CN113206926B - Method for balancing privacy and usability of image based on three-pixel-point encryption - Google Patents
Method for balancing privacy and usability of image based on three-pixel-point encryption Download PDFInfo
- Publication number
- CN113206926B CN113206926B CN202110471730.XA CN202110471730A CN113206926B CN 113206926 B CN113206926 B CN 113206926B CN 202110471730 A CN202110471730 A CN 202110471730A CN 113206926 B CN113206926 B CN 113206926B
- Authority
- CN
- China
- Prior art keywords
- pixel
- domain
- value
- group
- pixel group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000011218 segmentation Effects 0.000 claims description 8
- 230000010354 integration Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000000007 visual effect Effects 0.000 abstract description 5
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a method for balancing image privacy and usability based on three-pixel-point encryption, which comprises the steps of dividing an image into a plurality of pixel blocks, grouping pixels in each pixel block, and grouping every three pixels into one group; after the sum s of the pixel values in the pixel group is obtained, the domain is generated by using s, all the pixel groups in the domain are numbered by using ranksThe function calculates the number SN of the original pixel group; a random number is generated by using the secret key, and the random number is added with the SN to be complemented, namely the encrypted SN, namely the SN is generateden(ii) a By usingFunction solving SNenA corresponding group of pixels in the domain; all pixels in a block of pixels are scrambled and encrypted. The method and the device can keep the accurate thumbnail of the original image in the ciphertext image, so that an image owner can obtain the usability by using the visual information of the ciphertext image.
Description
Technical Field
The invention belongs to the field of privacy protection and image encryption, and particularly relates to a method for balancing image privacy and usability based on three-pixel-point encryption.
Background
With the continuous maturation of digital imaging technology, people have become accustomed to using electronic devices instead of traditional film cameras to capture images. This brings about a number of advantages such as low cost of taking images and what you see is what you get, so that ordinary people can easily take images at hand any time than ever before. These images record our daily lives, and although they enable us to recall at any time when it has happened, they undoubtedly record people's privacy, such as location, religious beliefs, interpersonal relationships. The illegal third party may further use the privacy information to perform privacy reasoning on the owner of the image, or directly use the image to perform AI model training, make a malicious image, and the like.
Meanwhile, the maturity of network infrastructure greatly promotes the development of cloud services. There is an increasing preference to upload pictures of local devices into the cloud due to the low cost, flexible scalability, and high availability of cloud services. This trend brings many benefits to cloud users, however, once the image is uploaded into the cloud, the privacy security of the image can only depend on the reliability of the cloud service provider, which undoubtedly greatly aggravates the privacy concern.
Generally, in order to solve the concern of image privacy, people often adopt a traditional image encryption algorithm to encrypt images. These encryption algorithms encrypt the image into a snowflake-like ciphertext image that does not reveal visual information, thus protecting privacy in the image. However, this is extremely unfriendly to the user. The user selects the cloud service not only because it relieves the pressure of insufficient storage of the local device, but also more importantly because of its ease of use feature. These techniques produce ciphertext images that do not reveal any useful visual information, so that the user must continually download, decrypt the image until the desired one is found, which is extremely time consuming, labor intensive, and time costly for the user. In other words, these techniques force the user to make choices in usability as well as privacy security. For ordinary users, although they know that a lot of privacy exists in the image, they still select the availability of the cloud. This is why there are a number of conventional image encryption algorithms that have been proven to be secure in theory, but have not been applied by the average user on a large scale to protect image privacy on cloud storage to date. Therefore, the method of protecting image privacy cannot be at the expense of the usability of the image.
Several methods to balance image privacy and usability have been proposed in large numbers. These methods can be broadly divided into three categories: image editing and image encryption. Image editing is one of the most common methods to balance privacy and usability. They hide or eliminate possible private information by modifying privacy sensitive areas in the image, but retain most of the visual information in the image. The methods mainly include image filtering, face de-identity recognition, object removal and object replacement. Such methods have been widely used in social networks and have achieved satisfactory results. However, they are not suitable for use on cloud storage, where the main purpose is to preserve the image, since most of these methods are irreversible damage to the image. While this damage can be mitigated by cropping only a small area in the image, the unprocessed background can expose too much complete semantic information. Image encryption refers to encoding image data in some way based on a key in order to make the image unintelligible, which is currently one of the most common means of ensuring image privacy during storage and transmission. The security of this method depends on the key used, in particular, a third party without the key can only see the encoded image, only the legitimate user with the correct key can see the original image. Although generally, the conventional image encryption method only considers the privacy security of the image and does not consider the usability brought by the image understandability, some more novel research works also consider the usability after the image encryption, such as ciphertext image retrieval and region-of-interest encryption. However, they have some common problems. If only a part of the area of the image is encrypted, how to distinguish the areas that should be encrypted, even if this problem is assumed to be solved, the unencrypted areas carry a lot of semantic information. The method of encrypting the whole image and obtaining the information of the image through the characteristics or the labels seems feasible, but the method of browsing the textual information to distinguish the image is difficult. Therefore, the existing method for balancing the privacy and the usability of the image in the cloud has some problems.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the problems in the prior art, the invention provides a method for balancing the image privacy and the usability based on three-pixel encryption, which can ensure the image privacy, enable an image owner to obtain the usability through the visual content of the image and is compatible with the existing cloud service.
The technical scheme is as follows: the invention relates to a method for balancing image privacy and usability based on three-pixel encryption, which comprises the following steps:
(1) original block segmentation: dividing a pre-acquired image into R, G, B three channels, wherein each channel is divided into a plurality of pixel blocks with b × b size according to a preset block dimension b;
(2) block-based encryption: dividing pixels in each block into a pixel group according to a preset rule, solving the sum s of pixel values in the pixel group, performing replacement encryption on the pixel group, and performing scrambling encryption on all pixels;
(3) ciphertext block integration: after the pixel blocks are encrypted, assembling the corresponding encrypted pixel blocks into ciphertext channels according to the sequence of block division, and then integrating the ciphertext channels together to form a ciphertext image;
(4) and (3) ciphertext block segmentation: acquiring parameters of a ciphertext image, dividing the ciphertext image into R, G, B three channels, wherein each channel is divided into a plurality of ciphertext pixel blocks with b × b sizes according to a preset block dimension b;
(5) block-based decryption: scrambling and decrypting all pixels and replacing and decrypting pixel groups;
(6) original block integration: after all pixel groups in the pixel block are decrypted, the original block is recovered; and assembling the corresponding decrypted pixel blocks into original channels according to the segmentation sequence of the blocks, and then integrating the original channels together to form an original image.
Further, the step (2) comprises the steps of:
(21) dividing the pixels in each block into a pixel group every three according to a preset rule, then solving the sum s of pixel values in the pixel group, generating a corresponding domain based on s, and simultaneously calculating the number of the pixel groups in the corresponding domain and numbering;
(22) by using ranksThe function determines the number SN of the original pixel group and uses the key1Generating a secret random number, and adding the secret random number to the SN; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups and the pixel groups is subjected to complementation, namely the encrypted SN, namely the SNen(ii) a By usingFunction solving SNenThe pixel group corresponding to the domain is a ciphertext pixel group, and the step is replacement encryption of the pixel group;
(23) substitutional encryption of all pixel groups in a pixel blockAfter operation, the key is utilized2All pixels in the pixel block are scrambled and encrypted.
Further, the step (5) includes the steps of:
(51) using key keys2Scrambling and decrypting all pixels in the pixel block; dividing every three pixel points into a pixel group according to a preset rule, then solving the sum s of pixel values in the pixel group, generating a corresponding domain based on s, and numbering the pixel groups in the domain;
(52) by using ranksFunction determination of ciphertext pixel group number SNenUsing key of key1Generating a secret random number, associated with the SNenSubtracting; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups is subjected to complementation to obtain the original pixel group number, namely SN; by usingThe function finds the pixel group corresponding to SN in the domain, i.e. the original pixel group, and this step is substitution decryption of the pixel group.
Further, the number of corresponding pixel groups in the domain in step (21):
wherein d represents the value range of the pixel value, s is the sum of the pixel values in the three-pixel group, and sum (x, y, z) is as follows:
where (x, y, z) represents the values of the first, second, and third pixels of the pixel group, respectively.
Further, the domain corresponding to the sum s of the pixel groups in the step (21) is:
Further, the step (21) of calculating and numbering the number of pixel groups in the corresponding domain is as follows:
1) calculating the sum s of pixel values in the pixel group (i, j, c), giving SN to each pixel group (i, j, c) in the domain, and setting the initial value x of the SN equal to 0;
2) calculating the starting value a of the first pixel i in the pixel groupbeginBegin (s,3), wherein begin (s, n) is defined as follows:
wherein n is the number of pixel points in the pixel group, and d represents the value range of the pixel value;
3) calculating the end value a of the first pixel in the pixel groupendEnd(s), wherein end(s) is defined as follows:
wherein d is the value range of the pixel value;
4) the second and third pixels may form a two-pixel group (j, c) having a sum of pixels s2Starting value b of s-i, jbegin=begin(s22), end value nend=end(s2);
5) The value c of the third pixel is s2-j;
6) SN of the three-pixel group (i, j, c) in the domain is x, and x is increased by 1, that is, x is x + 1;
7) j is increased by 1 if j is not greater than bendThen go to jumpGo to step 5);
8) i is increased by 1 if i is not greater than aendJumping to step 4);
9) SN assignment and numbering is done for all pixel groups in the domain.
Further, said utilizing rank of step (22)sThe function determines the number SN of the original pixel group as follows:
s1) adopt ranksThe function calculation value is the sum s of the pixels of the three-pixel group (i, j, c) of a, b and z, the value of the number of the pixel groups in the domain of the three pixels corresponding to the current value a is set as r, and the initial value of the r is 0;
s2) calculating the domain number r of the two-pixel group (b, z) in the two-pixel2=rank2s(b, z) wherein rank2s(b, z) is defined as follows:
wherein d is the value range of the pixel value;
s3) calculates the start value a of the first pixel i in the pixel groupbegin=begin(s,3);
S4) the sum of two pixel groups (b, z) is S2=s-i;
S5)r=r+domain2(s2) Therein domain2(s2) Is defined as follows:
s6) i ═ i +1, and if i is not greater than a-1, then go to step S4);
s7) value a, b, z, the SN of a group of three pixels (i, j, c) is equal to r + r2。
Further, the step (52) utilizesFunction solving of pixel group realization corresponding to SN in domainThe process is as follows:
calculating the pixel value of the first pixel of the group of pixels: let r be 0 and the start value of the first pixel be abeginBegin (s,3), where s is the sum of the pixel values in the pixel group; current abeginSetting r as the number of pixel groups in the corresponding domainenWherein r isenIs 0; if SN is greater than ren+domain2(s-abegin) Then r isen=ren+domain2(s-abegin) While a isbegin=abegin+ 1; otherwise, the pixel value a of the first pixelSN=abegin;
The sum of the pixel values of the second and third pixels is s2=s-aSN(ii) a Calculating the pixel value b of the second pixelSNThe formula of (a) is as follows:
wherein d represents the value range of the pixel value; pixel value c of the third pixelSN=s2-bSN(ii) a That is, SN corresponds to a pixel group of (a)SN,bSN,cSN)。
Further, the replacement encryption of the pixel group in the step (2) is implemented by the following formula:
wherein, SNenIs the encrypted SN, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
Further, the replacing decryption of the pixel group in the step (5) is implemented by the following formula:
wherein the content of the first and second substances,SN is the number after decryption, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
Has the advantages that: compared with the prior art, the invention has the beneficial effects that: the invention realizes the replacement encryption of the three-pixel group, enhances the connectivity of the Markov chain system modeled by the encryption scheme, maintains the accurate thumbnail of the original image, can perfectly recover the original image, and solves the problem of incompatibility of the privacy and the usability of the ciphertext image on the existing cloud service.
Drawings
FIG. 1 is a flow chart of an image encryption process of the present invention;
fig. 2 is a flow chart of pixel block based encryption of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention provides a method for balancing image privacy and usability based on three-pixel encryption, which comprises an encryption step and a decryption step, and specifically comprises the following steps:
step 1: as shown in fig. 1, the encryption process is as follows:
(1.1) original block segmentation:
the method comprises the steps of obtaining parameters of an input image, dividing the image into R, G, B three channels, and dividing each channel into a plurality of pixel blocks with b x b size according to a preset block dimension b.
(1.2) pixel block based encryption, as shown in fig. 2:
the pixels in each block are divided into three pixel groups according to a preset rule, then the sum s of pixel values in the pixel groups is obtained, a corresponding domain is generated based on s, and the number of the pixel groups in the corresponding domain is calculated and numbered.
And (3) calculating the number of pixel groups in the generation domain under the condition of s, wherein the calculation formula is as follows:
where d is a value range of a pixel value, generally d is 255, s is a sum of pixel values in the three-pixel group, and sum (x, y, z) is as follows:
where (x, y, z) represents the values of the first, second, and third pixels of the pixel group, respectively.
And generating a domain corresponding to the s, wherein the formula is as follows:
Calculating the number of pixel groups in the corresponding domain and numbering, i.e. assigning SN to each pixel group (i, j, c) in the domain, the steps are as follows:
1) the sum s of pixel values in the pixel group (i, j, c) is calculated, SN is given to each pixel group (i, j, c) in the domain, and the initial value x of SN is set to 0.
2) Calculating the starting value a of the first pixel i in the pixel groupbeginBegin (s,3), wherein begin (s, n) is defined as follows:
wherein n is the number of pixel points in the pixel group, and d represents the value range of the pixel value.
3) Calculating the end value a of the first pixel in the pixel groupendEnd(s), wherein end(s) is defined as follows:
4) the second and third pixels may form a two-pixel group (j, c) having a sum of pixels s2Starting value b of s-i, jbegin=begin(s22), end value b)end=end(s2)。
5) The value c of the third pixel is s2-j。
6) SN of the three-pixel group (i, j, c) in the domain is x, and x is increased by 1, that is, x + 1.
7) j is increased by 1 if j is not greater than bendJump to step 5).
8) i is increased by 1 if i is not greater than aendJump to step 4).
9) SN assignment and numbering is done for all pixel groups in the domain.
By using ranksThe function determines the number SN of the original pixel group and uses the key1Generating a secret random number, and adding the secret random number to the SN; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups and the pixel groups is subjected to complementation, namely the encrypted SN, namely the SNen(ii) a By usingFunction solving SNenThe corresponding pixel group in the domain is the ciphertext pixel group, and the step is replacement encryption of the pixel group.
The replacement encryption of the pixel group is realized by the following formula:
wherein, SNenIs the encrypted SN, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
ranksThe procedure for calculating SN for a three-pixel group (i, j, c) with a calculated value of a, b, z is as follows:
1) firstly, calculating the sum s of pixels of a pixel group, recording the value of the number of pixel groups in a three-pixel domain corresponding to the current value a, and setting r, wherein the initial value of r is 0.
2) Calculating the sequence number r of the two-pixel group (b, z) in the domain of the two pixels2=rank2s(b, z) wherein rank2s(b, z) is defined as follows:
3) calculating the starting value a of the first pixel i in the pixel groupbegin=begin(s,3)。
4) The sum of the two pixel groups (b, z) is s2=s-i。
5)r=r+domain2(s2) Therein domain2(s2) Is defined as follows:
6) i +1, if i is not greater than a-1, go to step 4).
7) The SN of a three-pixel group (i, j, c) of values a, b, z is equal to r + r2
After performing the replacement encryption operation on all pixel groups in the pixel block, using the key2All pixels in the pixel block are scrambled and encrypted.
(1.3) ciphertext block integration:
after the pixel blocks are encrypted, the corresponding encrypted pixel blocks are assembled into ciphertext channels according to the sequence of block division, and then the ciphertext channels are integrated together to form a ciphertext image.
Step 2: the decryption process includes the following:
(2.1) ciphertext block partitioning:
acquiring parameters of a ciphertext image, dividing the ciphertext image into R, G, B three channels, wherein each channel is divided into a plurality of ciphertext pixel blocks with b × b sizes according to a preset block dimension b;
(2.2) pixel block based decryption:
using key keys2Scrambling and decrypting all pixels in the pixel block; dividing every three pixel points into a pixel group according to a preset rule, then solving the sum s of pixel values in the pixel group, generating a corresponding domain based on s, and numbering the pixel groups in the domain;
by using ranksFunction determination of ciphertext pixel group number SNenUsing key of key1Generating a secret random number, associated with the SNenSubtracting; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups is subjected to complementation to obtain the original pixel group number, namely SN; by usingThe function finds the pixel group corresponding to SN in the domain, i.e. the original pixel group, and this step is substitution decryption of the pixel group.
Calculating the pixel value of the first pixel of the pixel group to be the starting value of the first pixelbeginBegin (s,3), where s is the sum of the pixel values in the pixel group; record the current abeginSetting r as the number of pixel groups in the corresponding domainenWherein r isenIs 0; if SN is greater than ren+domain2(s-abegin) Then r isen=ren+domain2(s-abegin) While a isbegin=abegin+ 1; otherwise, the pixel value a of the first pixelSN=anegin;
The sum of the pixel values of the second and third pixels is s2=s-aSN(ii) a Calculating the pixel value b of the second pixelSNThe formula of (a) is as follows:
wherein d represents the value range of the pixel value; pixel value c of the third pixelSN=s2-bSN(ii) a That is, SN corresponds to a pixel group of (a)SN,bSN,cSN)。
The replacement decryption of the pixel group is realized by the following formula:
wherein SN is the number after decryption, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
(2.3) original Block integration
After all pixel groups in the pixel block are decrypted, the original block is recovered; and assembling the corresponding decrypted pixel blocks into original channels according to the segmentation sequence of the blocks, and then integrating the original channels together to form an original image.
And circulating the operation until all pixel groups in the pixel block finish the operation, and utilizing the key2And carrying out scrambling encryption on pixels in the pixel block, namely completing encryption based on the pixel block.
After each pixel block in the image is subjected to the operation, the image thumbnail is kept, namely, the ciphertext image capable of balancing the privacy and the usability of the image is obtained. The sum of pixels in the pixel blocks is not changed in the whole encryption process, so that the scheme can generate accurate thumbnails. The decryption process of the scheme is the reverse process of the encryption process.
Claims (7)
1. A method for balancing image privacy and usability based on three-pixel encryption is characterized by comprising the following steps;
(1) original block segmentation: dividing a pre-acquired image into R, G, B three channels, wherein each channel is divided into a plurality of pixel blocks with b × b size according to a preset block dimension b;
(2) block-based encryption: dividing pixels in each block into a pixel group according to a preset rule, solving the sum s of pixel values in the pixel group, performing replacement encryption on the pixel group, and performing scrambling encryption on all pixels;
(3) ciphertext block integration: after the pixel blocks are encrypted, assembling the corresponding encrypted pixel blocks into ciphertext channels according to the sequence of block division, and then integrating the ciphertext channels together to form a ciphertext image;
(4) and (3) ciphertext block segmentation: acquiring parameters of a ciphertext image, dividing the ciphertext image into R, G, B three channels, wherein each channel is divided into a plurality of ciphertext pixel blocks with b × b sizes according to a preset block dimension b;
(5) block-based decryption: scrambling and decrypting all pixels and replacing and decrypting pixel groups;
(6) original block integration: after all pixel groups in the pixel block are decrypted, the original block is recovered; assembling the corresponding decrypted pixel blocks into original channels according to the segmentation sequence of the blocks, and then integrating the original channels together to form an original image;
the step (5) comprises the following steps:
(51) using key keys2Scrambling and decrypting all pixels in the pixel block; dividing every three pixel points into a pixel group according to a preset rule, then solving the sum s of pixel values in the pixel group, generating a corresponding domain based on s, and numbering the pixel groups in the domain;
(52) by using ranksFunction determination of ciphertext pixel group number SNenUsing key of key1Generating a secret random number, associated with the SNenSubtracting; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups is subjected to complementation to obtain the original pixel group number, namely SN; by usingThe function calculates the pixel group corresponding to the SN in the domain, namely the pixel group is the original pixel group, and the step is the replacement decryption of the pixel group;
the advantages of step (52)By usingThe implementation process of the function for solving the pixel group corresponding to the SN in the domain is as follows:
calculating the pixel value of the first pixel of the group of pixels: let r be 0 and the start value of the first pixel be abeginBegin (s,3), where s is the sum of the pixel values in the pixel group; current abeginSetting r as the number of pixel groups in the corresponding domainenWherein r isenIs 0; if SN is greater than ren+domain2(s-abegin) Then r isen=ren+domain2(s-abegin) While a isbegin=abegin+ 1; otherwise, the pixel value a of the first pixelSN=abegin;
The sum of the pixel values of the second and third pixels is s2=s-aSN(ii) a Calculating the pixel value b of the second pixelSNThe formula of (a) is as follows:
wherein d represents the value range of the pixel value; pixel value c of the third pixelSN=s2-bSN(ii) a That is, SN corresponds to a pixel group of (a)SN,bSN,cSN)。
2. The method for balancing privacy and usability of images based on triple pixel point encryption according to claim 1, wherein the step (2) comprises the steps of:
(21) dividing the pixels in each block into a pixel group every three according to a preset rule, then solving the sum s of pixel values in the pixel group, generating a corresponding domain based on s, and simultaneously calculating the number of the pixel groups in the corresponding domain and numbering;
(22) by using ranksThe function determines the number SN of the original pixel group and uses the key1Generating a secret random number, and adding the secret random number to the SN; simultaneously, the number of pixel groups in the domain is solved, and the sum of the pixel groups and the pixel groups is subjected to complementation, namely the encrypted SN, namely the SNen(ii) a By usingFunction solving SNenThe pixel group corresponding to the domain is a ciphertext pixel group, and the step is replacement encryption of the pixel group;
(23) after performing the replacement encryption operation on all pixel groups in the pixel block, using the key2All pixels in the pixel block are scrambled and encrypted.
4. The method for balancing image privacy and usability based on triple-pixel point encryption according to claim 2, wherein the step (21) of calculating and numbering the number of pixel groups in the corresponding domain is as follows:
1) calculating the sum s of pixel values in the pixel group (i, j, c), giving SN to each pixel group (i, j, c) in the domain, and setting the initial value x of the SN equal to 0;
2) calculating the starting value a of the first pixel i in the pixel groupbeginBegin (s,3), wherein begin (s, n) is defined as follows:
wherein n is the number of pixel points in the pixel group, and d represents the value range of the pixel value;
3) calculating the end value a of the first pixel in the pixel groupendEnd(s), wherein end(s) is defined as follows:
wherein d is the value range of the pixel value;
4) the second and third pixels may form a two-pixel group (j, c) having a sum of pixels s2Starting value b of s-i, jbegin=begin(s22), end value b)end=end(s2);
5) The value c of the third pixel is s2-j;
6) SN of the three-pixel group (i, j, c) in the domain is x, and x is increased by 1, that is, x is x + 1;
7) j is increased by 1 if j is not greater than bendJumping to step 5);
8) i is increased by 1 if i is not greater than aendJumping to step 4);
9) SN assignment and numbering is done for all pixel groups in the domain.
5. The method of claim 2, wherein said step (22) of utilizing rank is based on triple-pixel encryption to balance image privacy and usabilitysThe function determines the number SN of the original pixel group as follows:
s1) adopt ranksThe function calculation value is the sum s of the pixels of the three-pixel group (i, j, c) of a, b and z, the value of the number of the pixel groups in the domain of the three pixels corresponding to the current value a is set as r, and the initial value of the r is 0;
s2) calculating the domain number of the two-pixel group (b, z) in the two-pixelr2=rank2s(b, z) wherein rank2s(b, z) is defined as follows:
wherein d is the value range of the pixel value;
s3) calculates the start value a of the first pixel i in the pixel groupbegin=begin(s,3);
S4) the sum of two pixel groups (b, z) is S2=s-i;
S5)r=r+domain2(s2) Therein domain2(s2) Is defined as follows:
s6) i ═ i +1, and if i is not greater than a-1, then go to step S4);
s7) value a, b, z, the SN of a group of three pixels (i, j, c) is equal to r + r2。
6. The method for balancing image privacy and usability based on triple pixel point encryption according to claim 1, wherein the replacing encryption of the pixel group in the step (2) is implemented by the following formula:
wherein, SNenIs the encrypted SN, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
7. The method for balancing image privacy and usability based on triple-pixel point encryption according to claim 1, wherein the replacing decryption of the pixel group in the step (5) is implemented by the following formula:
wherein SN is the number after decryption, m is the key of the key1The generated random number is controlled, mod being the remainder symbol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110471730.XA CN113206926B (en) | 2021-04-29 | 2021-04-29 | Method for balancing privacy and usability of image based on three-pixel-point encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110471730.XA CN113206926B (en) | 2021-04-29 | 2021-04-29 | Method for balancing privacy and usability of image based on three-pixel-point encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113206926A CN113206926A (en) | 2021-08-03 |
CN113206926B true CN113206926B (en) | 2022-04-05 |
Family
ID=77029335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110471730.XA Active CN113206926B (en) | 2021-04-29 | 2021-04-29 | Method for balancing privacy and usability of image based on three-pixel-point encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113206926B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115002293B (en) * | 2022-08-01 | 2022-10-25 | 江西财经大学 | Privacy confidentiality method, system and storage medium based on thumbnail format reservation |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107633175B (en) * | 2017-09-14 | 2020-11-03 | 交通运输部水运科学研究所 | Chaos-based rapid color image encryption method |
CN112035847B (en) * | 2019-06-03 | 2023-10-27 | 湖北微模式科技发展有限公司 | Image encryption and decryption methods and devices, electronic equipment and storage medium |
CN112330521A (en) * | 2020-10-21 | 2021-02-05 | 南京航空航天大学 | Image encryption method |
CN112508764B (en) * | 2020-12-23 | 2024-03-15 | 南京航空航天大学 | Encryption method for balancing image privacy and usability based on information embedding |
-
2021
- 2021-04-29 CN CN202110471730.XA patent/CN113206926B/en active Active
Non-Patent Citations (2)
Title |
---|
TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption;Ruoyu Zhao, Yushu Zhang et.al;《Signal Processing》;20210130;全文 * |
高容量加密域图像可逆信息隐藏;王杭兴;《科技视界》;20180315;53-54 * |
Also Published As
Publication number | Publication date |
---|---|
CN113206926A (en) | 2021-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9276745B2 (en) | Preserving image privacy when manipulated by cloud services | |
Xiang et al. | Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group | |
Li et al. | Reversible data hiding in encrypted images using cross division and additive homomorphism | |
Zhang et al. | Reversibility improved data hiding in encrypted images | |
CN110753226B (en) | High-capacity ciphertext domain image reversible data hiding method | |
CN110337000B (en) | Encryption domain reversible information hiding method based on double binary tree expansion and public key encryption | |
US20130179690A1 (en) | Method and apparatus for fast image encryption and invisible digital watermark | |
CN112040086B (en) | Image encryption and decryption methods and devices, equipment and readable storage medium | |
CN112035847B (en) | Image encryption and decryption methods and devices, electronic equipment and storage medium | |
CN113206926B (en) | Method for balancing privacy and usability of image based on three-pixel-point encryption | |
Wang et al. | TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding | |
CN114390316A (en) | Processing method and device for image acquisition synchronous encryption privacy protection | |
CN112508764B (en) | Encryption method for balancing image privacy and usability based on information embedding | |
CN116208394A (en) | Image processing method, system, image capturing apparatus, server, and storage medium | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
CN112288757B (en) | Encryption domain image segmentation optimization method based on data packing technology | |
CN114374773A (en) | Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end | |
Rohith et al. | Reversible data embedding scheme in encrypted image using Arnold transform for satellite images | |
Besteena et al. | Reversible data hiding in selectively encrypted RGB images by reserving room in advance | |
CN107590369B (en) | Homomorphic encrypted domain reversible information hiding method based on code division multiplexing and value expansion | |
Li et al. | A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map. | |
Padeppagol et al. | Design and implementation of lifting based wavelet and adaptive LSB steganography to secret data sharing through image on FPGA | |
Lone et al. | A novel scheme for image authentication and secret data sharing | |
Wu et al. | Secret digital images over cloud computing using meaningful secret sharing technique | |
Harsoor et al. | Reversible data hiding in encrypted image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |