高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

支持预览的版权图像共享

肖祥立 叶茜 张玉书 温文媖 张新鹏

肖祥立, 叶茜, 张玉书, 温文媖, 张新鹏. 支持预览的版权图像共享[J]. 电子与信息学报, 2023, 45(3): 800-809. doi: 10.11999/JEIT220602
引用本文: 肖祥立, 叶茜, 张玉书, 温文媖, 张新鹏. 支持预览的版权图像共享[J]. 电子与信息学报, 2023, 45(3): 800-809. doi: 10.11999/JEIT220602
XIAO Xiangli, YE Xi, ZHANG Yushu, WEN Wenying, ZHANG Xinpeng. Preview-supported Copyright Image Sharing[J]. Journal of Electronics & Information Technology, 2023, 45(3): 800-809. doi: 10.11999/JEIT220602
Citation: XIAO Xiangli, YE Xi, ZHANG Yushu, WEN Wenying, ZHANG Xinpeng. Preview-supported Copyright Image Sharing[J]. Journal of Electronics & Information Technology, 2023, 45(3): 800-809. doi: 10.11999/JEIT220602

支持预览的版权图像共享

doi: 10.11999/JEIT220602
基金项目: 国家重点研发计划(2021YFB3100400)
详细信息
    作者简介:

    肖祥立:男,博士生,研究方向为多媒体信息安全、数字水印、区块链

    叶茜:女,硕士生,研究方向为多媒体信息安全、图像加密、信息隐藏

    张玉书:男,博士,教授,研究方向为多媒体信息安全、区块链、人工智能

    温文媖:女,博士,教授,研究方向为图像处理、多媒体信息安全、大数据与物联网安全

    张新鹏:男,博士,教授,研究方向为多媒体信息安全、人工智能安全、图像处理

    通讯作者:

    张玉书 yushu@nuaa.edu.cn

  • 中图分类号: TN918.91

Preview-supported Copyright Image Sharing

Funds: National Key Research and Development Program of China (2021YFB3100400)
  • 摘要: 针对数字水印技术均不考虑版权图像共享场景中用户的预览需求,以及软件控制方法和附加信息方法的局限性,该文提出一个支持直接从加密图像预览原图像部分视觉内容的版权图像共享方案。为此,将缩略图保持加密的思想引入到用户端嵌入的水印方案中,通过像素调整在加密图像上呈现原图像内容的模糊版本。用于调整的像素位被事先以信息隐藏的方法嵌入隐藏区域中,以保证解密的正确性。此外,用户水印被在解密的同时嵌入到图像中,用于实现对未授权重分发行为的追踪。这样一来,不仅满足了共享过程中用户的预览需求还同时保护了图像的版权。理论分析和实验测试的结果展现了所提方案的安全性、可行性、高效性和鲁棒性。
  • 图  1  加密效果示例

    图  2  系统模型

    图  3  空间留空

    图  4  调整处理

    图  5  方案各阶段的图像感知效果

    图  6  各步骤所耗时间(分块大小为$ 32 \times 32 $, $ P{\text{ = 0}}{\text{.7}} $, $ T{\text{ = 5000}} $)

    图  7  参数设置对方案效率的影响(像素数量为30722)

    图  8  无噪声影响下的成功追踪率($ a{\text{ = 3}} $, $ s{\text{ = 16}} $)

    图  9  有噪声影响下的成功追踪率($ a{\text{ = 3}} $, $ s{\text{ = 16}} $)

    表  1  嵌入容量测试(bit)

    嵌入容量P = 0.516×16P = 0.524×24P = 0.532×32P = 0.616×16P = 0.624×24P = 0.632×32P = 0.716×16P = 0.724×24P = 0.732×32
    总共727162779808678347396831038494319221001695993492421088301811686490
    所需770447144361313460688777800850770613871760784565451803203992396
    剩余–4328443544736488670853237643548616145199150358857026987694094
    下载: 导出CSV
  • [1] CELIK M U, LEMMA A N, KATZENBEISSER S, et al. Lookup-table-based secure client-side embedding for spread-spectrum watermarks[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 475–487. doi: 10.1109/TIFS.2008.926988
    [2] 钟桦, 刘芳, 焦李成. 基于图像特征的易损水印技术[J]. 电子与信息学报, 2003, 25(11): 1482–1487.

