|
|
A Digital Fingerprinting Scheme for Remote Sensing Images based on the Homomorphic Public Key Encryption Algorithm |
Xiucheng Wang1,2,3(),Liming Zhang1,2,3() |
1.Faculty of Geomatics,Lanzhou Jiaotong University,Lanzhou 730070,China 2.National -Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring,Lanzhou 730070,China 3.Gansu Provincial Engineering Laboratory for National Geographic State Monitoring,Lanzhou 730070,China |
|
|
Abstract An asymmetric fingerprinting scheme for remote sensing images based on the homomorphic public key encryption algorithm is proposed for solving the problems of high computational complexity and low bandwidth efficiency in asymmetric digital fingerprinting. In this scheme, the data provider encrypts the remote sensing images via the DCT spread spectrum scrambling method, and the Bresson homomorphic public key encryption algorithm is used to realize asymmetric distribution of the decryption key. The copies of remote sensing images with the fingerprint are decrypted by the client, and different copies with the fingerprint come from different decryption keys. The remote sensing images are not directly encrypted by the public key encryption algorithm, so the complexity of the algorithm is greatly reduced and the encryption efficiency is dramatically improved. Meanwhile, the demand of bandwidth will be reduced and the efficiency of bandwidth will be improved, because data owners not only need to generate one copy with the fingerprint for different users, but also data copies are distributed to different users via multicast transmission. The experiments have shown that the scheme can effectively improve the efficiency of bandwidth and the efficiency of encryption when the number of users is relatively large, which can greatly reduce the computing load of the data server and reduce the waiting time of the users.
|
Received: 14 April 2021
Published: 17 June 2022
|
|
Corresponding Authors:
Liming Zhang
E-mail: 0218750@stu.lzjtu.edu.cn;zlm@lzjtu.edu.cn
|
1 |
Ding Kaimeng, Zhu Changqing, Luo Wen, et al. Perceptual hash algorithm based on adaptive PCNN and PCA for remote sensing image authentication[J]. Journal of Nanjing Normal University(Natural Science Edition),2019,42(2):17-22.
|
1 |
丁凯孟,朱长青,罗文,等. 基于自适应PCNN与PCA的遥感影像感知哈希认证算法[J]. 南京师大学报(自然科学版), 2019,42(2):17-22.
|
2 |
Zhu Changqing, Fu Haojun, Yang Chengsong,et al. Watermarking algorithm for digital grid map based on integer wavelet transformation[J]. Geomatics and Information Science of Wuhan University,2009,34(5):619-621.
|
2 |
朱长青,符浩军,杨成松,等. 基于整数小波变换的栅格数字地图数字水印算法[J]. 武汉大学学报(信息科学版),2009,34(5):619-621.
|
3 |
Pfitzmann B, Waidner M. Anonymous Fingerprinting, Berlin, Heidelberg,1997[C]∥Springer Berlin Heidelberg,1997.
|
4 |
Pfitzmann B, Schunter M. Asymmetric Fingerprinting, Berlin, Heidelberg,1996[C]∥ Springer Berlin Heidelberg,1996.
|
5 |
Biehl I, Meyer B. Cryptographic methods for collusion-secure fingerprinting of digital data[J]. Computers & Electrical Engineering, 2002,28(1):59-75.
|
6 |
Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005,14(12):2129-2139
|
7 |
Zhang Xinpeng, Wang Shuozhong, Chen Chao. Asymmetric fingerprint scheme without authoritative third party[C]∥ The Sixth National Symposium on information hiding and multimedia information security, Harbin.
|
7 |
张新鹏, 王朔中, 陈超. 不需权威第三方的非对称指纹方案[C]∥ 第六届全国信息隐藏暨多媒体信息安全学术研讨会, 哈尔滨.
|
8 |
Xie Jianquan, Huang Dazu, Xie Qing. Asymmetric fingerprinting protocol based on RSA public key system[J]. Journal of Chinese Computer Systems, 2013,34(11):2542-2545.
|
8 |
谢建全,黄大足,谢勍. 基于RSA公钥体制的非对称数字指纹协议[J].小型微型计算机系统,2013,34(11):2542-2545.
|
9 |
Hu D, Li Q. Bandwidth efficient asymmetric fingerprinting scheme[J]. International Journal of Communication Systems, 2012,25(2):84-91.
|
10 |
Paul S. Multicasting on the internet and its applications[M]. Unised states: Springer science & Business media,1998.
|
11 |
Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11): 169-180.
|
12 |
T. E. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4):469-472.
|
13 |
Paillier P. Public-key cryptosystems based on composite degree residuosity classes, 1999[C]∥ International conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer, 1999.
|
14 |
Goldwasser S, Micali S. Probabilistic encryption & how to play mental poker keeping secret all partial information[M]. Providing sound foundations for cryptography: on the work of Shafi Goldwasser and Silvio Micali. United States: ACM Books, 2019.
|
15 |
Okamoto T, Uchiyama S. A new public-key cryptosystem as secure as factoring, 1998[C]∥ International conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer, 1998.
|
16 |
Bresson E, Catalano D, Pointcheval D. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, 2003[C]∥International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Heidelberg: Springer, 2003.
