CN108846816B - Ciphertext domain image restoration method - Google Patents
Ciphertext domain image restoration method Download PDFInfo
- Publication number
- CN108846816B CN108846816B CN201810634763.XA CN201810634763A CN108846816B CN 108846816 B CN108846816 B CN 108846816B CN 201810634763 A CN201810634763 A CN 201810634763A CN 108846816 B CN108846816 B CN 108846816B
- Authority
- CN
- China
- Prior art keywords
- image
- block
- repaired
- encrypted
- damaged
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 230000008439 repair process Effects 0.000 claims description 23
- 239000013598 vector Substances 0.000 claims description 22
- 238000001914 filtration Methods 0.000 claims description 9
- 230000009466 transformation Effects 0.000 claims description 5
- 238000006073 displacement reaction Methods 0.000 claims description 4
- 239000011159 matrix material Substances 0.000 claims description 3
- 230000006378 damage Effects 0.000 abstract description 4
- 230000000694 effects Effects 0.000 description 15
- 238000002474 experimental method Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000873 masking effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004710 electron pair approximation Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/10—Image enhancement or restoration by non-spatial domain filtering
Abstract
The invention provides a ciphertext domain image repairing method, which is used for repairing a damaged image generated by the damage of a mask image in a ciphertext domain, and has the following characteristics that: step one, obtaining an encrypted image E to be repairedPAuxiliary encrypted image EJAnd a mask image θ; step two, treating the repaired encrypted image E through the mask image thetaPMarking to obtain a damaged region omega and a complete region phi; step three, calculating the priority of the pixel c to be repaired in the damaged region omega by taking a block as a unit to obtain a target block with the highest priorityStep four, in the auxiliary encryption image EJWith the aid of a target blockAll candidate blocks B with good area phiSPerforming block matching to obtain the best matching blockStep five, using the best matching blockFor target blockRepairing to select initial repairing encrypted image EP1(ii) a Step six, respectively carrying out pair of auxiliary encrypted images EJUpdating the damaged region omega and the intact region phi; step seven, repeatStep two to step six, until all the damaged regions omega are repaired to obtain a repaired encrypted image E'P。
Description
Technical Field
The invention relates to an image restoration method, in particular to a ciphertext domain image restoration method.
Background
Image restoration techniques are used in many applications. Such as removing unwanted objects or regions, filling in missing parts of images, and is also widely used in computer vision, including image restoration, compression, editing, and merging. Image inpainting techniques are also extended to image-related applications, such as composite video and animation. The current image restoration techniques are mainly classified into three categories: interpolation-based methods (e.g., FMM algorithms), partial differential equation-based methods (e.g., TV algorithms), and sample/block-based methods (e.g., Criminisi algorithms).
Today, as the internet evolves, cloud storage and computing become prevalent. Due to limited storage space and computing capacity, a user can upload own multimedia data (such as images, videos and the like) to the cloud end and outsource various data processing work to the cloud server to realize the data processing. However, although cloud computing brings convenience, since users generally desire to protect data privacy, security issues are also raised. Thus, one safe and reasonable solution is to encrypt the data before it is uploaded to the cloud, and the cloud server can process the data in the ciphertext domain. Then, after the user decrypts the received data from the cloud server, the data can obtain an ideal effect in a clear text domain. Based on such application scenarios and requirements, in recent years, processing of ciphertext domain signals has been extensively studied. However, research on restoration of images has been focused on the plaintext field, and has not been related to the ciphertext field.
Disclosure of Invention
The invention aims to solve the problem of how to repair an encrypted image in a ciphertext domain, and provides a ciphertext domain image repairing method.
The invention provides a ciphertext domain image repairing method, which is used for repairing a damaged image generated by the damage of a mask image in a ciphertext domain, and has the following characteristics that: step one, obtaining an encrypted image E to be repairedPAuxiliary encrypted image EJAnd a mask image θ; step two, treating the repaired encrypted image E through the mask image thetaPMarking to obtain the omega sum of the damaged areaA good area phi; step three, calculating the priority of the pixel c to be repaired in the damaged region omega by taking a block as a unit to obtain a target block with the highest priorityStep four, in the auxiliary encryption image EJWith the aid of a target blockAll candidate blocks B with good area phiSPerforming block matching to find the best matching block in the good region phiStep five, using the best matching blockFor target blockRepairing is performed so that the encrypted image E to be repaired isPUpdating to an initial repair encrypted image EP1(ii) a Step six, respectively carrying out pair of auxiliary encrypted images EJUpdating the damaged region omega and the intact region phi; step seven, repeating the step two to the step six until all the damaged areas omega are repaired to obtain a repaired encrypted image E'PRepair encrypted image E'PEncrypting an image E for repairPThe repair result of (1).