    ZHONG Hua, LIU Fang, and JIAO Licheng. A novel fragile watermark technique based on image feature[J]. Journal of Electronics and Information Technology, 2003, 25(11): 1482–1487.
    [3] RHAYMA H, MAKHLOUFI A, HAMAM H, et al. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection[J]. Multimedia Tools and Applications, 2021, 80(17): 26813–26832. doi: 10.1007/s11042-021-10886-0
    [4] 张天骐, 周琳, 梁先明, 等. 基于Blob-Harris特征区域和NSCT-Zernike的鲁棒水印算法[J]. 电子与信息学报, 2021, 43(7): 2038–2045. doi: 10.11999/JEIT200164

    ZHANG Tianqi, ZHOU Lin, LIANG Xianming, et al. A robust watermarking algorithm based on Blob-Harris and NSCT- Zernike[J]. Journal of Electronics &Information Technology, 2021, 43(7): 2038–2045. doi: 10.11999/JEIT200164
    [5] VALIZADEH A and WANG Z J. An improved multiplicative spread spectrum embedding scheme for data hiding[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(4): 1127–1143. doi: 10.1109/TIFS.2012.2199312
    [6] CHEN B and WORNELL G W. Achievable performance of digital watermarking systems[C]. IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999: 13–18.
    [7] TẠ M T and GIANG N D. Robust watermarking method using QIM with VSS for image copyright protection[J]. Journal of Research and Development on Information & Communication Technology, 2021, 2021(1): 28–40. doi: 10.32913/mic-ict-research.v2021.n1.971
    [8] PATEL H A and SHAH D B. Digital watermarking system performance using QIM techniques and wavelet transforms[M]. GOYAL D, CHATURVEDI P, NAGAR A K, et al. Proceedings of Second International Conference on Smart Energy and Communication. Singapore: Springer, 2021: 699–711.
    [9] COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673–1687. doi: 10.1109/83.650120
    [10] MAIRGIOTIS A K, GALATSANOS N P, and YANG Yongyi. New additive watermark detectors based on a hierarchical spatially adaptive image model[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 29–37. doi: 10.1109/TIFS.2007.916290
    [11] CANNONS J and MOULIN P. Design and statistical analysis of a hash-aided image watermarking system[J]. IEEE Transactions on Image Processing, 2004, 13(10): 1393–1408. doi: 10.1109/TIP.2004.834660
    [12] PIVA A, BIANCHI T, and DE ROSA A. Secure client-side ST-DM watermark embedding[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 13–26. doi: 10.1109/TIFS.2009.2038761
    [13] WRIGHT C V, FENG Wuchi, and LIU Feng. Thumbnail-preserving encryption for JPEG[C]. The 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, United States, 2015: 141–146.
    [14] MAROHN B, WRIGHT C V, FENG Wuchi, et al. Approximate thumbnail preserving encryption[C]. The 2017 on Multimedia Privacy and Security, Dallas, United States, 2017: 33–43.
    [15] ZHANG Yushu, ZHAO Ruoyu, XIAO Xiangli, et al. HF-TPE: High-fidelity thumbnail-preserving encryption[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(3): 947–961. doi: 10.1109/TCSVT.2021.3070348
    [16] TAJIK K, GUNASEKARAN A, DUTTA R, et al. Balancing image privacy and usability with thumbnail-preserving encryption[C]. Network and Distributed Systems Security (NDSS) Symposium 2019, San Diego, United States, 2019: 295.
    [17] ZHAO Ruoyu, ZHANG Yushu, XIAO Xiangli, et al. TPE2: Three-pixel exact thumbnail-preserving image encryption[J]. Signal Processing, 2021, 183: 108019. doi: 10.1016/j.sigpro.2021.108019
    [18] 侯兴旺, 赵若宇, 张玉书. 一种精确缩略图保持的图像加密方案[J]. 计算机工程与科学, 2022, 44(1): 60–67. doi: 10.3969/j.issn.1007-130X.2022.01.007

    HOU Xingwang, ZHAO Ruoyu, and ZHANG Yushu. An exact thumbnail-preserving image encryption scheme[J]. Computer Engineering &Science, 2022, 44(1): 60–67. doi: 10.3969/j.issn.1007-130X.2022.01.007
    [19] TIAN Jun. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890–896. doi: 10.1109/TCSVT.2003.815962
    [20] WANG Yaomin and HE Wenguang. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022, 24: 1288–1298. doi: 10.1109/TMM.2021.3062699
    [21] WU Youqing, XIANG Youzhi, GUO Yutang, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929–1938. doi: 10.1109/TMM.2019.2952979
    [22] BIANCHI T and PIVA A. TTP-free asymmetric fingerprinting based on client side embedding[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1557–1568. doi: 10.1109/TIFS.2014.2340581
  • 加载中
图(9) / 表(1)
计量
  • 文章访问数:  457
  • HTML全文浏览量:  206
  • PDF下载量:  104
  • 被引次数: 0
出版历程
  • 收稿日期:  2022-05-12
  • 修回日期:  2022-11-11
  • 网络出版日期:  2022-11-14
  • 刊出日期:  2023-03-10

目录

    /

    返回文章
    返回