Computer Science ›› 2022, Vol. 49 ›› Issue (8): 127-135.doi: 10.11896/jsjkx.210700216

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Reversible Hidden Algorithm for Remote Sensing Images Based on Hachimoji DNA and QR Decomposition

WANG Kun-shu, ZHANG Ze-hui, GAO Tie-gang   

  1. College of Software,Nankai University,Tianjin 300350,China
  • Received:2021-07-22 Revised:2022-05-06 Published:2022-08-02
  • About author:WANG Kun-shu,born in 1994,Ph.D.Her main research interests include image encryption,digital watermarking,compressed sensing and machine lear-ning privacy protection.
    GAO Tie-gang,born in 1966,Ph.D,professor,senior engineer,Ph.D supervisor.His main research interests include federated learning information hiding and cloud data security.
  • Supported by:
    National Science and Technology Major Projects(2018YFB0204304),2021 Tianjin Graduate Scientific Research Innovation Project(2021YJSB012) and Key Project of Tianjin Natural Science Foundation(#21JCZDJC00130).

Abstract: In recent years,with the rapid development of cloud computing and artificial intelligence,digital images are more and more widely used in multimedia,medical and military fields.Among them,remote sensing technology can detect and process remote targets through the theory of electromagnetic wave,which makes the transmission security of remote sensing images increasingly significant.In order to solve the problems of digital image information security and privacy protection,this paper proposes a reversible remote sensing image hiding algorithm based on novel Hachimoji deoxyribonucleic acid (DNA) and QR decomposition.Firstly,the system parameters and initial values of the coupled map lattice(CML) are updated by using the information entropy of remote sensing image and host image,and the generated chaotic sequences are used as the one-time key stream of the encryption process,which increases resistance to known/selected plain-text attacks.Then,Hachimoji DNA technology is used to encode the remote sensing image with 8-bit base,and key streams are used to perform XOR operation and cyclic shift operation on the image matrix.Finally,the host image is decomposed into blocks,and the encrypted remote sensing image is embedded into the host block in the form of DNA bases.In particular,the host image still visually meaningful after embedding remote sensing information,and the embedded image information can also be extracted from it without loss.Simulation results show that the proposed algorithm has good embedding effect,high security and strong robustness.

Key words: Coupled mapping lattice, Cyclic shift, Hachimoji deoxyribonucleic acid, QR decomposition, Remote sensing images, Watermarks

CLC Number: 