The ciphertext domain image restoration method provided by the invention also has the following characteristics: wherein, in the fourth step, the target block is divided intoAnd candidate block BSPerforming block matching to obtain the best matching blockThe process comprises the following steps: according to the auxiliary encrypted image EJCalculating a target block by the following formulaWith each candidate block BSThe distance between the two or more of the two or more,(x, y) represents candidate block BSRelative to the target blockCoordinate displacement of (B)S∈Φ, Andrespectively representing auxiliary encrypted images EJTwo middle pixels m (i)1,j1) And m (i)2,j2) Selecting a distance target block from the encrypted valueThe most recent candidate block BSAs the best matching block
The ciphertext domain image restoration method provided by the invention also has the following characteristics: wherein, in the third step, the target block is obtained from the damaged region omegaThe process comprises the following steps: block priority O centered on pixel c to be repairedcIs composed ofRepresenting a block B of size l x l centred on the pixel c to be repairedcThe number of the medium good pixels,indicating that the pixel c to be repaired is located at the boundary of the damaged region omegaUp, select block priority OcBlock B with the largest valuecAs a target block
The ciphertext domain image restoration method provided by the invention also has the following characteristics that: step eight, restoring the encrypted image E'PCarrying out local weighted mean filtering processing to obtain an optimized encrypted image E ″P。
The ciphertext domain image restoration method provided by the invention also has the following characteristics: wherein the encrypted image E to be repairedPIs composed of damaged image IdAnd carrying out encryption processing by a Paillier encryption algorithm to obtain an image.
The ciphertext domain image restoration method provided by the invention also has the following characteristics: wherein the auxiliary encrypted image EJIs composed of damaged image IdAnd (3) obtaining an image after Johnson Lindenstaus transformation encryption processing.
The ciphertext domain image restoration method provided by the invention also has the following characteristics: wherein, the damaged image IdObtaining an auxiliary encrypted image EJThe process comprises the following steps: will be damaged image IdEach pixel m (i, j) of the image sensor, and s-1 pixels around the pixel m (i, j) form an s-pixel block; constructing an s-dimensional vector N for pixels in an s-pixels blocki,j(ii) a Using the key kJRandom matrix of size kxsAnd random k-dimensional noise vector σ vs vector Ni,jThe vector L is obtained by encryptioni,jThe vector Li,jAs an encryption result of one pixel m (i, j),will be damaged image IdAll pixels m (i, j) of (a) to (b) correspond to a vector Li,jAs an auxiliary encrypted image EJ。
Action and Effect of the invention
According to the ciphertext domain image restoration method, the encrypted image E to be restored is obtainedPAuxiliary encrypted image EJAnd after masking the image theta, treating the repaired encrypted image E through the mask image thetaPMarking to obtain a damaged region omega and a sound region phi, and determining a target block of the damaged region omegaIn the auxiliary encryption image EJWith the assistance of (1) finding the best matching block of good region phi by block matchingThen using the best matching blockFor target blockRepairing to update encrypted image E to be repairedPAuxiliary encrypted image EJDamaged region omega and sound region phi, repeating the repair process until a repaired encrypted image E 'is obtained'PThe process is completely carried out in the ciphertext domain, the plaintext information of the image cannot be leaked, the privacy is strong, a good image restoration effect can be obtained, the method has a wide application prospect, and the method is particularly suitable for transmission and restoration of the image information in the cloud computing process.
Drawings
FIG. 1 is a flow chart of a ciphertext domain image restoration method in an embodiment of the invention;
FIG. 2 is a graph comparing the repairing effect of the experimental group 1;
FIG. 3 is a graph comparing the repairing effect of experiment group 2; and
fig. 4 shows 7 images selected from the image library.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the present invention easy to understand, the following embodiments specifically describe the ciphertext domain image restoration method of the present invention with reference to the accompanying drawings.
