Background technology
With multimedia sensing equipment(Such as CMOS camera and microphone)And wireless communication system(The communication system that such as IEEE802.11,802.15 standards are proposed)Popularization, wireless multimedia sensor network obtained quick development.So-called wireless multimedia sensor network, the distributed sensing network being made up of one group of multimedia sensing node with calculating, storage and communication capacity, it perceives the media information of place surrounding enviroment by the multi-media sensor on node(Audio stream, video flowing, image, numerical value etc.), data are passed to by converging information center by multi-hop relay mode, then Monitoring Data is analyzed by convergence center.Increasingly complicated and changeable with monitoring of environmental, compared with traditional sensor network, as a kind of brand-new Information acquisition technology, WMSNs more focuses on the collection and processing of the big data quantities such as audio, video, image, large information capacity media.WMSNs not only increases existing sensor network application, such as tracking, environmental monitoring, has also expedited the emergence of increasing new application.For example, indoor/outdoor monitoring system, Traffic monitoring and control system, remote medical service system, industrial manufacturing supervision and control system etc., it all has a wide range of applications in military, civilian and commercial field.
Although with good development prospect, due to need in wireless channel transmitting multimedia data, WMSNs is easier by various security attacks(Distorted including eavesdropping, malice injection and packet).In addition, a large amount of multi-medium datas can be produced in WMSNs, and the transmission bandwidth of each multimedia sensing node, energy supply and computing capability are limited, such inner contradictions cause WMSNs compared with traditional sensors network, when solving Communication Security Problem, more challenges are faced.
Guarantee data integrity and credible traditional approach is to use AES.But, between limited energy resource and computing capability, complicated AES, such as Diffie-Hellman public key encryption algorithms are difficult to realize in wireless multimedia sensor network.In addition, in modern encryption system, the distribution and management of key are most important, and this problem needs further solve.In recent years, steganography art(Stegonagraphy)To ensure that digital communication has safely provided a kind of new thinking.Compared with AES, secret information is not processed as unreadable ciphertext by Steganography, but secret information is hidden in the Digital Media of other forms(Text, audio or image)In, from the attention without causing attacker, it is to avoid secret information is found.In addition, it is without complicated rigorous key management in AES, with more preferable flexibility.The information insertion commonly used in Steganography is divided into spatial domain Shift Method and transpositions domain with extraction algorithm.Spatial domain Shift Method is that the redundancy section in carrier information is replaced with information to be concealed, and such as LSB algorithms replace some inessential positions in carrier with hiding information position.And most information concealing methods all employ conversion field technique at present, information to be concealed is embedded into a transformation space (such as wavelet transformed domain) for carrier, transpositions domain has the advantages that can be compatible with data compression standard, stronger with the robustness of the attack such as some image procossings to compressing, cutting out.Although Steganography has many advantages, such as, the technology is not widely used in WMSNs secure communication.American scholar ClaudeTurner proposes a kind of Information hiding applied to sensor network and calculates normal form, but, the normal form does not consider application of the information concealing method in multi-medium data transmission, and related Information hiding and extraction algorithm are needed to be optimized.
Furthermore, it is contemplated that in WMSNs applied environments various technical resources limitation, the safety and secrecy policy of communication must be combined with the distributed treatment mechanism of content of multimedia.Distributed source coding(DistributedSourceCoding, DSC)Technology is exactly the typical distributed treatment mechanism of one of which.So far, in WMSNs, DSC technique is mainly used in multimedia data compression, and due to reducing the computation burden of coding side, this method has more preferable energy-conservation to show on sensing node.How the technology to be applied in WMSNs communication security, while communication quality is ensured, obtain higher energy efficiency, be worth further research.
The content of the invention
Technical problem:The present invention is directed to the problem of being proposed in background technology, it is contemplated that potential communication security is threatened in WMSNs applications, and sensor node technical resource(Wireless transmission bandwidth, energy supply and computing capability)A kind of limitation, it is proposed that safety communicating method applied to wireless multimedia sensor network.This method reduces the energy ezpenditure of sensing node, extends network life while WMSNs communication securities are ensured.