  • TP309
[1]WANG M,YANG W F,XIONG X W.Application of Information Hiding Technology Based on MATLAB in Military Information Security[J].Advanced Materials Research,2012,546-547:395-400.
[2]LI X B,ZHOU Q.Data hiding transmission method againstcompression for satellite image based on chaos and slant transform[J].Computer Engineering and Design,2013,34(7):2301-2305.
[3]WU J,CHANG R F,CHEN C J.Tamper detection and recovery for medical images using near-lossless information hiding technique[J].Journal of Digital Imaging,2008,21(1):59-76.
[4]TIRKEL A Z,RANKIN G A,SCHYNDEL R V,et al.Electro-nic Watermark[C]//Digital Image Computing,Technology and Applications.1993:666-673.
[5]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1995,35(3/4):313-336.
[6]LIANG X Y,XIANG S J.Robust and Reversible Data Hiding Algorithm Based on Histogram of Difference Statistics Shifting in Wavelet Domain[J].Journal of Cyber Security,2020,5(3):113-127.
[7]BHARDWAJ R,AGGARWAL A.An improved block basedjoint reversible data hiding in encrypted images by symmetric cryptosystem[J].Pattern Recognition Letters,2020,139:60-68.
[8]WU Y,XIANG Y,GUO Y,et al.An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling[J].IEEE Transactions on Multimedia,2019,22(8):1929-1938.
[9]YIN Z,SHE X,TANG J,et al.Reversible data hiding in en-cryptedimages based on pixel prediction and multi-MSB planes rearrangement[J].Signal Processing,2021,187:108146.
[10]ANAND A,SINGH A K.An improved DWT-SVD domain watermarking for medical information security[J].Computer Communications,2020,152:72-80.
[11]CHEN Y,JIA Z G,PENG Y,et al.A new structure-preserving quaternion QR decomposition method for color image blind watermarking[J].Signal Processing,2021,185:108088.
[12]ADLEMAN L M.Molecular computation of solutions of combinatiorial problems[J].Science,1994,266:1021-1024.
[13]WU X J,KAN H B,KURTHS J.A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps[J].Applied Soft Computing,2015,37:24-39.
[14]ZHEN P,ZHAO G,MIN L,et al.Chaos-based image encryption scheme combining DNA coding and entropy[J].Multimedia Tools and Applications,2016,75:6303-6319.
[15]WU X J,WANG K S,WANG X Y,et al.Lossless chaotic color image cryptosystem based on DNA encryption and entropy[J].Nonlinear Dynamics,2017,90:855-875.
[16]RAHMAN M S,KHALIL I,XUN Y.A lossless DNA data hi-ding approach for data authenticity in mobile cloud based healthcare systems[J].International Journal of Information Management,2019,45:276-288.
[17]HOSHIKA,SHUICHI.Hachimoji DNA and RNA:A geneticsystem with eight building blocks[J].Science,2019,363(6429):884-887.
[18]WASTON J D,CRICK F.Molecular Structure of Nucleic Acids:A Structure for Deoxyribose Nucleic Acid[J].Nature,1953,248(4):623-624.
[19]SU Q,WANG G,ZHANG X,et al.An improved color image watermarking algorithm based on QR decomposition[J].Multimedia Tools and Applications,2017,76(1):707-729.
[20]SU Q,LIU Y,LIU D,et al.A new watermarking scheme forcolour image using QR decomposition and ternary coding[J].Multimedia Tools and Applications,2019,78(7):8113-8132.
[21]KANEKO K.Overview of coupled map lattices[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,1992,2(3):279-282.
[22]WU X J,WANG K S,WANGX Y,et al.Color image DNA encryption using NCA map-based CML and one-time keys[J].Signal Processing,2018,148(7):272-287.
[23]SU J,WANG X,WANG T,et al.New Proof Method for Cyclic Shift and XOR Structured Diffusion Layer[J].Journal of Cryptologic Research,2020,7(6):763-773.
[24]PONNAIAN D,CHANDRANBABU K.Crypt analysis of animage compression-encryption algorithm and a modified scheme using compressive sensing[J].Optik,2017,147:263-276.
[25]CHEN J,ZHANG Y,QI L,et al.Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression[J].Optics & Laser Technology,2018,99:238-248.
[26]CHAI X.An efficient visually meaningful image compressionand encryption scheme based on compressive sensing and dyna-mic LSB embedding[J].Optics and Lasers in Engineering,2020,124(1):105837.
[27]CHAI X,WU H,GAN Z,et al.Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy[J].Signal Processing,2020,171:107525.
[28]GUAN H,ZENG Z,LIU J,et al.Image Fingerprinting Based on Improved Image Normalization and DFT[J].Applied Mechanics &Materials,2014,556-562:4759-4764.
[29]SU Q,CHEN B.A novel blind color image watermarking using upper Hessenberg matrix[J].AEU-International Journal of Electronics and Communications,2017,78:64-71.
[30]MUSRRAT A,WOOK A C,MILLIE P,et al.A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD[J].Discrete Dynamics in Nature and Society,2016,2(24):1-15.
[31]LIN H,SONG Z,WANG X,et al.An antenna group delaymeasurement method based on three-antenna extrapolation and least residual error curve fitting technique[J].Microwave and Optical Technology Letters,2018,60(7):1608-1612.
[32]SU Q,WANG G,ZHANG X,et al.A new algorithm of blind color image watermarking based on LU decomposition[J].Multidimensional Systems & Signal Processing,2018,29(1):1055-1074.
[33]SHAO L.J A novel blind color images watermarking based on SVD[J].Optik-International Journal for Light and Electron Optics,2014,125(12):2868-2874.
[1] ZHANG Man, LI Jie, ZHU Xin-zhong, SHEN Ji, CHENG Hao-tian. Augmentation Technology of Remote Sensing Dataset Based on Improved DCGAN Algorithm [J]. Computer Science, 2021, 48(6A): 80-84.
[2] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[3] WANG Zhen-wu, SUN Jai-jun,  YU Zhong-yi and BU Yi-ya. Review of Remote Sensing Image Classification Based on Support Vector Machine [J]. Computer Science, 2016, 43(9): 11-17.
[4] WANG Wan-liang,CHEN Yu,QIU Hong and ZHENG Jian-wei. Incremental Kernel Discriminant Analysis Method via QR Decomposition [J]. Computer Science, 2014, 41(4): 297-301.
[5] . Fast and Automatic Registration Method for Large Multi-spectral Remote Sensing Images [J]. Computer Science, 2012, 39(2): 61-65.
[6] XU Li-yan,WANG Jing,QIU Jun,SUN Quan-sen,XIA De-shen. Multi-spectral Remote Sensing Image Registration Based on Feature Point [J]. Computer Science, 2011, 38(7): 280-282.
[7] . [J]. Computer Science, 2009, 36(4): 268-272.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!