An image restorer (such as a cloud server with strong computing power) treats the restored encrypted image E according to the ciphertext domain image restoration method related to the embodimentPThe encrypted image E to be repaired needs to be obtained from the image owner before being repaired in the ciphertext domainPAuxiliary encrypted image EJAnd a mask image theta.
The image owner holds a damaged image IdAnd a mask image theta. Wherein the mask image theta is based on the damaged image IdDerived images I for marking damaged imagesdImages of damaged and sound areas. Since the image owner wants the image restorer to correct the damaged image I in the ciphertext domaindRepair is performed, so an image owner is required for the damaged image IdEncryption is carried out, and the specific process of encryption is as follows:
firstly, the damaged image IdEncrypted image E to be repaired is obtained by encrypting through Paillier encryption algorithmPThe encrypted image to be restored EPAs the object of the repair. In the present embodiment, the damaged image IdThe Paillier encryption algorithm is adopted for encryption, so that the Paillier encryption algorithm is also adopted for decryption in subsequent decryption. In practical application, damaged image IdOther algorithms can be used for encryption, and the subsequent decryption process also adopts the corresponding algorithm for decryption.
Secondly, the damaged image IdThe auxiliary encryption image E is obtained by encrypting through Johnson Lindenstaus graphic transformation algorithm (JL algorithm for short)J。
Wherein, the damaged image IdObtaining an auxiliary encrypted image EJThe process comprises the following steps:
(1) will be damaged image IdIs given by pixel m (i, j)An s-pixel block is formed for the center and the surrounding s-1 pixels.
(2) Constructing an s-dimensional vector N for pixels in an s-pixels blocki,j。
(3) Key kappa using JL algorithmJRandom matrix of size kxsAnd random k-dimensional noise vector σ vs vector Ni,jThe vector L is obtained by encryptioni,j,
Vector Li,jIs a k-dimensional vector representing the result of the encryption for one pixel m (i, j).
(4) Will be damaged image IdAll pixels m (i, j) of (a) to (b) correspond to a vector Li,jAs an auxiliary encrypted image EJ。
Fig. 1 is a flowchart of a ciphertext domain image restoration method in an embodiment of the present invention.
As shown in fig. 1, the ciphertext domain image restoration method according to the embodiment includes the following steps:
step S1, the image restorer obtains the encrypted image E to be restoredPAuxiliary encrypted image EJAnd a mask image theta.
Step S2, treat the repair encrypted image E through the mask image θPMarking is carried out to obtain a damaged region omega and a good region phi.
Step S3, calculating the priority of the pixel c to be repaired in the damaged region omega by taking the block as the unit to obtain the target block with the highest priority
The block priority calculation takes into account the following two conditions:
(1) the center pixel of the block having the higher priority should be located at the boundary of the target region Ω.
(2) A block with a higher priority should have more good pixels.
These two conditions may ensure that the more perfect blocks in the repair process are repaired first and are biased towards those blocks that are continuous, strong-edged, and high-confidence pixels around.
Thus, the block B centered on the pixel c to be repairedcBlock priority O ofcIs composed of
Wherein the content of the first and second substances,representing a block B of size l x l centred on the pixel c to be repairedcThe number of the medium good pixels,indicating that the pixel c to be repaired is located at the boundary of the damaged region omegaThe above.
Will border the boundarySolving the block priority O of all the pixels c to be repairedcPost-selection block priority OcBlock B with the largest valuecAs a target block
In step S4, the auxiliary encrypted image EJWith the aid of a target blockAll candidate blocks B associated with the good area phi (or within a specified range)SPerforming block matching to select the best matching block from the good region phi
The specific process is as follows:
maintaining the characteristic of Euclidean distance based on JL transformation and according to the auxiliary encryption image EJCalculating a target block by the following formulaWith each candidate block BSThe distance between the two or more of the two or more,
wherein (x, y) represents a candidate block BSRelative to the target blockCoordinate displacement of (B)S∈Φ,
Andrespectively representing auxiliary encrypted images EJTwo middle pixels m (i)1,j1) And m (i)2,j2) Cryptographic values of, i.e. k-dimensional vectors EJ(i1,j1) And EJ(i2,j2)。D[EJ(i1,j1),EJ(i2,j2)]Representing an auxiliary encrypted image EJTwo pixels apart.