Technical scheme:The present invention is a kind of safety communicating method applied to wireless multimedia sensor network, and this method introduces the concept of Distributed Calculation, it is proposed that a kind of distributed network communication topological structure of load balancing;Using the image latent writing art based on wavelet transform, it is ensured that the invisibility and security of secret information;Perfect hash function is introduced in information insertion/extraction algorithm, without key management;
In the distributed network topology structure used, the transmitting procedure of secret information is as follows,
Step 1:After the sensing node capture images of source, notify the sensing node in the range of efficient communication, meet desired node and select multiple cluster heads according to low energy consumption self adaptation sub-clustering hierarchical structure LEACH (LowEnergyAdaptiveClusteringHierarchy) clustering route protocol;
Step 2:Cluster head that step 1 is obtained is according to the distance between with source node, and self-organizing forms remaining node in a virtual cluster head link, network and selects respective leader cluster node to set up cluster respectively according to LEACH agreements;
Step 3:It is 3 parts that original secret information O is nbits points by source sensing node:O1For n/2bits, O2For n/4bits, O3For n/4bits, wavelet transformation then is carried out to carrier image, wavelet field sub-bands of frequencies coefficient is respectively obtained:LL1,LH1,HL1,HH1;4 nearest member nodes of chosen distance source node, use Node respectively in cluster residing for source nodeLL1,NodeLH1,NodeHL1,NodeHH1Represent, by O1And LL1It is transferred to NodeLL1Node, by O2And LH1It is transferred to NodeLH1Node, O3And HL1It is transferred to NodeHL1Node, HH1It is transferred to NodeHH1Node;
Step 4:In NodeLH1、NodeHL1At node, using the information embedded mobile GIS proposed in this method by O2、O3It is embedded into LH1、HL1In, wavelet coefficient and Node after insertionLL1O1, the LL1 at place, NodeHH1The HH at place1The leader cluster node of lower cluster is transferred to together;
Step 5:Next leader cluster node is received after data, will have been inserted into the LH of secret information1、HL1And HH13 member nodes storage in the cluster is sent to, to O1And LL1Repeat the operation of step 3- steps 5, embedding operation so is repeated along link direction, until reaching aggregation node;
Step 6:In aggregation node, by wavelet inverse transformation, the wavelet coefficient for being embedded with secret information is subjected to wavelet reconstruction, is finally included the stego image of complete secret information;
Step 7:Stego image is transferred to after destination node, and the information extraction algorithm proposed using this method recovers original secret information, so far, and whole secure communication process terminates.
In described information insertion/extraction algorithm, the discrete wavelet transformer used is changed to Harr wavelet transformations, but not limited to this.
In described information insertion/extraction algorithm, the perfect hash function used, using key value and secret information data total amount as input, is output as binary data sequence.
Described information insertion/extraction algorithm, the perfect hash function used uses the perfect hash function based on gperf, but not limited to this.
Beneficial effect:A kind of limitation of this method for potential Communication Security Problem in WMSNs applications, and sensor node technical resource, it is proposed that safety communicating method based on distributed image Steganography.This method first proposed a kind of network topology agreement based on distributed treatment mechanism.On secret information insertion and extraction algorithm, the transform domain method based on wavelet transformation is employed, and introduce perfect hash function.In brief, this method has advantages below:
(1)By concealed sensing data equiblibrium mass distribution to each sensor node.Each node only handles a part for initial data, and neither one node can know whole initial data.Attacked to obtain complete data, attacker needs the communication investigated between all participation nodes.Therefore the mechanism can obtain higher security.
(2)Due to taking distributed mechanism, substantial amounts of calculating can be transferred to energy and the more abundant aggregation node of computing resource from sensing node.Therefore, the life-span of whole network can extend.
(3)Information hiding and the intermediate frequency coefficient in extraction algorithm selection discrete wavelet domain, can so obtain higher robustness, it is to avoid the security threat that interchannel noise, data compression or malicious attack are brought.In addition, by introducing perfect hash function, the mechanism is without complicated key management.
Embodiment
In order to ensure the communication security in WMSNs applications, present invention employs a kind of communication security guard method based on distributed image Steganography.Specifically, this method can be usedSuch a five-tuple is represented.Wherein C is carrier image, and O is secret information, EkFor information embedded mobile GIS, DkFor information extraction algorithm, P is distributed network topology agreement.Secret information O is embedded in carrier image C by this method, from the attention without causing attacker, for secret information insertion and extraction algorithm EkAnd Dk, we are employed based on two wavelet transforms(DiscreteWaveletTransform, DWT)Transform-domain algorithm, secret information data are embedded into the intermediate frequency coefficient in image wavelet transform domain by the algorithm, both ensure that invisibility of the secret information in transmitting procedure, turn avoid because compression of images and malicious attack etc. and may caused by information lose.In addition, this method by embedded with introducing perfect hash function in extraction algorithm, it is to avoid complicated rigorous cipher key management procedures in conventional encryption algorithm.Further, in order to solve the problems, such as to limit multimedia-data procession and the resource constraint of transmission in WMSNs all the time, the concept of distributed source coding is introduced, it is proposed that a kind of energy-efficient, load balancing distributed network topology agreement.
First, distributed network topology agreement
The transmitting procedure of secret information in a network is as follows in such as accompanying drawing 1, the agreement:
1. after the sensing node capture images of source, notifying the sensing node in the range of efficient communication, meet desired node and select multiple cluster heads according to LEACH (LowEnergyAdaptiveClusteringHierarchy) clustering route protocol.
2. cluster head that step 1 is obtained is according to the distance between with source node, self-organizing forms remaining node in a virtual cluster head link, network and is selected respective leader cluster node to set up cluster respectively according to LEACH.
3. source sensing node is by original secret information O(nbits)It is divided into 3 parts:O1(n/2bits)、O2(n/4bits)、O3(n/4bits) wavelet transformation then, is carried out to carrier image, wavelet field sub-bands of frequencies coefficient is obtained:LL1,LH1,HL1,HH1.Wherein, LH1, HL1For intermediate frequency coefficient.4 nearest member nodes of chosen distance source node, use Node respectively in cluster residing for source nodeLL1,NodeLH1,NodeHL1,NodeHH1Represent.By O1And LL1It is transferred to NodeLL1Node, by O2And LH1It is transferred to NodeLH1Node, O3And HL1It is transferred to NodeHL1Node, HH1It is transferred to NodeHH1Node.
4. in NodeLH1、NodeHL1At node, using the information embedded mobile GIS proposed in this method by O2、O3It is embedded into LH1、HL1In.Wavelet coefficient and Node after insertionLL1O1, the LL1 at place, NodeHH1The HH at place1The leader cluster node of lower cluster is transferred to together.
5. next leader cluster node is received after data, the LH of secret information will be had been inserted into1、HL1And HH13 nearest member node storages being sent in the cluster, to O1And LL1Repeat the operation of step 3- steps 5.Embedding operation so is repeated along link direction, until reaching convergence(Sink)Node.
6. in aggregation node, by wavelet inverse transformation, the wavelet coefficient for being embedded with secret information is subjected to wavelet reconstruction, is finally included the stego image of complete secret information(Stego).
7. stego image is transferred to after destination node, the information extraction algorithm proposed using this method recovers original secret information.So far, whole secure communication process terminates.
2nd, information insertion/extraction algorithm
Information embedded mobile GIS:
1. input secret information O and carrier image C.
2. secret information O is serialized into Tokenize, 1 byte is a data block, is stored in array L [m].Wherein, the sum of data block is m.
3. couple C carries out two-dimensional discrete wavelet conversion, 4 wavelet sub-band coefficients LL, HL, LH, HH are obtained.
4. producing the binary system pseudo random number of 16 bits using PRNG, keyword h is used as.
5. keyword h and m as input, is produced a data sequence by perfect hash function H, stored with array P [m].The Serial No. represents the wavelet coefficient position of embedded concealed data.
6. select HL, LH wavelet sub-band to be embedded in secret information.J ← 1, works as j<During=m, following embedding operation is performed:
Read the data of storage in L [j].
The position of wavelet coefficient is determined according to P [j], the wavelet coefficient at this is replaced with data in L [j].
j←j+1.
7. final output is keyword h, the wavelet coefficient of secret information data volume m and embedded secret information.So far whole information telescopiny terminates.
Information extraction algorithm:
1. inputting keyword h ', secret information data volume m and stego image C ', wherein h ' binary length is n.
2. pair n/16 grades of wavelet transformations of C ' carry out, obtain wavelet coefficient LL at different levelsi、HLi、LHi、HHi, wherein i represents wavelet series.
3.i ← 1, works as i<During=n/16, following operate is performed:
Choose wavelet coefficient HLi、LHi。
Extract in h ' [(i-1)* 16+1, i*16] binary data, represented with h ' [i].
Using the perfect hash function H of selection, using h ' [i] and m as input, data sequence P ' [m] is produced.
J ← 1, works as j<During=m, following operate is performed:
From HLi、LHiIn extract wavelet coefficient represented by P ' [m] at position.
j←j+1。
4. the data serializing that will be extracted from wavelet coefficients at different levels, finally gives initial data.So far, information extraction process terminates.
The implementation of technical scheme is described in further detail with reference to embodiment.
In the present embodiment, source node is nearer apart from destination node, and whole process only needs one-level wavelet transformation, as shown in Figure 2.The present embodiment is only illustrative of the invention and is not intended to limit the scope of the invention.In addition, it is to be understood that after present invention has been read, those skilled in the art can make various changes or modifications to the present invention, these equivalent form of values also belong to the application appended claims and limit scope.
Whole communication process of the secret information in WMSNs is as follows:
1. after the sensing node capture images C of source, notifying the sensing node in the range of efficient communication, meet desired node and select cluster head according to LEACH agreements.
2. source sensing node carries out Harr wavelet transformations to carrier image C, wavelet field sub-bands of frequencies coefficient is obtained:LL,LH,HL,HH.Wherein, LH, HL are intermediate frequency coefficient.The nearest member node of chosen distance source node, is represented with Node in cluster residing for source node.Original secret information O and wavelet coefficient are transferred to Node nodes.
3. at Node nodes, secret information O is serialized, 1 byte is a data block, is stored in array L [m].Wherein, the sum of data block is m.The binary system pseudo random number of 16 bits is produced using PRNG, keyword h is used as.Using the perfect hash function H based on GNUgperf using keyword h and m as input, a data sequence is produced, is stored with array P [m].The Serial No. represents the wavelet coefficient position of embedded concealed data.Medium wave coefficient HL, LH is selected to be embedded in secret information.J ← 1, works as j<During=m, following embedding operation is performed:
Read the data of storage in L [i].
The position of wavelet coefficient is determined according to P [i], the wavelet coefficient at this is replaced with data in L [i].
j←j+1。
After whole telescopiny terminates, Node nodes are by the wavelet coefficient after processing and are transferred to aggregation node(Sink).
4. in aggregation node, carry out inverse transformation to the wavelet coefficient received using Harr small echos, obtain the stego image containing secret information, then by and the original information bytes length m and keyword h that receive be transferred to destination node.
5. destination node D is received after data, first to C ' carry out Harr wavelet transformations, wavelet coefficient LL, LH, HL, HH are obtained.Then the perfect hash function H based on GNUgperf is utilized, using h and m as input, data sequence P [m] is produced.J ← 1, works as j<During=m, following operate is performed:
From HLi、LHiIn extract wavelet coefficient represented by P [m] at position.
j←j+1。
So far, complete secret information is extracted, and whole communication process terminates.
To verify the robustness and attack tolerant of this method, we represent similitude therebetween with the normalizated correlation coefficient NC between original secret information O and the secret information O ' received, and NC expression formula is as follows:
Wherein, O (i) represents the i-th bit of raw information, and O ' (i) represents to receive the i-th bit of information, and w is total number of bits of raw information.
As shown in Figure 3, first to stego image C ' addition salt-pepper noises, the influence of noise come during analogue communication, by calculating, its NC value is 0.96.
Then the interception stego image C ' part of the upper left corner 1/4, carrys out the intercepting message behavior of simulated strike person, by calculating, and its NC value is 0.94.
The analog result of embodiment shows that this method is with very strong robustness and attack tolerant, the security threat that can effectively avoid interchannel noise, data compression or malicious attack from bringing.