CN111241561B - User certifiable outsourcing image denoising method based on privacy protection - Google Patents

User certifiable outsourcing image denoising method based on privacy protection Download PDF

Info

Publication number
CN111241561B
CN111241561B CN202010024855.3A CN202010024855A CN111241561B CN 111241561 B CN111241561 B CN 111241561B CN 202010024855 A CN202010024855 A CN 202010024855A CN 111241561 B CN111241561 B CN 111241561B
Authority
CN
China
Prior art keywords
image
user
server
edge
edge computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010024855.3A
Other languages
Chinese (zh)
Other versions
CN111241561A (en
Inventor
程航
黄逸冰
王美清
陈飞
颜娜招
黄芹健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou University
Original Assignee
Fuzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou University filed Critical Fuzhou University
Priority to CN202010024855.3A priority Critical patent/CN111241561B/en
Publication of CN111241561A publication Critical patent/CN111241561A/en
Application granted granted Critical
Publication of CN111241561B publication Critical patent/CN111241561B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • G06T5/70
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10004Still image; Photographic image

Abstract

The invention relates to a user certifiable outsourcing image denoising method based on privacy protection, which comprises the following steps: a trusted third party TTP to a content owner CO, an authorized user AU and two edge compute servers ES1、ES2Distributing the related keys; the CO first encrypts the noisy image using the key assigned by the TTP and sends the encrypted image to the first edge computing server ES1(ii) a Second edge compute server ES2Assisting a first edge computing server ES1The ciphertext image is denoised, and the result obtained by calculation is sent to a first edge calculation server ES1(ii) a AU makes image use request to corresponding CO, and calculates server ES from first edge1And acquiring a corresponding de-noised ciphertext image, and authorizing the AU to decrypt and recover the required plaintext de-noised image under the help of a private key of the AU. The invention ensures the safety of the user privacy data and provides the image denoising service; and the local calculation and communication overhead of the user is reduced, and the ciphertext denoising effect is almost equal to the performance of a plaintext domain.