Since the Euclidean distance between two ciphertext vectors in the JL transformation is approximate to the Euclidean distance between corresponding plaintexts, the distance target block is selectedThe most recent candidate block BSAs the best matching block
Step S5, using the best matching blockCorresponding patch Ψ insFor target blockDefective block Ψ incFilling to complete the target blockRepair of damaged pixels in the image to be repaired, and then encrypting the image to be repaired EPUpdating to an initial repair encrypted image EP1,
EP1(i,j)=EP(i+x*,j+y*),
(i,j)∈Ψc,
Wherein (x)*,y*) Representing best matching blocksRelative to the target blockCoordinate displacement of (E)P1(i, j) is the encrypted marred pixel EP(i, j) filling result.
Step S6, respectively for the auxiliary encrypted image EJThe damaged region Ω and the good region Φ.
Wherein the auxiliary encrypted image EJUpdated as an auxiliary encrypted image EJ1,
EJ1(i,j)=EJ(i+x*,j+y*),
(i,j)∈Ψc。
Step S7, repeating steps S2-S6 until all damaged regions omega are repaired to obtain repaired encrypted image E'PRepair encrypted image E'PEncrypting an image E for repairPThe repair result of (1).
Step S8, repairing the encrypted image EPCarrying out local weighted mean filtering processing to obtain an optimized encrypted image E ″P。
For weighted mean filtering in the plain text domain, pixel c, m (i, j), in the corrupted region Ω should be replaced by a weighted mean of m (i, j) itself and its neighboring pixels:
m′(i,j)=wi-1,j·m(i-1,j)+wi+1,j·m(i+1,j)+wi,j·m(i,j)+wi,j-1·m(i,j-1)+wi,j+1·m(i,j+1),
the weights may be set as: w is ai-1,j=wi+1,j=wi,j-1=wi,j+1=1/(4+ω)、wi,jω/(4+ ω), where ω may be a small positive integer.
However, in order to realize weighted mean filtering in the encrypted domain, the weight w is based on the homomorphic propertyi,jShould be modified to be an integer:
w′i,j=(4+ω)·wi,j,
according to the homomorphism property, the image restorer can execute the following operations to realize the weighted mean filtering of the damaged region Ω in the ciphertext domain:
wherein ρ '(i, j) represents E'PThe cryptographic value of the pixel at the middle coordinate (i, j), ρ "(i, j) is the result of a weighted mean filtering of ρ' (i, j) located in the cryptographic domain, thus obtaining the final optimized encrypted image E ″P。
In the above, the image restorer treats the restored encrypted image E according to the ciphertext domain image restoring method of the embodimentPThe optimized encrypted image E' is obtained by repairing in the ciphertext domainPAll the processes of (1).
After the repair is complete, the image repairer will send the optimized encrypted image E ″PAnd sending the image to the image owner or a receiver authorized by the image owner. And the image owner or the authorized receiver decrypts the image by the private key of the paillier encryption algorithm, and m '(i, j) represents the decryption result of rho' (i, j).
Due to the weight rounding process in the weighted mean filtering process, the decrypted result m' (i, j) of the pixels in the damaged region Ω should be further processed:
and correspondingly obtaining a final repaired image.
The effect of the method according to the present embodiment is examined by comparing the image to be repaired, the damaged image, and the repaired image.
FIG. 2 is a graph comparing the repairing effect of the experimental group 1.
FIG. 3 is a graph comparing the repairing effect of experiment group 2.
As shown in fig. 2, fig. 2(a) shows an image to be repaired having a size of 512 × 512; FIG. 2(b) shows a randomly generated mask image; FIG. 2(c) shows a damaged image generated by the destruction of FIG. 2(a) according to FIG. 2 (b); fig. 2(d) shows that fig. 2(c) is encrypted by Paillier algorithm and JL transform respectively, wherein the ciphertext of each pixel after being encrypted by the JL transform is a multidimensional vector, so that the ciphertext cannot be displayed in an image form, while the ciphertext encrypted by the Paillier algorithm may exceed the value range of the gray value, so as to facilitate understanding of the encrypted result, which is obtained by modulo 256; fig. 2(e) shows a diagram after the optimized encrypted image is restored by the method of the present embodiment, modulo 256; fig. 2(f) shows a restored picture obtained by decrypting fig. 2 (e). Comparing fig. 2(f) with the image to be repaired like fig. 2(a), the peak signal-to-noise ratio PSNR of experimental group 1 is 44.65dB, and SSIM is 0.9826. SSIM is an index for measuring the structural similarity of two pictures, and the closer the value is to 1, the higher the similarity of the two pictures is.
As shown in fig. 3, (a) to (f) in fig. 3 have the same meanings as (a) to (f) in fig. 2, and when fig. 3(f) is compared with the image to be restored, like fig. 3(a), the peak signal-to-noise ratio PSNR of the experimental group 2 is 42.56dB, and SSIM is 0.9615.
In summary, the results of experiment 1 and experiment 2 both show the repairing effect of the method according to the present embodiment.
Fig. 4 shows 7 images selected from the image library.
In addition, as shown in fig. 4, we select 7 images from the image library for experiments, respectively and randomly damage, then repair in the ciphertext domain by using the method related to this embodiment, compare the obtained decrypted repair image with the repair results of three classic plaintext domain image repair algorithms (TV algorithm, BSCB algorithm, criiniisi algorithm), and obtain PSNR and SSIM results as shown in table 1,
TABLE 1 Algorithm repair results comparison Table
The results in table 1 show that the ciphertext domain image restoration method according to the present embodiment can be effectively applied in the cloud computing environment, and the restoration quality reaches a level equivalent to some advanced restoration methods for plaintext images, and the method can effectively protect image privacy, which is not possessed by these restoration methods for plaintext images.
Effects and effects of the embodiments
According to the ciphertext domain image restoration method of the embodiment, the encrypted image E to be restored is acquiredPAuxiliary encrypted image EJAnd after masking the image theta, treating the repaired encrypted image E through the mask image thetaPMarking to obtain a damaged region omega and a sound region phi, and determining a target block of the damaged region omegaIn the auxiliary encryption image EJWith the assistance of (1) finding the best matching block of good region phi by block matchingThen using the best matching blockFor target blockRepairing to update encrypted image E to be repairedPAuxiliary encrypted image EJDamaged region omega and sound region phi, repeating the repair process until a repaired encrypted image E 'is obtained'PThe process is completely carried out in the ciphertext domain, the plaintext information of the image cannot be leaked, the privacy is strong, a good image restoration effect can be obtained, the method has a wide application prospect, and the method is particularly suitable for transmission and restoration of the image information in the cloud computing process.
Further, the restored encrypted image E'PPerforming local weighted mean filtering can avoid restoring the encrypted image E'PThe mosaic effect appears, so that the obtained optimized encrypted image E ″)PHas more excellent image effect.
Further, the optimized encrypted image E ″ obtained by the method according to the present embodimentPThe restored image obtained after decryption and three classicsThe comparison of the repair results of the repair algorithm of the plaintext field image shows that, in terms of repair quality, the method according to the embodiment can reach a level equivalent to that of some advanced repair methods of the plaintext image.
The above embodiments are preferred examples of the present invention, and are not intended to limit the scope of the present invention.
