on SVD Filling 计算机科学, 2019, 46(6A): 468-472. |
[12] | 杜秀丽, 左思铭, 邱少明. 基于图像灰度熵的自适应字典学习算法 Adaptive Dictionary Learning Algorithm Based on Image Gray Entropy 计算机科学, 2019, 46(5): 266-271. https://doi.org/10.11896/j.issn.1002-137X.2019.05.041 |
[13] | 李孟天,胡斌. 基于批处理技术的RLWE全同态加密方案 RLWE-based Fully Homomorphic Encryption Scheme with Batch Technique 计算机科学, 2019, 46(3): 209-216. https://doi.org/10.11896/j.issn.1002-137X.2019.03.031 |
[14] | 张琦, 柳玲, 文俊浩. 一种基于领域信任及不信任的奇异值分解推荐算法 Recommendation Algorithm with Field Trust and Distrust Based on SVD 计算机科学, 2019, 46(10): 27-31. https://doi.org/10.11896/jsjkx.190300388 |
[15] | 张茗琪, 曹国, 陈强, 孙权森. 基于改进逆滤波的衍射成像光谱仪图像复原方法 Image Restoration Method Based on Improved Inverse Filtering for Diffractive Optic Imaging Spectrometer 计算机科学, 2019, 46(1): 86-93. https://doi.org/10.11896/j.issn.1002-137X.2019.01.013 |
|