Description

User certifiable outsourcing image denoising method based on privacy protection
Technical Field
The invention relates to the technical field of image processing, in particular to a user authenticable outsourcing image denoising method based on privacy protection.
Background
At present, computer vision technology has been widely applied in the fields of image classification, object detection, semantic segmentation, and the like. In these fields, there is a certain requirement on image quality, but in reality, digital images obtained by interference of the imaging device itself or many external environments are often noisy, and if the noisy images are directly used as samples for research, the research results may be negatively affected. Therefore, before image processing, a denoising preprocessing operation is often required to be performed on the sample image to obtain sample data with higher quality.
In recent years, with the popularization of mobile imaging devices such as smart phones and digital cameras and the rapid development of multimedia technologies, the number of images has increased explosively, which brings great challenges to image storage and processing for users with limited resources. In recent years, cloud computing and services thereof are widely applied to many fields, are generally accepted and used by people, and also bring great commercial value to cloud computing service providers. The global public cloud services market promulgated in Gartner is predicted to grow by 17% by 2020, with a total of 2664 billion dollars, higher than 2227 billion dollars in 2019. The cloud computing technology solves the problem of resource limitation of users, and the cost of large-scale data storage and processing is greatly reduced by means of self mass storage and strong computing capacity. In this case, users tend to send their multimedia data to cloud computing for storage and processing. But the problem is that the storage position of the external packet data and whether the data is lost or even tampered are unknown to the user, which is easy to cause the user to worry about the data privacy security. Encrypting data directly with a conventional encryption algorithm prior to outsourcing is a common method of ensuring confidentiality of data. However, it may prevent further processing of the encrypted data, such as image denoising. A simple scheme for denoising secure images is: downloading the encrypted noisy image, locally decrypting the encrypted noisy image into a plaintext noisy image, and then directly performing denoising operation by using a denoising method. However, such operations may increase the computational cost and communication overhead for the user. Therefore, it is very important to directly denoise the ciphertext image without revealing the privacy of the user.
Recently, signal processing on data of encrypted text and images has become a popular research field, and various research branches such as ciphertext image sharing, text searchable encryption, ciphertext domain image retrieval, ciphertext domain invertible information hiding, and the like have been successively appeared. Relatively, there is relatively little research on secure image denoising on ciphertext images. The existing ciphertext domain image denoising methods mainly comprise three types, the first type is based on a secret sharing technology, the representative method is a safe wavelet denoising method based on secret sharing provided in Saghaian, but threshold normalization after each multiplication operation can be completed only by mutual communication of related parties, and the calculation and communication cost of a user can be increased; the second method is based on a secure multi-party computing technology, and the representative is that Pedrouzo-Ulloa et al provides a wavelet denoising scheme based on lattice codes, which solves the homomorphic computing problem of single-round filtering and threshold operation, but has low efficiency in the non-local mean image denoising algorithm. Another work is Zheng et al [4] proposed to utilize an external cloud database to assist image security denoising, the scheme is based on two cloud servers, one for storing an encrypted image block database, and the other for generating a garbled circuit and sending it to the image cloud database to perform comparison operations. For a large image database, the communication load between the servers is quite huge. The third kind is based on homomorphic encryption technology, and its representative work is Hu et al propose a dual-coding scheme based on Paillier additive homomorphism and JL distance preserving transformation to perform non-local image denoising. However, the introduction of the Paillier public key encryption system easily causes the expansion of ciphertext data and the increase of computation complexity. In addition, in the scheme, the pixel weight requires that the user side performs the JL transformation operation in advance, which is easy to affect the denoising precision and the user experience. Based on the scheme, Hu et al further provides a random non-local mean denoising algorithm based on double servers. Compared with the first scheme, the scheme reduces ciphertext expansion and reduces communication overhead of the user and the cloud server. However, in the new scheme, the JL transformation still needs to be performed by the user side, and the user needs to interact with two cloud servers in the denoising process.
The above three types of ciphertext denoising schemes are all based on a cloud server (see fig. 1), which easily causes processing time delay and high network bandwidth requirements, and affects user experience. In addition, the existing scheme does not consider the problem of outsourced certification for the user to perform authorization and revocation operations from the viewpoint of the practicability of the system. Currently, a feasible method is still lacked in the field, and a low-delay user-certifiable outsourced image denoising scheme for privacy protection can be supported.
Disclosure of Invention
In view of the above, the present invention provides a user certifiable outsourced image denoising method based on privacy protection, which ensures the security of user privacy data and provides an image denoising service; and the local calculation and communication overhead of the user is reduced, and the ciphertext denoising effect is almost equal to the performance of a plaintext domain.
The invention is realized by adopting the following scheme: a user authenticable outsourcing image denoising method based on privacy protection comprises a trusted third party TTP, a content owner CO, an authorized user AU and a first edge computing server ES1A second edge computing server ES2The method comprises the following steps:
step S1: the trusted third party TTP gives the content owner CO, the authorized user AU and the two edge computing servers ES1、ES2Distributing the related keys;
step S2: the content owner CO first encrypts the noisy image using a key assigned by the trusted third party TTP and sends the encrypted image to the first edge computing server ES1(ii) a Second edge compute server ES2Assisting a first edge computing server ES1The ciphertext image is denoised, and the result obtained by calculation is sent to a first edge calculation server ES1
Step S3: the authorized user AU makes an image use request to the corresponding content owner CO, andcomputing a server ES from a first edge1And acquiring a corresponding de-noised ciphertext image, and authorizing the AU to decrypt and recover the required plaintext de-noised image under the help of a private key of the AU.
Further, step S1 is specifically: the trusted third party TTP generates a master key k and assigns its private key k to the data owner COCOAssigning its private key k to an authorized user AUAUTo the first edge computing server ES1Assign its private key k'CO
Figure BDA0002362093570000021
k′AUTo the second edge compute server ES2Distributing its private key