Claims (6)
1. A ciphertext domain image repairing method is used for repairing damaged images in a ciphertext domain, and is characterized by comprising the following steps:
step one, obtaining an encrypted image E to be repairedPAuxiliary encrypted image EJAnd a mask image θ;
secondly, the encrypted image E to be repaired is processed by the mask image thetaPMarking to obtain a damaged region omega and a complete region phi;
thirdly, calculating the priority of the pixel c to be repaired in the damaged region omega by taking a block as a unit to obtain a target block with the highest priority
Step four, in the auxiliary encryption image EJWith the aid of the target blockAll candidate blocks B with the good region ΦSPerforming block matching to find the best matching block in the good region phi
Step five, using the optimal matching blockFor the target blockRepairing to repair the encrypted image E to be repairedPUpdating to an initial repair encrypted image EP1;
Step six, respectively carrying out comparison on the auxiliary encrypted images EJUpdating the damaged region omega and the intact region phi;
step seven, repeating the step two to the step six until all the damaged regions omega are repaired to obtain a repaired encrypted image E'PRepair encrypted image E'PEncrypting the image E to be repairedPAs a result of the repair of (a),
wherein, in the fourth step, the target block is processedAnd the candidate block BSPerforming block matching to obtain the best matching blockThe process comprises the following steps:
according to the auxiliary encrypted image EJCalculating the target block by the following formulaWith each of said candidate blocks BSThe distance between the two or more of the two or more,
(x, y) represents the candidate block BSRelative to the target blockCoordinate displacement of (B)S∈Φ,
Andrespectively representing said auxiliary encrypted images EJTwo middle pixels m (i)1,j1) And m (i)2,j2) The encrypted value of (a) is determined,
2. The ciphertext domain image restoration method of claim 1, wherein:
wherein, in step three, the target block is obtained from the damaged region omegaThe process comprises the following steps:
block priority O centered on the pixel c to be repairedcIs composed of
Representing a block B of size l x l centred on said pixel c to be repairedcThe number of the medium good pixels,indicating that the pixel c to be repaired is located at the damagedThe boundary of region omegaIn the above-mentioned manner,
3. The ciphertext domain image restoration method according to claim 1, further comprising:
step eight, the repaired encrypted image E'PCarrying out local weighted mean filtering processing to obtain an optimized encrypted image E ″P。
4. The ciphertext domain image restoration method of claim 1, wherein:
wherein the encrypted image E to be repairedPIs composed of the damaged image IdAnd carrying out encryption processing by a Paillier encryption algorithm to obtain an image.
5. The ciphertext domain image restoration method of claim 1, wherein:
wherein the auxiliary encrypted image EJIs composed of the damaged image IdAnd (3) obtaining an image after Johnson Lindenstaus transformation encryption processing.
6. The ciphertext domain image restoration method of claim 5, wherein:
wherein the damaged image IdObtaining the auxiliary encrypted image EJThe process comprises the following steps:
the damaged image IdEach pixel m (i, j) of the image sensor, and s-1 pixels around the pixel m (i, j) form an s-pixel block;
constructing an s-dimensional vector N for pixels in the s-pixels blocki,j;
Using the key kJRandom matrix of size kxsAnd a random k-dimensional noise vector σ versus the vector Ni,jThe vector L is obtained by encryptioni,jThe vector Li,jAs an encryption result of one pixel m (i, j),
the damaged image IdAll pixels m (i, j) of (a) to (b) correspond to a vector Li,jAs an auxiliary encrypted image EJ。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634763.XA CN108846816B (en) | 2018-06-20 | 2018-06-20 | Ciphertext domain image restoration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634763.XA CN108846816B (en) | 2018-06-20 | 2018-06-20 | Ciphertext domain image restoration method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108846816A CN108846816A (en) | 2018-11-20 |
CN108846816B true CN108846816B (en) | 2021-10-01 |
Family
ID=64203017
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810634763.XA Active CN108846816B (en) | 2018-06-20 | 2018-06-20 | Ciphertext domain image restoration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108846816B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7193728B2 (en) * | 2019-03-15 | 2022-12-21 | 富士通株式会社 | Information processing device and stored image selection method |
CN110503619B (en) * | 2019-06-27 | 2021-09-03 | 北京奇艺世纪科技有限公司 | Image processing method, device and readable storage medium |
CN113379036B (en) * | 2021-06-18 | 2023-04-07 | 西安石油大学 | Oil-gas image desensitization method based on context encoder |
CN113923313B (en) * | 2021-10-09 | 2023-06-27 | 上海理工大学 | Carrier generation type information hiding method and extraction method based on cartoon pattern |
WO2023092342A1 (en) * | 2021-11-24 | 2023-06-01 | 上海健康医学院 | Medical image privacy protection method based on ciphertext image restoration |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103955877A (en) * | 2014-01-21 | 2014-07-30 | 广州大学 | Multimedia-sensing-network watermark verification and image restoration method and device |
CN104376535A (en) * | 2014-11-04 | 2015-02-25 | 徐州工程学院 | Rapid image repairing method based on sample |
CN104966279A (en) * | 2015-06-15 | 2015-10-07 | 鲁东大学 | Image synthesis restoration method based on local structure features |
CN105830134A (en) * | 2013-12-16 | 2016-08-03 | 来特荣国际有限公司 | Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium |
CN107395336A (en) * | 2017-07-03 | 2017-11-24 | 安徽大学 | Ciphertext domain reversible data embedding method based on pailliar public key encryps |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101647911B1 (en) * | 2012-03-16 | 2016-08-11 | 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 | Mobile authentication by image inpainting |
-
2018
- 2018-06-20 CN CN201810634763.XA patent/CN108846816B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105830134A (en) * | 2013-12-16 | 2016-08-03 | 来特荣国际有限公司 | Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium |
CN103955877A (en) * | 2014-01-21 | 2014-07-30 | 广州大学 | Multimedia-sensing-network watermark verification and image restoration method and device |
CN104376535A (en) * | 2014-11-04 | 2015-02-25 | 徐州工程学院 | Rapid image repairing method based on sample |
CN104966279A (en) * | 2015-06-15 | 2015-10-07 | 鲁东大学 | Image synthesis restoration method based on local structure features |
CN107395336A (en) * | 2017-07-03 | 2017-11-24 | 安徽大学 | Ciphertext domain reversible data embedding method based on pailliar public key encryps |
Non-Patent Citations (3)
Title |
---|
A Novel Joint Data-Hiding and Compression;Chuan Qin,et al;《IEEE TRANSACTIONS ON IMAGE PROCESSING》;20140331;正文第969-978页 * |
基于图像修复的肿瘤患者图片隐私保护技术研究;胡强;《中国优秀硕士学位论文全文数据库 信息科技辑》;20140415;I138-67 * |
基于样本块的图像修复算法研究;麻佳琪;《中国优秀硕士学位论文全文数据库 信息科技辑》;20180415;I138-2538 * |
Also Published As
Publication number | Publication date |
---|---|
CN108846816A (en) | 2018-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108846816B (en) | Ciphertext domain image restoration method | |
Ou et al. | High payload image steganography with minimum distortion based on absolute moment block truncation coding | |
Guo et al. | Secure watermarking scheme against watermark attacks in the encrypted domain | |
Irawan et al. | Hiding and securing message on edge areas of image using LSB steganography and OTP encryption | |
Zheng et al. | Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking | |
Jafar et al. | An efficient reversible data hiding algorithm using two steganographic images | |
Han et al. | A robust color image watermarking algorithm against rotation attacks | |
Dogan | A new approach for data hiding based on pixel pairs and chaotic map | |
Kumar et al. | Feature based steganalysis using wavelet decomposition and magnitude statistics | |
Priya et al. | Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection | |
Madono et al. | Sia-gan: Scrambling inversion attack using generative adversarial network | |
CN112800395A (en) | Copyright authentication and verification method for multiple images based on zero watermark technology | |
Mandal et al. | High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion | |
Kukreja et al. | Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography | |
Bhardwaj | A high payload reversible data hiding algorithm for homomorphic encrypted absolute moment block truncation coding compressed images | |
Kaur et al. | Comparison of different image formats using LSB Steganography | |
Sun et al. | An image watermarking scheme using Arnold transform and fuzzy smooth support vector machine | |
Sharma et al. | Digital video watermarking: features, techniques, and challenges | |
Deng et al. | POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing | |
Brar et al. | Double layer image security system using encryption and steganography | |
Bhardwaj et al. | An improved dual image separable reversible data hiding algorithm for encrypted HAMBTC compressed images | |
Sharma et al. | Dual domain robust watermarking scheme using random DFRFT and least significant bit technique | |
Vinay et al. | A novel secure data hiding technique into video sequences using RVIHS | |
Bhavani et al. | Image segmentation based hybrid watermarking algorithm for copyright protection | |
Mushtaq et al. | Cultural Heritage Copyright Protection: A blind and robust watermarking technique for heritage images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |