首页 > 论文 > 激光与光电子学进展 > 56卷 > 3期(pp:31001--1)

一种加密遥感图像的安全外包搜索方案

A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images

  • 摘要
  • 论文信息
  • 参考文献
  • 被引情况
  • PDF全文
分享:

摘要

遥感图像具有多时相、多语义、多波段等特点, 鉴于敏感遥感图像涉及国家机密信息及传统图像搜索效率低下的原因, 利用云平台进行遥感图像安全外包搜索已是大势所趋。因此提出了一种加密遥感图像的安全外包搜索方案, 对存储在云平台的遥感图像进行扫描模式加密, 再通过异或(XOR)运算和Johnson-Lindenstrauss (JL)转换得到一份双密文, JL转换的遥感图像用于在云平台进行搜索, XOR运算后的遥感图像用于图像解密。实验结果表明, 本文方案可以有效保证云平台上遥感图像的安全性, 同时, 加密图像搜索的准确率高, 搜索效率较同态加密提升98.37%, 且计算复杂度低, 通信成本低, 适合于云计算平台部署应用。

Abstract

The remote sensing images have the multi-temporal, multi-semantics and multi-spectral characteristics. In view of the sensitive remote sensing images involving state secret information with low searching efficiency, it is a general trend to conduct a secure outsourcing search for remote sensing images based on a cloud platform. Thus, a scheme of secure outsourcing search for encrypted remote sensing images is proposed. The remote sensing image stored on the cloud platform is first encrypted by the scan mode, and then a double ciphertext is obtained through the exclusive or operation and the Johnson-Lindenstrauss (JL) transformation. The JL-transformed remote sensing images are used to search on the cloud platform, while the exclusive or encrypted remote sensing images are used to decrypt image. The experimental results show that this scheme can effectively guarantee the security of remote sensing images on the cloud platform. Meanwhile, the search accuracy of encrypted images is high and the search efficiency is 98.37% higher than that by homomorphic encryption. Moreover, the computational complexity and communication cost are low, and it is suitable for the deployment on the cloud computing platforms.

Newport宣传-MKS新实验室计划
补充资料

中图分类号:TP751.1

DOI:10.3788/lop56.031001

所属栏目:图像处理

基金项目:国家自然科学基金(61402282, 61672339, 41671431)、上海市自然科学基金(18ZR1417300)、上海市科委地方高校能力建设项目(15590501900, 17050501900)、上海海洋大学科技发展专项项目

收稿日期:2018-06-05

修改稿日期:2018-07-26

网络出版日期:2018-08-11

作者单位    点击查看

黄冬梅:上海海洋大学信息学院, 上海 201306
吴国健:上海海洋大学信息学院, 上海 201306
魏立斐:上海海洋大学信息学院, 上海 201306
魏泉苗:国家海洋局东海分局, 上海 200136
戴亮:上海海洋大学信息学院, 上海 201306

联系人作者:魏立斐(Lfwei@shou.edu.cn)

【1】Asiyan H , Abudurexiti H . Comparative research of image retrieval based on text and content[J]. Journal of Capital Normal University (Natural Science Edition), 2012, 33(4): 6-9.
阿斯艳·哈米提, 阿不都热西提·哈米提. 基于文本的图像检索与基于内容的图像检索技术的比较研究[J]. 首都师范大学学报(自然科学版), 2012, 33(4): 6-9.

【2】Hou P, Chen L, Cheng G. A new method of multi-temporal remote sensing images storage management[J]. Ordnance Industry Automation, 2010, 29(3): 63-67.
侯平, 陈荦, 程果. 一种多时相遥感影像存储管理的新方法[J]. 兵工自动化, 2010, 29(3): 63-67.

【3】Wu Y Q, Wang Z L. Infrared andvisible image fusion based on target extraction and guided filtering enhancement[J]. Acta Optica Sinica, 2017, 37(8): 0810001.
吴一全, 王志来. 基于目标提取与引导滤波增强的红外与可见光图像融合[J]. 光学学报, 2017, 37(8): 0810001.

【4】Zhang Y Q, Wang X F, Liu X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348.
张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348.

【5】Yao L S, Zhu Z Y, Cheng J X. Colorimage encryption algorithm based on DNA sequence operation and fractional order Chen hyper-chaotic system[J]. Laser & Optoelectronics Progress, 2016, 53(9): 091003.
姚丽莎, 朱珍元, 程家兴. DNA序列和分数阶Chen超混沌系统彩色图像加密[J]. 激光与光电子学进展, 2016, 53(9): 091003.

【6】Bai Y B H, Lü X D, Li G Q, et al. Optical interference double gray image encryption system based on compressive sensing[J]. Laser & Optoelectronics Progress, 2016, 53(4): 041002.
白音布和, 吕晓东, 李根全, 等. 基于压缩感知的光学干涉双灰度图像加密系统[J]. 激光与光电子学进展, 2016, 53(4): 041002.

【7】Xiang F, Liu C Y, Fang B X, et al. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013, 34(7): 143-153.
项菲, 刘川意, 方滨兴, 等. 云计算环境下密文搜索算法的研究[J]. 通信学报, 2013, 34(7): 143-153.

【8】Zhu B P, Zhang J K. Scheme ofciphertext retrieval in cloud based on ontology semantic expansion[J]. Journal of Nanjing University of Science and Technology (Nature Science), 2015, 39(4): 392-397.
朱保平, 张金康. 云环境中基于本体语义扩展的密文检索方案[J]. 南京理工大学学报(自然科学版), 2015, 39(4): 392-397.

【9】Zhang C Y, Li J B, Wang S S. Encrypted image retrieval algorithm based on discrete wavelet transform and perceptual hash[J]. Journal of Computer Applications, 2018, 38(2): 539-544,572.
张春艳, 李京兵, 王双双. 基于离散小波变换和感知哈希的加密医学图像检索算法[J]. 计算机应用, 2018, 38(2): 539-544,572.

【10】Chen F. Privacy preserving image retrieval method based on binary SIFT and homomorphic encryption[J].Transducer and Microsystem Technologies, 2017, 36(5): 83-87.
陈帆. 量化SIFT和同态加密的隐私保护图像检索方法[J]. 传感器与微系统, 2017, 36(5): 83-87.

【11】Qin J H,Xie B, Xiang X Y, et al. An image retrieval algorithm based on multi-feature fusion[J]. Telecommunication Engineering, 2017, 57(9): 1023-1029.
秦姣华, 谢备, 向旭宇, 等. 融合多特征的图像检索算法[J]. 电讯技术, 2017, 57(9): 1023-1029.

【12】Han W, Shen M, Xu Y Y, et al. Secure JPEG image retrieval method under cloud environment[J]. Application Research of Computers, 2017, 34(4): 1239-1243.
韩威, 申铭, 徐彦彦, 等. 一种云环境下JPEG图像的安全检索方法[J]. 计算机应用研究, 2017, 34(4): 1239-1243.

【13】Huang D M, Geng X, Wei L F, et al. A secure query scheme on encrypted remote sensing images based on henon mapping[J]. Journal of Software, 2016, 27(7): 1729-1740.
黄冬梅, 耿霞, 魏立斐, 等. 基于Henon映射的加密遥感图像的安全检索方案[J]. 软件学报, 2016, 27(7): 1729-1740.

【14】Geng X. Remote sensing image encryption supporting ciphertext search and computation[D]. Shanghai: Shanghai Ocean University, 2017.
耿霞. 支持密文搜索和运算的遥感图像加密研究[D]. 上海: 上海海洋大学, 2017.

【15】Shen Z R, Xue W, Shu J W. Survey on the research and development of searchable encryption schemes[J]. Journal of Software, 2014, 25(4): 880-895.
沈志荣, 薛巍, 舒继武. 可搜索加密机制研究与进展[J]. 软件学报, 2014, 25(4): 880-895.

【16】Demir B, Bruzzone L. Hashing-based scalable remote sensing image search and retrieval in large archives[J]. IEEE Transactions on Geoscience and Remote Sensing, 2016, 54(2): 892-904.

【17】Lu W J, Varna A L, Swaminathan A, et al. Secure image retrieval through feature protection[C]∥2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 2009: 1533-1536.

【18】Ailon N, Chazelle B. Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform[C]∥Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing-STOC′06, the Thirty-Eighth Annual ACM Symposium, 2006.

【19】Indyk P, Motwani R. Approximate nearest neighbors[C]∥Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing - STOC′98, the Thirtieth Annual ACM Symposium, 1998.

【20】Sun X H. Image encryption algorithms and practices[M]. Beijing: Science Press, 2013: 64-74.
孙燮华. 图像加密算法与实践[M]. 北京: 科学出版社, 2013: 64-74.

【21】Maniccam S S, Bourbakis N G. Image and video encryption using SCAN patterns[J]. Pattern Recognition, 2004, 37(4): 725-737.

【22】Wang F, You H J, Fu X Y. Adapted anisotropic Gaussian SIFT matching strategy for SAR registration[J]. IEEE Geoscience and Remote Sensing Letters, 2015, 12(1): 160-164.

【23】Dellinger F,Delon J, Gousseau Y, et al. SAR-SIFT: a SIFT-like algorithm for SAR images[J]. IEEE Transactions on Geoscience and Remote Sensing, 2015, 53(1): 453-466.

【24】Wang B S, Zhang J X, Lu L J, et al. A uniform SIFT-like algorithm for SAR image registration[J]. IEEE Geoscience and Remote Sensing Letters, 2015, 12(7): 1426-1430.

【25】Lowe D G. Distinctiveimage features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110.

【26】Wang C, Cao N, Li J, et al. Secure ranked keyword search over encrypted cloud data[C]∥IEEE 30th International Conference on Distributed Computing Systems, 2010: 253-262.

【27】Cheon J H, Kim M, Kim M. Search-and-compute on encrypted data[M]∥Heidelberg: Springer, 2015: 142-159.Cheon J H, Kim M, Kim M. Search-and-compute on encrypted data[M]∥Heidelberg: Springer, 2015: 142-159.

引用该论文

Huang Dongmei,Wu Guojian,Wei Lifei,Wei Quanmiao,Dai Liang. A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031001

黄冬梅,吴国健,魏立斐,魏泉苗,戴亮. 一种加密遥感图像的安全外包搜索方案[J]. 激光与光电子学进展, 2019, 56(3): 031001

您的浏览器不支持PDF插件,请使用最新的(Chrome/Fire Fox等)浏览器.或者您还可以点击此处下载该论文PDF