Figure BDA0002362093570000022
Wherein the private key satisfies: k is a radical ofCO·k′CO=k、
Figure BDA0002362093570000023
Figure BDA0002362093570000024
k′AU·kAUK and
Figure BDA0002362093570000025
further, the step S2 specifically includes the following steps:
step S21: the content owner CO assigns to it a key k according to the TTPCOFor own image { I1,I2,...,IMEncrypting one by one, wherein the size of the image is mxn; let a given picture be It(t ∈ { 1.,. M }), whose pixel is denoted vt(i, j), wherein i ∈ {1, 2.., m }, j ∈ {1, 2.., n }, and (i, j) represents a position of a pixel in a corresponding image; v. oft(i, j) the encrypted data is marked as ct(i, j), the encryption process is shown as formula (1):
Figure BDA0002362093570000026
in the formula, x1,...,xgThe value of (d) is obtained by the Chinese remainder theorem, diag (v)t(i,j),x1,...,xg) Is formed by g +1 variables vt(i,j),x1,...,xgThe formed diagonal matrix;
step S22: after the data owner CO has encrypted all the images, the encrypted noisy images are uploaded to a first edge computing server ES1Before this step is completed, the data owner CO calculates the server ES for the first edge1The service request sent out has two forms, one is a request for only storing and processing images which are unwilling to share, the other is a request for carrying out ciphertext denoising processing and user authorization verification on images which are willing to share, the former case does not carry out any processing, and for the latter case, when the authorization verification of an authorized user passes, the first edge computing server ES1Key k 'distributed by TTP side'COThe encrypted uploaded image is further processed, i.e. re-encrypted into another ciphertext form Ct(i, j), namely:
Figure BDA0002362093570000031
at this time Ct(i, j) is vt(i, j) the data encrypted by the key k has a corresponding key transformation mechanism as shown in equation (3):
Figure BDA0002362093570000032
the square of the euclidean distance in the image ciphertext state is further calculated by equation (3): for ciphertext image ItPixel v oft(i, j) -centric search window Nt(i, j), and by pixel vt(a, b) centered neighborhood window Nt(a, b) where the window size d × d, the ciphertext E (Dist (N) of the square of the Euclidean distance between them is calculatedt(i,j),Nt(a, b)), k) is as shown in equation (4):
Figure BDA0002362093570000033
again, by the cryptographic algorithm used in the system having additive and multiplicative homomorphism, i.e. satisfying equations (5) and (6), equation (4) is further reduced to equation (7):
E(m1,k)+E(m2,k)=E(m1+m2,k); (5)
E(m1,k)·E(m2,k)=E(m1·m2,k); (6)
Figure BDA0002362093570000034
step S23: first edge calculation Server ES in equation (7)1The Euclidean distance square of the similar block pixel under the encryption of the main key k can be obtained, and at the moment, the first edge computing server ES1By another private key of its own
Figure BDA0002362093570000035
The ciphertext data is subjected to similarity transformation into the calculation result of equation (8), and the second edge calculation server ES2Has a key of ES1
Figure BDA0002362093570000041
And then the square value of the plain text Euclidean distance is obtained, and the steps are as the following formula (9):
Figure BDA0002362093570000042
Figure BDA0002362093570000043
in the formula (I), the compound is shown in the specification,
Figure BDA0002362093570000044
is a similarity transformation function that satisfies the relationship: if there is any ciphertext as C ═ E (x, k), then
Figure BDA0002362093570000045
(·)00Taking a first element of the matrix;
step S24: the second edge computing server ES2 obtains the similar weight value w according to the plain text Euclidean distance of the similar pixel blockst((i, j), (a, b)), where wt((i, j), (a, b)) represents the weights of two similar pixels of the pixel in the ith row and the jth column and the pixel in the a row and the b column, and the weight value w in the ciphertext state is obtained according to the formulas (10) and (11)t((i,j),(a,b)):
Figure BDA0002362093570000046
Figure BDA0002362093570000047
In the formula, | · the luminance | |2Is the euclidean distance, h is the coefficient used to control the attenuation of the weights, Ω is the similar pixel search window; second edge compute server ES2After obtaining the weight values of the similar pixel blocks, the server ES is calculated for preventing the first edge1The weight value in the plaintext can be obtained, and the encryption processing is carried out:
Figure BDA0002362093570000048
wherein A is a scaling factor;
step S25: second edge compute server ES2Sending the weighted value in the ciphertext state to the first edge computing server ES1(ii) a Then ES1Performs re-encryption, i.e. calculates equation (13), second edge calculation server ES2After key conversion, a weighted value ciphertext encrypted by the main key is obtainedFormula (14):
Figure BDA0002362093570000049
E(A·wt((i,j),(a,b)),k)=k-1·diag(A·wt((i,j),(a,b)),x1,...,xg)·k; (14)
step S26: when obtaining the weight value of the encrypted main key k, the first edge computing server ES1Can encrypt the image ItPerforming non-local mean filtering processing, so as to complete the denoising operation, as shown in equation (15):
Figure BDA0002362093570000051
further, in step S23, the second edge calculation server ES2After obtaining the distance in the ciphertext state of equation (8), performing key transformation to obtain the squared Euclidean distance in the plaintext state, as equation (9), which is the pair of ES2In other words, the approximate outline of the image can be derived by a method in which the first edge computing server ES takes into account such unsafe factors1Randomly selecting cipher text pixels to form a plurality of blocks, calculating the square of the Euclidean distance of cipher texts between the blocks by using a formula (7), using the square as noise to cover the real cipher text distance between the blocks, wherein the additional Euclidean distance only has a first edge to calculate the server ES1It is known that even ES2The distance in the plaintext can be obtained, and the true statistical distribution of the original Euclidean distance square value can not be estimated.
Further, step S3 is specifically: first edge compute server ES1And (3) carrying out data similarity transformation on the denoised ciphertext image, as shown in a formula (16), and then returning to a corresponding authorized user AU:
Figure BDA0002362093570000052
AU of authorized user using its correspondenceKey k ofAUAnd finally decrypting to recover the required plaintext de-noised image, namely:
Figure BDA0002362093570000053
in the formula (I), the compound is shown in the specification,
Figure BDA0002362093570000054
representing an image ItThe plaintext pixel values at location (i, j) after denoising.
Further, when the authorized user AU is a plurality of users with different levels, each user is assigned an id number, and q levels are set, that is, the vip1,vip2,...,vipqWhen an authorized user AU submits a de-noising service request, the first edge calculation server ES1Firstly, verifying the access authority of a user, and if the user passes the verification, executing denoising service of a corresponding level; if not, ES1The service will be denied.
Further, the authorization verification specifically includes:
step SA: assignment of kappa to content owner CO by trusted third party TTPCOAssigning kappa to authorized user AUAU、κ′AUTo the first edge computing server ES1Dispensing
Figure BDA0002362093570000055
And meets the requirements that: kappaCO·κAU=κ、
Figure BDA0002362093570000056
Figure BDA0002362093570000057
Step SB: AU submission (id) of authorized userAU,vipAU) Requesting the corresponding content owner for the right to use the image, if the data owner CO agrees with the user, a plaintext certificate T ═ CO, id, will be generated for the authorized user AUAU,vipAU) And use the private informationKey kappaCOThe certificate is encrypted, as in formula (18), d is recorded
Figure BDA0002362093570000061
Finally, the data owner CO respectively sends the plaintext version and the ciphertext version of the certificate to the first edge computing server ES1And an authorized user AU:
Figure BDA0002362093570000062
step SC: when an AU is authorized to obtain credentials
Figure BDA0002362093570000063
Then, use the private key κAUIt is encrypted again, i.e.:
Figure BDA0002362093570000064
at this time, the authorized user AU needs to perform similarity transformation once, and the specific process is as shown in equation (20):
Figure BDA0002362093570000065
finally, the authorized user AU will send to the first edge computing server ES1And a denoising service image use application is provided for the application;
step SD: when the first edge calculates the server ES1Using the key upon receiving a user request
Figure BDA0002362093570000066
To pair
Figure BDA0002362093570000067
Performing decryption operation, specifically as formula (21):
Figure BDA0002362093570000068
if the result of the calculation of the formula (21) is completed and the certificate
Figure BDA0002362093570000069
If the AU is equal to the AU, the AU is authorized to pass the user authority verification and enjoy the denoising service right; if the results are not equal, the first edge computing server ES1The current user cannot be authorized, i.e. the user cannot enjoy the denoising service, and the verification process is ended.
Further, if the data owner CO wants to perform outsource revocation certification, the method includes the following steps:
step SA: trusted third party TTP will upsilonCOIs distributed to the data owner CO, will
Figure BDA00023620935700000610
ES assigned to first edge computing server1Will be
Figure BDA00023620935700000611
To the second edge compute server ES 2; and meets the requirements of:
Figure BDA00023620935700000612
Figure BDA00023620935700000613
step SB: the data owner CO collects information of users who are not using the resource illegally and generates a corresponding certificate R ═ CO, rev, idAU,vipAU) Where rev denotes a revocation operation, the data owner CO then uses its own key vCOThe encryption certificate R is represented by formula (22):
Figure BDA00023620935700000614
the data owner CO converts the plaintext version R and the ciphertext version of the certificate
Figure BDA00023620935700000615
Respectively sent to a first edge computing server ES1And a second edge computing server ES2
Step SC: when receiving the withdrawal request, the second edge computing server ES2To pair
Figure BDA00023620935700000616
And carrying out encryption again, namely:
Figure BDA0002362093570000071
at this time, the second edge computing server ES2A similarity transformation is required, as shown in equation (24):
Figure BDA0002362093570000072
second edge compute server ES2Will be provided with
Figure BDA0002362093570000073
Send to the first edge computing server ES1In the private key
Figure BDA0002362093570000074
Assisted first edge compute server ES1And executing decryption operation, specifically as (25):
Figure BDA0002362093570000075
by comparison
Figure BDA0002362093570000076
And R, a first edge computing server ES1The revocation validity can be judged, and if the revocation validity is equal, the first edge computing server ES1Performing a revocation operation on the corresponding user; if the results are not equal, the first edge computing server ES1Continue to respond to the de-noising service enjoyed on the user's certificate content.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention requires no interaction between the server and the user. In the scheme of the invention, the image content owner only needs to complete the encryption operation of the image locally, and the denoising work is completed by the edge computing server with more outstanding performance advantages, thereby being convenient for the image content owner.
2. The invention has low noise removing precision loss. In the scheme of the invention, JL transformation operation is not needed, the denoising precision loss is reduced, and the denoising effect is basically the same as that of a plaintext domain.
3. The invention supports multi-user multi-key management, and designs a novel key conversion protocol. It allows different users to have their own keys, greatly enhancing system security.
4. Low computation delay and low broadband cost. The invention introduces the edge calculation technology, reduces the intermediate transmission process and improves the overall processing efficiency of the system; in the scheme, the edge calculation nearby processing does not need to exchange data with a cloud server, and the requirement of a user network broadband is reduced.
5. The invention also includes a user authorization and decommissioning mechanism. Based on a key conversion mechanism, the invention designs a safe user authorization and revocation outsourceable mechanism, which is suitable for multi-level multi-user scenes. It allows the server to authenticate correctly users performing different levels of authorization without knowledge of the plaintext content; and simultaneously, the server is allowed to execute denoising service revocation operation on the user specified by the image content owner.
Drawings
FIG. 1 is a prior art ciphertext domain denoising framework.
Fig. 2 is a basic structure of ciphertext domain denoising in the embodiment of the present invention.
FIG. 3 is a block diagram of the overall framework for ciphertext domain denoising according to the embodiment of the present invention.
Fig. 4 illustrates a mechanism for outsourced authentication for authorization and revocation of multi-level and multi-user in an embodiment of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure herein. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As shown in fig. 2 and fig. 3, the present embodiment provides a user authenticatable outsourcing image denoising method based on privacy protection, including a trusted third party TTP, a content owner CO, an authorized user AU, and a first edge computing server ES1A second edge computing server ES2The method comprises the following steps:
step S1: the trusted third party TTP gives the content owner CO, the authorized user AU and the two edge computing servers ES1、ES2Distributing the related keys;
step S2: the content owner CO first encrypts the noisy image using a key assigned by the trusted third party TTP and sends the encrypted image to the first edge computing server ES1(ii) a Second edge compute server ES2Assisting a first edge computing server ES1The ciphertext image is denoised, and the result obtained by calculation is sent to a first edge calculation server ES1(ii) a While the process is generated, all the user authorization certificates and corresponding ciphertext data which are allowed to be accessed are uploaded to the first edge computing server ES1
Step S3: the authorized user is equivalent toThe consumer of the system, who needs a sufficiently clear set of images for experimental or commercial use. The authorized user AU will therefore make an image use request to the corresponding content owner CO and calculate the server ES from the first edge1And acquiring a corresponding de-noised ciphertext image, and authorizing the AU to decrypt and recover the required plaintext de-noised image under the help of a private key of the AU.
In the present embodiment, the first edge computing server ES1The method mainly responds to a storage or denoising processing request of a content owner, and provides a storage process, denoising calculation and a denoising result for the content owner. Furthermore, the first edge computing server ES1And the system is responsible for responding to the validity verification of the access right of the user. Second edge compute server ES2Is responsible for assisting the edge computing server 1 to carry out ciphertext image denoising, and the result obtained by computing is sent to the first edge computing server ES1
