通信学报 ›› 2019, Vol. 40 ›› Issue (11): 65-75.doi: 10.11959/j.issn.1000-436x.2019220
姚远志,王锋,严文博,俞能海
修回日期:
2019-09-05
出版日期:
2019-11-25
发布日期:
2019-12-06
作者简介:
姚远志(1989- ),男,安徽望江人,博士,中国科学技术大学副研究员,主要研究方向为信息隐藏和视频编码。|王锋(1996- ),男,安徽潜山人,中国科学技术大学硕士生,主要研究方向为信息隐藏和隐私保护。|严文博(1991- ),男,安徽寿县人,中国科学技术大学博士生,主要研究方向为信息隐藏和隐私保护。|俞能海(1964- ),男,安徽无为人,博士,中国科学技术大学教授、博士生导师,主要研究方向为图像视频处理与分析、计算机视觉与模式识别、信息隐藏与媒体内容安全、信息检索与数据挖掘。
基金资助:
Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU
Revised:
2019-09-05
Online:
2019-11-25
Published:
2019-12-06
Supported by:
摘要:
针对图像在网络传输中的隐私信息泄露问题,提出了一种基于二维码和可逆可视水印的图像隐私保护方案。为了保护图像拍摄时间、拍摄地点和详细描述等隐私信息,首先将这类隐私信息加密后存储在云平台,并生成能够链接到加密隐私信息的统一资源定位符。该方案将统一资源定位符编码成二维码,并将该二维码作为可视水印可逆地嵌入图像中,实现对隐私信息的访问权限控制。在该方案中,使用视觉感知模型选择适合的水印嵌入参数,以平衡水印的可视性和载密图像的视觉质量。实验结果表明,该方案能够保证载密图像具有良好的视觉质量,同时不影响二维码的正确识别和解码。使用所提方案在保障图像传输质量的同时,也降低了隐私泄露的风险。
中图分类号:
姚远志,王锋,严文博,俞能海. 基于二维码和可逆可视水印的图像隐私保护方案[J]. 通信学报, 2019, 40(11): 65-75.
Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU. Image privacy preservation scheme based on QR code and reversible visible watermarking[J]. Journal on Communications, 2019, 40(11): 65-75.
表2
嵌入的二维码的尺寸为128像素×128像素时使用不同可逆可视水印算法生成载密图像的客观质量"
载体图像 | Huang等算法 | Mohammad等算法 | Yao等算法 | 本文提出的算法 | |||||||
PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | ||||
Jetplane | 18.445 | 0.793 1 | 23.201 | 0.943 6 | 27.401 | 0.954 3 | 26.750 | 0.976 5 | |||
Lena | 17.146 | 0.755 0 | 22.493 | 0.941 2 | 25.746 | 0.944 7 | 27.903 | 0.974 5 | |||
Living room | 17.482 | 0.795 7 | 21.500 | 0.935 2 | 25.892 | 0.945 6 | 29.692 | 0.975 1 | |||
Mandril | 18.939 | 0.867 5 | 21.827 | 0.934 0 | 28.159 | 0.945 1 | 29.008 | 0.973 7 | |||
Peppers | 17.325 | 0.746 2 | 21.810 | 0.940 3 | 26.791 | 0.944 3 | 28.755 | 0.973 7 | |||
Woman | 17.400 | 0.800 8 | 21.471 | 0.935 4 | 26.069 | 0.938 1 | 28.269 | 0.972 5 | |||
均值 | 17.790 | 0.793 1 | 22.050 | 0.938 3 | 26.676 | 0.945 4 | 28.396 | 0.974 3 | |||
标准差 | 0.725 | 0.043 0 | 0.673 | 0.003 9 | 0.958 | 0.005 2 | 1.015 | 0.001 4 |
表3
嵌入的二维码的尺寸为256像素×256像素时使用不同可逆可视水印算法生成载密图像的客观质量"
载体图像 | Huang等算法 | Mohammad等算法 | Yao等算法 | 本文提出的算法 | |||||||
PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | ||||
Jetplane | 11.736 | 0.554 3 | 17.990 | 0.786 8 | 21.734 | 0.818 8 | 18.102 | 0.857 6 | |||
Lena | 11.062 | 0.435 1 | 17.099 | 0.773 9 | 20.132 | 0.795 1 | 20.456 | 0.853 9 | |||
Living room | 11.460 | 0.560 5 | 16.787 | 0.774 6 | 20.770 | 0.808 4 | 21.069 | 0.858 8 | |||
Mandril | 11.644 | 0.647 1 | 16.591 | 0.753 5 | 21.486 | 0.804 8 | 19.389 | 0.851 8 | |||
Peppers | 11.657 | 0.471 1 | 16.411 | 0.774 3 | 21.510 | 0.783 5 | 21.034 | 0.853 9 | |||
Woman | 12.103 | 0.539 9 | 16.711 | 0.766 9 | 21.597 | 0.783 8 | 20.686 | 0.854 6 | |||
均值 | 11.610 | 0.534 7 | 16.932 | 0.771 7 | 21.205 | 0.799 1 | 20.123 | 0.855 1 | |||
标准差 | 0.342 | 0.074 4 | 0.567 | 0.011 0 | 0.624 | 0.014 1 | 1.164 | 0.002 6 |
[1] | 李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11. |
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11. | |
[2] | 中国互联网信息中心. 第43次中国互联网发展状况统计报告[R].(2019-02-28)[2019-07-08]. |
China Internet Network Information Center. The 43rd China statistical report on internet development[R].(2019-02-28)[2019-07-08]. | |
[3] | 李维皓, 曹进, 李晖 . 基于位置服务隐私自关联的隐私保护方案[J]. 通信学报, 2019,40(5): 57-66. |
LI W H , CAO J , LI H . Privacy self-correlation privacy-preserving scheme in LBS[J]. Journal on Communications, 2019,40(5): 57-66. | |
[4] | 王新宇, 牛犇, 李凤华 ,等. APP隐私泄露风险评估与保护方案[J]. 通信学报, 2019,40(5): 13-23. |
WANG X Y , NIU B , LI F H ,et al. Risk assessing and priva-cy-preserving scheme for privacy leakage in APP[J]. Journal on Communications, 2019,40(5): 13-23. | |
[5] | 严文博, 姚远志, 张卫明 ,等. 基于二维码和信息隐藏的物流系统隐私保护方案[J]. 网络与信息安全学报, 2017,3(11): 22-28. |
YAN W B , YAO Y Z , ZHANG W M ,et al. Privacy-preserving scheme for logistics systems based on 2D code and information hiding[J]. Chinese Journal of Network and Information Security, 2017,3(11): 22-28. | |
[6] | MOHANTY S P , RAMAKRISHNAN K R , KANKANHALLI M S . A DCT domain visible watermarking technique for images[C]// International Conference on Multimedia and Expo. IEEE, 2000: 1029-1032. |
[7] | SHI Y Q , LI X , ZHANG X ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4: 3210-3237. |
[8] | HU Y , JEON B . Reversible visible watermarking and lossless recovery of original images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(11): 1423-1429. |
[9] | YIP S K , AU O C , HO C W ,et al. Lossless visible watermarking[C]// International Conference on Multimedia and Expo. IEEE, 2006: 853-856. |
[10] | TSAI H M , Chang L W . A high secure reversible visible watermarking scheme[C]// International Conference on Multimedia and Expo. IEEE, 2007: 2106-2109. |
[11] | LIU T Y , TSAI W H . Generic lossless visible watermarking—a new approach[J]. IEEE Transactions on Image Processing, 2010,19(5): 1224-1235. |
[12] | YANG Y , SUN X , YANG H ,et al. A contrast-sensitive reversible visible image watermarking technique[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009,19(5): 656-667. |
[13] | MOHAMMAD N , SUN X , YANG H ,et al. Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images[J]. Multimedia Tools and Applications, 2017,76(11): 13301-13313. |
[14] | LIN Y K , YANG C H , TSAI J T . More secure lossless visible watermarking by DCT[J]. Multimedia Tools and Applications, 2018,77(7): 8579-8601. |
[15] | YAO Y , ZHANG W , WANG H ,et al. Content-adaptive reversible visible watermarking in encrypted images[J]. Signal Processing, 2019,164: 386-401. |
[16] | HUANG H C , CHANG F C , FANG W C . Reversible data hiding with histogram-based difference expansion for QR code applications[J]. IEEE Transactions on Consumer Electronics, 2011,57(2): 779-787. |
[17] | FRAGOSO-NAVARRO E , CEDILLO-HERNáNDEZ M, M , NAKANO-MIYATAKE M . Visible watermarking assessment metrics based on just noticeable distortion[J]. IEEE Access, 2018,6: 75767-75788. |
[18] | GAO X , LU W , TAO D ,et al. Image quality assessment based on multiscale geometric analysis[J]. IEEE Transactions on Image Processing, 2009,18(7): 1409-1423. |
[19] | WU H R , REIBMAN A R , LIN W ,et al. Perceptual visual signal compression and transmission[J]. Proceedings of the IEEE, 2013,101(9): 2025-2043. |
[20] | LIU A , LIN W , PAUL M ,et al. Just noticeable difference for images with decomposition model for separating edge and textured regions[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010,20(11): 1648-1652. |
[21] | WU J , LIN W , SHI G ,et al. Pattern masking estimation in image with structural uncertainty[J]. IEEE Transactions on Image Processing, 2013,22(12): 4892-4904. |
[22] | WU J , LI L , DONG W ,et al. Enhanced just noticeable difference model for images with pattern complexity[J]. IEEE Transactions on Image Processing, 2017,26(6): 2682-2693. |
[23] | SACHNEV V , KIM H J , NAM J ,et al. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009,19(7): 989-999. |
[24] | WANG Z , BOVIK A C , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612. |
[25] | MENEZES A J , VAN OORSCHOT P C , VANSTONE S A . Handbook of applied cryptography[M]. CRC Press, 1996. |
[26] | 荣辉桂, 莫进侠, 常炳国 ,等. 基于Shamir秘密共享的密钥分发与恢复算法[J]. 通信学报, 2015,36(3): 265-274. |
RONG H G , MO J X , CHANG B G ,et al. Key distribution and recovery algorithm based on Shamir’s secret sharing[J]. Journal on Communications, 2015,36(3): 265-274. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[4] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[8] | 吴友情, 马文静, 殷赵霞, 彭银银, 张新鹏. 基于预测误差位平面压缩的密文图像可逆信息隐藏[J]. 通信学报, 2022, 43(8): 219-230. |
[9] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[10] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[11] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[12] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
[13] | 史瑞, 封化民, 谢惠琴, 史国振, 刘飚, 杨旸. 基于带智能卡的移动终端实现的隐私保护的属性票据方案[J]. 通信学报, 2022, 43(10): 26-41. |
[14] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[15] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|