融合2D压缩感知的缩略图格式保留加密隐私保护
Two dimensional compressed-sensing-relevant thumbnail-preserving encryption method
- 2023年28卷第3期 页码:666-679
纸质出版日期: 2023-03-16 ,
录用日期: 2022-09-14
DOI: 10.11834/jig.220512
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2023-03-16 ,
录用日期: 2022-09-14
移动端阅览
匡琳, 邹孟雷, 温文媖. 融合2D压缩感知的缩略图格式保留加密隐私保护[J]. 中国图象图形学报, 2023,28(3):666-679.
Lin Kuang, Menglei Zou, Wenying Wen. Two dimensional compressed-sensing-relevant thumbnail-preserving encryption method[J]. Journal of Image and Graphics, 2023,28(3):666-679.
目的
2
随着云存储服务的普及,人们越来越习惯在云中存储图像,但存在高开销的数据传输、数据篡改以及可能泄露用户隐私的问题。为此,本文提出一种新型的基于2维压缩感知(2D compressed sensing
2DCS)与缩略图格式保留加密(thumbnail-preserving encryption
TPE)结合的数据隐私保护方案。
方法
2
利用确定性二进制对角(deterministic binary block diagonal
DBBD)矩阵作为测量矩阵对原始图像进行压缩采样,压缩采样的观测值能够保留图像的结构相似性,提高视觉上的观感体验,并通过误差像素集和显著性像素集生成关键像素集,利用2维离散小波变换将关键像素集嵌入压缩信号,在保证图像恢复质量的同时极大地去除冗余信息。最后通过TPE使合法用户在隐私性与可用性之间取得良好平衡。
结果
2
该方案能够在压缩图像的同时保留图像的形态和重要特征,在压缩图像以降低存储成本的同时保证图像边缘和纹理等重要部分的重建质量。实验结果表明,重建图像的视觉效果与原图非常接近,实测平均信噪比(peak signal to noise ratio
PSNR)和结构相似性(structural similarity
SSIM)显著提升。压缩率为0.25时,平均PSNR大于31.8 dB,SSIM大于0.97。相比于未使用关键像素集重建图像,PSNR和SSIM分别提高约4%6%和1%3%。此外,本文算法恢复图像质量也同样优于对比的3种CS方法,有潜力应用于实际的图像云存储服务。
结论
2
与传统的压缩加密方案相比,基于2DCS与TPE的隐私保护方案(2DCS-TPE)不仅保证隐私性、可用性及合法用户体验,还实现了低采样复杂度和节约资源存储成本,减轻设备负担,并且具有较好的重建质量。
Objective
2
Cloud storage services are challenged for high overhead data transfer
data tampering and possible leakage of user privacy
such as leaking images to unauthorized third parties. It threatens the leakage of sensitive information like user's identity
health status and location.
Method
2
We develop a novel data privacy protection scheme in terms of the combination of 2D compressed sensing (2DCS) and thumbnail-preserving encryption (TPE)
which can use deterministic binary block diagonal (DBBD) matrix as the measurement matrix to sample the original image. Binary block diagonal (DBBD) matrix is used as the measurement matrix to sample the original image
and the sampling result can preserve the structural similarity of the image and improve the visual experience through the compressed signal mapping to YUV type signal
the reconstruction quality of the luminance part of the signal
and the error pixel set and the saliency pixel set-generated pixel set. Since the compressed signal has visual significance and can be as a downsampled version of the original image
the two-dimensional discrete wavelet transform can be used to decompose the compressed signal into 4 parts
one of which is the low-frequency part
which can make most of the visual information of the sampled values are available
and the remaining three parts are the high-frequency part of the compressed signal
which contains the detailed information only. The issue of embedding the key pixel set into the high frequency part of the compressed signal can greatly remove redundant information while ensuring the image recovery quality. In order to achieve a good balance between privacy and usability
our scheme is focused on using TPE to enable legitimate users to preview images in the cloud using visual information from ciphertext images combined with a priori knowledge to identify
organize and manage the images. The illegal third parties without a priori knowledge cannot obtain the exact in plaintext through ciphertext images.
Result
2
To ensure the reconstruction quality of key parts of the image like edges and textures
our scheme can be used to preserve the morphology and essential features of the image while compressing the image to reduce the storage cost at the same time. The cipher image-related thumbnail image is similar to original thumbnail image
which ensures the security of the cipher image without sacrifying the availability of cloud services. The experimental results show that the visual effect of the reconstructed image is very similar to its original image
and the measured average signal-to-noise ratio (PSNR) and structural similarity (SSIM) are significantly improved
whereas the average PSNR is greater than 31.8 dB and the SSIM is greater than 0.97 at a compression rate of 0.25. Compared to the reconstructed images of key pixel set-excluded
the PSNR and SSIM are improved by about 4%6% and 1%3% each. In addition
our algorithm ability for images recovery that are equally better than the three compared CS methods in terms of PSNR and SSIM metrics
and there is no significant cliff effect in 2DCS-TPE at extreme compression ratios
and the PSNR and SSIM gains are relatively in consistent in terms of compression ratios.
Conclusion
2
To get image reconstruction quality better
our 2DCS-TPE scheme has its potentials to gurantee the privacy
usability and legitimate user experience
and it can achieve high security and low computational complexity as well.
云存储缩略图格式保留加密(TPE)压缩感知(CS)隐私性可用性
cloud storagethumbnail-preserving encryption(TPE)compressed sensing(CS)privacyavailability
Chai X L, Shao F, Jiang Q P and Ho Y S. 2020a. MSTGAR: multioperator-based stereoscopic thumbnail generation with arbitrary resolution. IEEE Transactions on Multimedia, 22(5): 1208-1219 [DOI: 10.1109/TMM.2019.2939707]
Chai X L, Wu H Y, Gan Z H, Zhang Y S, Chen Y R and Nixon K W. 2020b. An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Optics and Lasers in Engineering, 124: #105837 [DOI: 10.1016/j.optlaseng.2019.105837]
Chen J X, Chen L and Zhou Y C. 2021. Universal chosen-ciphertext attack for a family of image encryption schemes. IEEE Transactions on Multimedia, 23: 2372-2385 [DOI: 10.1109/TMM.2020.3011315]
Donoho D L. 2006. Compressed sensing. IEEE Transactions on Information Theory, 52(4): 1289-1306 [DOI: 10.1109/TIT.2006.871582]
Hu G Q, Li H W, Xu G W and Ma X Q. 2021. Enabling simultaneous content regulation and privacy protection for cloud storage image. IEEE Transactions on Cloud Computing: #3081564[DOI: 10.1109/TCC.2021.3081564]
Hua Z Y, Zhu Z H, Chen Y Y and Li Y M. 2021. Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynamics, 104(4): 4505-4522 [DOI: 10.1007/s11071-021-06472-6]
Huan W N, Li S, Qian Z X and Zhang X P. 2022. Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain. IEEE Transactions on Circuits and Systems for Video Technology, 32(4): 1955-1965 [DOI: 10.1109/TCSVT.2021.3092004]
Liu S, Li C Q and Hu Q. 2022. Cryptanalyzing two image encryption algorithms based on a first-order time-delay system. IEEE MultiMedia, 29(1): 74-84 [DOI: 10.1109/MMUL.2021.3114589]
Lu W, Zhang J H, Zhao X F, Zhang W M and Huang J W. 2021. Secure robust JPEG steganography based on AutoEncoder with adaptive BCH encoding. IEEE Transactions on Circuits and Systems for Video Technology, 31(7): 2909-2922 [DOI: 10.1109/TCSVT.2020.3027843]
Mitra D, Rajan S and Balaji B. 2018. A deterministic compressive sensing approach for compressed domain image analysis//2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). Louisville, USA: IEEE: 596-601 [DOI:10.1109/ISSPIT.2018.8642673http://dx.doi.org/10.1109/ISSPIT.2018.8642673]
Ochotorena C N and Yamashita Y. 2020. Anisotropic guided filtering. IEEE Transactions on Image Processing, 29: 1397-1412 [DOI: 10.1109/TIP.2019.2941326]
Qin C, Zhou Q, Cao F, Dong J and Zhang X P. 2019. Flexible lossy compression for selective encrypted image with image inpainting. IEEE Transactions on Circuits and Systems for Video Technology, 29(11): 3341-3355 [DOI: 10.1109/TCSVT.2018.2878026]
Ravelomanantsoa A, Rabah H and Rouane A. 2015. Compressed sensing: a simple deterministic measurement matrix and a fast recovery algorithm. IEEE Transactions on Instrumentation and Measurement, 64(12): 3405-3413 [DOI: 10.1109/TIM.2015.2459471]
Reilly D and Fan L Y. 2021. A comparative evaluation of differentially private image obfuscation//Proceedings of the 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). Atlanta, USA: IEEE: 80-89 [DOI:10.1109/TPSISA52974.2021.00009http://dx.doi.org/10.1109/TPSISA52974.2021.00009]
Sun E Y N, Wu H C, Busch C, Huang S C H, Kuan Y C and Chang S Y. 2021. Efficient recoverable cryptographic mosaic technique by permutations. IEEE Transactions on Circuits and Systems for Video Technology, 31(1): 112-125 [DOI: 10.1109/TCSVT.2020.2976050]
Tajik K, Gunasekaran A, Dutta R, Ellis B, Bobba R B, Rosulek M, Wright C V and Feng W C. 2019. Balancing image privacy and usability with thumbnail-preserving encryption//The 26th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.]
Tian X H, Zheng P J and Huang J W. 2021. Robust privacy-preserving motion detection and object tracking in encrypted streaming video. IEEE Transactions onInformation Forensics and Security, 16: 5381-5396 [DOI: 10.1109/TIFS.2021.3128817]
Wei L F, Zhang K, Zhang L and Huang D M. 2018. A secure data forwarding protocol for data statistic services in multi-hop marine sensor networks. Fundamenta Informaticae, 157(1/2): 63-78 [DOI: 10.3233/FI-2018-1618]
Wen W Y, Hong Y K, Fang Y M, Li M and Li M. 2020. A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Processing, 173: #107580 [DOI: 10.1016/j.sigpro.2020.107580]
Wen W Y, Hong Y K, Fang Y M, Zhang Y S and Wan Z. 2022. Semi-tensor product compression sensing integrated to verifiable image encryption method. Journal of Image and Graphics, 27(1): 215-225
温文媖, 洪宇坤, 方玉明, 张玉书, 万征. 2022. 结合半张量积压缩感知的可验证图像加密. 中国图象图形学报, 27(1): 215-225 [DOI: 10.11834/jig.210442]
Xie Z Y and Chen W. 2020. Storage-efficient edge caching with asynchronous user requests. IEEE Transactions on Cognitive Communications and Networking, 6(1): 229-241 [DOI: 10.1109/TCCN.2019.2954391]
Yin Z X and Ke L F. 2021. Robust adaptive steganography based on dither modulation and modification with re-compression. IEEE Transactions on Signal and Information Processing over Networks, 7: 336-345 [DOI: 10.1109/TSIPN.2021.3081373]
Zhang B, Xiao D and Xiang Y. 2021b. Robust coding of encrypted images via 2D compressed sensing. IEEE Transactions on Multimedia, 23: 2656-2671 [DOI: 10.1109/TMM.2020.3014489]
Zhang T K, Wang Y, Yi W Q, Liu Y W, Feng C Y and Nallanathan A. 2022b. Two time-scale caching placement and user association in dynamic cellular networks. IEEE Transactions on Communications, 70(4): 2561-2574 [DOI: 10.1109/TCOMM.2022.3152265]
Zhang Y S, Wang P, Huang H, Zhu Y W, Xiao D and Xiang Y. 2021a. Privacy-assured FogCS: chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Transactions on Industrial Informatics, 17(5): 3401-3411 [DOI: 10.1109/TII.2020.3008914]
Zhang Y S, Zhao R Y, Xiao X L, Lan R S, Liu Z and Zhang X P. 2022a. HF-TPE: high-fidelity thumbnail-preserving encryption. IEEE Transactions on Circuits and Systems for Video Technology, 32(3): 947-961 [DOI: 10.1109/TCSVT.2021.3070348]
Zhu H, Cao Y, Hu Q W, Wang W, Jiang T and Zhang Q. 2019. Multi-bitrate video caching for D2D-enabled cellular networks. IEEE MultiMedia, 26(1): 10-20 [DOI: 10.1109/MMUL.2018.2879589]