In this embodiment, the TTP calculates and distributes keys belonging to its own according to the number of authorized users and edge computing servers, so that the use of independent keys greatly improves the security of the system. Specifically, at the beginning of the system, the TTP allocates corresponding keys to the content owner, the authorized user, and the edge computing server, as shown in (r) of fig. 3, step S1 specifically includes: the trusted third party TTP generates a master key k and assigns its private key k to the data owner COCOAssigning its private key k to an authorized user AUAUThe first edge compute server ES1 is assigned its private key k'CO
Figure BDA0002362093570000081
To the second edge compute server ES2Distributing its private key
Figure BDA0002362093570000082
Wherein the private key satisfies: k is a radical ofCO·k′CO=k、
Figure BDA0002362093570000083
Figure BDA0002362093570000084
And
Figure BDA0002362093570000085
k is the private key of TTP, CO, ES1、ES2AU cannot acquire the key k. The private keys are TTP distributed to CO and ES through a secure channel1、ES2、AU。
In this embodiment, the step S2 specifically includes the following steps:
step S21: like that in fig. 3, the content owner CO assigns to it a key k according to the TTPCOFor own image { I1,I2,...,IMEncrypting one by one, wherein the size of the image is mxn; let a given picture be It(t ∈ { 1.,. M }), whose pixel is denoted vt(i, j), wherein i ∈ {1, 2.., m }, j ∈ {1, 2.., n }, and (i, j) represents a position of a pixel in a corresponding image; v. oft(i, j) the encrypted data is marked as ct(i, j), the encryption process is shown as formula (1):
Figure BDA0002362093570000091
in the formula, x1,...,xgThe value of (d) is obtained by the Chinese remainder theorem, diag (v)t(i,j),x1,...,xg) Is formed by g +1 variables vt(i,j),x1,...,xgThe formed diagonal matrix;
step S22: as shown in fig. 3, after the data owner CO encrypts all the images, the encrypted noisy images are uploaded to the first edge computing server ES1Before this step is completed, the data owner CO calculates the server ES for the first edge1The service request sent out has two forms, one is a request for only storing and processing images which are unwilling to share, the other is a request for carrying out ciphertext denoising processing and user authorization verification on images which are willing to share, the former condition is not processed, and for the latter condition, after the authorization verification of an authorized user is passed, the second condition isAn edge computing server ES1Key k 'distributed by TTP side'COThe encrypted uploaded image is further processed, i.e. re-encrypted into another ciphertext form Ct(i, j), namely:
Figure BDA0002362093570000092
at this time Ct(i, j) is vt(i, j) the data encrypted by the key k has a corresponding key transformation mechanism as shown in equation (3):
Figure BDA0002362093570000093
the square of the euclidean distance in the image ciphertext state is further calculated by equation (3): for ciphertext image ItC is the pixel vt(i, j) -centric search window Nt(i, j), and by pixel vt(a, b) centered neighborhood window Nt(a, b) where the window size d × d, the ciphertext E (Dist (N) of the square of the Euclidean distance between them is calculatedt(i,j),Nt(a, b)), k) is as shown in equation (4):
Figure BDA0002362093570000094
again, by the cryptographic algorithm used in the system having additive and multiplicative homomorphism, i.e. satisfying equations (5) and (6), equation (4) is further reduced to equation (7):
E(m1,k)+E(m2,k)=E(m1+m2,k); (5)
E(m1,k)·E(m2,k)=E(m1·m2,k); (6)
Figure BDA0002362093570000101
here, the calculation of the squared euclidean distance can be outsourced to any party who does not know the secret key because all steps are performed in the ciphertext state and the calculating party cannot obtain any plaintext information without the secret key.
Step S23: as of (r) in FIG. 3, the first edge calculation Server ES in equation (7)1The Euclidean distance square of the similar block pixel under the encryption of the main key k can be obtained, and at the moment, the first edge computing server ES1By another private key of its own
Figure BDA0002362093570000102
The ciphertext data is subjected to similarity transformation into the calculation result of equation (8), and the second edge calculation server ES2Has a first electrode and an ES1The corresponding key is
Figure BDA0002362093570000103
And then the square value of the plain text Euclidean distance is obtained, and the steps are as the following formula (9):
Figure BDA0002362093570000104
Figure BDA0002362093570000105
in the formula (I), the compound is shown in the specification,
Figure BDA0002362093570000106
is a similarity transformation function that satisfies the relationship: if there is any ciphertext as C ═ E (x, k), then
Figure BDA0002362093570000107
(·)00Taking a first element of the matrix;
step S24: second edge compute server ES2Obtaining similar weight value w according to plaintext Euclidean distance of similar pixel blockst((i, j), (a, b)), where wt((i, j), (a, b)) indicates the weights of two similar pixels of the pixel in the ith row and j column and the pixel in the a row and b column,obtaining the weighted value w in the ciphertext state according to the formulas (10) and (11)t((i,j),(a,b)):
Figure BDA0002362093570000108
Figure BDA0002362093570000111
The denoising algorithm adopted by the embodiment is a non-local mean denoising algorithm in a plain text domain. In the formula, | · the luminance | |2Is the euclidean distance, h is the coefficient used to control the attenuation of the weights, Ω is the similar pixel search window; second edge compute server ES2After obtaining the weight values of the similar pixel blocks, the server ES is calculated for preventing the first edge1The weight value in the plaintext can be obtained, and the encryption processing is carried out:
Figure BDA0002362093570000112
wherein A is a scaling factor; the encryption algorithm employed here is based on large integers, so the ES2Before encryption, integer preprocessing needs to be performed on the weight value, namely multiplying by a scaling factor A. Obviously, a certain error is introduced in the process, and certainly, selecting a sufficiently large a is a simple and effective solution, but in order to enable the experiment to decrypt a correct denoising value, a needs to satisfy a < 2N/28Where N is the number of bits of the encryption key. Generally, the value of a cannot be too large or too small, and a relatively suitable value needs to be selected according to actual conditions
Step S25: e.g., # in FIG. 3, the second edge compute server ES2Sending the weighted value in the ciphertext state to the first edge computing server ES1(ii) a Then ES1Performs re-encryption, i.e. calculates equation (13), second edge calculation server ES2After key conversion, a weighted value ciphertext encrypted by the master key is obtainedAs shown in formula (14):
Figure BDA0002362093570000113
E(A·wt((i,j),(a,b)),k)=k-1·diag(A·wt((i,j),(a,b)),x1,...,xg)·k; (14)
step S26: when the weight value of the encrypted master key k is obtained, the first edge computing server ES1Can encrypt the image ItPerforming non-local mean filtering processing, so as to complete the denoising operation, as shown in equation (15):
Figure BDA0002362093570000114
in the present embodiment, in step S23, the second edge calculation server ES2After obtaining the distance in the ciphertext state of equation (8), performing key transformation to obtain the squared Euclidean distance in the plaintext state, as equation (9), which is the pair of ES2In other words, the approximate outline of the image can be derived by a method in which the first edge computing server ES takes into account such unsafe factors1Randomly selecting cipher text pixels to form a plurality of blocks, calculating the square of the Euclidean distance of cipher texts between the blocks by using a formula (7), using the square as noise to cover the real cipher text distance between the blocks, wherein the additional Euclidean distance only has a first edge to calculate the server ES1It is known that even ES2The distance in the plaintext can be obtained, and the true statistical distribution of the original Euclidean distance square value can not be estimated.
In this embodiment, as shown in fig. 3 c and b, step S3 specifically includes: first edge compute server ES1And (3) carrying out data similarity transformation on the denoised ciphertext image, as shown in a formula (16), and then returning to a corresponding authorized user AU:
Figure BDA0002362093570000121
authorized user AU uses its corresponding key kAUAnd finally decrypting to recover the required plaintext de-noised image, namely:
Figure BDA0002362093570000122
in the formula (I), the compound is shown in the specification,
Figure BDA0002362093570000123
representing an image ItThe plaintext pixel values at location (i, j) after denoising. In the process of equation (12), the quantization process is introduced in this embodiment, so that when the authorized user decrypts, we need to perform inverse quantization operation, and the steps and quantization process are inverse.
In this embodiment, in a real multi-level and multi-user system, when the authorized user AU is a plurality of users with different levels, each user is assigned an id number, and q levels, that is, vip, exist1,vip2,...,vipqThe service enjoyed by each different level of users is defined to be different, and is mainly embodied in the number of the denoised images which can be owned at one time and the time period which can be owned with the denoised service, such as: vip1The user can be allowed to have the number of the denoised images within 2000 at a time, and the time period for having the denoising service can be allowed to: 20191201- - -20200110.
As shown in the upper part of FIG. 4, assuming that the CO has many images available for experiment, he would like to earn profit in the form of sharing images to users of different levels, but since these digital images are noisy due to imaging equipment or external environmental interference and his own computing resources are limited, he would choose to outsource denoising operations and authorize certifications to the ES1. When an authorized user AU submits a de-noising service request, a first edge calculation server ES1Firstly, verifying the access authority of a user, and if the user passes the verification, executing denoising service of a corresponding level; if not, ES1The service will be denied.
In this embodiment, the authorization verification specifically includes:
step SA: trusted third party TTP assigns kappa to content owner COCOAssigning kappa to authorized user AUAU、κ′AUTo the first edge computing server ES1Dispensing
Figure BDA0002362093570000124
And meets the requirements that: kappaCO·κAU=κ、
Figure BDA0002362093570000125
Figure BDA0002362093570000126
Step SB: AU submission (id) of authorized userAU,vipAU) Requesting the corresponding content owner for the right to use the image, if the data owner CO agrees with the user, a plaintext certificate T ═ CO, id, will be generated for the authorized user AUAU,vipAU) And using the private key kCOThe certificate is encrypted, as in formula (18), d is recorded
Figure BDA0002362093570000127
Finally, the data owner CO respectively sends the plaintext version and the ciphertext version of the certificate to the first edge computing server ES1And an authorized user AU:
Figure BDA0002362093570000128
step SC: when an AU is authorized to obtain credentials
Figure BDA0002362093570000129
Then, use the private key κAUIt is encrypted again, i.e.:
Figure BDA0002362093570000131
at this time, the authorized user AU needs to perform similarity transformation once, and the specific process is as shown in equation (20):
Figure BDA0002362093570000132
finally, the authorized user AU will send to the first edge computing server ES1And a denoising service image use application is provided for the application;
step SD: when the first edge calculates the server ES1Using the key upon receiving a user request
Figure BDA0002362093570000133
To pair
Figure BDA0002362093570000134
Performing a decryption operation, specifically as in formula (21):
Figure BDA0002362093570000135
if the result of the calculation of the formula (21) is completed and the certificate
Figure BDA0002362093570000136
If the AU is equal to the AU, the AU is authorized to pass the user authority verification and enjoy the denoising service right; if the results are not equal, the first edge computing server ES1The current user cannot be authorized, i.e. the user cannot enjoy the denoising service, and the verification process is ended.
As shown in the lower half of fig. 4, the present embodiment is divided into two cases regarding the revocation case. (I) In order to save the cost, part of users may temporarily decide to cancel the denoising service. In this case, the scheme of this embodiment allows the user to propose a service revocation application to the CO, and the specific implementation of the subsequent revocation process can refer to the outsourcing authorization authentication process; (II), there are actually some users who, in order to earn their own interest, may not agree by CO to be from ES1The acquired denoised image is illegally utilized and widely spread. Thus, the present embodiment allows the CO to have the right to force termination of cooperation with a malicious user,meanwhile, in consideration of the convenience of the CO, an outsource revocation certification mechanism is designed to guarantee the rights and interests of the CO, and in this embodiment, if the data owner CO needs to perform outsource revocation certification, the method includes the following steps:
step SA: trusted third party TTP will upsilonCOIs distributed to the data owner CO, will
Figure BDA0002362093570000137
ES assigned to first edge computing server1Will be
Figure BDA0002362093570000138
ES assigned to the second edge compute server2(ii) a And meets the requirements that:
Figure BDA0002362093570000139
Figure BDA00023620935700001310
step SB: the data owner CO collects information of users who are not using the resource illegally and generates a corresponding certificate R ═ CO, rev, idAU,vipAU) Where rev denotes a revocation operation, the data owner CO then uses its own key vCOThe encryption certificate R is represented by formula (22):
Figure BDA00023620935700001311
the data owner CO sends the plaintext version R and the ciphertext version of the certificate
Figure BDA00023620935700001312
Respectively sent to a first edge computing server ES1And a second edge computing server ES2
Step SC: when receiving the withdrawal request, the second edge computing server ES2For is to
Figure BDA00023620935700001313
Is encrypted again to obtain:
Figure BDA00023620935700001314
At this time, the second edge computing server ES2A similarity transformation is required, as shown in equation (24):
Figure BDA0002362093570000141
second edge compute server ES2Will be provided with
Figure BDA0002362093570000142
Send to the first edge computing server ES1In the private key
Figure BDA0002362093570000143
Assisted first edge compute server ES1And executing decryption operation, specifically as (25):
Figure BDA0002362093570000144
by comparison
Figure BDA0002362093570000145
And R, a first edge computing server ES1The revocation validity can be judged, and if the revocation validity is equal, the first edge computing server ES1Performing a revocation operation on the corresponding user; if the results are not equal, the first edge computing server ES1Continue to respond to the de-noising service enjoyed on the user's certificate content.
The foregoing is directed to preferred embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow. However, any simple modification, equivalent change and modification of the above embodiments according to the technical essence of the present invention will still fall within the protection scope of the technical solution of the present invention.