|
17 |
Gentry C. Fully homomorphic encryption using ideal lattices[C]∥Proceedings of the forty-first annual ACM symposium on Theory of computing. United States: Association for Computing Machinery, 2009.
|
18 |
Qin Sixian, Yu Yongsheng, Zhang Xiaohui, et al. Comparison and analysis of invisible digital watermark algorithms for remote sensing[J]. Journal of Geomatics,2017, 42(5): 59-62.
|
18 |
秦思娴, 余咏胜, 张小惠, 等. 遥感影像不可见数字水印算法比较与分析[J]. 测绘地理信息,2017,42(5):59-62.
|
19 |
Diao Yiqing, Ye Ayong, Zhang Jiaomei, et al. A dual privacy protection method based on group signature and homomorphic encryption for alliance blockchain[J]. Journal of Computer Research and Development,2022,59(1):172-181.
|
19 |
刁一晴,叶阿勇,张娇美,等. 基于群签名和同态加密的联盟链双重隐私保护方法[J]. 计算机研究与发展, 2022, 59(1): 172-181.
|
20 |
Tu Hang. Secure multi-party computation protocol based on fully homomorphic encryption[J]. Communications Techno-logy, 2021, 54(12): 2674-2678.
|
20 |
涂航. 基于全同态加密的安全多方计算协议[J]. 通信技术, 2021, 54(12): 2674-2678.
|
21 |
Zhong Yang, Bi Renwan, Yan Xishan,et al. Efficient homomorphic neural network supporting privacy-preserving training[J/OL]. Journal of Computer Applications: 1-11 [2022-03-12].
|
21 |
钟洋, 毕仁万, 颜西山,等. 支持隐私保护训练的高效同态神经网络[J/OL]. 计算机应用: 1-11 [2022-03-12].
|
22 |
Chalmers R C, Almeroth K C. Modeling the branching characteristics and efficiency gains in global multicast trees:[C]// Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society. United States: IEEE, 2001.
|
[1] |
Xiaojing Hu,Xiaohua Hao,Jian Wang,Liyun Dai,Hongyu Zhao,Hongyi Li. Snow Depth Downscaling Algorithm based on the Fusion of AMSR2 and MODIS Data:A Case Study in Northern Xinjiang, China[J]. Remote Sensing Technology and Application, 2021, 36(6): 1236
-1246
. |
[2] |
Rongrong Zhang,Jingyu Zeng,Xiaoping Wu,Xiaozhen Zhou,Yubin Ren,Jia Tang,Qianfeng Wang. Spatial and Temporal Pattern Analysis of NPP in Xiong’an New Area based on Remote Sensing Data Fusion[J]. Remote Sensing Technology and Application, 2021, 36(6): 1425
-1435
. |
[3] |
Duo Chu,Zhaojun Zheng,Zhuoma Laba,Yuzhen Cidan. Accuracy Assessment of IMS 4 km Snow and Ice Products on the Tibetan Plateau based on Landsat⁃8 OLI Images[J]. Remote Sensing Technology and Application, 2021, 36(6): 1223
-1235
. |
[4] |
Xianzhao Liu,Xu Yang. The Accuracy of Nighttime Light Data to Estimate China's Provincial Carbon Emissions: A Comparison with Carbon Emissions Allocated by International Carbon Database[J]. Remote Sensing Technology and Application, 2022, 37(2): 319
-332
. |
[5] |
Ting Wang,Bin Zou,Zhengrong Zou,Shenxin Li,Zhong Zheng. Analysis and Prospect of Remote Sensing Monitoring of Straw Burning[J]. Remote Sensing Technology and Application, 2022, 37(2): 279
-289
. |
[6] |
Xiaoyue Chang,Linhai Jing,Yi Lin. Extraction of the Taiga-tundra Ecotone in Northern Finland based on Airborne LiDAR Data and Landsat 8 Images[J]. Remote Sensing Technology and Application, 2021, 36(6): 1259
-1271
. |
[7] |
Yihua Zhan,Ke Xu,Xiyu Xu,Maofei Jiang. Coastal Waveforms Processing Method for Spaceborne Radar Altimeter based on Neural Network Classification[J]. Remote Sensing Technology and Application, 2022, 37(2): 524
-531
. |
[8] |
Lijuan Yang,Jianxia Zhang,Musheng Lin. Research on Methods of Remotely Sensed PM2.5 Concentrations Estimation in Four Provinces and One City along the East Coast of China[J]. Remote Sensing Technology and Application, 2021, 36(6): 1408
-1415
. |
[9] |
Shuguo Wang, Chunfeng Ma, Zebin Zhao, Long Wei. Estimation of Soil Moisture of Agriculture Field in the Middle Reaches of the Heihe River Basin based on Sentinel-1 and Landsat 8 Imagery[J]. Remote Sensing Technology and Application, 2020, 35(1): 13
-22
. |
[10] |
Yongqian Wang,Mengqi He,Yang Zhang,Shiqi Yang,Yanghua Gao. Retrieval of Fine-mode Aerosol Optical Depth based on Multi-Angle Polarization Data of GF-5 Satellite[J]. Remote Sensing Technology and Application, 2022, 37(2): 451
-459
. |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|