Claims (7)

1. A user authenticable outsourcing image denoising method based on privacy protection is characterized by comprising a trusted third party TTP, a content owner CO, an authorized user AU and a first edge computing server ES1A second edge computing server ES2The method comprises the following steps:
step S1: the trusted third party TTP gives the content owner CO, the authorized user AU and the two edge computing servers ES1、ES2Distributing the related keys;
step S2: the content owner CO first encrypts the noisy image using a key assigned by the trusted third party TTP and sends the encrypted image to the first edge computing server ES1(ii) a Second edge compute server ES2Assisting a first edge computing server ES1The ciphertext image is denoised, and the result obtained by calculation is sent to a first edge calculation server ES1
Step S3: the authorized user AU makes an image use request to the corresponding content owner CO and calculates a server ES from a first edge1Acquiring a corresponding de-noised ciphertext image, and authorizing a user AU to decrypt and recover the required plaintext de-noised image under the help of a private key of the user AU;
the step S2 specifically includes the following steps:
step S21: the content owner CO assigns to it a key k according to the TTPCOFor own image { I1,I2,...,IMEncrypting one by one, wherein the size of the image is mxn; let a given picture be It(t ∈ { 1.,. M }), whose pixel is denoted vt(i, j), wherein i ∈ {1, 2.., m }, j ∈ {1, 2.., n }, and (i, j) represents a position of a pixel in a corresponding image; v. oft(i, j) the encrypted data is recorded as ct(i, j), the encryption process is shown as formula (1):
Figure FDA0003502998960000011
in the formula, x1,...,xgThe value of (d) is obtained by the Chinese remainder theorem, diag (v)t(i,j),x1,...,xg) Is formed by g +1 variables vt(i,j),x1,...,xgThe formed diagonal matrix;
step S22: after the data owner CO has encrypted all the images, the encrypted noisy images are uploaded to a first edge computing server ES1Before this step is completed, the data owner CO calculates the server ES for the first edge1The service request sent out has two forms, one is a request for only storing and processing images which are unwilling to share, the other is a request for carrying out ciphertext denoising processing and user authorization verification on images which are willing to share, the former case does not carry out any processing, and for the latter case, when the authorization verification of an authorized user passes, the first edge computing server ES1Key k 'distributed by TTP side'COThe encrypted uploaded image is further processed, i.e. re-encrypted into another ciphertext form Ct(i, j), namely:
Figure FDA0003502998960000012
at this time Ct(i, j) is vt(i, j) the data encrypted by the key k has a corresponding key transformation mechanism as shown in equation (3):
Figure FDA0003502998960000021
the square of the euclidean distance in the image ciphertext state is further calculated by equation (3): for ciphertext image ItPixel v oft(i, j) -centric search window Nt(i, j), and by pixel vt(a, b) centered neighborhood window Nt(a, b) wherein the window size d x d, calculated between themCipher text E (Dist (N) of Euclidean distance squaret(i,j),Nt(a, b)), k) is as shown in equation (4):
Figure FDA0003502998960000022
again, by the cryptographic algorithm used in the system having additive and multiplicative homomorphism, i.e. satisfying equations (5) and (6), equation (4) is further reduced to equation (7):
E(m1,k)+E(m2,k)=E(m1+m2,k); (5)
E(m1,k)·E(m2,k)=E(m1·m2,k); (6)
Figure FDA0003502998960000023
step S23: first edge calculation Server ES in equation (7)1The Euclidean distance square of the similar block pixel under the encryption of the main key k can be obtained, and at the moment, the first edge computing server ES1By another private key of its own
Figure FDA0003502998960000024
The ciphertext data is subjected to similarity transformation into the calculation result of equation (8), and the second edge calculation server ES2Has a first electrode and an second electrode1The corresponding key is
Figure FDA0003502998960000025
And then the square value of the plain text Euclidean distance is obtained, and the steps are as the following formula (9):
Figure FDA0003502998960000031
Figure FDA0003502998960000032
in the formula (I), the compound is shown in the specification,
Figure FDA0003502998960000033
is a similarity transformation function that satisfies the relationship: if there is any ciphertext as C ═ E (x, k), then
Figure FDA0003502998960000034
(·)00Taking a first element of the matrix;
step S24: second edge compute server ES2Obtaining similar weight value w according to plaintext Euclidean distance of similar pixel blockst((i, j), (a, b)), where wt((i, j), (a, b)) represents the weights of two similar pixels of the pixel in the ith row and the jth column and the pixel in the a row and the b column, and the weight value w in the ciphertext state is obtained according to the formulas (10) and (11)t((i,j),(a,b)):
Figure FDA0003502998960000035
Figure FDA0003502998960000036
In the formula, | · the luminance | |2Is the euclidean distance, h is the coefficient used to control the attenuation of the weights, Ω is the similar pixel search window; second edge compute server ES2After obtaining the weight values of the similar pixel blocks, the server ES is calculated for preventing the first edge1The weight value in the plaintext can be obtained, and the encryption processing is carried out:
Figure FDA0003502998960000037
wherein A is a scaling factor;
step S25: second edge compute server ES2Form a ciphertextSending the weight value under the state to a first edge computing server ES1(ii) a Then ES1Performs re-encryption, i.e. calculates equation (13), second edge calculation server ES2After key transformation, a weight value ciphertext encrypted by the master key is obtained according to the formula (14):
Figure FDA0003502998960000038
E(A·wt((i,j),(a,b)),k)=k-1·diag(A·wt((i,j),(a,b)),x1,…,xg)·k; (14)
step S26: when obtaining the weight value of the encrypted main key k, the first edge computing server ES1Can encrypt the image ItPerforming non-local mean filtering processing, so as to complete the denoising operation, as shown in equation (15):
Figure FDA0003502998960000041
2. the method for denoising user authenticatable outsourced images based on privacy protection as claimed in claim 1, wherein the step S1 specifically comprises: the trusted third party TTP generates a master key k and assigns its private key k to the data owner COCOAssigning its private key k to an authorized user AUAUTo the first edge computing server ES1Assign its private key k'CO
Figure FDA0003502998960000042
k′AUTo the second edge computing server ES2Distributing its private key
Figure FDA0003502998960000043
Wherein the private key satisfies: k is a radical ofCO·k′CO=k、
Figure FDA0003502998960000044
k′AU·kAUK and
Figure FDA0003502998960000045
3. the method for denoising user authenticatable outsourcing images based on privacy protection as claimed in claim 1, wherein in step S23, the second edge computing server ES2After obtaining the distance in the ciphertext state of equation (8), performing key transformation to obtain the squared Euclidean distance in the plaintext state, as equation (9), which is the pair of ES2In other words, the approximate outline of the image can be derived by a method in which the first edge computing server ES takes into account such unsafe factors1Randomly selecting cipher text pixels to form a plurality of blocks, calculating the square of the Euclidean distance of cipher texts between the blocks by using a formula (7), using the square as noise to cover the real cipher text distance between the blocks, wherein the additional Euclidean distance only has a first edge to calculate the server ES1It is known that even ES2The distance in the plaintext can be obtained, and the true statistical distribution of the original Euclidean distance square value can not be estimated.
4. The method for denoising user authenticatable outsourced images based on privacy protection as claimed in claim 1, wherein the step S3 specifically comprises: first edge compute server ES1And (3) carrying out data similarity transformation on the denoised ciphertext image, as shown in a formula (16), and then returning to a corresponding authorized user AU:
Figure FDA0003502998960000046
authorized user AU uses its corresponding key kAUAnd finally decrypting to recover the required plaintext de-noised image, namely:
Figure FDA0003502998960000047
in the formula (I), the compound is shown in the specification,
Figure FDA0003502998960000048
representing an image ItThe plaintext pixel values at location (i, j) after denoising.
5. The method as claimed in claim 1, wherein when the authorized user AU is a plurality of users with different levels, each user is assigned an id number, and q levels are provided, that is, vip1,vip2,…,vipqWhen an authorized user AU submits a de-noising service request, the first edge calculation server ES1Firstly, verifying the access authority of a user, and if the user passes the verification, executing denoising service of a corresponding level; if not, ES1The service will be denied.
6. The privacy protection-based user authenticatable outsourcing image denoising method according to claim 5, wherein the authorization verification specifically comprises:
step SA: assignment of kappa to content owner CO by trusted third party TTPCOAssigning kappa to authorized user AUAU、κ′AUTo the first edge computing server ES1Dispensing
Figure FDA0003502998960000051
And meets the requirements that: kappaCO·κAU=κ、
Figure FDA0003502998960000052
Figure FDA0003502998960000053
Step SB: AU submission (id) of authorized userAU,vipAU) Requesting image use right to corresponding content ownerIf the data owner CO agrees with the user, a plaintext certificate T ═ will be generated for the authorized user AU (CO, id)AU,vipAU) And using the private key kCOThe certificate is encrypted, as in equation (18), and is noted
Figure FDA00035029989600000512
Finally, the data owner CO respectively sends the plaintext version and the ciphertext version of the certificate to the first edge computing server ES1And an authorized user AU:
Figure FDA0003502998960000054
step SC: when an AU is authorized to obtain credentials
Figure FDA0003502998960000055
Then, use the private key κAUIt is encrypted again, i.e.:
Figure FDA0003502998960000056
at this time, the authorized user AU needs to perform similarity transformation once, and the specific process is as shown in equation (20):
Figure FDA0003502998960000057
finally, the authorized user AU will send to the first edge computing server ES1And a denoising service image use application is provided for the application;
step SD: when the first edge calculates the server ES1Using the key upon receiving a user request
Figure FDA0003502998960000058
To pair
Figure FDA0003502998960000059
Performing a decryption operation, specifically as in formula (21):
Figure FDA00035029989600000510
if the result of the calculation of the formula (21) is completed and the certificate
Figure FDA00035029989600000511
If the AU is equal to the AU, the AU is authorized to pass the user authority verification and enjoy the denoising service right; if the results are not equal, the first edge computing server ES1The current user cannot be authorized, i.e. the user cannot enjoy the denoising service, and the verification process is ended.
7. The method for denoising the user certifiable outsourcing image based on the privacy protection as claimed in claim 5, wherein if the data owner CO wants to perform outsourcing revocation certification, the method comprises the following steps:
step SA: trusted third party TTP to vCOIs distributed to the data owner CO, will
Figure FDA0003502998960000061
ES assigned to first edge computing server1Will be
Figure FDA0003502998960000062
ES assigned to the second edge compute server2(ii) a And meets the requirements that:
Figure FDA0003502998960000063
Figure FDA0003502998960000064
step SB: the data owner CO collects information of users who are not using the resource illegally and generates a corresponding certificate R ═ CO, rev, idAU,vipAU) Which isWhere rev denotes a revoke operation, the data owner CO then uses its own key vCOThe encryption certificate R is represented by formula (22):
Figure FDA0003502998960000065
the data owner CO converts the plaintext version R and the ciphertext version of the certificate
Figure FDA0003502998960000066
Respectively sent to a first edge computing server ES1And a second edge computing server ES2
Step SC: when receiving the withdrawal request, the second edge computing server ES2To pair
Figure FDA0003502998960000067
And carrying out encryption again, namely:
Figure FDA0003502998960000068
at this time, the second edge computing server ES2A similarity transformation is required, as shown in equation (24):
Figure FDA0003502998960000069
second edge compute server ES2Will be provided with
Figure FDA00035029989600000610
Send to the first edge computing server ES1In the private key
Figure FDA00035029989600000611
Assisted first edge compute server ES1And executing decryption operation, specifically as (25):
Figure FDA00035029989600000612
by comparison
Figure FDA00035029989600000613
And R, a first edge computing server ES1The revocation validity can be judged, and if the revocation validity is equal, the first edge computing server ES1Performing a revocation operation on the corresponding user; if the results are not equal, the first edge computing server ES1Continue to respond to the de-noising service enjoyed on the user's certificate content.
CN202010024855.3A 2020-01-10 2020-01-10 User certifiable outsourcing image denoising method based on privacy protection Active CN111241561B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010024855.3A CN111241561B (en) 2020-01-10 2020-01-10 User certifiable outsourcing image denoising method based on privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010024855.3A CN111241561B (en) 2020-01-10 2020-01-10 User certifiable outsourcing image denoising method based on privacy protection

Publications (2)

Publication Number Publication Date
CN111241561A CN111241561A (en) 2020-06-05
CN111241561B true CN111241561B (en) 2022-05-03

Family

ID=70864652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010024855.3A Active CN111241561B (en) 2020-01-10 2020-01-10 User certifiable outsourcing image denoising method based on privacy protection

Country Status (1)

Country Link
CN (1) CN111241561B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112865958B (en) * 2020-12-31 2023-04-18 北方工业大学 Privacy protection system and method for searching target through Internet of things camera
CN112884662A (en) * 2021-01-05 2021-06-01 杭州国测测绘技术有限公司 Three-dimensional digital map image processing method based on aerial image of aircraft
CN113298030B (en) * 2021-06-16 2022-08-02 福州大学 Lightweight privacy protection outsourcing electroencephalogram signal feature extraction method
CN113435406A (en) * 2021-07-15 2021-09-24 支付宝(杭州)信息技术有限公司 Face recognition method and device for realizing privacy protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282333A (en) * 2018-03-02 2018-07-13 重庆邮电大学 Data safety sharing method under multiple edge node collaboration mode under industrial cloud environment
CN108390876A (en) * 2018-02-13 2018-08-10 西安电子科技大学 Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server
CN108921866A (en) * 2018-07-24 2018-11-30 北京深瞐科技有限公司 A kind of image processing method and system
CN110611667A (en) * 2019-09-02 2019-12-24 深圳市赛梅斯凯科技有限公司 Dynamic position privacy protection method and device in edge computing environment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018026841A1 (en) * 2016-08-01 2018-02-08 Georgia Tech Research Corporation Methods and systems for providing secure mobile edge computing ecosystems
CN109993153B (en) * 2019-04-18 2021-05-11 江苏曲速教育科技有限公司 Artificial intelligence system of going over examination papers based on edge calculation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108390876A (en) * 2018-02-13 2018-08-10 西安电子科技大学 Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server
CN108282333A (en) * 2018-03-02 2018-07-13 重庆邮电大学 Data safety sharing method under multiple edge node collaboration mode under industrial cloud environment
CN108921866A (en) * 2018-07-24 2018-11-30 北京深瞐科技有限公司 A kind of image processing method and system
CN110611667A (en) * 2019-09-02 2019-12-24 深圳市赛梅斯凯科技有限公司 Dynamic position privacy protection method and device in edge computing environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting;Jun Zhou 等;《Computers & Security》;20191102;第1-15页 *
边缘计算的架构、挑战与应用;李林哲 等;《大数据》;20190430;第3-16页 *

Also Published As

Publication number Publication date
CN111241561A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN111241561B (en) User certifiable outsourcing image denoising method based on privacy protection
CN110719158B (en) Edge calculation privacy protection system and method based on joint learning
JP5537032B2 (en) Secure threshold decryption protocol calculation
CN111275202A (en) Machine learning prediction method and system for data privacy protection
US20170134370A1 (en) Enabling single sign-on authentication for accessing protected network services
KR102549337B1 (en) Systems and methods for biometric protocol standards
Torres et al. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data
CN110445751B (en) Distributed information sharing method and system based on re-encryption
CN110012024B (en) Data sharing method, system, equipment and computer readable storage medium
Hussain et al. Secure password transmission for web applications over internet using cryptography and image steganography
US20060129812A1 (en) Authentication for admitting parties into a network
CN114697042A (en) Block chain-based Internet of things security data sharing proxy re-encryption method
CN110266490B (en) Keyword ciphertext generation method and device of cloud storage data
Thangavel et al. An analysis of privacy preservation schemes in cloud computing
Xiong et al. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
Han et al. Biometric-Kerberos authentication scheme for secure mobile computing services
Kumaravelu et al. Computationally efficient and secure anonymous authentication scheme for IoT‐based mobile pay‐TV systems
US9294273B2 (en) Method and system for conditional access to a digital content, associated terminal and subscriber device
Feng et al. Secure outsourced principal eigentensor computation for cyber-physical-social systems
Huang et al. Enhanced authentication for commercial video services
Fatima et al. Secure authentication and key management protocol in cloud computing
CN113328863B (en) Mobile equipment data acquisition method and system based on zero-knowledge proof
US20240095314A1 (en) Distributed Digital Rights Management (DRM) Protection
Zhang et al. CREAMS: Copyrighted cloud media sharing
Geetha Enhance the security of data storage and retrieval in cloud computing through authentication based encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant