WO2019242254A1 - Image area copy detection method supporting privacy protection function - Google Patents

Image area copy detection method supporting privacy protection function Download PDF

Info

Publication number
WO2019242254A1
WO2019242254A1 PCT/CN2018/121122 CN2018121122W WO2019242254A1 WO 2019242254 A1 WO2019242254 A1 WO 2019242254A1 CN 2018121122 W CN2018121122 W CN 2018121122W WO 2019242254 A1 WO2019242254 A1 WO 2019242254A1
Authority
WO
WIPO (PCT)
Prior art keywords
calculation
ciphertext
image
copy
privacy protection
Prior art date
Application number
PCT/CN2018/121122
Other languages
French (fr)
Chinese (zh)
Inventor
翁健
冯丙文
杨雅希
魏凯敏
刘志全
董彩芹
Original Assignee
暨南大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 暨南大学 filed Critical 暨南大学
Priority to AU2018402494A priority Critical patent/AU2018402494B2/en
Publication of WO2019242254A1 publication Critical patent/WO2019242254A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems

Definitions

  • the present invention relates to the field of digital image forensics, and in particular, to a method for detecting copying of an image area supporting a privacy protection function.
  • Area copy is the most common image tampering technique to copy part of the image to other locations to cover some objects in the image or emphasize some content. Forensics of this type of image tampering usually requires finding multiple highly similar areas in the image, and the similarity of these areas will obviously exceed the normal natural image as evidence of tampering and locate the tampered area.
  • Outsourcing regional forensics to the cloud, and cloud servers to provide forensic services is a cost-effective solution, but it also brings the risk of privacy leakage.
  • the image data that users need to forensic often contain sensitive content, and there is often an interest relationship between users and image content. This information is usually not intended to be leaked to digital forensics cloud service providers.
  • the purpose of the present invention is to overcome the shortcomings and shortcomings of the prior art, and to provide an image area copy detection method that supports the privacy protection function.
  • the user terminal can send the image in cipher text to the cloud server.
  • the cloud server does not know the image.
  • Under the premise of the content it provides effective regional copying and forensics services to detect and locate tampering operations.
  • the present invention can provide privacy protection of user image content.
  • a method for detecting the copy of an image area supporting a privacy protection function comprising: a user terminal, N mutually independent cloud server terminals, some of which are used for ciphertext storage, and some services
  • the end is used for ciphertext calculation; the user end uses the image encryption algorithm to split the image into multiple ciphertexts and hand them over to the server for ciphertext storage.
  • These servers interact with the server for ciphertext calculation through interaction.
  • the detection and positioning of the image tampering operation in the ciphertext space are completed with calculation.
  • each server for ciphertext storage obtains the suspected tampering area, and the server for ciphertext storage sends the result to the user.
  • the detection method includes the following steps:
  • step S1 the client The image ciphertext generation steps include:
  • step 1 Select a random number matrix R of size l m ⁇ l m , each element of which is a random number between 0 and 2 10 ; generate 2 copies of the image ciphertext:
  • Step 2 Send I (1) to the secure channel Send I (2) over the secure channel to
  • calculating the Harris corner specifically includes:
  • Has image ciphertext I (1) Has image ciphertext I (2) , with Shared key set
  • step 1 Calculation
  • Step 2 with Interactive computing After calculation have have
  • Step 3 with Interactive computing After calculation have have
  • Step 4 with Interactive computing After calculation have have
  • Step 5 with Interactive computing After calculation have have
  • Step 6 Calculation Where h is the Gaussian filter kernel
  • Step 7 with Interactive computing After calculation have have
  • Step 8 with Interactive computing After calculation have have
  • Step 9 with Interactive computing After calculation have have
  • Step 10 with Interactive computing After calculation have have
  • Step 11 with Interactive computing After calculation Owns A (1) Owns A (2) ;
  • Step 12 Calculation Where t is the Harris corner check constant
  • Step 13 with Generate an all-zero matrix H of size l m ⁇ l m for storing Harris corners; for all i and j, Calculate coefficient blocks U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8) and U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form
  • U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8)
  • U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form
  • the corresponding local minimum of the plaintext U (8i + 1: 8i + 8,8j + 1: 8j + 8) is:
  • extracting the point of interest descriptor specifically includes:
  • step 1 Generate a three-dimensional all-zeros matrix D (1) of size l m ⁇ l m ⁇ 49, Generate a three-dimensional all-zero matrix D (2) of the same size, which is used to store the descriptors of points of interest;
  • Step 2-1 Calculation Where FFT () represents fast Fourier transform and LPM () represents log-polar mapping Represents a 7 ⁇ 7 pixel block with (i, j) as the center in I (1) ;
  • the interest point matching specifically includes:
  • step 1 Generate a l D ⁇ 6 matrix T (1) , where l D is the number of all (i, j) with D (1) (i, j, :) ⁇ 0, Generate a matrix T (2) of the same size. Note that (i, j ) with D (1) (i, j, :) ⁇ 0 must also satisfy D (2) (i, j, :) ⁇ 0;
  • Step 3 In cipher text form, find the descriptor closest to the descriptor at (i, j) and its location. The method is:
  • Step 3-2 For any (i ′, j ′), if D (1) (i ′, j ′, :) ⁇ 0 && (i ′> i
  • Step 3-2-1 with Interactive computing After calculation have have
  • Step 3-2-2 with Interactive computing After calculation have have
  • Step 3-2-3 with Interactive computing After calculation have have
  • Step 3-2-4 with Interactive computing After calculation have have
  • Step 3-2-5 Calculation
  • Step 4 Find the smallest i ′ and corresponding j ′ that satisfy D (1) (i ′, j ′, :) ⁇ 0 && (i ′> i
  • Step 5 The plaintext T corresponding to T (1) and T (2) is reordered in the cipher text form according to the size of T (:, 5);
  • Step 6 For all l D ⁇ i> 1, if (T (1) (i, 1)> T (1) (i, 3)
  • the plaintext T corresponding to T (1) and T (2) in the cipher text form is reordered according to the size of T (:, 5) by the method:
  • Step 5-2 Find the position of the minimum value of T (i: l D , 5) in ciphertext form, the method is:
  • Step 5-3 Exchange T (1) ( ⁇ , :) and T (1) (i, :); Exchange T (2) ( ⁇ , :) and T (2) (i, :);
  • the location of the tampering area specifically includes:
  • Step 2 Find the number of points that satisfy the distance less than ⁇ from the T (1) (i, :) position by the method:
  • the client Obtaining detection results and suspected tampering areas include:
  • the two areas of the stitching are labeled as i and -i, i ⁇ ⁇ 1, ..., 5 ⁇
  • step 1 Send E over a secure channel to
  • the present invention has the following advantages and beneficial effects:
  • the present invention provides a method for forensic copying of image areas with privacy protection capabilities.
  • the server can detect the copy operation of the image area and locate the suspected tampering area without knowing the content of the image.
  • Image encryption technology and the proposed forensic algorithm based on multi-party secure computing.
  • the forensic method provided by the present invention has higher calculation efficiency and better accuracy, and the effect is brought about by the image forensics flow, the secure multi-party multiplication protocol, and the secure multi-party comparison protocol, which are proposed by the present invention, and have a relatively low calculation amount. Since multiple regions are located simultaneously in the region positioning operation, the present invention can be used to detect a tampered image with multiple copied regions.
  • FIG. 1 is an overall flowchart of the method of the embodiment.
  • FIG. 2 is a flowchart of tampering positioning calculation of a stitching region.
  • the invention combines multi-party secure computing, image interest point descriptor extraction, and nearest neighbor search technologies to realize the detection and location of image region replication on the premise of protecting the privacy of image content.
  • the present invention uses image encryption to split the image into two image ciphertexts.
  • the present invention designs a forensic algorithm based on secure multi-party calculations. Through the interaction of three servers, it can extract the interest point descriptor without knowing the ciphertext of the other party, and find Best match descriptor.
  • the present invention designs a simple image forensics process and a secure multi-party computing protocol.
  • uppercase letters represent matrices
  • bold lowercase letters represent vectors
  • a * B represents the convolution of A and B.
  • step 1 L select a random number R m ⁇ l m matrix size, each element of a random number between 0 and 210.
  • step 2 L select a random number R m ⁇ l m matrix size, each element of a random number between 0 and 210.
  • Step 2 Send I (1) to the secure channel Send I (2) over the secure channel to
  • Has image ciphertext I (1) Has image ciphertext I (2) , with Shared key set
  • step 1 Calculation
  • Step 2 with Interactive computing After calculation have have
  • Step 3 with Interactive computing After calculation have have
  • Step 4 with Interactive computing After calculation have have
  • Step 5 with Interactive computing After calculation have have
  • Step 6 Calculation Where h is the Gaussian filter kernel
  • Step 7 with Interactive computing After calculation have have
  • Step 8 with Interactive computing After calculation have have
  • Step 9 with Interactive computing After calculation have have
  • Step 10 with Interactive computing After calculation have have
  • Step 11 with Interactive computing After calculation Owns A (1) Owns A (2) ;
  • Step 12 Calculation Where t is the Harris corner check constant, which is generally taken between 0.04-0.06;
  • Step 13 with An all-zero matrix H of size l m ⁇ l m is generated for storing Harris corner points.
  • H size of size l m ⁇ l m is generated for storing Harris corner points.
  • U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8)
  • U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form
  • the corresponding local minimum of plaintext U (8i + 1: 8i + 8,8j + 1: 8j + 8).
  • step 1 Generate a three-dimensional all-zeros matrix D (1) of size l m ⁇ l m ⁇ 49, Generate a three-dimensional all-zero matrix D (2) of the same size, which is used to store the descriptors of points of interest;
  • Step 2-1 Calculation Where FFT () represents a fast Fourier transform, and LPM () represents a log-polar mapping, Represents a 7 ⁇ 7 pixel block with (i, j) as the center in I (1) ;
  • step 1 Generate a l D ⁇ 6 matrix T (1) , where l D is the number of all (i, j) with D (1) (i, j, :) ⁇ 0, Generate a matrix T (2) of the same size. Note that (i, j ) with D (1) (i, j, :) ⁇ 0 must also satisfy D (2) (i, j, :) ⁇ 0;
  • Step 3 In cipher text form, find the descriptor closest to the descriptor at (i, j) and its location. The method is:
  • Step 3-2 For any (i ′, j ′), if D (1) (i ′, j ′, :) ⁇ 0 && (i ′> i
  • Step 3-2-1 with Interactive computing After calculation have have
  • Step 3-2-2 with Interactive computing After calculation have have
  • Step 3-2-3 with Interactive computing After calculation have have
  • Step 3-2-4 with Interactive computing After calculation have have
  • Step 3-2-5 Calculation
  • Step 4 Find the smallest i ′ and corresponding j ′ that satisfy D (1) (i ′, j ′, :) ⁇ 0 && (i ′> i
  • Step 5 The plaintext T corresponding to T (1) and T (2) in cipher text form is reordered according to the size of T (:, 5).
  • Step 5-2 Find the position of the minimum value of T (i: l D , 5) in ciphertext form, the method is:
  • Step 5-3 Exchange T (1) ( ⁇ , :) and T (1) (i, :); Exchange T (2) ( ⁇ , :) and T (2) (i, :);
  • Step 6 For all l D ⁇ i> 1, if (T (1) (i, 1)> T (1) (i, 3)
  • Step 2 Find the number of points that satisfy the distance less than ⁇ from the T (1) (i, :) position by the method:
  • the two regions of the stitching are labeled as i and -i, i ⁇ ⁇ 1, ..., 5 ⁇ .
  • step 1 Send E over a secure channel to
  • the protocol flow is:
  • Has a ciphertext matrix X 1 Has a ciphertext matrix X 2 , with Shared key set
  • step 1 with Select two key matrices K 1 of the same size as X 1 (or X 2 ) according to pre-negotiation,
  • Step 4 Send V to Send R to
  • the secure multiparty comparison protocol b SCP (X 1 , X 2 ) is used for comparison Ciphertext matrix X 1 and The size of the ciphertext matrix X 2 and the calculation process Will not know X 2 , Will not know X 1 , Will not know X 1 or X 2 , the protocol flow is:
  • Has a ciphertext matrix X 1 Has a ciphertext matrix X 2 , with Shared key set
  • step 1 with Select two key matrices K 1 of the same size as X 1 (or X 2 ) according to pre-negotiation,
  • Step 4 Send b to with
  • the image encryption technology used in this solution can be implemented with similar technologies, such as replacing the addition operation with the subtraction operation to achieve the same effect.
  • the multiplication and comparison protocols based on multi-party secure calculations used in this solution can be implemented by using various other multi-party security protocols to achieve similar results, but the computing efficiency or the number of cloud servers used varies.
  • the sorting algorithm in this solution can be replaced with any other sorting algorithm to achieve the same effect.
  • the user terminal can send the image in the form of cipher text to the cloud server.
  • the cloud server provides an effective area copy forensics service without realizing the image content, so as to detect and locate the tampering operation.
  • the present invention can provide privacy protection of user image content.
  • This method is suitable for image digital forensics cloud services, and provides individuals, enterprises, government departments, etc. with a safe and reliable regional copy forensics and forensics service. This solution is suitable for unreliable cloud service environments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

An image area copy detection method supporting a privacy protection function, comprising: a user side and N independent cloud server sides. Part of the server sides is used for ciphertext storage, and the other part is used for ciphertext calculation; the user side splits an image into a plurality of ciphertext by using an image encryption algorithm, and the ciphertext is respectively transmitted to the server sides for ciphertext storage; the server sides for ciphertext storage and the server sides for ciphertext calculation complete detection and positioning of a copy tampering operation of an image area under a ciphertext space by means of interaction and calculation; finally, each server side for ciphertext storage obtains a suspected tampering area, and the server side for ciphertext storage sends the result to the user side. The cloud server side provides an effective area copy evidence obtaining service on the premise that the image content is not known, and detection and positioning of the tampering operation are realized. With respect to a conventional area copy evidence obtaining tool or service, the method can provide privacy protection for the image content of a user.

Description

一种支持隐私保护功能的图像区域复制检测方法Image area copy detection method supporting privacy protection function 技术领域Technical field
本发明涉及数字图像取证领域,特别涉及一种支持隐私保护功能的图像区域复制检测方法。The present invention relates to the field of digital image forensics, and in particular, to a method for detecting copying of an image area supporting a privacy protection function.
背景技术Background technique
区域复制是将图像中一部分拷贝到其他位置,以达到掩盖图像中某些物体,或是强调某些内容的目的,是最常见的图像篡改技术。对该类图像篡改的取证通常需要在图像中找到多个高度相似的区域,这些区域的相似度将明显超过正常自然图像,以此作为篡改的证据,并定位篡改区域。将区域复制取证外包给云,由云服务器来提供取证服务是一种经济有效的解决方案,但随之也带来了隐私泄露的风险。用户需要取证的图像数据经常包含敏感内容,而且用户和图像内容也经常存在着利益关系。这些信息通常用户不希望泄露给数字取证云服务提供方。另一方面,云平台的计算资源共享更加剧了数据外泄的安全隐患。而现有的图像区域复制篡改取证操作只能在明文下进行,因此面临图像内容泄漏的风险。如何在区域复制取证外包服务中保护图像数据的安全和隐私,成为了决定图像取证外包能否实际应用的一个重要因素。Area copy is the most common image tampering technique to copy part of the image to other locations to cover some objects in the image or emphasize some content. Forensics of this type of image tampering usually requires finding multiple highly similar areas in the image, and the similarity of these areas will obviously exceed the normal natural image as evidence of tampering and locate the tampered area. Outsourcing regional forensics to the cloud, and cloud servers to provide forensic services is a cost-effective solution, but it also brings the risk of privacy leakage. The image data that users need to forensic often contain sensitive content, and there is often an interest relationship between users and image content. This information is usually not intended to be leaked to digital forensics cloud service providers. On the other hand, the sharing of computing resources on cloud platforms has exacerbated the security risks of data leakage. However, the existing image area copying, tampering and forensics operations can only be performed in plain text, and therefore face the risk of image content leakage. How to protect the security and privacy of image data in regional copy forensics outsourcing services has become an important factor in determining whether image forensics outsourcing can be practically applied.
发明内容Summary of the Invention
本发明的目的在于克服现有技术的缺点与不足,提供一种支持隐私保护功能的图像区域复制检测方法,用户端可以将密文形式的图像发送给云服务端,云服务端在不知晓图像内容的前提下,提供有效的区域复制取证服务,实现对篡改操作的检测和定位。相比于传统区域复制取证工具或服务,本发明可以提供用户图像内容的隐私保护。The purpose of the present invention is to overcome the shortcomings and shortcomings of the prior art, and to provide an image area copy detection method that supports the privacy protection function. The user terminal can send the image in cipher text to the cloud server. The cloud server does not know the image. Under the premise of the content, it provides effective regional copying and forensics services to detect and locate tampering operations. Compared with the traditional area copying forensics tool or service, the present invention can provide privacy protection of user image content.
本发明的目的通过以下的技术方案实现:一种支持隐私保护功能的图像区域复制检测方法,包括:用户端,N个相互独立的云服务端,其中部分服务端用于密文存储,部分服务端用于密文计算;用户端利用图像加密算法将图像分拆为多个密文,分别交给用于密文存储的服务端,由这些服务端和用于密文计算的服务端通过交互和计算完成密文空间下对图像区域复制篡改操作的检测和定位;最后每个用于密文存储的服务端均获得疑似篡改区域,用于密文存储的服务端将结果发送给用户端。The object of the present invention is achieved by the following technical solution: a method for detecting the copy of an image area supporting a privacy protection function, comprising: a user terminal, N mutually independent cloud server terminals, some of which are used for ciphertext storage, and some services The end is used for ciphertext calculation; the user end uses the image encryption algorithm to split the image into multiple ciphertexts and hand them over to the server for ciphertext storage. These servers interact with the server for ciphertext calculation through interaction. The detection and positioning of the image tampering operation in the ciphertext space are completed with calculation. Finally, each server for ciphertext storage obtains the suspected tampering area, and the server for ciphertext storage sends the result to the user.
优选的,包括1个用户端
Figure PCTCN2018121122-appb-000001
3个相互独立的云服务端,其中2个服务端,
Figure PCTCN2018121122-appb-000002
Figure PCTCN2018121122-appb-000003
用于 密文存储,1个服务端
Figure PCTCN2018121122-appb-000004
用于密文计算;
Figure PCTCN2018121122-appb-000005
利用图像加密算法将图像分拆为两个密文,分别交给
Figure PCTCN2018121122-appb-000006
Figure PCTCN2018121122-appb-000007
由这两个服务端和
Figure PCTCN2018121122-appb-000008
通过交互和计算完成密文空间下对图像区域复制篡改操作的检测和定位;最后
Figure PCTCN2018121122-appb-000009
Figure PCTCN2018121122-appb-000010
均获得疑似篡改区域,
Figure PCTCN2018121122-appb-000011
Figure PCTCN2018121122-appb-000012
将结果发送给
Figure PCTCN2018121122-appb-000013
Preferably, includes 1 client
Figure PCTCN2018121122-appb-000001
3 independent cloud servers, 2 of them,
Figure PCTCN2018121122-appb-000002
with
Figure PCTCN2018121122-appb-000003
For ciphertext storage, 1 server
Figure PCTCN2018121122-appb-000004
For ciphertext calculations;
Figure PCTCN2018121122-appb-000005
Use image encryption algorithm to split the image into two ciphertexts
Figure PCTCN2018121122-appb-000006
with
Figure PCTCN2018121122-appb-000007
By these two servers and
Figure PCTCN2018121122-appb-000008
Detecting and locating the tampering operation of the image area in ciphertext space through interaction and calculation; finally
Figure PCTCN2018121122-appb-000009
with
Figure PCTCN2018121122-appb-000010
All obtained suspected tampered areas,
Figure PCTCN2018121122-appb-000011
with
Figure PCTCN2018121122-appb-000012
Send results to
Figure PCTCN2018121122-appb-000013
具体的,检测方法包括以下步骤:Specifically, the detection method includes the following steps:
S1、用户端
Figure PCTCN2018121122-appb-000014
图像密文生成步骤;
S1, client
Figure PCTCN2018121122-appb-000014
Image ciphertext generation step;
S2、云服务端
Figure PCTCN2018121122-appb-000015
Figure PCTCN2018121122-appb-000016
的密文空间下篡改区域检测与定位步骤;
S2, cloud server
Figure PCTCN2018121122-appb-000015
with
Figure PCTCN2018121122-appb-000016
Detection and location steps of tampered area in ciphertext space;
S2-1、计算Harris角点;S2-1. Calculate Harris corner;
S2-2、提取兴趣点描述子;S2-2, extracting a point of interest descriptor;
S2-3、兴趣点匹配;S2-3. Points of interest match;
S2-4、篡改区域定位;S2-4. Tampering with the positioning of the area;
S3、用户端
Figure PCTCN2018121122-appb-000017
获得检测结果和疑似篡改区域。
S3, client
Figure PCTCN2018121122-appb-000017
Obtain detection results and suspected tampered areas.
优选的,步骤S1,用户端
Figure PCTCN2018121122-appb-000018
图像密文生成步骤包括:
Preferably, in step S1, the client
Figure PCTCN2018121122-appb-000018
The image ciphertext generation steps include:
计算前,
Figure PCTCN2018121122-appb-000019
拥有一l m×l m大小的待检测图像X;
Before calculation,
Figure PCTCN2018121122-appb-000019
Have an image to be inspected X with a size of l m × l m ;
步骤1:
Figure PCTCN2018121122-appb-000020
选择一l m×l m大小的随机数矩阵R,其每个元素为0~2 10之间的随机数;生成2份图像密文:
step 1:
Figure PCTCN2018121122-appb-000020
Select a random number matrix R of size l m × l m , each element of which is a random number between 0 and 2 10 ; generate 2 copies of the image ciphertext:
I (1)=X+R,I (2)=R I (1) = X + R, I (2) = R
步骤2:
Figure PCTCN2018121122-appb-000021
将I (1)通过安全信道发送给
Figure PCTCN2018121122-appb-000022
将I (2)通过安全信道发送给
Figure PCTCN2018121122-appb-000023
Step 2:
Figure PCTCN2018121122-appb-000021
Send I (1) to the secure channel
Figure PCTCN2018121122-appb-000022
Send I (2) over the secure channel to
Figure PCTCN2018121122-appb-000023
计算后,
Figure PCTCN2018121122-appb-000024
拥有密文I (1)
Figure PCTCN2018121122-appb-000025
拥有密文I (2)
After calculation,
Figure PCTCN2018121122-appb-000024
Owns the ciphertext I (1) ,
Figure PCTCN2018121122-appb-000025
Owns the ciphertext I (2) .
优选的,步骤S2-1,计算Harris角点具体包括:Preferably, in step S2-1, calculating the Harris corner specifically includes:
计算前,
Figure PCTCN2018121122-appb-000026
拥有图像密文I (1)
Figure PCTCN2018121122-appb-000027
拥有图像密文I (2)
Figure PCTCN2018121122-appb-000028
Figure PCTCN2018121122-appb-000029
共享密钥集
Figure PCTCN2018121122-appb-000030
Before calculation,
Figure PCTCN2018121122-appb-000026
Has image ciphertext I (1) ,
Figure PCTCN2018121122-appb-000027
Has image ciphertext I (2) ,
Figure PCTCN2018121122-appb-000028
with
Figure PCTCN2018121122-appb-000029
Shared key set
Figure PCTCN2018121122-appb-000030
步骤1:
Figure PCTCN2018121122-appb-000031
计算
Figure PCTCN2018121122-appb-000032
step 1:
Figure PCTCN2018121122-appb-000031
Calculation
Figure PCTCN2018121122-appb-000032
Figure PCTCN2018121122-appb-000033
计算
Figure PCTCN2018121122-appb-000034
Figure PCTCN2018121122-appb-000033
Calculation
Figure PCTCN2018121122-appb-000034
步骤2:
Figure PCTCN2018121122-appb-000035
Figure PCTCN2018121122-appb-000036
交互计算
Figure PCTCN2018121122-appb-000037
计算后
Figure PCTCN2018121122-appb-000038
拥有
Figure PCTCN2018121122-appb-000039
拥有
Figure PCTCN2018121122-appb-000040
Step 2:
Figure PCTCN2018121122-appb-000035
with
Figure PCTCN2018121122-appb-000036
Interactive computing
Figure PCTCN2018121122-appb-000037
After calculation
Figure PCTCN2018121122-appb-000038
have
Figure PCTCN2018121122-appb-000039
have
Figure PCTCN2018121122-appb-000040
步骤3:
Figure PCTCN2018121122-appb-000041
Figure PCTCN2018121122-appb-000042
交互计算
Figure PCTCN2018121122-appb-000043
计算后
Figure PCTCN2018121122-appb-000044
拥有
Figure PCTCN2018121122-appb-000045
拥有
Figure PCTCN2018121122-appb-000046
Step 3:
Figure PCTCN2018121122-appb-000041
with
Figure PCTCN2018121122-appb-000042
Interactive computing
Figure PCTCN2018121122-appb-000043
After calculation
Figure PCTCN2018121122-appb-000044
have
Figure PCTCN2018121122-appb-000045
have
Figure PCTCN2018121122-appb-000046
步骤4:
Figure PCTCN2018121122-appb-000047
Figure PCTCN2018121122-appb-000048
交互计算
Figure PCTCN2018121122-appb-000049
计算后
Figure PCTCN2018121122-appb-000050
拥有
Figure PCTCN2018121122-appb-000051
拥有
Figure PCTCN2018121122-appb-000052
Step 4:
Figure PCTCN2018121122-appb-000047
with
Figure PCTCN2018121122-appb-000048
Interactive computing
Figure PCTCN2018121122-appb-000049
After calculation
Figure PCTCN2018121122-appb-000050
have
Figure PCTCN2018121122-appb-000051
have
Figure PCTCN2018121122-appb-000052
步骤5:
Figure PCTCN2018121122-appb-000053
Figure PCTCN2018121122-appb-000054
交互计算
Figure PCTCN2018121122-appb-000055
计算后
Figure PCTCN2018121122-appb-000056
拥有
Figure PCTCN2018121122-appb-000057
拥有
Figure PCTCN2018121122-appb-000058
Step 5:
Figure PCTCN2018121122-appb-000053
with
Figure PCTCN2018121122-appb-000054
Interactive computing
Figure PCTCN2018121122-appb-000055
After calculation
Figure PCTCN2018121122-appb-000056
have
Figure PCTCN2018121122-appb-000057
have
Figure PCTCN2018121122-appb-000058
步骤6:
Figure PCTCN2018121122-appb-000059
计算
Figure PCTCN2018121122-appb-000060
Figure PCTCN2018121122-appb-000061
其中h为Gaussian滤波核;
Step 6:
Figure PCTCN2018121122-appb-000059
Calculation
Figure PCTCN2018121122-appb-000060
Figure PCTCN2018121122-appb-000061
Where h is the Gaussian filter kernel;
Figure PCTCN2018121122-appb-000062
计算
Figure PCTCN2018121122-appb-000063
Figure PCTCN2018121122-appb-000064
Figure PCTCN2018121122-appb-000062
Calculation
Figure PCTCN2018121122-appb-000063
Figure PCTCN2018121122-appb-000064
步骤7:
Figure PCTCN2018121122-appb-000065
Figure PCTCN2018121122-appb-000066
交互计算
Figure PCTCN2018121122-appb-000067
计算后
Figure PCTCN2018121122-appb-000068
拥有
Figure PCTCN2018121122-appb-000069
拥有
Figure PCTCN2018121122-appb-000070
Step 7:
Figure PCTCN2018121122-appb-000065
with
Figure PCTCN2018121122-appb-000066
Interactive computing
Figure PCTCN2018121122-appb-000067
After calculation
Figure PCTCN2018121122-appb-000068
have
Figure PCTCN2018121122-appb-000069
have
Figure PCTCN2018121122-appb-000070
步骤8:
Figure PCTCN2018121122-appb-000071
Figure PCTCN2018121122-appb-000072
交互计算
Figure PCTCN2018121122-appb-000073
计算后
Figure PCTCN2018121122-appb-000074
拥有
Figure PCTCN2018121122-appb-000075
拥有
Figure PCTCN2018121122-appb-000076
Step 8:
Figure PCTCN2018121122-appb-000071
with
Figure PCTCN2018121122-appb-000072
Interactive computing
Figure PCTCN2018121122-appb-000073
After calculation
Figure PCTCN2018121122-appb-000074
have
Figure PCTCN2018121122-appb-000075
have
Figure PCTCN2018121122-appb-000076
步骤9:
Figure PCTCN2018121122-appb-000077
Figure PCTCN2018121122-appb-000078
交互计算
Figure PCTCN2018121122-appb-000079
计算后
Figure PCTCN2018121122-appb-000080
拥有
Figure PCTCN2018121122-appb-000081
拥有
Figure PCTCN2018121122-appb-000082
Step 9:
Figure PCTCN2018121122-appb-000077
with
Figure PCTCN2018121122-appb-000078
Interactive computing
Figure PCTCN2018121122-appb-000079
After calculation
Figure PCTCN2018121122-appb-000080
have
Figure PCTCN2018121122-appb-000081
have
Figure PCTCN2018121122-appb-000082
步骤10:
Figure PCTCN2018121122-appb-000083
Figure PCTCN2018121122-appb-000084
交互计算
Figure PCTCN2018121122-appb-000085
计算后
Figure PCTCN2018121122-appb-000086
拥有
Figure PCTCN2018121122-appb-000087
拥有
Figure PCTCN2018121122-appb-000088
Step 10:
Figure PCTCN2018121122-appb-000083
with
Figure PCTCN2018121122-appb-000084
Interactive computing
Figure PCTCN2018121122-appb-000085
After calculation
Figure PCTCN2018121122-appb-000086
have
Figure PCTCN2018121122-appb-000087
have
Figure PCTCN2018121122-appb-000088
步骤11:
Figure PCTCN2018121122-appb-000089
Figure PCTCN2018121122-appb-000090
交互计算
Figure PCTCN2018121122-appb-000091
计算后
Figure PCTCN2018121122-appb-000092
拥有A (1)
Figure PCTCN2018121122-appb-000093
拥有A (2)
Step 11:
Figure PCTCN2018121122-appb-000089
with
Figure PCTCN2018121122-appb-000090
Interactive computing
Figure PCTCN2018121122-appb-000091
After calculation
Figure PCTCN2018121122-appb-000092
Owns A (1)
Figure PCTCN2018121122-appb-000093
Owns A (2) ;
步骤12:
Figure PCTCN2018121122-appb-000094
计算
Figure PCTCN2018121122-appb-000095
Figure PCTCN2018121122-appb-000096
其中t为Harris角点检查常数;
Step 12:
Figure PCTCN2018121122-appb-000094
Calculation
Figure PCTCN2018121122-appb-000095
Figure PCTCN2018121122-appb-000096
Where t is the Harris corner check constant;
Figure PCTCN2018121122-appb-000097
计算
Figure PCTCN2018121122-appb-000098
Figure PCTCN2018121122-appb-000099
Figure PCTCN2018121122-appb-000097
Calculation
Figure PCTCN2018121122-appb-000098
Figure PCTCN2018121122-appb-000099
步骤13:
Figure PCTCN2018121122-appb-000100
Figure PCTCN2018121122-appb-000101
各生成一个l m×l m大小的全零矩阵H,用于存放Harris角点;对所有的i和j,
Figure PCTCN2018121122-appb-000102
密文形式下计算系数块U (1)(8i+1:8i+8,8j+1:8j+8)和U (2)(8i+1:8i+8,8j+1:8j+8)对应的明文U(8i+1:8i+8,8j+1:8j+8)的局部最小值, 方法为:
Step 13:
Figure PCTCN2018121122-appb-000100
with
Figure PCTCN2018121122-appb-000101
Generate an all-zero matrix H of size l m × l m for storing Harris corners; for all i and j,
Figure PCTCN2018121122-appb-000102
Calculate coefficient blocks U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8) and U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form The corresponding local minimum of the plaintext U (8i + 1: 8i + 8,8j + 1: 8j + 8), the method is:
步骤13-1:
Figure PCTCN2018121122-appb-000103
Figure PCTCN2018121122-appb-000104
均令θ m=8i+1,θ n=8j+1;
Step 13-1:
Figure PCTCN2018121122-appb-000103
with
Figure PCTCN2018121122-appb-000104
Let θ m = 8i + 1, θ n = 8j + 1 both;
步骤13-2:对所有的8i+1<m≤8i+8,8j+1<n≤8j+8,
Figure PCTCN2018121122-appb-000105
Figure PCTCN2018121122-appb-000106
交互计算b=SCP(U (1)mn)-U (1)(m,n),U (2)mn)-U (2)(m,n)),计算后
Figure PCTCN2018121122-appb-000107
Figure PCTCN2018121122-appb-000108
均拥有b;若b=0,
Figure PCTCN2018121122-appb-000109
Figure PCTCN2018121122-appb-000110
均令θ m=m,θ n=n;
Step 13-2: For all 8i + 1 <m≤8i + 8, 8j + 1 <n≤8j + 8
Figure PCTCN2018121122-appb-000105
with
Figure PCTCN2018121122-appb-000106
Interactive calculation b = SCP (U (1)m , θ n ) -U (1) (m, n), U (2)m , θ n ) -U (2) (m, n)) After calculation
Figure PCTCN2018121122-appb-000107
with
Figure PCTCN2018121122-appb-000108
Both have b; if b = 0,
Figure PCTCN2018121122-appb-000109
with
Figure PCTCN2018121122-appb-000110
Let θ m = m and θ n = n both;
步骤13-3:
Figure PCTCN2018121122-appb-000111
Figure PCTCN2018121122-appb-000112
均令H(θ mn)=1;
Step 13-3:
Figure PCTCN2018121122-appb-000111
with
Figure PCTCN2018121122-appb-000112
Let H (θ m , θ n ) = 1;
计算后,
Figure PCTCN2018121122-appb-000113
Figure PCTCN2018121122-appb-000114
均拥有检测到的Harris角点H。
After calculation,
Figure PCTCN2018121122-appb-000113
with
Figure PCTCN2018121122-appb-000114
Each has a detected Harris corner H.
优选的,步骤S2-2,提取兴趣点描述子具体包括:Preferably, in step S2-2, extracting the point of interest descriptor specifically includes:
计算前,
Figure PCTCN2018121122-appb-000115
拥有图像密文I (1),检测到的Harris角点H,
Figure PCTCN2018121122-appb-000116
拥有图像密文I (2),检测到的Harris角点H
Before calculation,
Figure PCTCN2018121122-appb-000115
Have image ciphertext I (1) , Harris corner H detected,
Figure PCTCN2018121122-appb-000116
Own image ciphertext I (2) , Harris corner H detected
步骤1:
Figure PCTCN2018121122-appb-000117
生成一个l m×l m×49大小的三维全零矩阵D (1)
Figure PCTCN2018121122-appb-000118
生成一同样大小的三维全零矩阵D (2),均用来存放兴趣点描述子;
step 1:
Figure PCTCN2018121122-appb-000117
Generate a three-dimensional all-zeros matrix D (1) of size l m × l m × 49,
Figure PCTCN2018121122-appb-000118
Generate a three-dimensional all-zero matrix D (2) of the same size, which is used to store the descriptors of points of interest;
步骤2:对于所有的满足H(i,j)=1的i和j,密文形式下计算兴趣点描述子,方法为:Step 2: For all i and j that satisfy H (i, j) = 1, calculate the point of interest descriptor in ciphertext form:
步骤2-1:
Figure PCTCN2018121122-appb-000119
计算
Figure PCTCN2018121122-appb-000120
其中FFT()表示快速Fourier变换,LPM()表示log-polar映射,
Figure PCTCN2018121122-appb-000121
表示I (1)中以(i,j)为中心的7×7的像素块;
Step 2-1:
Figure PCTCN2018121122-appb-000119
Calculation
Figure PCTCN2018121122-appb-000120
Where FFT () represents fast Fourier transform and LPM () represents log-polar mapping
Figure PCTCN2018121122-appb-000121
Represents a 7 × 7 pixel block with (i, j) as the center in I (1) ;
Figure PCTCN2018121122-appb-000122
计算
Figure PCTCN2018121122-appb-000123
其中
Figure PCTCN2018121122-appb-000124
表示I (2)中以(i,j)为中心的7×7的像素块;
Figure PCTCN2018121122-appb-000122
Calculation
Figure PCTCN2018121122-appb-000123
among them
Figure PCTCN2018121122-appb-000124
Represents a 7 × 7 pixel block centered at (i, j ) in I (2) ;
步骤2-2:
Figure PCTCN2018121122-appb-000125
令D (1)(i,j,:)=[F (1)(1,1),…,F (1)(1,7),…,F (1)(7,1),…,F (1)(7,7)];
Step 2-2:
Figure PCTCN2018121122-appb-000125
Let D (1) (i, j, :) = [F (1) (1,1), ..., F (1) (1,7), ..., F (1) (7,1), ..., F (1) (7,7)];
Figure PCTCN2018121122-appb-000126
令D (2)(i,j,:)=[F (2)(1,1),…,F (2)(1,7),…,F (2)(7,1),…,F (2)(7,7)]。
Figure PCTCN2018121122-appb-000126
Let D (2) (i, j, :) = [F (2) (1,1), ..., F (2) (1,7), ..., F (2) (7,1), ..., F (2) (7,7)].
计算后,
Figure PCTCN2018121122-appb-000127
拥有密文形式的兴趣点描述子D (1)
Figure PCTCN2018121122-appb-000128
拥有密文形式的兴趣点描述子D (2)
After calculation,
Figure PCTCN2018121122-appb-000127
Has a point of interest descriptor D (1) in cipher text,
Figure PCTCN2018121122-appb-000128
The point-of-interest descriptor D (2) in ciphertext form.
优选的,步骤S2-3,兴趣点匹配具体包括:Preferably, in step S2-3, the interest point matching specifically includes:
计算前,
Figure PCTCN2018121122-appb-000129
拥有密文形式的兴趣点描述子D (1)
Figure PCTCN2018121122-appb-000130
拥有密文形式的兴趣点描述子D (2)
Figure PCTCN2018121122-appb-000131
Figure PCTCN2018121122-appb-000132
均拥有控制参数α和β,共享密钥集
Figure PCTCN2018121122-appb-000133
Before calculation,
Figure PCTCN2018121122-appb-000129
Has a point of interest descriptor D (1) in cipher text,
Figure PCTCN2018121122-appb-000130
Has a point of interest descriptor D (2) in ciphertext,
Figure PCTCN2018121122-appb-000131
with
Figure PCTCN2018121122-appb-000132
Both have control parameters α and β, shared key set
Figure PCTCN2018121122-appb-000133
步骤1:
Figure PCTCN2018121122-appb-000134
生成一个l D×6大小的矩阵T (1),其中l D是D (1)(i,j,:)≠0的所有(i,j)的个数,
Figure PCTCN2018121122-appb-000135
生成一个同样大小的矩阵T (2),注意D (1)(i,j,:)≠0的(i,j)一定同时满足D (2)(i,j,:)≠0;
step 1:
Figure PCTCN2018121122-appb-000134
Generate a l D × 6 matrix T (1) , where l D is the number of all (i, j) with D (1) (i, j, :) ≠ 0,
Figure PCTCN2018121122-appb-000135
Generate a matrix T (2) of the same size. Note that (i, j ) with D (1) (i, j, :) ≠ 0 must also satisfy D (2) (i, j, :) ≠ 0;
步骤2:用p表示当前匹配的特征点的索引,
Figure PCTCN2018121122-appb-000136
Figure PCTCN2018121122-appb-000137
均从第一个特征点开始匹配,即令p=1,找到满足D (1)(i,j,:)≠0的最小的i和对应的j;
Step 2: Use p to represent the index of the currently matched feature points,
Figure PCTCN2018121122-appb-000136
with
Figure PCTCN2018121122-appb-000137
Both start from the first feature point, that is, let p = 1, find the smallest i and corresponding j that satisfy D (1) (i, j, :) ≠ 0;
步骤3:密文形式下寻找与(i,j)处描述子最近临的描述子及其位置,方法为:Step 3: In cipher text form, find the descriptor closest to the descriptor at (i, j) and its location. The method is:
步骤3-1:
Figure PCTCN2018121122-appb-000138
令T (1)(p,1)=i,T (1)(p,2)=j,若存在q<p满足T (1)(q,3)=i,T (1)(q,4)=j,则令T (1)(p,3)=T (1)(q,1),T (1)(p,4)=T (1)(q,2),T (1)(p,5)=T (1)(q,5),否则令T (1)(p,5)=inf;
Step 3-1:
Figure PCTCN2018121122-appb-000138
Let T (1) (p, 1) = i, T (1) (p, 2) = j, if q <p satisfies T (1) (q, 3) = i, T (1) (q, 4) = j, then let T (1) (p, 3) = T (1) (q, 1), T (1) (p, 4) = T (1) (q, 2), T (1 ) (p, 5) = T (1) (q, 5), otherwise let T (1) (p, 5) = inf;
Figure PCTCN2018121122-appb-000139
令T (2)(p,1)=i,T (2)(p,2)=j,若存在q<p满足T (2)(q,3)=i,T (2)(q,4)=j,则令T (2)(p,3)=T (2)(q,1),T (2)(p,4)=T (2)(q,2),T (2)(p,5)=T (2)(q,5),否则令T (1)(p,5)=0;
Figure PCTCN2018121122-appb-000139
Let T (2) (p, 1) = i, T (2) (p, 2) = j, if q <p satisfies T (2) (q, 3) = i, T (2) (q, 4) = j, then let T (2) (p, 3) = T (2) (q, 1), T (2) (p, 4) = T (2) (q, 2), T (2 ) (p, 5) = T (2) (q, 5), otherwise let T (1) (p, 5) = 0;
步骤3-2:对于任意(i′,j′),如果满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)&&((i′-i) 2+(j′-j) 2)>α,密文形式下判断该位置处描述子是否和(i,j)处描述子最近,方法为: Step 3-2: For any (i ′, j ′), if D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j) && ((i′- i) 2 + (j′-j) 2 )> α, to determine whether the descriptor at this position is closest to the descriptor at (i, j) in cipher text, the method is:
步骤3-2-1:
Figure PCTCN2018121122-appb-000140
Figure PCTCN2018121122-appb-000141
交互计算
Figure PCTCN2018121122-appb-000142
计算后
Figure PCTCN2018121122-appb-000143
拥有
Figure PCTCN2018121122-appb-000144
拥有
Figure PCTCN2018121122-appb-000145
Step 3-2-1:
Figure PCTCN2018121122-appb-000140
with
Figure PCTCN2018121122-appb-000141
Interactive computing
Figure PCTCN2018121122-appb-000142
After calculation
Figure PCTCN2018121122-appb-000143
have
Figure PCTCN2018121122-appb-000144
have
Figure PCTCN2018121122-appb-000145
步骤3-2-2:
Figure PCTCN2018121122-appb-000146
Figure PCTCN2018121122-appb-000147
交互计算
Figure PCTCN2018121122-appb-000148
计算后
Figure PCTCN2018121122-appb-000149
拥有
Figure PCTCN2018121122-appb-000150
拥有
Figure PCTCN2018121122-appb-000151
Step 3-2-2:
Figure PCTCN2018121122-appb-000146
with
Figure PCTCN2018121122-appb-000147
Interactive computing
Figure PCTCN2018121122-appb-000148
After calculation
Figure PCTCN2018121122-appb-000149
have
Figure PCTCN2018121122-appb-000150
have
Figure PCTCN2018121122-appb-000151
步骤3-2-3:
Figure PCTCN2018121122-appb-000152
Figure PCTCN2018121122-appb-000153
交互计算
Figure PCTCN2018121122-appb-000154
计算后
Figure PCTCN2018121122-appb-000155
拥有
Figure PCTCN2018121122-appb-000156
拥有
Figure PCTCN2018121122-appb-000157
Step 3-2-3:
Figure PCTCN2018121122-appb-000152
with
Figure PCTCN2018121122-appb-000153
Interactive computing
Figure PCTCN2018121122-appb-000154
After calculation
Figure PCTCN2018121122-appb-000155
have
Figure PCTCN2018121122-appb-000156
have
Figure PCTCN2018121122-appb-000157
步骤3-2-4:
Figure PCTCN2018121122-appb-000158
Figure PCTCN2018121122-appb-000159
交互计算
Figure PCTCN2018121122-appb-000160
计算后
Figure PCTCN2018121122-appb-000161
拥有
Figure PCTCN2018121122-appb-000162
拥有
Figure PCTCN2018121122-appb-000163
Step 3-2-4:
Figure PCTCN2018121122-appb-000158
with
Figure PCTCN2018121122-appb-000159
Interactive computing
Figure PCTCN2018121122-appb-000160
After calculation
Figure PCTCN2018121122-appb-000161
have
Figure PCTCN2018121122-appb-000162
have
Figure PCTCN2018121122-appb-000163
步骤3-2-5:
Figure PCTCN2018121122-appb-000164
计算
Figure PCTCN2018121122-appb-000165
Figure PCTCN2018121122-appb-000166
Step 3-2-5:
Figure PCTCN2018121122-appb-000164
Calculation
Figure PCTCN2018121122-appb-000165
Figure PCTCN2018121122-appb-000166
Figure PCTCN2018121122-appb-000167
计算
Figure PCTCN2018121122-appb-000168
Figure PCTCN2018121122-appb-000169
Figure PCTCN2018121122-appb-000167
Calculation
Figure PCTCN2018121122-appb-000168
Figure PCTCN2018121122-appb-000169
步骤3-2-6:
Figure PCTCN2018121122-appb-000170
计算u (1)=(U (1)(1)+…+U (1)(49));
Step 3-2-6:
Figure PCTCN2018121122-appb-000170
Calculate u (1) = (U (1) (1) + ... + U (1) (49));
Figure PCTCN2018121122-appb-000171
计算u (2)=(U (2)(1)+…+U (2)(49));
Figure PCTCN2018121122-appb-000171
Calculate u (2) = (U (2) (1) + ... + U (2) (49));
步骤3-2-7:
Figure PCTCN2018121122-appb-000172
Figure PCTCN2018121122-appb-000173
交互计算b=SCP(T (1)(p,5)-u (1),T (2)(p,5)-u (2)),计算后
Figure PCTCN2018121122-appb-000174
Figure PCTCN2018121122-appb-000175
均拥有b;
Step 3-2-7:
Figure PCTCN2018121122-appb-000172
with
Figure PCTCN2018121122-appb-000173
Interactive calculation b = SCP (T (1) (p, 5) -u (1) , T (2) (p, 5) -u (2) ), after calculation
Figure PCTCN2018121122-appb-000174
with
Figure PCTCN2018121122-appb-000175
Both have b;
步骤3-2-8:如果b=1,
Figure PCTCN2018121122-appb-000176
令T (1)(p,3)=,T (1)(p,4)=j′,T (1)(p,6)=T (1)(p,5),T (1)(p,5)=u (1)
Figure PCTCN2018121122-appb-000177
令T (2)(p,3)=i′,T (2)(p,4)=j′,T (2)(p,6)=T (2)(p,5),T (2)(p,5)=u (2)
Step 3-2-8: If b = 1,
Figure PCTCN2018121122-appb-000176
Let T (1) (p, 3) =, T (1) (p, 4) = j ', T (1) (p, 6) = T (1) (p, 5), T (1) ( p, 5) = u (1) ,
Figure PCTCN2018121122-appb-000177
Let T (2) (p, 3) = i ', T (2) (p, 4) = j', T (2) (p, 6) = T (2) (p, 5), T (2 ) (p, 5) = u (2) .
步骤3-3:
Figure PCTCN2018121122-appb-000178
Figure PCTCN2018121122-appb-000179
交互计算b=SCP(T (1)(p,5)×β-T (1)(p,6),T (2)(p,5)×β-T (2)(p,6)),计算后
Figure PCTCN2018121122-appb-000180
Figure PCTCN2018121122-appb-000181
均拥有b;
Step 3-3:
Figure PCTCN2018121122-appb-000178
with
Figure PCTCN2018121122-appb-000179
Interactive calculation b = SCP (T (1) (p, 5) × β-T (1) (p, 6), T (2) (p, 5) × β-T (2) (p, 6)) After calculation
Figure PCTCN2018121122-appb-000180
with
Figure PCTCN2018121122-appb-000181
Both have b;
步骤3-4:如果b=1,
Figure PCTCN2018121122-appb-000182
令T (1)(p,3)=0,T (1)(p,4)=0,T (1)(p,5)=inf,
Step 3-4: If b = 1,
Figure PCTCN2018121122-appb-000182
Let T (1) (p, 3) = 0, T (1) (p, 4) = 0, T (1) (p, 5) = inf,
Figure PCTCN2018121122-appb-000183
令T (2)(p,3)=0,T (2)(p,4)=0,T (2)(p,5)=0;
Figure PCTCN2018121122-appb-000183
Let T (2) (p, 3) = 0, T (2) (p, 4) = 0, T (2) (p, 5) = 0;
步骤4:寻找满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)的最小的i′和对应的j′,若存在,
Figure PCTCN2018121122-appb-000184
Figure PCTCN2018121122-appb-000185
均令p=p+1,i=i′,j=j′,返回步骤3重新执行,否则转至步骤5;
Step 4: Find the smallest i ′ and corresponding j ′ that satisfy D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j), if they exist,
Figure PCTCN2018121122-appb-000184
with
Figure PCTCN2018121122-appb-000185
Let p = p + 1, i = i ′, j = j ′, return to step 3 and execute again, otherwise go to step 5;
步骤5:密文形式下对T (1)和T (2)对应的明文T按照T(:,5)的大小重排序; Step 5: The plaintext T corresponding to T (1) and T (2) is reordered in the cipher text form according to the size of T (:, 5);
步骤6:对于所有l D≥i>1,如果(T (1)(i,1)>T (1)(i,3)||T (1)(i,2)>T (1)(i,4)),则
Figure PCTCN2018121122-appb-000186
交 互T (1)(i,1)和T (1)(i,3),T (1)(i,2)和T (1)(i,4);
Step 6: For all l D ≥i> 1, if (T (1) (i, 1)> T (1) (i, 3) || T (1) (i, 2)> T (1) ( i, 4)), then
Figure PCTCN2018121122-appb-000186
Interacting T (1) (i, 1) and T (1) (i, 3), T (1) (i, 2) and T (1) (i, 4);
如果(T (2)(i,1)>T (2)(i,3)||T (2)(i,2)>T (2)(i,4)),则
Figure PCTCN2018121122-appb-000187
交互T (2)(i,1)和T (2)(i,3),T (2)(i,2)和T (2)(i,4);
If (T (2) (i, 1)> T (2) (i, 3) || T (2) (i, 2)> T (2) (i, 4)), then
Figure PCTCN2018121122-appb-000187
Interacting T (2) (i, 1) and T (2) (i, 3), T (2) (i, 2) and T (2) (i, 4);
步骤7:如果存在l D≥i>j满足T (1)(i,:)=T (1)(j,:),则
Figure PCTCN2018121122-appb-000188
删去T (1)(i,:);
Step 7: If l D ≥i> j satisfies T (1) (i,:) = T (1) (j, :), then
Figure PCTCN2018121122-appb-000188
Delete T (1) (i, :);
如果存在l D≥i>j满足T (2)(i,:)=T (2)(j,:),则
Figure PCTCN2018121122-appb-000189
删去T (2)(i,:);
If l D ≥i> j satisfies T (2) (i, :) = T (2) (j, :), then
Figure PCTCN2018121122-appb-000189
Delete T (2) (i, :);
计算后,
Figure PCTCN2018121122-appb-000190
拥有密文形式的排序好的p个匹配特征点T (1)
Figure PCTCN2018121122-appb-000191
拥有密文形式的排序好的p个匹配特征点T (2)
After calculation,
Figure PCTCN2018121122-appb-000190
Ranked p matching feature points T (1) in ciphertext form,
Figure PCTCN2018121122-appb-000191
Ranked p matching feature points T (2) in ciphertext form.
优选的,密文形式下对T (1)和T (2)对应的明文T按照T(:,5)的大小重排序,方法为: Preferably, the plaintext T corresponding to T (1) and T (2) in the cipher text form is reordered according to the size of T (:, 5) by the method:
步骤5-1:
Figure PCTCN2018121122-appb-000192
Figure PCTCN2018121122-appb-000193
均令i=1;
Step 5-1:
Figure PCTCN2018121122-appb-000192
with
Figure PCTCN2018121122-appb-000193
Let i = 1;
步骤5-2:密文形式下求得T(i:l D,5)的最小值的位置,方法为: Step 5-2: Find the position of the minimum value of T (i: l D , 5) in ciphertext form, the method is:
步骤5-2-1:
Figure PCTCN2018121122-appb-000194
Figure PCTCN2018121122-appb-000195
均令θ=i;
Step 5-2-1:
Figure PCTCN2018121122-appb-000194
with
Figure PCTCN2018121122-appb-000195
Let θ = i;
步骤5-2-2:对于所有的l D≥i′>i,
Figure PCTCN2018121122-appb-000196
Figure PCTCN2018121122-appb-000197
交互计算b=SCP(T (1)(θ,5)-T (1)(i′,5),T (2)(θ,5)-T (2)(i′,5)),计算后
Figure PCTCN2018121122-appb-000198
Figure PCTCN2018121122-appb-000199
均拥有b;若b=1,
Figure PCTCN2018121122-appb-000200
Figure PCTCN2018121122-appb-000201
均令θ=i′;
Step 5-2-2: For all l D ≥i ′> i,
Figure PCTCN2018121122-appb-000196
with
Figure PCTCN2018121122-appb-000197
Interactive calculation b = SCP (T (1) (θ, 5) -T (1) (i ′, 5), T (2) (θ, 5) -T (2) (i ′, 5)), calculate Rear
Figure PCTCN2018121122-appb-000198
with
Figure PCTCN2018121122-appb-000199
Both have b; if b = 1,
Figure PCTCN2018121122-appb-000200
with
Figure PCTCN2018121122-appb-000201
Let θ = i ′;
步骤5-3:
Figure PCTCN2018121122-appb-000202
交换T (1)(θ,:)和T (1)(i,:);
Figure PCTCN2018121122-appb-000203
交换T (2)(θ,:)和T (2)(i,:);
Step 5-3:
Figure PCTCN2018121122-appb-000202
Exchange T (1) (θ, :) and T (1) (i, :);
Figure PCTCN2018121122-appb-000203
Exchange T (2) (θ, :) and T (2) (i, :);
步骤5-4:
Figure PCTCN2018121122-appb-000204
Figure PCTCN2018121122-appb-000205
均令i=i+1,若i≤l D,返回步骤5-2重新执行,否则转至步骤6。
Step 5-4:
Figure PCTCN2018121122-appb-000204
with
Figure PCTCN2018121122-appb-000205
Let i = i + 1, if i ≤ l D , return to step 5-2 and execute again, otherwise go to step 6.
优选的,步骤S2-4,篡改区域定位具体包括:Preferably, in step S2-4, the location of the tampering area specifically includes:
计算前,
Figure PCTCN2018121122-appb-000206
p=1,2,拥有密文形式的排序好的匹配特征点T (1)
Figure PCTCN2018121122-appb-000207
拥有控制参数γ和δ;
Before calculation,
Figure PCTCN2018121122-appb-000206
p = 1,2, with sorted matching feature points T (1) in ciphertext form,
Figure PCTCN2018121122-appb-000207
Have control parameters γ and δ;
步骤1:
Figure PCTCN2018121122-appb-000208
生成l m×l m大小的全零矩阵E,并令i=1;
step 1:
Figure PCTCN2018121122-appb-000208
Generate an all-zero matrix E of size l m × l m , and let i = 1;
步骤2:
Figure PCTCN2018121122-appb-000209
寻找与T (1)(i,:)位置满足距离小于γ的点的个数,方法为:
Step 2:
Figure PCTCN2018121122-appb-000209
Find the number of points that satisfy the distance less than γ from the T (1) (i, :) position by the method:
步骤2-1:
Figure PCTCN2018121122-appb-000210
令n=0,j=i+1,集合ε={i};
Step 2-1:
Figure PCTCN2018121122-appb-000210
Let n = 0, j = i + 1, and set ε = {i};
步骤2-2:
Figure PCTCN2018121122-appb-000211
计算a=(T (1)(i,1)-T (1)(j,1)) 2+(T (1)(i,2)-T (1)(j,2)) 2,b=(T (1)(i,3)-T (1)(j,3)) 2+(T (1)(i,4)-T (1)(j,4)) 2
Step 2-2:
Figure PCTCN2018121122-appb-000211
Calculate a = (T (1) (i, 1) -T (1) (j, 1)) 2 + (T (1) (i, 2) -T (1) (j, 2)) 2 , b = (T (1) (i, 3) -T (1) (j, 3)) 2 + (T (1) (i, 4) -T (1) (j, 4)) 2 ;
步骤2-3:若满足a>γ&&b>r/2&&b<2r,则
Figure PCTCN2018121122-appb-000212
令n=n+1,ε=ε+{j};
Step 2-3: If a> γ &&b> r / 2 && b <2r is satisfied, then
Figure PCTCN2018121122-appb-000212
Let n = n + 1, ε = ε + {j};
步骤2-4:令j=j+1,若j≤l D,返回步骤2-2重新执行,否则转至步骤3; Step 2-4: Let j = j + 1, if j≤l D , return to step 2-2 and execute again, otherwise go to step 3;
步骤3:若n≥δ,则对于所有的j∈ε 1
Figure PCTCN2018121122-appb-000213
令E(T (1)(j,1),T (1)(j,2))=i,E(T (1)(j,3),T (1)(j,4))=-i;
Step 3: If n≥δ, then for all j∈ε 1 ,
Figure PCTCN2018121122-appb-000213
Let E (T (1) (j, 1), T (1) (j, 2)) = i, E (T (1) (j, 3), T (1) (j, 4)) =- i;
步骤4:
Figure PCTCN2018121122-appb-000214
寻找将所有E(j,k)=i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
Figure PCTCN2018121122-appb-000215
令E(j′,k′)=i;
Step 4:
Figure PCTCN2018121122-appb-000214
Find the smallest circle that includes all points (j, k) where E (j, k) = i, and get all points (j ′, k ′) located inside the circle
Figure PCTCN2018121122-appb-000215
Let E (j ′, k ′) = i;
步骤5:
Figure PCTCN2018121122-appb-000216
寻找将所有E(j,k)=-i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
Figure PCTCN2018121122-appb-000217
令E(j′,k′)=-i;
Step 5:
Figure PCTCN2018121122-appb-000216
Find the smallest circle that includes all points (j, k) where E (j, k) = -i, and obtain all points (j ′, k ′) located inside the circle
Figure PCTCN2018121122-appb-000217
Let E (j ′, k ′) =-i;
步骤6:令i=i+1,若i≤5,返回步骤2-3重新执行,否则结束执行;Step 6: Let i = i + 1, if i≤5, return to step 2-3 and execute again, otherwise end execution;
计算后,
Figure PCTCN2018121122-appb-000218
p=1,2,拥有疑似篡改区域E。
After calculation,
Figure PCTCN2018121122-appb-000218
p = 1, 2 and has a suspected tampering area E.
优选的,步骤S3,用户端
Figure PCTCN2018121122-appb-000219
获得检测结果和疑似篡改区域具体包括:
Preferably, in step S3, the client
Figure PCTCN2018121122-appb-000219
Obtaining detection results and suspected tampering areas include:
计算前,
Figure PCTCN2018121122-appb-000220
拥有疑似篡改区域E,拼接的两个区域分布被标注为i和-i,i∈{1,…,5};
Before calculation,
Figure PCTCN2018121122-appb-000220
With the suspected tampering area E, the two areas of the stitching are labeled as i and -i, i ∈ {1, ..., 5}
步骤1:
Figure PCTCN2018121122-appb-000221
将E通过安全信道发送给
Figure PCTCN2018121122-appb-000222
step 1:
Figure PCTCN2018121122-appb-000221
Send E over a secure channel to
Figure PCTCN2018121122-appb-000222
计算后,
Figure PCTCN2018121122-appb-000223
拥有疑似篡改区域E。
After calculation,
Figure PCTCN2018121122-appb-000223
Possess suspected tampering area E.
本发明与现有技术相比,具有如下优点和有益效果:Compared with the prior art, the present invention has the following advantages and beneficial effects:
1、本发明提供了具有隐私保护能力的图像区域复制取证方法,服务端可以在不知晓图像内容的前提下实现对图像区域复制操作的检测和疑似篡改区域的定位,该效果是本发明使用的图像加密技术和提出的基于多方安全计算的取证算法带来的。1. The present invention provides a method for forensic copying of image areas with privacy protection capabilities. The server can detect the copy operation of the image area and locate the suspected tampering area without knowing the content of the image. Image encryption technology and the proposed forensic algorithm based on multi-party secure computing.
2、本发明提供的取证方法具有较高的计算效率和较好的精确度,该效果是本发明提出的计算量较低的图像取证流程、安全多方乘法协议、安全多方比较协议带来的。由于在区域定 位操作同时定位了多个区域,本发明可用于检测具有多个复制区域的篡改图像。2. The forensic method provided by the present invention has higher calculation efficiency and better accuracy, and the effect is brought about by the image forensics flow, the secure multi-party multiplication protocol, and the secure multi-party comparison protocol, which are proposed by the present invention, and have a relatively low calculation amount. Since multiple regions are located simultaneously in the region positioning operation, the present invention can be used to detect a tampered image with multiple copied regions.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是实施例方法整体流程图。FIG. 1 is an overall flowchart of the method of the embodiment.
图2是拼接区域篡改定位计算流程图。FIG. 2 is a flowchart of tampering positioning calculation of a stitching region.
具体实施方式detailed description
下面结合实施例及附图对本发明作进一步详细的描述,但本发明的实施方式不限于此。The present invention is described in further detail below with reference to the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.
实施例1Example 1
本发明结合多方安全计算、图像兴趣点描述子提取和最近邻搜索技术,以在保护图像内容隐私的前提下,实现图像区域复制的检测和定位。为了实现图像内容的保密,本发明使用图像加密将图像分拆为两个图像密文。为了在满足隐私保护的前提下实现图像取证,本发明设计基于安全多方计算的取证算法,通过3个服务端的交互,来实现在不知晓对方密文的前提下,提取兴趣点描述子,并寻找最匹配描述子。为了保证算法执行的效率和准确率,本发明设计了简单的图像取证流程和安全多方计算协议。The invention combines multi-party secure computing, image interest point descriptor extraction, and nearest neighbor search technologies to realize the detection and location of image region replication on the premise of protecting the privacy of image content. In order to achieve the confidentiality of image content, the present invention uses image encryption to split the image into two image ciphertexts. In order to achieve image forensics under the premise of privacy protection, the present invention designs a forensic algorithm based on secure multi-party calculations. Through the interaction of three servers, it can extract the interest point descriptor without knowing the ciphertext of the other party, and find Best match descriptor. In order to ensure the efficiency and accuracy of algorithm execution, the present invention designs a simple image forensics process and a secure multi-party computing protocol.
本实施例中存在4个个体:1个用户端
Figure PCTCN2018121122-appb-000224
3个相互独立的云服务端,其中2个服务端,
Figure PCTCN2018121122-appb-000225
Figure PCTCN2018121122-appb-000226
用于密文存储,1个服务端,
Figure PCTCN2018121122-appb-000227
用于密文计算,如图1所示。
Figure PCTCN2018121122-appb-000228
利用图像加密算法将图像分拆为两个密文,分别交给
Figure PCTCN2018121122-appb-000229
Figure PCTCN2018121122-appb-000230
由这两个服务端和
Figure PCTCN2018121122-appb-000231
通过交互和计算完成密文空间下对图像区域复制篡改操作的检测和定位。最后
Figure PCTCN2018121122-appb-000232
Figure PCTCN2018121122-appb-000233
均获得疑似篡改区域,
Figure PCTCN2018121122-appb-000234
Figure PCTCN2018121122-appb-000235
将结果发送给
Figure PCTCN2018121122-appb-000236
There are 4 individuals in this embodiment: 1 client
Figure PCTCN2018121122-appb-000224
3 independent cloud servers, 2 of them,
Figure PCTCN2018121122-appb-000225
with
Figure PCTCN2018121122-appb-000226
Used for ciphertext storage, 1 server,
Figure PCTCN2018121122-appb-000227
Used for ciphertext calculation, as shown in Figure 1.
Figure PCTCN2018121122-appb-000228
Use the image encryption algorithm to split the image into two ciphertexts and hand them over to
Figure PCTCN2018121122-appb-000229
with
Figure PCTCN2018121122-appb-000230
By these two servers and
Figure PCTCN2018121122-appb-000231
The detection and location of the image tampering operation in the ciphertext space are completed through interaction and calculation. At last
Figure PCTCN2018121122-appb-000232
with
Figure PCTCN2018121122-appb-000233
All obtained suspected tampered areas,
Figure PCTCN2018121122-appb-000234
with
Figure PCTCN2018121122-appb-000235
Send results to
Figure PCTCN2018121122-appb-000236
本实施方案中,用大写字母(如I,J)表示矩阵,用粗体小写字母(如i,j)表示向量,用斜体小写字母(如i,j)表示数,所有的乘法均是按元素乘,如有C=AB,则C中每个元素C(i,j)=A(i,j)×B(i,j)。A*B表示A和B的卷积。具体实施流程如下:In this embodiment, uppercase letters (such as I, J) represent matrices, bold lowercase letters (such as i, j) represent vectors, and italic lowercase letters (such as i, j) represent numbers. All multiplications are performed according to Element multiplication, if C = AB, then each element in C C (i, j) = A (i, j) × B (i, j). A * B represents the convolution of A and B. The specific implementation process is as follows:
一、用户端
Figure PCTCN2018121122-appb-000237
图像密文生成流程
First, the client
Figure PCTCN2018121122-appb-000237
Image ciphertext generation process
计算前,
Figure PCTCN2018121122-appb-000238
拥有一l m×l m大小的待检测图像X。
Before calculation,
Figure PCTCN2018121122-appb-000238
Have an image X to be detected with a size of l m × l m .
步骤1:
Figure PCTCN2018121122-appb-000239
选择一l m×l m大小的随机数矩阵R,其每个元素为0~2 10之间的随机数。生成2份图像密文:
step 1:
Figure PCTCN2018121122-appb-000239
L select a random number R m × l m matrix size, each element of a random number between 0 and 210. Generate 2 image ciphertexts:
I (1)=X+R,I (2)=R I (1) = X + R, I (2) = R
步骤2:
Figure PCTCN2018121122-appb-000240
将I (1)通过安全信道发送给
Figure PCTCN2018121122-appb-000241
将I (2)通过安全信道发送给
Figure PCTCN2018121122-appb-000242
Step 2:
Figure PCTCN2018121122-appb-000240
Send I (1) to the secure channel
Figure PCTCN2018121122-appb-000241
Send I (2) over the secure channel to
Figure PCTCN2018121122-appb-000242
计算后,
Figure PCTCN2018121122-appb-000243
拥有密文I (1)
Figure PCTCN2018121122-appb-000244
拥有密文I (2)
After calculation,
Figure PCTCN2018121122-appb-000243
Owns the ciphertext I (1) ,
Figure PCTCN2018121122-appb-000244
Owns the ciphertext I (2) .
二、云服务端
Figure PCTCN2018121122-appb-000245
Figure PCTCN2018121122-appb-000246
的密文空间下篡改区域检测与定位流程
Cloud server
Figure PCTCN2018121122-appb-000245
with
Figure PCTCN2018121122-appb-000246
Detection and localization process of tampered area in ciphertext space
(1)计算Harris角点:(1) Calculate Harris Corner:
计算前,
Figure PCTCN2018121122-appb-000247
拥有图像密文I (1)
Figure PCTCN2018121122-appb-000248
拥有图像密文I (2)
Figure PCTCN2018121122-appb-000249
Figure PCTCN2018121122-appb-000250
共享密钥集
Figure PCTCN2018121122-appb-000251
Before calculation,
Figure PCTCN2018121122-appb-000247
Has image ciphertext I (1) ,
Figure PCTCN2018121122-appb-000248
Has image ciphertext I (2) ,
Figure PCTCN2018121122-appb-000249
with
Figure PCTCN2018121122-appb-000250
Shared key set
Figure PCTCN2018121122-appb-000251
步骤1:
Figure PCTCN2018121122-appb-000252
计算
Figure PCTCN2018121122-appb-000253
step 1:
Figure PCTCN2018121122-appb-000252
Calculation
Figure PCTCN2018121122-appb-000253
Figure PCTCN2018121122-appb-000254
计算
Figure PCTCN2018121122-appb-000255
Figure PCTCN2018121122-appb-000254
Calculation
Figure PCTCN2018121122-appb-000255
步骤2:
Figure PCTCN2018121122-appb-000256
Figure PCTCN2018121122-appb-000257
交互计算
Figure PCTCN2018121122-appb-000258
计算后
Figure PCTCN2018121122-appb-000259
拥有
Figure PCTCN2018121122-appb-000260
拥有
Figure PCTCN2018121122-appb-000261
Step 2:
Figure PCTCN2018121122-appb-000256
with
Figure PCTCN2018121122-appb-000257
Interactive computing
Figure PCTCN2018121122-appb-000258
After calculation
Figure PCTCN2018121122-appb-000259
have
Figure PCTCN2018121122-appb-000260
have
Figure PCTCN2018121122-appb-000261
步骤3:
Figure PCTCN2018121122-appb-000262
Figure PCTCN2018121122-appb-000263
交互计算
Figure PCTCN2018121122-appb-000264
计算后
Figure PCTCN2018121122-appb-000265
拥有
Figure PCTCN2018121122-appb-000266
拥有
Figure PCTCN2018121122-appb-000267
Step 3:
Figure PCTCN2018121122-appb-000262
with
Figure PCTCN2018121122-appb-000263
Interactive computing
Figure PCTCN2018121122-appb-000264
After calculation
Figure PCTCN2018121122-appb-000265
have
Figure PCTCN2018121122-appb-000266
have
Figure PCTCN2018121122-appb-000267
步骤4:
Figure PCTCN2018121122-appb-000268
Figure PCTCN2018121122-appb-000269
交互计算
Figure PCTCN2018121122-appb-000270
计算后
Figure PCTCN2018121122-appb-000271
拥有
Figure PCTCN2018121122-appb-000272
拥有
Figure PCTCN2018121122-appb-000273
Step 4:
Figure PCTCN2018121122-appb-000268
with
Figure PCTCN2018121122-appb-000269
Interactive computing
Figure PCTCN2018121122-appb-000270
After calculation
Figure PCTCN2018121122-appb-000271
have
Figure PCTCN2018121122-appb-000272
have
Figure PCTCN2018121122-appb-000273
步骤5:
Figure PCTCN2018121122-appb-000274
Figure PCTCN2018121122-appb-000275
交互计算
Figure PCTCN2018121122-appb-000276
计算后
Figure PCTCN2018121122-appb-000277
拥有
Figure PCTCN2018121122-appb-000278
拥有
Figure PCTCN2018121122-appb-000279
Step 5:
Figure PCTCN2018121122-appb-000274
with
Figure PCTCN2018121122-appb-000275
Interactive computing
Figure PCTCN2018121122-appb-000276
After calculation
Figure PCTCN2018121122-appb-000277
have
Figure PCTCN2018121122-appb-000278
have
Figure PCTCN2018121122-appb-000279
步骤6:
Figure PCTCN2018121122-appb-000280
计算
Figure PCTCN2018121122-appb-000281
Figure PCTCN2018121122-appb-000282
其中h为Gaussian滤波核;
Step 6:
Figure PCTCN2018121122-appb-000280
Calculation
Figure PCTCN2018121122-appb-000281
Figure PCTCN2018121122-appb-000282
Where h is the Gaussian filter kernel;
Figure PCTCN2018121122-appb-000283
计算
Figure PCTCN2018121122-appb-000284
Figure PCTCN2018121122-appb-000285
Figure PCTCN2018121122-appb-000283
Calculation
Figure PCTCN2018121122-appb-000284
Figure PCTCN2018121122-appb-000285
步骤7:
Figure PCTCN2018121122-appb-000286
Figure PCTCN2018121122-appb-000287
交互计算
Figure PCTCN2018121122-appb-000288
计算后
Figure PCTCN2018121122-appb-000289
拥有
Figure PCTCN2018121122-appb-000290
拥有
Figure PCTCN2018121122-appb-000291
Step 7:
Figure PCTCN2018121122-appb-000286
with
Figure PCTCN2018121122-appb-000287
Interactive computing
Figure PCTCN2018121122-appb-000288
After calculation
Figure PCTCN2018121122-appb-000289
have
Figure PCTCN2018121122-appb-000290
have
Figure PCTCN2018121122-appb-000291
步骤8:
Figure PCTCN2018121122-appb-000292
Figure PCTCN2018121122-appb-000293
交互计算
Figure PCTCN2018121122-appb-000294
计算后
Figure PCTCN2018121122-appb-000295
拥有
Figure PCTCN2018121122-appb-000296
拥有
Figure PCTCN2018121122-appb-000297
Step 8:
Figure PCTCN2018121122-appb-000292
with
Figure PCTCN2018121122-appb-000293
Interactive computing
Figure PCTCN2018121122-appb-000294
After calculation
Figure PCTCN2018121122-appb-000295
have
Figure PCTCN2018121122-appb-000296
have
Figure PCTCN2018121122-appb-000297
步骤9:
Figure PCTCN2018121122-appb-000298
Figure PCTCN2018121122-appb-000299
交互计算
Figure PCTCN2018121122-appb-000300
计算后
Figure PCTCN2018121122-appb-000301
拥有
Figure PCTCN2018121122-appb-000302
拥有
Figure PCTCN2018121122-appb-000303
Step 9:
Figure PCTCN2018121122-appb-000298
with
Figure PCTCN2018121122-appb-000299
Interactive computing
Figure PCTCN2018121122-appb-000300
After calculation
Figure PCTCN2018121122-appb-000301
have
Figure PCTCN2018121122-appb-000302
have
Figure PCTCN2018121122-appb-000303
步骤10:
Figure PCTCN2018121122-appb-000304
Figure PCTCN2018121122-appb-000305
交互计算
Figure PCTCN2018121122-appb-000306
计算后
Figure PCTCN2018121122-appb-000307
拥有
Figure PCTCN2018121122-appb-000308
拥有
Figure PCTCN2018121122-appb-000309
Step 10:
Figure PCTCN2018121122-appb-000304
with
Figure PCTCN2018121122-appb-000305
Interactive computing
Figure PCTCN2018121122-appb-000306
After calculation
Figure PCTCN2018121122-appb-000307
have
Figure PCTCN2018121122-appb-000308
have
Figure PCTCN2018121122-appb-000309
步骤11:
Figure PCTCN2018121122-appb-000310
Figure PCTCN2018121122-appb-000311
交互计算
Figure PCTCN2018121122-appb-000312
计算后
Figure PCTCN2018121122-appb-000313
拥有A (1)
Figure PCTCN2018121122-appb-000314
拥有A (2)
Step 11:
Figure PCTCN2018121122-appb-000310
with
Figure PCTCN2018121122-appb-000311
Interactive computing
Figure PCTCN2018121122-appb-000312
After calculation
Figure PCTCN2018121122-appb-000313
Owns A (1)
Figure PCTCN2018121122-appb-000314
Owns A (2) ;
步骤12:
Figure PCTCN2018121122-appb-000315
计算
Figure PCTCN2018121122-appb-000316
Figure PCTCN2018121122-appb-000317
其中t为Harris角点检查常数,一般取在0.04-0.06间;
Step 12:
Figure PCTCN2018121122-appb-000315
Calculation
Figure PCTCN2018121122-appb-000316
Figure PCTCN2018121122-appb-000317
Where t is the Harris corner check constant, which is generally taken between 0.04-0.06;
Figure PCTCN2018121122-appb-000318
计算
Figure PCTCN2018121122-appb-000319
Figure PCTCN2018121122-appb-000320
Figure PCTCN2018121122-appb-000318
Calculation
Figure PCTCN2018121122-appb-000319
Figure PCTCN2018121122-appb-000320
步骤13:
Figure PCTCN2018121122-appb-000321
Figure PCTCN2018121122-appb-000322
各生成一个l m×l m大小的全零矩阵H,用于存放Harris角点。对所有的i和j,
Figure PCTCN2018121122-appb-000323
密文形式下计算系数块U (1)(8i+1:8i+8,8j+1:8j+8)和U (2)(8i+1:8i+8,8j+1:8j+8)对应的明文U(8i+1:8i+8,8j+1:8j+8)的局部最小值,方法为:
Step 13:
Figure PCTCN2018121122-appb-000321
with
Figure PCTCN2018121122-appb-000322
An all-zero matrix H of size l m × l m is generated for storing Harris corner points. For all i and j,
Figure PCTCN2018121122-appb-000323
Calculate coefficient blocks U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8) and U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form The corresponding local minimum of plaintext U (8i + 1: 8i + 8,8j + 1: 8j + 8).
步骤13-1:
Figure PCTCN2018121122-appb-000324
Figure PCTCN2018121122-appb-000325
均令θ m=8i+1,θ n=8j+1;
Step 13-1:
Figure PCTCN2018121122-appb-000324
with
Figure PCTCN2018121122-appb-000325
Let θ m = 8i + 1, θ n = 8j + 1 both;
步骤13-2:对所有的8i+1<m≤8i+8,8j+1<n≤8j+8,
Figure PCTCN2018121122-appb-000326
Figure PCTCN2018121122-appb-000327
交互计算b=SCP(U (1)mn)-U (1)(m,n),U (2)mn)-U (2)(m,n)),计算后
Figure PCTCN2018121122-appb-000328
Figure PCTCN2018121122-appb-000329
均拥有b;若b=0,
Figure PCTCN2018121122-appb-000330
Figure PCTCN2018121122-appb-000331
均令θ m=m,θ n=n;
Step 13-2: For all 8i + 1 <m≤8i + 8, 8j + 1 <n≤8j + 8,
Figure PCTCN2018121122-appb-000326
with
Figure PCTCN2018121122-appb-000327
Interactive calculation b = SCP (U (1)m , θ n ) -U (1) (m, n), U (2)m , θ n ) -U (2) (m, n)) After calculation
Figure PCTCN2018121122-appb-000328
with
Figure PCTCN2018121122-appb-000329
Both have b; if b = 0,
Figure PCTCN2018121122-appb-000330
with
Figure PCTCN2018121122-appb-000331
Let θ m = m and θ n = n both;
步骤13-3:
Figure PCTCN2018121122-appb-000332
Figure PCTCN2018121122-appb-000333
均令H(θ mn)=1。
Step 13-3:
Figure PCTCN2018121122-appb-000332
with
Figure PCTCN2018121122-appb-000333
Let H (θ m , θ n ) = 1.
计算后,
Figure PCTCN2018121122-appb-000334
Figure PCTCN2018121122-appb-000335
均拥有检测到的Harris角点H。
After calculation,
Figure PCTCN2018121122-appb-000334
with
Figure PCTCN2018121122-appb-000335
Each has a detected Harris corner H.
(2)提取兴趣点描述子:(2) Extract the point of interest descriptor:
计算前,
Figure PCTCN2018121122-appb-000336
拥有图像密文I (1),检测到的Harris角点H,
Figure PCTCN2018121122-appb-000337
拥有图像密文I (2),检测到的Harris角点H。
Before calculation,
Figure PCTCN2018121122-appb-000336
Have image ciphertext I (1) , Harris corner H detected,
Figure PCTCN2018121122-appb-000337
Have image ciphertext I (2) , Harris corner H detected.
步骤1:
Figure PCTCN2018121122-appb-000338
生成一个l m×l m×49大小的三维全零矩阵D (1)
Figure PCTCN2018121122-appb-000339
生成一同样大小的三维全零矩阵D (2),均用来存放兴趣点描述子;
step 1:
Figure PCTCN2018121122-appb-000338
Generate a three-dimensional all-zeros matrix D (1) of size l m × l m × 49,
Figure PCTCN2018121122-appb-000339
Generate a three-dimensional all-zero matrix D (2) of the same size, which is used to store the descriptors of points of interest;
步骤2:对于所有的满足H(i,j)=1的i和j,密文形式下计算兴趣点描述子。方法为:Step 2: For all i and j that satisfy H (i, j) = 1, calculate the point of interest descriptor in ciphertext form. The method is:
步骤2-1:
Figure PCTCN2018121122-appb-000340
计算
Figure PCTCN2018121122-appb-000341
其中FFT()表示快速Fourier变换,LPM()表示log-polar映射,
Figure PCTCN2018121122-appb-000342
表示I (1)中以(i,j)为中心的7×7的像素块;
Step 2-1:
Figure PCTCN2018121122-appb-000340
Calculation
Figure PCTCN2018121122-appb-000341
Where FFT () represents a fast Fourier transform, and LPM () represents a log-polar mapping,
Figure PCTCN2018121122-appb-000342
Represents a 7 × 7 pixel block with (i, j) as the center in I (1) ;
Figure PCTCN2018121122-appb-000343
计算
Figure PCTCN2018121122-appb-000344
其中
Figure PCTCN2018121122-appb-000345
表示I (2)中以(i,j)为中心的7×7的像素块;
Figure PCTCN2018121122-appb-000343
Calculation
Figure PCTCN2018121122-appb-000344
among them
Figure PCTCN2018121122-appb-000345
Represents a 7 × 7 pixel block centered at (i, j ) in I (2) ;
步骤2-2:
Figure PCTCN2018121122-appb-000346
令D (1)(i,j,:)=[F (1)(1,1),…,F (1)(1,7),…,F (1)(7,1),…,F (1)(7,7)];
Step 2-2:
Figure PCTCN2018121122-appb-000346
Let D (1) (i, j, :) = [F (1) (1,1), ..., F (1) (1,7), ..., F (1) (7,1), ..., F (1) (7,7)];
Figure PCTCN2018121122-appb-000347
令D (2)(i,j,:)=[F (2)(1,1),…,F (2)(1,7),…,F (2)(7,1),…,F (2)(7,7)]。
Figure PCTCN2018121122-appb-000347
Let D (2) (i, j, :) = [F (2) (1,1), ..., F (2) (1,7), ..., F (2) (7,1), ..., F (2) (7,7)].
计算后,
Figure PCTCN2018121122-appb-000348
拥有密文形式的兴趣点描述子D (1)
Figure PCTCN2018121122-appb-000349
拥有密文形式的兴趣点描述子D (2)
After calculation,
Figure PCTCN2018121122-appb-000348
Has a point of interest descriptor D (1) in cipher text,
Figure PCTCN2018121122-appb-000349
The point-of-interest descriptor D (2) in ciphertext form.
(3)兴趣点匹配:(3) Points of interest match:
计算前,
Figure PCTCN2018121122-appb-000350
拥有密文形式的兴趣点描述子D (1)
Figure PCTCN2018121122-appb-000351
拥有密文形式的兴趣点描述子D (2)
Figure PCTCN2018121122-appb-000352
Figure PCTCN2018121122-appb-000353
均拥有控制参数α和β,共享密钥集
Figure PCTCN2018121122-appb-000354
Before calculation,
Figure PCTCN2018121122-appb-000350
Has a point of interest descriptor D (1) in cipher text,
Figure PCTCN2018121122-appb-000351
Has a point of interest descriptor D (2) in ciphertext,
Figure PCTCN2018121122-appb-000352
with
Figure PCTCN2018121122-appb-000353
Both have control parameters α and β, shared key set
Figure PCTCN2018121122-appb-000354
步骤1:
Figure PCTCN2018121122-appb-000355
生成一个l D×6大小的矩阵T (1),其中l D是D (1)(i,j,:)≠0的所有(i,j)的个数,
Figure PCTCN2018121122-appb-000356
生成一个同样大小的矩阵T (2),注意D (1)(i,j,:)≠0的(i,j)一定同时满足D (2)(i,j,:)≠0;
step 1:
Figure PCTCN2018121122-appb-000355
Generate a l D × 6 matrix T (1) , where l D is the number of all (i, j) with D (1) (i, j, :) ≠ 0,
Figure PCTCN2018121122-appb-000356
Generate a matrix T (2) of the same size. Note that (i, j ) with D (1) (i, j, :) ≠ 0 must also satisfy D (2) (i, j, :) ≠ 0;
步骤2:用p表示当前匹配的特征点的索引,
Figure PCTCN2018121122-appb-000357
Figure PCTCN2018121122-appb-000358
均从第一个特征点开始匹配,即令p=1,找到满足D (1)(i,j,:)≠0的最小的i和对应的j;
Step 2: Use p to represent the index of the currently matched feature points,
Figure PCTCN2018121122-appb-000357
with
Figure PCTCN2018121122-appb-000358
Both start from the first feature point, that is, let p = 1, find the smallest i and corresponding j that satisfy D (1) (i, j, :) ≠ 0;
步骤3:密文形式下寻找与(i,j)处描述子最近临的描述子及其位置,方法为:Step 3: In cipher text form, find the descriptor closest to the descriptor at (i, j) and its location. The method is:
步骤3-1:
Figure PCTCN2018121122-appb-000359
令T (1)(p,1)=i,T (1)(p,2)=j,若存在q<p满足T (1)(q,3)=i,T (1)(q,4)=j,则令T (1)(p,3)=T (1)(q,1),T (1)(p,4)=T (1)(q,2),T (1)(p,5)=T (1)(q,5),否则令T (1)(p,5)=inf;
Step 3-1:
Figure PCTCN2018121122-appb-000359
Let T (1) (p, 1) = i, T (1) (p, 2) = j, if q <p satisfies T (1) (q, 3) = i, T (1) (q, 4) = j, then let T (1) (p, 3) = T (1) (q, 1), T (1) (p, 4) = T (1) (q, 2), T (1 ) (p, 5) = T (1) (q, 5), otherwise let T (1) (p, 5) = inf;
Figure PCTCN2018121122-appb-000360
令T (2)(p,1)=i,T (2)(p,2)=j,若存在q<p满足T (2)(q,3)=i,T (2)(q,4)=j,则令T (2)(p,3)=T (2)(q,1),T (2)(p,4)=T (2)(q,2),T (2)(p,5)=T (2)(q,5),否则令T (1)(p,5)=0;
Figure PCTCN2018121122-appb-000360
Let T (2) (p, 1) = i, T (2) (p, 2) = j, if q <p satisfies T (2) (q, 3) = i, T (2) (q, 4) = j, then let T (2) (p, 3) = T (2) (q, 1), T (2) (p, 4) = T (2) (q, 2), T (2 ) (p, 5) = T (2) (q, 5), otherwise let T (1) (p, 5) = 0;
步骤3-2:对于任意(i′,j′),如果满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)&&((i′-i) 2+(j′-j) 2)>α,密文形式下判断该位置处描述子是否和(i,j)处描述子最近,方法为: Step 3-2: For any (i ′, j ′), if D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j) && ((i′- i) 2 + (j′-j) 2 )> α, to determine whether the descriptor at this position is closest to the descriptor at (i, j) in cipher text, the method is:
步骤3-2-1:
Figure PCTCN2018121122-appb-000361
Figure PCTCN2018121122-appb-000362
交互计算
Figure PCTCN2018121122-appb-000363
计算后
Figure PCTCN2018121122-appb-000364
拥有
Figure PCTCN2018121122-appb-000365
拥有
Figure PCTCN2018121122-appb-000366
Step 3-2-1:
Figure PCTCN2018121122-appb-000361
with
Figure PCTCN2018121122-appb-000362
Interactive computing
Figure PCTCN2018121122-appb-000363
After calculation
Figure PCTCN2018121122-appb-000364
have
Figure PCTCN2018121122-appb-000365
have
Figure PCTCN2018121122-appb-000366
步骤3-2-2:
Figure PCTCN2018121122-appb-000367
Figure PCTCN2018121122-appb-000368
交互计算
Figure PCTCN2018121122-appb-000369
计算后
Figure PCTCN2018121122-appb-000370
拥有
Figure PCTCN2018121122-appb-000371
拥有
Figure PCTCN2018121122-appb-000372
Step 3-2-2:
Figure PCTCN2018121122-appb-000367
with
Figure PCTCN2018121122-appb-000368
Interactive computing
Figure PCTCN2018121122-appb-000369
After calculation
Figure PCTCN2018121122-appb-000370
have
Figure PCTCN2018121122-appb-000371
have
Figure PCTCN2018121122-appb-000372
步骤3-2-3:
Figure PCTCN2018121122-appb-000373
Figure PCTCN2018121122-appb-000374
交互计算
Figure PCTCN2018121122-appb-000375
计算后
Figure PCTCN2018121122-appb-000376
拥有
Figure PCTCN2018121122-appb-000377
拥有
Figure PCTCN2018121122-appb-000378
Step 3-2-3:
Figure PCTCN2018121122-appb-000373
with
Figure PCTCN2018121122-appb-000374
Interactive computing
Figure PCTCN2018121122-appb-000375
After calculation
Figure PCTCN2018121122-appb-000376
have
Figure PCTCN2018121122-appb-000377
have
Figure PCTCN2018121122-appb-000378
步骤3-2-4:
Figure PCTCN2018121122-appb-000379
Figure PCTCN2018121122-appb-000380
交互计算
Figure PCTCN2018121122-appb-000381
计算后
Figure PCTCN2018121122-appb-000382
拥有
Figure PCTCN2018121122-appb-000383
拥有
Figure PCTCN2018121122-appb-000384
Step 3-2-4:
Figure PCTCN2018121122-appb-000379
with
Figure PCTCN2018121122-appb-000380
Interactive computing
Figure PCTCN2018121122-appb-000381
After calculation
Figure PCTCN2018121122-appb-000382
have
Figure PCTCN2018121122-appb-000383
have
Figure PCTCN2018121122-appb-000384
步骤3-2-5:
Figure PCTCN2018121122-appb-000385
计算
Figure PCTCN2018121122-appb-000386
Figure PCTCN2018121122-appb-000387
Step 3-2-5:
Figure PCTCN2018121122-appb-000385
Calculation
Figure PCTCN2018121122-appb-000386
Figure PCTCN2018121122-appb-000387
Figure PCTCN2018121122-appb-000388
计算
Figure PCTCN2018121122-appb-000389
Figure PCTCN2018121122-appb-000390
Figure PCTCN2018121122-appb-000388
Calculation
Figure PCTCN2018121122-appb-000389
Figure PCTCN2018121122-appb-000390
步骤3-2-6:
Figure PCTCN2018121122-appb-000391
计算u (1)=(U (1)(1)+…+U (1)(49));
Step 3-2-6:
Figure PCTCN2018121122-appb-000391
Calculate u (1) = (U (1) (1) + ... + U (1) (49));
Figure PCTCN2018121122-appb-000392
计算u (2)=(U (2)(1)+…+U (2)(49));
Figure PCTCN2018121122-appb-000392
Calculate u (2) = (U (2) (1) + ... + U (2) (49));
步骤3-2-7:
Figure PCTCN2018121122-appb-000393
Figure PCTCN2018121122-appb-000394
交互计算b=SCP(T (1)(p,5)-u (1),T (2)(p,5)-u (2)),计算后
Figure PCTCN2018121122-appb-000395
Figure PCTCN2018121122-appb-000396
均拥有b;
Step 3-2-7:
Figure PCTCN2018121122-appb-000393
with
Figure PCTCN2018121122-appb-000394
Interactive calculation b = SCP (T (1) (p, 5) -u (1) , T (2) (p, 5) -u (2) ), after calculation
Figure PCTCN2018121122-appb-000395
with
Figure PCTCN2018121122-appb-000396
Both have b;
步骤3-2-8:如果b=1,
Figure PCTCN2018121122-appb-000397
令T (1)(p,3)=,T (1)(p,4)=j′,T (1)(p,6)=T (1)(p,5),T (1)(p,5)=u (1)
Figure PCTCN2018121122-appb-000398
令T (2)(p,3)=i′,T (2)(p,4)=j′,T (2)(p,6)=T (2)(p,5),T (2)(p,5)=u (2)
Step 3-2-8: If b = 1,
Figure PCTCN2018121122-appb-000397
Let T (1) (p, 3) =, T (1) (p, 4) = j ', T (1) (p, 6) = T (1) (p, 5), T (1) ( p, 5) = u (1) ,
Figure PCTCN2018121122-appb-000398
Let T (2) (p, 3) = i ', T (2) (p, 4) = j', T (2) (p, 6) = T (2) (p, 5), T (2 ) (p, 5) = u (2) .
步骤3-3:
Figure PCTCN2018121122-appb-000399
Figure PCTCN2018121122-appb-000400
交互计算b=SCP(T (1)(p,5)×β-T (1)(p,6),T (2)(p,5)×β-T (2)(p,6)),计算后
Figure PCTCN2018121122-appb-000401
Figure PCTCN2018121122-appb-000402
均拥有b;
Step 3-3:
Figure PCTCN2018121122-appb-000399
with
Figure PCTCN2018121122-appb-000400
Interactive calculation b = SCP (T (1) (p, 5) × β-T (1) (p, 6), T (2) (p, 5) × β-T (2) (p, 6)) After calculation
Figure PCTCN2018121122-appb-000401
with
Figure PCTCN2018121122-appb-000402
Both have b;
步骤3-4:如果b=1,
Figure PCTCN2018121122-appb-000403
令T (1)(p,3)=0,T (1)(p,4)=0,T (1)(p,5)=inf,
Step 3-4: If b = 1,
Figure PCTCN2018121122-appb-000403
Let T (1) (p, 3) = 0, T (1) (p, 4) = 0, T (1) (p, 5) = inf,
Figure PCTCN2018121122-appb-000404
令T (2)(p,3)=0,T (2)(p,4)=0,T (2)(p,5)=0。
Figure PCTCN2018121122-appb-000404
Let T (2) (p, 3) = 0, T (2) (p, 4) = 0, and T (2) (p, 5) = 0.
步骤4:寻找满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)的最小的i′和对应的j′,若存在,
Figure PCTCN2018121122-appb-000405
Figure PCTCN2018121122-appb-000406
均令p=p+1,i=i′,j=j′,返回步骤3重新执行,否则转至步骤5;
Step 4: Find the smallest i ′ and corresponding j ′ that satisfy D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j), if they exist,
Figure PCTCN2018121122-appb-000405
with
Figure PCTCN2018121122-appb-000406
Let p = p + 1, i = i ′, j = j ′, return to step 3 and execute again, otherwise go to step 5;
步骤5:密文形式下对T (1)和T (2)对应的明文T按照T(:,5)的大小重排序,方法为: Step 5: The plaintext T corresponding to T (1) and T (2) in cipher text form is reordered according to the size of T (:, 5).
步骤5-1:
Figure PCTCN2018121122-appb-000407
Figure PCTCN2018121122-appb-000408
均令i=1;
Step 5-1:
Figure PCTCN2018121122-appb-000407
with
Figure PCTCN2018121122-appb-000408
Let i = 1;
步骤5-2:密文形式下求得T(i:l D,5)的最小值的位置,方法为: Step 5-2: Find the position of the minimum value of T (i: l D , 5) in ciphertext form, the method is:
步骤5-2-1:
Figure PCTCN2018121122-appb-000409
Figure PCTCN2018121122-appb-000410
均令θ=i;
Step 5-2-1:
Figure PCTCN2018121122-appb-000409
with
Figure PCTCN2018121122-appb-000410
Let θ = i;
步骤5-2-2:对于所有的l D≥i′>i,
Figure PCTCN2018121122-appb-000411
Figure PCTCN2018121122-appb-000412
交互计算b=SCP(T (1)(θ,5)-T (1)(i′,5),T (2)(θ,5)-T (2)(i′,5)),计算后
Figure PCTCN2018121122-appb-000413
Figure PCTCN2018121122-appb-000414
均拥有b;若b=1,
Figure PCTCN2018121122-appb-000415
Figure PCTCN2018121122-appb-000416
均令θ=i′;
Step 5-2-2: For all l D ≥i ′> i,
Figure PCTCN2018121122-appb-000411
with
Figure PCTCN2018121122-appb-000412
Interactive calculation b = SCP (T (1) (θ, 5) -T (1) (i ′, 5), T (2) (θ, 5) -T (2) (i ′, 5)), calculate Rear
Figure PCTCN2018121122-appb-000413
with
Figure PCTCN2018121122-appb-000414
Both have b; if b = 1,
Figure PCTCN2018121122-appb-000415
with
Figure PCTCN2018121122-appb-000416
Let θ = i ′;
步骤5-3:
Figure PCTCN2018121122-appb-000417
交换T (1)(θ,:)和T (1)(i,:);
Figure PCTCN2018121122-appb-000418
交换T (2)(θ,:)和T (2)(i,:);
Step 5-3:
Figure PCTCN2018121122-appb-000417
Exchange T (1) (θ, :) and T (1) (i, :);
Figure PCTCN2018121122-appb-000418
Exchange T (2) (θ, :) and T (2) (i, :);
步骤5-4:
Figure PCTCN2018121122-appb-000419
Figure PCTCN2018121122-appb-000420
均令i=i+1,若i≤l D,返回步骤5-2重新执行,否则转至步骤6;
Step 5-4:
Figure PCTCN2018121122-appb-000419
with
Figure PCTCN2018121122-appb-000420
Let i = i + 1, if i ≤ l D , return to step 5-2 and execute again, otherwise go to step 6;
步骤6:对于所有l D≥i>1,如果(T (1)(i,1)>T (1)(i,3)||T (1)(i,2)>T (1)(i,4)),则
Figure PCTCN2018121122-appb-000421
交互T (1)(i,1)和T (1)(i,3),T (1)(i,2)和T (1)(i,4);
Step 6: For all l D ≥i> 1, if (T (1) (i, 1)> T (1) (i, 3) || T (1) (i, 2)> T (1) ( i, 4)), then
Figure PCTCN2018121122-appb-000421
Interacting T (1) (i, 1) and T (1) (i, 3), T (1) (i, 2) and T (1) (i, 4);
如果(T (2)(i,1)>T (2)(i,3)||T (2)(i,2)>T (2)(i,4)),则
Figure PCTCN2018121122-appb-000422
交互T (2)(i,1)和T (2)(i,3),T (2)(i,2)和T (2)(i,4);
If (T (2) (i, 1)> T (2) (i, 3) || T (2) (i, 2)> T (2) (i, 4)), then
Figure PCTCN2018121122-appb-000422
Interacting T (2) (i, 1) and T (2) (i, 3), T (2) (i, 2) and T (2) (i, 4);
步骤7:如果存在l D≥i>j满足T (1)(i,:)=T (1)(j,:),则
Figure PCTCN2018121122-appb-000423
删去T (1)(i,:);
Step 7: If l D ≥i> j satisfies T (1) (i,:) = T (1) (j, :), then
Figure PCTCN2018121122-appb-000423
Delete T (1) (i, :);
如果存在l D≥i>j满足T (2)(i,:)=T (2)(j,:),则
Figure PCTCN2018121122-appb-000424
删去T (2)(i,:)。
If l D ≥i> j satisfies T (2) (i, :) = T (2) (j, :), then
Figure PCTCN2018121122-appb-000424
Delete T (2) (i, :).
计算后,
Figure PCTCN2018121122-appb-000425
拥有密文形式的排序好的p个匹配特征点T (1)
Figure PCTCN2018121122-appb-000426
拥有密文形式的排序好的p个匹配特征点T (2)
After calculation,
Figure PCTCN2018121122-appb-000425
Ranked p matching feature points T (1) in ciphertext form,
Figure PCTCN2018121122-appb-000426
Ranked p matching feature points T (2) in ciphertext form.
(4)篡改区域定位:(4) Tampering area positioning:
计算前,
Figure PCTCN2018121122-appb-000427
p=1,2,拥有密文形式的排序好的匹配特征点T (1)
Figure PCTCN2018121122-appb-000428
拥有控制参数γ和δ。
Before calculation,
Figure PCTCN2018121122-appb-000427
p = 1,2, has the sorted matching feature point T (1) in ciphertext form.
Figure PCTCN2018121122-appb-000428
Have control parameters γ and δ.
步骤1:
Figure PCTCN2018121122-appb-000429
生成l m×l m大小的全零矩阵E,并令i=1;
step 1:
Figure PCTCN2018121122-appb-000429
Generate an all-zero matrix E of size l m × l m , and let i = 1;
步骤2:
Figure PCTCN2018121122-appb-000430
寻找与T (1)(i,:)位置满足距离小于γ的点的个数,方法为:
Step 2:
Figure PCTCN2018121122-appb-000430
Find the number of points that satisfy the distance less than γ from the T (1) (i, :) position by the method:
步骤2-1:
Figure PCTCN2018121122-appb-000431
令n=0,j=i+1,集合ε={i};
Step 2-1:
Figure PCTCN2018121122-appb-000431
Let n = 0, j = i + 1, and set ε = {i};
步骤2-2:
Figure PCTCN2018121122-appb-000432
计算a=(T (1)(i,1)-T (1)(j,1)) 2+(T (1)(i,2)-T (1)(j,2)) 2,b=(T (1)(i,3)-T (1)(j,3)) 2+(T (1)(i,4)-T (1)(j,4)) 2
Step 2-2:
Figure PCTCN2018121122-appb-000432
Calculate a = (T (1) (i, 1) -T (1) (j, 1)) 2 + (T (1) (i, 2) -T (1) (j, 2)) 2 , b = (T (1) (i, 3) -T (1) (j, 3)) 2 + (T (1) (i, 4) -T (1) (j, 4)) 2 ;
步骤2-3:若满足a>γ&&b>r/2&&b<2r,则
Figure PCTCN2018121122-appb-000433
令n=n+1,ε=ε+{j};
Step 2-3: If a> γ &&b> r / 2 && b <2r is satisfied, then
Figure PCTCN2018121122-appb-000433
Let n = n + 1, ε = ε + {j};
步骤2-4:令j=j+1,若j≤l D,返回步骤2-2重新执行,否则转至步骤3; Step 2-4: Let j = j + 1, if j≤l D , return to step 2-2 and execute again, otherwise go to step 3;
步骤3:若n≥δ,则对于所有的j∈ε 1
Figure PCTCN2018121122-appb-000434
令E(T (1)(j,1),T (1)(j,2))=i,E(T (1)(j,3),T (1)(j,4))=-i;
Step 3: If n≥δ, then for all j∈ε 1 ,
Figure PCTCN2018121122-appb-000434
Let E (T (1) (j, 1), T (1) (j, 2)) = i, E (T (1) (j, 3), T (1) (j, 4)) =- i;
步骤4:
Figure PCTCN2018121122-appb-000435
寻找将所有E(j,k)=i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
Figure PCTCN2018121122-appb-000436
令E(j′,k′)=i;
Step 4:
Figure PCTCN2018121122-appb-000435
Find the smallest circle that includes all points (j, k) where E (j, k) = i, and get all points (j ′, k ′) located inside the circle
Figure PCTCN2018121122-appb-000436
Let E (j ′, k ′) = i;
步骤5:
Figure PCTCN2018121122-appb-000437
寻找将所有E(j,k)=-i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
Figure PCTCN2018121122-appb-000438
令E(j′,k′)=-i;
Step 5:
Figure PCTCN2018121122-appb-000437
Find the smallest circle that includes all points (j, k) where E (j, k) = -i, and obtain all points (j ′, k ′) located inside the circle
Figure PCTCN2018121122-appb-000438
Let E (j ′, k ′) =-i;
步骤6:令i=i+1,若i≤5,返回步骤2-3重新执行,否则结束执行;Step 6: Let i = i + 1, if i≤5, return to step 2-3 and execute again, otherwise end execution;
计算后,
Figure PCTCN2018121122-appb-000439
p=1,2,拥有疑似篡改区域E。
After calculation,
Figure PCTCN2018121122-appb-000439
p = 1, 2 and has a suspected tampering area E.
三、用户端
Figure PCTCN2018121122-appb-000440
获得检测结果和疑似篡改区域
Third, the client
Figure PCTCN2018121122-appb-000440
Obtain detection results and suspected tampered areas
计算前,
Figure PCTCN2018121122-appb-000441
拥有疑似篡改区域E,拼接的两个区域分布被标注为i和-i,i∈{1,…,5}。
Before calculation,
Figure PCTCN2018121122-appb-000441
With the suspected tampering area E, the two regions of the stitching are labeled as i and -i, i ∈ {1, ..., 5}.
步骤1:
Figure PCTCN2018121122-appb-000442
将E通过安全信道发送给
Figure PCTCN2018121122-appb-000443
step 1:
Figure PCTCN2018121122-appb-000442
Send E over a secure channel to
Figure PCTCN2018121122-appb-000443
计算后,
Figure PCTCN2018121122-appb-000444
拥有疑似篡改区域E。
After calculation,
Figure PCTCN2018121122-appb-000444
Possess suspected tampering area E.
在上述步骤中,安全多方乘法协议(Y (1),Y (2))=SMP(X 1,X 2)用于计算
Figure PCTCN2018121122-appb-000445
的密文矩阵X 1
Figure PCTCN2018121122-appb-000446
的密文矩阵X 2的乘法,且计算过程中
Figure PCTCN2018121122-appb-000447
不会得知X 2
Figure PCTCN2018121122-appb-000448
不会得知X 1
Figure PCTCN2018121122-appb-000449
不会得知X 1或X 2,三个服务端均不会得知X 1X 2,协议流程为:
In the above steps, secure multiparty multiplication protocol (Y (1), Y ( 2)) = SMP (X 1, X 2) for calculating
Figure PCTCN2018121122-appb-000445
Ciphertext matrix X 1 and
Figure PCTCN2018121122-appb-000446
Multiplication of the ciphertext matrix X 2 and during calculation
Figure PCTCN2018121122-appb-000447
Will not know X 2 ,
Figure PCTCN2018121122-appb-000448
Will not know X 1 ,
Figure PCTCN2018121122-appb-000449
X 1 or X 2 will not be known, and X 1 X 2 will not be known to all three servers. The protocol flow is:
计算前,
Figure PCTCN2018121122-appb-000450
拥有密文矩阵X 1
Figure PCTCN2018121122-appb-000451
拥有密文矩阵X 2
Figure PCTCN2018121122-appb-000452
Figure PCTCN2018121122-appb-000453
共享密钥集
Figure PCTCN2018121122-appb-000454
Before calculation,
Figure PCTCN2018121122-appb-000450
Has a ciphertext matrix X 1 ,
Figure PCTCN2018121122-appb-000451
Has a ciphertext matrix X 2 ,
Figure PCTCN2018121122-appb-000452
with
Figure PCTCN2018121122-appb-000453
Shared key set
Figure PCTCN2018121122-appb-000454
步骤1:
Figure PCTCN2018121122-appb-000455
Figure PCTCN2018121122-appb-000456
按照预先协商选择和X 1(或是X 2)同样大小的两个密钥矩阵K 1,
Figure PCTCN2018121122-appb-000457
step 1:
Figure PCTCN2018121122-appb-000455
with
Figure PCTCN2018121122-appb-000456
Select two key matrices K 1 of the same size as X 1 (or X 2 ) according to pre-negotiation,
Figure PCTCN2018121122-appb-000457
步骤2:
Figure PCTCN2018121122-appb-000458
计算U 1=(X 1+K 2)/K 1,并将U 1发送给
Figure PCTCN2018121122-appb-000459
Step 2:
Figure PCTCN2018121122-appb-000458
Calculate U 1 = (X 1 + K 2 ) / K 1 and send U 1 to
Figure PCTCN2018121122-appb-000459
Figure PCTCN2018121122-appb-000460
计算U 2=X 2K 1,并将U 2发送给
Figure PCTCN2018121122-appb-000461
Figure PCTCN2018121122-appb-000460
Calculate U 2 = X 2 K 1 and send U 2 to
Figure PCTCN2018121122-appb-000461
步骤3:
Figure PCTCN2018121122-appb-000462
随机选择和U 1同样大小的随机数矩阵R,其每个元素均在为0~2 10之间,并计算V=U 1U 2+R;
Step 3:
Figure PCTCN2018121122-appb-000462
Randomly select a random number matrix R of the same size as U 1 , each element of which is between 0 and 2 10 , and calculate V = U 1 U 2 + R;
步骤4:
Figure PCTCN2018121122-appb-000463
将V发送给
Figure PCTCN2018121122-appb-000464
将R发送给
Figure PCTCN2018121122-appb-000465
Step 4:
Figure PCTCN2018121122-appb-000463
Send V to
Figure PCTCN2018121122-appb-000464
Send R to
Figure PCTCN2018121122-appb-000465
步骤5:
Figure PCTCN2018121122-appb-000466
令Y (1)=V;
Step 5:
Figure PCTCN2018121122-appb-000466
Let Y (1) = V;
Figure PCTCN2018121122-appb-000467
令Y (2)=X 2K 2+R;
Figure PCTCN2018121122-appb-000467
Let Y (2) = X 2 K 2 + R;
计算后,
Figure PCTCN2018121122-appb-000468
拥有密文矩阵Y (1)
Figure PCTCN2018121122-appb-000469
拥有密文矩阵Y (2),其满足Y (1)-Y (2)=X 1X 2
After calculation,
Figure PCTCN2018121122-appb-000468
Has a ciphertext matrix Y (1) ,
Figure PCTCN2018121122-appb-000469
Have a ciphertext matrix Y (2) , which satisfies Y (1) -Y (2) = X 1 X 2 .
在上述步骤中,安全多方比较协议b=SCP(X 1,X 2)用于比较
Figure PCTCN2018121122-appb-000470
的密文矩阵X 1
Figure PCTCN2018121122-appb-000471
的密文矩阵X 2的大小,且计算过程中
Figure PCTCN2018121122-appb-000472
不会得知X 2
Figure PCTCN2018121122-appb-000473
不会得知X 1
Figure PCTCN2018121122-appb-000474
不会得知X 1或X 2,协议流程为:
In the above steps, the secure multiparty comparison protocol b = SCP (X 1 , X 2 ) is used for comparison
Figure PCTCN2018121122-appb-000470
Ciphertext matrix X 1 and
Figure PCTCN2018121122-appb-000471
The size of the ciphertext matrix X 2 and the calculation process
Figure PCTCN2018121122-appb-000472
Will not know X 2 ,
Figure PCTCN2018121122-appb-000473
Will not know X 1 ,
Figure PCTCN2018121122-appb-000474
Will not know X 1 or X 2 , the protocol flow is:
计算前,
Figure PCTCN2018121122-appb-000475
拥有密文矩阵X 1
Figure PCTCN2018121122-appb-000476
拥有密文矩阵X 2
Figure PCTCN2018121122-appb-000477
Figure PCTCN2018121122-appb-000478
共享密钥集
Figure PCTCN2018121122-appb-000479
Before calculation,
Figure PCTCN2018121122-appb-000475
Has a ciphertext matrix X 1 ,
Figure PCTCN2018121122-appb-000476
Has a ciphertext matrix X 2 ,
Figure PCTCN2018121122-appb-000477
with
Figure PCTCN2018121122-appb-000478
Shared key set
Figure PCTCN2018121122-appb-000479
步骤1:
Figure PCTCN2018121122-appb-000480
Figure PCTCN2018121122-appb-000481
按照预先协商选择和X 1(或是X 2)同样大小的两个密钥矩阵K 1,
Figure PCTCN2018121122-appb-000482
step 1:
Figure PCTCN2018121122-appb-000480
with
Figure PCTCN2018121122-appb-000481
Select two key matrices K 1 of the same size as X 1 (or X 2 ) according to pre-negotiation,
Figure PCTCN2018121122-appb-000482
步骤2:
Figure PCTCN2018121122-appb-000483
计算U 1=(X 1+K 1)/K 2,并将U 1发送给
Figure PCTCN2018121122-appb-000484
Step 2:
Figure PCTCN2018121122-appb-000483
Calculate U 1 = (X 1 + K 1 ) / K 2 and send U 1 to
Figure PCTCN2018121122-appb-000484
Figure PCTCN2018121122-appb-000485
计算U 2=(X 2+K 1)/K 2,并将U 2发送给
Figure PCTCN2018121122-appb-000486
Figure PCTCN2018121122-appb-000485
Calculate U 2 = (X 2 + K 1 ) / K 2 and send U 2 to
Figure PCTCN2018121122-appb-000486
步骤3:
Figure PCTCN2018121122-appb-000487
计算U 1/U 2,若结果大于1,令b=1,否则令b=0;
Step 3:
Figure PCTCN2018121122-appb-000487
Calculate U 1 / U 2. If the result is greater than 1, let b = 1, otherwise let b = 0.
步骤4:
Figure PCTCN2018121122-appb-000488
将b发送给
Figure PCTCN2018121122-appb-000489
Figure PCTCN2018121122-appb-000490
Step 4:
Figure PCTCN2018121122-appb-000488
Send b to
Figure PCTCN2018121122-appb-000489
with
Figure PCTCN2018121122-appb-000490
计算后,
Figure PCTCN2018121122-appb-000491
Figure PCTCN2018121122-appb-000492
均拥有比较结果b,其满足若b=1,X 1>X 2,否则X 1≤X 2
After calculation,
Figure PCTCN2018121122-appb-000491
with
Figure PCTCN2018121122-appb-000492
Each has a comparison result b, which satisfies X 1 > X 2 if b = 1, otherwise X 1 ≤ X 2 .
本方案选用的图像加密技术可以用类似技术实现,例如将加运算替换为减运算,以达到同样效果。The image encryption technology used in this solution can be implemented with similar technologies, such as replacing the addition operation with the subtraction operation to achieve the same effect.
本方案选用的基于多方安全计算的乘法协议和比较协议可以选用其他各类多方安全协议实现以达到类似效果,只是计算效率,或使用的云服务端数量发生变化。The multiplication and comparison protocols based on multi-party secure calculations used in this solution can be implemented by using various other multi-party security protocols to achieve similar results, but the computing efficiency or the number of cloud servers used varies.
本方案中的排序算法可以替换为其他任意排序算法以达到同样效果。The sorting algorithm in this solution can be replaced with any other sorting algorithm to achieve the same effect.
现有的图像区域复制取证方法只能在明文下进行,会泄漏图像内容。在本发明方法中,用户端可以将密文形式的图像发送给云服务端,云服务端在不知晓图像内容的前提下,提供有效的区域复制取证服务,实现对篡改操作的检测和定位。相比于传统区域复制取证工具或服务,本发明可以提供用户图像内容的隐私保护。Existing image area copying and forensics methods can only be performed in plain text, which will leak image content. In the method of the present invention, the user terminal can send the image in the form of cipher text to the cloud server. The cloud server provides an effective area copy forensics service without realizing the image content, so as to detect and locate the tampering operation. Compared with the traditional area copying forensics tool or service, the present invention can provide privacy protection of user image content.
本方法适用于图像数字取证云服务,为个人、企业、政府部门等提供安全、可靠的区域复制取证取证服务。该方案适用于不可靠的云服务环境。This method is suitable for image digital forensics cloud services, and provides individuals, enterprises, government departments, etc. with a safe and reliable regional copy forensics and forensics service. This solution is suitable for unreliable cloud service environments.
上述实施例为本发明较佳的实施方式,但本发明的实施方式并不受上述实施例的限制,其他的任何未背离本发明的精神实质与原理下所作的改变、修饰、替代、组合、简化,均应为等效的置换方式,都包含在本发明的保护范围之内。The above embodiment is a preferred embodiment of the present invention, but the embodiment of the present invention is not limited by the above embodiment. Any other changes, modifications, substitutions, combinations, and modifications made without departing from the spirit and principle of the present invention, Simplified, all should be equivalent replacement methods, and all are included in the protection scope of the present invention.

Claims (10)

  1. 一种支持隐私保护功能的图像区域复制检测方法,其特征在于,包括:用户端和N个相互独立的云服务端,其中部分服务端用于密文存储,部分服务端用于密文计算;用户端利用图像加密算法将图像分拆为多个密文,分别交给用于密文存储的服务端,由这些服务端和用于密文计算的服务端通过交互和计算完成密文空间下对图像区域复制篡改操作的检测和定位;最后每个用于密文存储的服务端均获得疑似篡改区域,用于密文存储的服务端将结果发送给用户端。An image region copy detection method supporting privacy protection function, comprising: a user terminal and N mutually independent cloud servers, some of which are used for ciphertext storage, and some of which are used for ciphertext calculation; The user terminal uses the image encryption algorithm to split the image into multiple ciphertexts and hand them over to the server for ciphertext storage. These servers and the server for ciphertext calculation complete the ciphertext space through interaction and calculation. Detection and location of image tampering operations; finally, each server for ciphertext storage obtains a suspected tampering area, and the server for ciphertext storage sends the results to the user.
  2. 根据权利要求1所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,包括1个用户端
    Figure PCTCN2018121122-appb-100001
    3个相互独立的云服务端,其中2个服务端,
    Figure PCTCN2018121122-appb-100002
    Figure PCTCN2018121122-appb-100003
    用于密文存储,1个服务端
    Figure PCTCN2018121122-appb-100004
    用于密文计算;
    Figure PCTCN2018121122-appb-100005
    利用图像加密算法将图像分拆为两个密文,分别交给
    Figure PCTCN2018121122-appb-100006
    Figure PCTCN2018121122-appb-100007
    由这两个服务端和
    Figure PCTCN2018121122-appb-100008
    通过交互和计算完成密文空间下对图像区域复制篡改操作的检测和定位;最后
    Figure PCTCN2018121122-appb-100009
    Figure PCTCN2018121122-appb-100010
    均获得疑似篡改区域,
    Figure PCTCN2018121122-appb-100011
    Figure PCTCN2018121122-appb-100012
    将结果发送给
    Figure PCTCN2018121122-appb-100013
    The method for detecting a copy of an image area supporting privacy protection according to claim 1, further comprising: a client
    Figure PCTCN2018121122-appb-100001
    3 independent cloud servers, 2 of them,
    Figure PCTCN2018121122-appb-100002
    with
    Figure PCTCN2018121122-appb-100003
    For ciphertext storage, 1 server
    Figure PCTCN2018121122-appb-100004
    For ciphertext calculations;
    Figure PCTCN2018121122-appb-100005
    Use the image encryption algorithm to split the image into two ciphertexts and hand them over to
    Figure PCTCN2018121122-appb-100006
    with
    Figure PCTCN2018121122-appb-100007
    By these two servers and
    Figure PCTCN2018121122-appb-100008
    Detecting and locating the tampering operation of the image area in ciphertext space through interaction and calculation; finally
    Figure PCTCN2018121122-appb-100009
    with
    Figure PCTCN2018121122-appb-100010
    All obtained suspected tampered areas,
    Figure PCTCN2018121122-appb-100011
    with
    Figure PCTCN2018121122-appb-100012
    Send results to
    Figure PCTCN2018121122-appb-100013
  3. 根据权利要求2所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,检测方法包括以下步骤:The method for detecting a copy of an image area supporting the privacy protection function according to claim 2, wherein the detection method comprises the following steps:
    S1、用户端
    Figure PCTCN2018121122-appb-100014
    图像密文生成步骤;
    S1, client
    Figure PCTCN2018121122-appb-100014
    Image ciphertext generation step;
    S2、云服务端
    Figure PCTCN2018121122-appb-100015
    Figure PCTCN2018121122-appb-100016
    的密文空间下篡改区域检测与定位步骤;
    S2, cloud server
    Figure PCTCN2018121122-appb-100015
    with
    Figure PCTCN2018121122-appb-100016
    Detection and location steps of tampered area in ciphertext space;
    S2-1、计算Harris角点;S2-1. Calculate Harris corner;
    S2-2、提取兴趣点描述子;S2-2, extracting a point of interest descriptor;
    S2-3、兴趣点匹配;S2-3. Points of interest match;
    S2-4、篡改区域定位;S2-4. Tampering with the positioning of the area;
    S3、用户端
    Figure PCTCN2018121122-appb-100017
    获得检测结果和疑似篡改区域。
    S3, client
    Figure PCTCN2018121122-appb-100017
    Obtain detection results and suspected tampered areas.
  4. 根据权利要求3所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S1,用户端
    Figure PCTCN2018121122-appb-100018
    图像密文生成步骤包括:
    The method for detecting a copy of an image area supporting privacy protection according to claim 3, wherein in step S1, the user
    Figure PCTCN2018121122-appb-100018
    The image ciphertext generation steps include:
    计算前,
    Figure PCTCN2018121122-appb-100019
    拥有一l m×l m大小的待检测图像X;
    Before calculation,
    Figure PCTCN2018121122-appb-100019
    Have an image to be inspected X with a size of l m × l m ;
    步骤1:
    Figure PCTCN2018121122-appb-100020
    选择一l m×l m大小的随机数矩阵R,其每个元素为0~2 10之间的随机数;生成2份图像密文:
    step 1:
    Figure PCTCN2018121122-appb-100020
    Select a random number matrix R of size l m × l m , each element of which is a random number between 0 and 2 10 ; generate 2 copies of the image ciphertext:
    I (1)=X+R,I (2)=R I (1) = X + R, I (2) = R
    步骤2:
    Figure PCTCN2018121122-appb-100021
    将I (1)通过安全信道发送给
    Figure PCTCN2018121122-appb-100022
    将I (2)通过安全信道发送给
    Figure PCTCN2018121122-appb-100023
    Step 2:
    Figure PCTCN2018121122-appb-100021
    Send I (1) to the secure channel
    Figure PCTCN2018121122-appb-100022
    Send I (2) over the secure channel to
    Figure PCTCN2018121122-appb-100023
    计算后,
    Figure PCTCN2018121122-appb-100024
    拥有密文I (1)
    Figure PCTCN2018121122-appb-100025
    拥有密文I (2)
    After calculation,
    Figure PCTCN2018121122-appb-100024
    Owns the ciphertext I (1) ,
    Figure PCTCN2018121122-appb-100025
    Owns the ciphertext I (2) .
  5. 根据权利要求4所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S2-1,计算Harris角点具体包括:The method for detecting a copy of an image area supporting privacy protection according to claim 4, wherein, in step S2-1, calculating the Harris corner specifically comprises:
    计算前,
    Figure PCTCN2018121122-appb-100026
    拥有图像密文I (1)
    Figure PCTCN2018121122-appb-100027
    拥有图像密文I (2)
    Figure PCTCN2018121122-appb-100028
    Figure PCTCN2018121122-appb-100029
    共享密钥集
    Figure PCTCN2018121122-appb-100030
    Before calculation,
    Figure PCTCN2018121122-appb-100026
    Has image ciphertext I (1) ,
    Figure PCTCN2018121122-appb-100027
    Has image ciphertext I (2) ,
    Figure PCTCN2018121122-appb-100028
    with
    Figure PCTCN2018121122-appb-100029
    Shared key set
    Figure PCTCN2018121122-appb-100030
    步骤1:
    Figure PCTCN2018121122-appb-100031
    计算
    Figure PCTCN2018121122-appb-100032
    step 1:
    Figure PCTCN2018121122-appb-100031
    Calculation
    Figure PCTCN2018121122-appb-100032
    Figure PCTCN2018121122-appb-100033
    计算
    Figure PCTCN2018121122-appb-100034
    Figure PCTCN2018121122-appb-100033
    Calculation
    Figure PCTCN2018121122-appb-100034
    步骤2:
    Figure PCTCN2018121122-appb-100035
    Figure PCTCN2018121122-appb-100036
    交互计算
    Figure PCTCN2018121122-appb-100037
    计算后
    Figure PCTCN2018121122-appb-100038
    拥有
    Figure PCTCN2018121122-appb-100039
    拥有
    Figure PCTCN2018121122-appb-100040
    Step 2:
    Figure PCTCN2018121122-appb-100035
    with
    Figure PCTCN2018121122-appb-100036
    Interactive computing
    Figure PCTCN2018121122-appb-100037
    After calculation
    Figure PCTCN2018121122-appb-100038
    have
    Figure PCTCN2018121122-appb-100039
    have
    Figure PCTCN2018121122-appb-100040
    步骤3:
    Figure PCTCN2018121122-appb-100041
    Figure PCTCN2018121122-appb-100042
    交互计算
    Figure PCTCN2018121122-appb-100043
    计算后
    Figure PCTCN2018121122-appb-100044
    拥有
    Figure PCTCN2018121122-appb-100045
    拥有
    Figure PCTCN2018121122-appb-100046
    Step 3:
    Figure PCTCN2018121122-appb-100041
    with
    Figure PCTCN2018121122-appb-100042
    Interactive computing
    Figure PCTCN2018121122-appb-100043
    After calculation
    Figure PCTCN2018121122-appb-100044
    have
    Figure PCTCN2018121122-appb-100045
    have
    Figure PCTCN2018121122-appb-100046
    步骤4:
    Figure PCTCN2018121122-appb-100047
    Figure PCTCN2018121122-appb-100048
    交互计算
    Figure PCTCN2018121122-appb-100049
    计算后
    Figure PCTCN2018121122-appb-100050
    拥有
    Figure PCTCN2018121122-appb-100051
    拥有
    Figure PCTCN2018121122-appb-100052
    Step 4:
    Figure PCTCN2018121122-appb-100047
    with
    Figure PCTCN2018121122-appb-100048
    Interactive computing
    Figure PCTCN2018121122-appb-100049
    After calculation
    Figure PCTCN2018121122-appb-100050
    have
    Figure PCTCN2018121122-appb-100051
    have
    Figure PCTCN2018121122-appb-100052
    步骤5:
    Figure PCTCN2018121122-appb-100053
    Figure PCTCN2018121122-appb-100054
    交互计算
    Figure PCTCN2018121122-appb-100055
    计算后
    Figure PCTCN2018121122-appb-100056
    拥有
    Figure PCTCN2018121122-appb-100057
    拥有
    Figure PCTCN2018121122-appb-100058
    Step 5:
    Figure PCTCN2018121122-appb-100053
    with
    Figure PCTCN2018121122-appb-100054
    Interactive computing
    Figure PCTCN2018121122-appb-100055
    After calculation
    Figure PCTCN2018121122-appb-100056
    have
    Figure PCTCN2018121122-appb-100057
    have
    Figure PCTCN2018121122-appb-100058
    步骤6:
    Figure PCTCN2018121122-appb-100059
    计算
    Figure PCTCN2018121122-appb-100060
    Figure PCTCN2018121122-appb-100061
    其中h为Gaussian滤波核;
    Step 6:
    Figure PCTCN2018121122-appb-100059
    Calculation
    Figure PCTCN2018121122-appb-100060
    Figure PCTCN2018121122-appb-100061
    Where h is the Gaussian filter kernel;
    Figure PCTCN2018121122-appb-100062
    计算
    Figure PCTCN2018121122-appb-100063
    Figure PCTCN2018121122-appb-100064
    Figure PCTCN2018121122-appb-100062
    Calculation
    Figure PCTCN2018121122-appb-100063
    Figure PCTCN2018121122-appb-100064
    步骤7:
    Figure PCTCN2018121122-appb-100065
    Figure PCTCN2018121122-appb-100066
    交互计算
    Figure PCTCN2018121122-appb-100067
    计算后
    Figure PCTCN2018121122-appb-100068
    拥有
    Figure PCTCN2018121122-appb-100069
    拥有
    Figure PCTCN2018121122-appb-100070
    Step 7:
    Figure PCTCN2018121122-appb-100065
    with
    Figure PCTCN2018121122-appb-100066
    Interactive computing
    Figure PCTCN2018121122-appb-100067
    After calculation
    Figure PCTCN2018121122-appb-100068
    have
    Figure PCTCN2018121122-appb-100069
    have
    Figure PCTCN2018121122-appb-100070
    步骤8:
    Figure PCTCN2018121122-appb-100071
    Figure PCTCN2018121122-appb-100072
    交互计算
    Figure PCTCN2018121122-appb-100073
    计算后
    Figure PCTCN2018121122-appb-100074
    拥有
    Figure PCTCN2018121122-appb-100075
    拥有
    Figure PCTCN2018121122-appb-100076
    Step 8:
    Figure PCTCN2018121122-appb-100071
    with
    Figure PCTCN2018121122-appb-100072
    Interactive computing
    Figure PCTCN2018121122-appb-100073
    After calculation
    Figure PCTCN2018121122-appb-100074
    have
    Figure PCTCN2018121122-appb-100075
    have
    Figure PCTCN2018121122-appb-100076
    步骤9:
    Figure PCTCN2018121122-appb-100077
    Figure PCTCN2018121122-appb-100078
    交互计算
    Figure PCTCN2018121122-appb-100079
    计算后
    Figure PCTCN2018121122-appb-100080
    拥有
    Figure PCTCN2018121122-appb-100081
    拥有
    Figure PCTCN2018121122-appb-100082
    Step 9:
    Figure PCTCN2018121122-appb-100077
    with
    Figure PCTCN2018121122-appb-100078
    Interactive computing
    Figure PCTCN2018121122-appb-100079
    After calculation
    Figure PCTCN2018121122-appb-100080
    have
    Figure PCTCN2018121122-appb-100081
    have
    Figure PCTCN2018121122-appb-100082
    步骤10:
    Figure PCTCN2018121122-appb-100083
    Figure PCTCN2018121122-appb-100084
    交互计算
    Figure PCTCN2018121122-appb-100085
    计算后
    Figure PCTCN2018121122-appb-100086
    拥有
    Figure PCTCN2018121122-appb-100087
    拥有
    Figure PCTCN2018121122-appb-100088
    Step 10:
    Figure PCTCN2018121122-appb-100083
    with
    Figure PCTCN2018121122-appb-100084
    Interactive computing
    Figure PCTCN2018121122-appb-100085
    After calculation
    Figure PCTCN2018121122-appb-100086
    have
    Figure PCTCN2018121122-appb-100087
    have
    Figure PCTCN2018121122-appb-100088
    步骤11:
    Figure PCTCN2018121122-appb-100089
    Figure PCTCN2018121122-appb-100090
    交互计算
    Figure PCTCN2018121122-appb-100091
    计算后
    Figure PCTCN2018121122-appb-100092
    拥有A (1)
    Figure PCTCN2018121122-appb-100093
    拥有A (2)
    Step 11:
    Figure PCTCN2018121122-appb-100089
    with
    Figure PCTCN2018121122-appb-100090
    Interactive computing
    Figure PCTCN2018121122-appb-100091
    After calculation
    Figure PCTCN2018121122-appb-100092
    Owns A (1)
    Figure PCTCN2018121122-appb-100093
    Owns A (2) ;
    步骤12:
    Figure PCTCN2018121122-appb-100094
    计算
    Figure PCTCN2018121122-appb-100095
    Figure PCTCN2018121122-appb-100096
    其中t为Harris角点检查常数;
    Step 12:
    Figure PCTCN2018121122-appb-100094
    Calculation
    Figure PCTCN2018121122-appb-100095
    Figure PCTCN2018121122-appb-100096
    Where t is the Harris corner check constant;
    Figure PCTCN2018121122-appb-100097
    计算
    Figure PCTCN2018121122-appb-100098
    Figure PCTCN2018121122-appb-100099
    Figure PCTCN2018121122-appb-100097
    Calculation
    Figure PCTCN2018121122-appb-100098
    Figure PCTCN2018121122-appb-100099
    步骤13:
    Figure PCTCN2018121122-appb-100100
    Figure PCTCN2018121122-appb-100101
    各生成一个l m×l m大小的全零矩阵H,用于存放Harris角点;对所有的i和j,
    Figure PCTCN2018121122-appb-100102
    密文形式下计算系数块U (1)(8i+1:8i+8,8j+1:8j+8)和U (2)(8i+1:8i+8,8j+1:8j+8)对应的明文U(8i+1:8i+8,8j+1:8j+8)的局部最小值,方法为:
    Step 13:
    Figure PCTCN2018121122-appb-100100
    with
    Figure PCTCN2018121122-appb-100101
    Generate an all-zero matrix H of size l m × l m for storing Harris corners; for all i and j,
    Figure PCTCN2018121122-appb-100102
    Calculate coefficient blocks U (1) (8i + 1: 8i + 8,8j + 1: 8j + 8) and U (2) (8i + 1: 8i + 8,8j + 1: 8j + 8) in ciphertext form The corresponding local minimum of plaintext U (8i + 1: 8i + 8,8j + 1: 8j + 8).
    步骤13-1:
    Figure PCTCN2018121122-appb-100103
    Figure PCTCN2018121122-appb-100104
    均令θ m=8i+1,θ n=8j+1;
    Step 13-1:
    Figure PCTCN2018121122-appb-100103
    with
    Figure PCTCN2018121122-appb-100104
    Let θ m = 8i + 1, θ n = 8j + 1 both;
    步骤13-2:对所有的8i+1<m≤8i+8,8j+1<n≤8j+8,
    Figure PCTCN2018121122-appb-100105
    Figure PCTCN2018121122-appb-100106
    交互计算b=SCP(U (1)mn)-U (1)(m,n),U (2)mn)-U (2)(m,n)),计算后
    Figure PCTCN2018121122-appb-100107
    Figure PCTCN2018121122-appb-100108
    均拥有b;若b=0,
    Figure PCTCN2018121122-appb-100109
    Figure PCTCN2018121122-appb-100110
    均令θ m=m,θ n=n;
    Step 13-2: For all 8i + 1 <m≤8i + 8, 8j + 1 <n≤8j + 8,
    Figure PCTCN2018121122-appb-100105
    with
    Figure PCTCN2018121122-appb-100106
    Interactive calculation b = SCP (U (1)m , θ n ) -U (1) (m, n), U (2)m , θ n ) -U (2) (m, n)) After calculation
    Figure PCTCN2018121122-appb-100107
    with
    Figure PCTCN2018121122-appb-100108
    Both have b; if b = 0,
    Figure PCTCN2018121122-appb-100109
    with
    Figure PCTCN2018121122-appb-100110
    Let θ m = m and θ n = n both;
    步骤13-3:
    Figure PCTCN2018121122-appb-100111
    Figure PCTCN2018121122-appb-100112
    均令H(θ mn)=1;
    Step 13-3:
    Figure PCTCN2018121122-appb-100111
    with
    Figure PCTCN2018121122-appb-100112
    Let H (θ m , θ n ) = 1;
    计算后,
    Figure PCTCN2018121122-appb-100113
    Figure PCTCN2018121122-appb-100114
    均拥有检测到的Harris角点H。
    After calculation,
    Figure PCTCN2018121122-appb-100113
    with
    Figure PCTCN2018121122-appb-100114
    Each has a detected Harris corner H.
  6. 根据权利要求5所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S2-2,提取兴趣点描述子具体包括:The method for detecting a copy of an image area supporting privacy protection according to claim 5, wherein, in step S2-2, extracting a point of interest descriptor comprises:
    计算前,
    Figure PCTCN2018121122-appb-100115
    拥有图像密文I (1),检测到的Harris角点H,
    Figure PCTCN2018121122-appb-100116
    拥有图像密文I (2),检测到的Harris角点H
    Before calculation,
    Figure PCTCN2018121122-appb-100115
    Have image ciphertext I (1) , Harris corner H detected,
    Figure PCTCN2018121122-appb-100116
    Own image ciphertext I (2) , Harris corner H detected
    步骤1:
    Figure PCTCN2018121122-appb-100117
    生成一个l m×l m×49大小的三维全零矩阵D (1)
    Figure PCTCN2018121122-appb-100118
    生成一同样大小的三维全零矩阵D (2),均用来存放兴趣点描述子;
    step 1:
    Figure PCTCN2018121122-appb-100117
    Generate a three-dimensional all-zeros matrix D (1) of size l m × l m × 49,
    Figure PCTCN2018121122-appb-100118
    Generate a three-dimensional all-zero matrix D (2) of the same size, which is used to store the descriptors of points of interest;
    步骤2:对于所有的满足H(i,j)=1的i和j,密文形式下计算兴趣点描述子,方法为:Step 2: For all i and j that satisfy H (i, j) = 1, calculate the point of interest descriptor in ciphertext form:
    步骤2-1:
    Figure PCTCN2018121122-appb-100119
    计算
    Figure PCTCN2018121122-appb-100120
    其中FFT( )表示快速Fourier变换,LPM( )表示log-polar映射,
    Figure PCTCN2018121122-appb-100121
    表示I (1)中以(i,j)为中心的7×7的像素块;
    Step 2-1:
    Figure PCTCN2018121122-appb-100119
    Calculation
    Figure PCTCN2018121122-appb-100120
    Where FFT () represents fast Fourier transform, and LPM () represents log-polar mapping,
    Figure PCTCN2018121122-appb-100121
    Represents a 7 × 7 pixel block with (i, j) as the center in I (1) ;
    Figure PCTCN2018121122-appb-100122
    计算
    Figure PCTCN2018121122-appb-100123
    其中
    Figure PCTCN2018121122-appb-100124
    表示I (2)中以(i,j)为中心的7×7的像素块;
    Figure PCTCN2018121122-appb-100122
    Calculation
    Figure PCTCN2018121122-appb-100123
    among them
    Figure PCTCN2018121122-appb-100124
    Represents a 7 × 7 pixel block centered at (i, j ) in I (2) ;
    步骤2-2:
    Figure PCTCN2018121122-appb-100125
    令D (1)(i,j,:)=[F (1)(1,1),…,F (1)(1,7),…,F (1)(7,1),…,F (1)(7,7)];
    Step 2-2:
    Figure PCTCN2018121122-appb-100125
    Let D (1) (i, j, :) = [F (1) (1,1), ..., F (1) (1,7), ..., F (1) (7,1), ..., F (1) (7,7)];
    Figure PCTCN2018121122-appb-100126
    令D (2)(i,j,:)=[F (2)(1,1),…,F (2)(1,7),…,F (2)(7,1),…,F (2)(7,7)];
    Figure PCTCN2018121122-appb-100126
    Let D (2) (i, j, :) = [F (2) (1,1), ..., F (2) (1,7), ..., F (2) (7,1), ..., F (2) (7,7)];
    计算后,
    Figure PCTCN2018121122-appb-100127
    拥有密文形式的兴趣点描述子D (1)
    Figure PCTCN2018121122-appb-100128
    拥有密文形式的兴趣点描述子D (2)
    After calculation,
    Figure PCTCN2018121122-appb-100127
    Has a point of interest descriptor D (1) in cipher text,
    Figure PCTCN2018121122-appb-100128
    The point-of-interest descriptor D (2) in ciphertext form.
  7. 根据权利要求6所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S2-3,兴趣点匹配具体包括:The method for detecting a copy of an image area supporting privacy protection according to claim 6, wherein, in step S2-3, the matching of the points of interest specifically includes:
    计算前,
    Figure PCTCN2018121122-appb-100129
    拥有密文形式的兴趣点描述子D (1)
    Figure PCTCN2018121122-appb-100130
    拥有密文形式的兴趣点描述子D (2)
    Figure PCTCN2018121122-appb-100131
    Figure PCTCN2018121122-appb-100132
    均拥有控制参数α和β,共享密钥集
    Figure PCTCN2018121122-appb-100133
    Before calculation,
    Figure PCTCN2018121122-appb-100129
    Has a point of interest descriptor D (1) in cipher text,
    Figure PCTCN2018121122-appb-100130
    Has a point of interest descriptor D (2) in ciphertext,
    Figure PCTCN2018121122-appb-100131
    with
    Figure PCTCN2018121122-appb-100132
    Both have control parameters α and β, shared key set
    Figure PCTCN2018121122-appb-100133
    步骤1:
    Figure PCTCN2018121122-appb-100134
    生成一个l D×6大小的矩阵T (1),其中l D是D (1)(i,j,:)≠0的所有(i,j)的个数,
    Figure PCTCN2018121122-appb-100135
    生成一个同样大小的矩阵T (2),注意D (1)(i,j,:)≠0的(i,j)一定同时满足D (2)(i,j,:)≠0;
    step 1:
    Figure PCTCN2018121122-appb-100134
    Generate a l D × 6 matrix T (1) , where l D is the number of all (i, j) with D (1) (i, j, :) ≠ 0,
    Figure PCTCN2018121122-appb-100135
    Generate a matrix T (2) of the same size. Note that (i, j ) with D (1) (i, j, :) ≠ 0 must also satisfy D (2) (i, j, :) ≠ 0;
    步骤2:用p表示当前匹配的特征点的索引,
    Figure PCTCN2018121122-appb-100136
    Figure PCTCN2018121122-appb-100137
    均从第一个特征点开始匹配,即令p=1,找到满足D (1)(i,j,:)≠0的最小的i和对应的j;
    Step 2: Use p to represent the index of the currently matched feature points,
    Figure PCTCN2018121122-appb-100136
    with
    Figure PCTCN2018121122-appb-100137
    Both start from the first feature point, that is, let p = 1, find the smallest i and corresponding j that satisfy D (1) (i, j, :) ≠ 0;
    步骤3:密文形式下寻找与(i,j)处描述子最近临的描述子及其位置,方法为:Step 3: In cipher text form, find the descriptor closest to the descriptor at (i, j) and its location. The method is:
    步骤3-1:
    Figure PCTCN2018121122-appb-100138
    令T (1)(p,1)=i,T (1)(p,2)=j,若存在q<p满足T (1)(q,3)=i,T (1)(q,4)=j,则令T (1)(p,3)=T (1)(q,1),T (1)(p,4)=T (1)(q,2),T (1)(p,5)=T (1)(q,5),否则令T (1)(p,5)=inf;
    Step 3-1:
    Figure PCTCN2018121122-appb-100138
    Let T (1) (p, 1) = i, T (1) (p, 2) = j, if q <p satisfies T (1) (q, 3) = i, T (1) (q, 4) = j, then let T (1) (p, 3) = T (1) (q, 1), T (1) (p, 4) = T (1) (q, 2), T (1 ) (p, 5) = T (1) (q, 5), otherwise let T (1) (p, 5) = inf;
    Figure PCTCN2018121122-appb-100139
    令T (2)(p,1)=i,T (2)(p,2)=j,若存在q<p满足T (2)(q,3)=i,T (2)(q,4)=j,则令T (2)(p,3)=T (2)(q,1),T (2)(p,4)=T (2)(q,2),T (2)(p,5)=T (2)(q,5),否则令T (1)(p,5)=0;
    Figure PCTCN2018121122-appb-100139
    Let T (2) (p, 1) = i, T (2) (p, 2) = j, if q <p satisfies T (2) (q, 3) = i, T (2) (q, 4) = j, then let T (2) (p, 3) = T (2) (q, 1), T (2) (p, 4) = T (2) (q, 2), T (2 ) (p, 5) = T (2) (q, 5), otherwise let T (1) (p, 5) = 0;
    步骤3-2:对于任意(i′,j′),如果满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)&&((i′-i) 2+(j′-j) 2)>α,密文形式下判断该位置处描述子是否和(i,j)处描述子最近,方法为: Step 3-2: For any (i ′, j ′), if D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j) && ((i′- i) 2 + (j′-j) 2 )> α, to determine whether the descriptor at this position is closest to the descriptor at (i, j) in cipher text, the method is:
    步骤3-2-1:
    Figure PCTCN2018121122-appb-100140
    Figure PCTCN2018121122-appb-100141
    交互计算
    Figure PCTCN2018121122-appb-100142
    计算后
    Figure PCTCN2018121122-appb-100143
    拥有
    Figure PCTCN2018121122-appb-100144
    拥有
    Figure PCTCN2018121122-appb-100145
    Step 3-2-1:
    Figure PCTCN2018121122-appb-100140
    with
    Figure PCTCN2018121122-appb-100141
    Interactive computing
    Figure PCTCN2018121122-appb-100142
    After calculation
    Figure PCTCN2018121122-appb-100143
    have
    Figure PCTCN2018121122-appb-100144
    have
    Figure PCTCN2018121122-appb-100145
    步骤3-2-2:
    Figure PCTCN2018121122-appb-100146
    Figure PCTCN2018121122-appb-100147
    交互计算
    Figure PCTCN2018121122-appb-100148
    计算后
    Figure PCTCN2018121122-appb-100149
    拥有
    Figure PCTCN2018121122-appb-100150
    拥有
    Figure PCTCN2018121122-appb-100151
    Step 3-2-2:
    Figure PCTCN2018121122-appb-100146
    with
    Figure PCTCN2018121122-appb-100147
    Interactive computing
    Figure PCTCN2018121122-appb-100148
    After calculation
    Figure PCTCN2018121122-appb-100149
    have
    Figure PCTCN2018121122-appb-100150
    have
    Figure PCTCN2018121122-appb-100151
    步骤3-2-3:
    Figure PCTCN2018121122-appb-100152
    Figure PCTCN2018121122-appb-100153
    交互计算
    Figure PCTCN2018121122-appb-100154
    计算后
    Figure PCTCN2018121122-appb-100155
    拥有
    Figure PCTCN2018121122-appb-100156
    拥有
    Figure PCTCN2018121122-appb-100157
    Step 3-2-3:
    Figure PCTCN2018121122-appb-100152
    with
    Figure PCTCN2018121122-appb-100153
    Interactive computing
    Figure PCTCN2018121122-appb-100154
    After calculation
    Figure PCTCN2018121122-appb-100155
    have
    Figure PCTCN2018121122-appb-100156
    have
    Figure PCTCN2018121122-appb-100157
    步骤3-2-4:
    Figure PCTCN2018121122-appb-100158
    Figure PCTCN2018121122-appb-100159
    交互计算
    Figure PCTCN2018121122-appb-100160
    计算后
    Figure PCTCN2018121122-appb-100161
    拥有
    Figure PCTCN2018121122-appb-100162
    拥有
    Figure PCTCN2018121122-appb-100163
    Step 3-2-4:
    Figure PCTCN2018121122-appb-100158
    with
    Figure PCTCN2018121122-appb-100159
    Interactive computing
    Figure PCTCN2018121122-appb-100160
    After calculation
    Figure PCTCN2018121122-appb-100161
    have
    Figure PCTCN2018121122-appb-100162
    have
    Figure PCTCN2018121122-appb-100163
    步骤3-2-5:
    Figure PCTCN2018121122-appb-100164
    计算
    Figure PCTCN2018121122-appb-100165
    Figure PCTCN2018121122-appb-100166
    Step 3-2-5:
    Figure PCTCN2018121122-appb-100164
    Calculation
    Figure PCTCN2018121122-appb-100165
    Figure PCTCN2018121122-appb-100166
    Figure PCTCN2018121122-appb-100167
    计算
    Figure PCTCN2018121122-appb-100168
    Figure PCTCN2018121122-appb-100169
    Figure PCTCN2018121122-appb-100167
    Calculation
    Figure PCTCN2018121122-appb-100168
    Figure PCTCN2018121122-appb-100169
    步骤3-2-6:
    Figure PCTCN2018121122-appb-100170
    计算u (1)=(U (1)(1)+…+U (1)(49));
    Step 3-2-6:
    Figure PCTCN2018121122-appb-100170
    Calculate u (1) = (U (1) (1) + ... + U (1) (49));
    Figure PCTCN2018121122-appb-100171
    计算u (2)=(U (2)(1)+…+U (2)(49));
    Figure PCTCN2018121122-appb-100171
    Calculate u (2) = (U (2) (1) + ... + U (2) (49));
    步骤3-2-7:
    Figure PCTCN2018121122-appb-100172
    Figure PCTCN2018121122-appb-100173
    交互计算b=SCP(T (1)(p,5)-u (1),T (2)(p,5)-u (2)),计算后
    Figure PCTCN2018121122-appb-100174
    Figure PCTCN2018121122-appb-100175
    均拥有b;
    Step 3-2-7:
    Figure PCTCN2018121122-appb-100172
    with
    Figure PCTCN2018121122-appb-100173
    Interactive calculation b = SCP (T (1) (p, 5) -u (1) , T (2) (p, 5) -u (2) ), after calculation
    Figure PCTCN2018121122-appb-100174
    with
    Figure PCTCN2018121122-appb-100175
    Both have b;
    步骤3-2-8:如果b=1,
    Figure PCTCN2018121122-appb-100176
    令T (1)(p,3)=,T (1)(p,4)=j′,T (1)(p,6)=T (1)(p,5),T (1)(p,5)=u (1)
    Figure PCTCN2018121122-appb-100177
    令T (2)(p,3)=i′,T (2)(p,4)=j′,T (2)(p,6)=T (2)(p,5),T (2)(p,5)=u (2)
    Step 3-2-8: If b = 1,
    Figure PCTCN2018121122-appb-100176
    Let T (1) (p, 3) =, T (1) (p, 4) = j ', T (1) (p, 6) = T (1) (p, 5), T (1) ( p, 5) = u (1) ,
    Figure PCTCN2018121122-appb-100177
    Let T (2) (p, 3) = i ', T (2) (p, 4) = j', T (2) (p, 6) = T (2) (p, 5), T (2 ) (p, 5) = u (2) ;
    步骤3-3:
    Figure PCTCN2018121122-appb-100178
    Figure PCTCN2018121122-appb-100179
    交互计算b=SCP(T (1)(p,5)×β-T (1)(p,6),T (2)(p,5)×β-T (2)(p,6)),计算后
    Figure PCTCN2018121122-appb-100180
    Figure PCTCN2018121122-appb-100181
    均拥有b;
    Step 3-3:
    Figure PCTCN2018121122-appb-100178
    with
    Figure PCTCN2018121122-appb-100179
    Interactive calculation b = SCP (T (1) (p, 5) × β-T (1) (p, 6), T (2) (p, 5) × β-T (2) (p, 6)) After calculation
    Figure PCTCN2018121122-appb-100180
    with
    Figure PCTCN2018121122-appb-100181
    Both have b;
    步骤3-4:如果b=1,
    Figure PCTCN2018121122-appb-100182
    令T (1)(p,3)=0,T (1)(p,4)=0,T (1)(p,5)=inf,
    Step 3-4: If b = 1,
    Figure PCTCN2018121122-appb-100182
    Let T (1) (p, 3) = 0, T (1) (p, 4) = 0, T (1) (p, 5) = inf,
    Figure PCTCN2018121122-appb-100183
    令T (2)(p,3)=0,T (2)(p,4)=0,T (2)(p,5)=0;
    Figure PCTCN2018121122-appb-100183
    Let T (2) (p, 3) = 0, T (2) (p, 4) = 0, T (2) (p, 5) = 0;
    步骤4:寻找满足D (1)(i′,j′,:)≠0&&(i′>i||j′>j)的最小的i′和对应的j′,若存在,
    Figure PCTCN2018121122-appb-100184
    Figure PCTCN2018121122-appb-100185
    均令p=p+1,i=i′,j=j′,返回步骤3重新执行,否则转至步骤5;
    Step 4: Find the smallest i ′ and corresponding j ′ that satisfy D (1) (i ′, j ′, :) ≠ 0 && (i ′> i || j ′> j), if they exist,
    Figure PCTCN2018121122-appb-100184
    with
    Figure PCTCN2018121122-appb-100185
    Let p = p + 1, i = i ′, j = j ′, return to step 3 and execute again, otherwise go to step 5;
    步骤5:密文形式下对T (1)和T (2)对应的明文T按照T(:,5)的大小重排序; Step 5: The plaintext T corresponding to T (1) and T (2) is reordered in the cipher text form according to the size of T (:, 5);
    步骤6:对于所有l D≥i>1,如果(T (1)(i,1)>T (1)(i,3)||T (1)(i,2)>T (1)(i,4)),则
    Figure PCTCN2018121122-appb-100186
    交互T (1)(i,1)和T (1)(i,3),T (1)(i,2)和T (1)(i,4);
    Step 6: For all l D ≥i> 1, if (T (1) (i, 1)> T (1) (i, 3) || T (1) (i, 2)> T (1) ( i, 4)), then
    Figure PCTCN2018121122-appb-100186
    Interacting T (1) (i, 1) and T (1) (i, 3), T (1) (i, 2) and T (1) (i, 4);
    如果(T (2)(i,1)>T (2)(i,3)||T (2)(i,2)>T (2)(i,4)),则
    Figure PCTCN2018121122-appb-100187
    交互T (2)(i,1)和T (2)(i,3),T (2)(i,2)和T (2)(i,4);
    If (T (2) (i, 1)> T (2) (i, 3) || T (2) (i, 2)> T (2) (i, 4)), then
    Figure PCTCN2018121122-appb-100187
    Interacting T (2) (i, 1) and T (2) (i, 3), T (2) (i, 2) and T (2) (i, 4);
    步骤7:如果存在l D≥i>j满足T (1)(i,:)=T (1)(j,:),则
    Figure PCTCN2018121122-appb-100188
    删去T (1)(i,:);
    Step 7: If l D ≥i> j satisfies T (1) (i,:) = T (1) (j, :), then
    Figure PCTCN2018121122-appb-100188
    Delete T (1) (i, :);
    如果存在l D≥i>j满足T (2)(i,:)=T (2)(j,:),则
    Figure PCTCN2018121122-appb-100189
    删去T (2)(i,:);
    If l D ≥i> j satisfies T (2) (i, :) = T (2) (j, :), then
    Figure PCTCN2018121122-appb-100189
    Delete T (2) (i, :);
    计算后,
    Figure PCTCN2018121122-appb-100190
    拥有密文形式的排序好的p个匹配特征点T (1)
    Figure PCTCN2018121122-appb-100191
    拥有密文形式的排序好的p个匹配特征点T (2)
    After calculation,
    Figure PCTCN2018121122-appb-100190
    Ranked p matching feature points T (1) in ciphertext form,
    Figure PCTCN2018121122-appb-100191
    Ranked p matching feature points T (2) in ciphertext form.
  8. 根据权利要求7所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,密文形式下对T (1)和T (2)对应的明文T按照T(:,5)的大小重排序,方法为: The method for detecting the copy of an image area supporting privacy protection according to claim 7, wherein the plaintext T corresponding to T (1) and T (2) in the ciphertext form is weighted according to the size of T (:, 5) Sort by:
    步骤5-1:
    Figure PCTCN2018121122-appb-100192
    Figure PCTCN2018121122-appb-100193
    均令i=1;
    Step 5-1:
    Figure PCTCN2018121122-appb-100192
    with
    Figure PCTCN2018121122-appb-100193
    Let i = 1;
    步骤5-2:密文形式下求得T(i:l D,5)的最小值的位置,方法为: Step 5-2: Find the position of the minimum value of T (i: l D , 5) in ciphertext form, the method is:
    步骤5-2-1:
    Figure PCTCN2018121122-appb-100194
    Figure PCTCN2018121122-appb-100195
    均令θ=i;
    Step 5-2-1:
    Figure PCTCN2018121122-appb-100194
    with
    Figure PCTCN2018121122-appb-100195
    Let θ = i;
    步骤5-2-2:对于所有的l D≥i′>i,
    Figure PCTCN2018121122-appb-100196
    Figure PCTCN2018121122-appb-100197
    交互计算b=SCP(T (1)(θ,5)-T (1)(i′,5),T (2)(θ,5)-T (2)(i′,5)),计算后
    Figure PCTCN2018121122-appb-100198
    Figure PCTCN2018121122-appb-100199
    均拥有b;若b=1,
    Figure PCTCN2018121122-appb-100200
    Figure PCTCN2018121122-appb-100201
    均令θ=i′;
    Step 5-2-2: For all l D ≥i ′> i,
    Figure PCTCN2018121122-appb-100196
    with
    Figure PCTCN2018121122-appb-100197
    Interactive calculation b = SCP (T (1) (θ, 5) -T (1) (i ′, 5), T (2) (θ, 5) -T (2) (i ′, 5)), calculate Rear
    Figure PCTCN2018121122-appb-100198
    with
    Figure PCTCN2018121122-appb-100199
    Both have b; if b = 1,
    Figure PCTCN2018121122-appb-100200
    with
    Figure PCTCN2018121122-appb-100201
    Let θ = i ′;
    步骤5-3:
    Figure PCTCN2018121122-appb-100202
    交换T (1)(θ,:)和T (1)(i,:);
    Figure PCTCN2018121122-appb-100203
    交换T (2)(θ,:)和T (2)(i,:);
    Step 5-3:
    Figure PCTCN2018121122-appb-100202
    Exchange T (1) (θ, :) and T (1) (i, :);
    Figure PCTCN2018121122-appb-100203
    Exchange T (2) (θ, :) and T (2) (i, :);
    步骤5-4:
    Figure PCTCN2018121122-appb-100204
    Figure PCTCN2018121122-appb-100205
    均令i=i+1,若i≤l D,返回步骤5-2重新执行,否则转至步骤6。
    Step 5-4:
    Figure PCTCN2018121122-appb-100204
    with
    Figure PCTCN2018121122-appb-100205
    Let i = i + 1, if i ≤ l D , return to step 5-2 and execute again, otherwise go to step 6.
  9. 根据权利要求7所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S2-4,篡改区域定位具体包括:The method for detecting a copy of an image area supporting privacy protection according to claim 7, wherein, in step S2-4, the location of the tampered area specifically comprises:
    计算前,
    Figure PCTCN2018121122-appb-100206
    p=1,2,拥有密文形式的排序好的匹配特征点T (1)
    Figure PCTCN2018121122-appb-100207
    拥有控制参数γ和δ;
    Before calculation,
    Figure PCTCN2018121122-appb-100206
    p = 1,2, with sorted matching feature points T (1) in ciphertext form,
    Figure PCTCN2018121122-appb-100207
    Have control parameters γ and δ;
    步骤1:
    Figure PCTCN2018121122-appb-100208
    生成l m×l m大小的全零矩阵E,并令i=1;
    step 1:
    Figure PCTCN2018121122-appb-100208
    Generate an all-zero matrix E of size l m × l m , and let i = 1;
    步骤2:
    Figure PCTCN2018121122-appb-100209
    寻找与T (1)(i,:)位置满足距离小于γ的点的个数,方法为:
    Step 2:
    Figure PCTCN2018121122-appb-100209
    Find the number of points that satisfy the distance less than γ from the T (1) (i, :) position by the method:
    步骤2-1:
    Figure PCTCN2018121122-appb-100210
    令n=0,j=i+1,集合ε={i};
    Step 2-1:
    Figure PCTCN2018121122-appb-100210
    Let n = 0, j = i + 1, and set ε = {i};
    步骤2-2:
    Figure PCTCN2018121122-appb-100211
    计算a=(T (1)(i,1)-T (1)(j,1)) 2+(T (1)(i,2)-T (1)(j,2)) 2,b=(T (1)(i,3)-T (1)(j,3)) 2+(T (1)(i,4)-T (1)(j,4)) 2
    Step 2-2:
    Figure PCTCN2018121122-appb-100211
    Calculate a = (T (1) (i, 1) -T (1) (j, 1)) 2 + (T (1) (i, 2) -T (1) (j, 2)) 2 , b = (T (1) (i, 3) -T (1) (j, 3)) 2 + (T (1) (i, 4) -T (1) (j, 4)) 2 ;
    步骤2-3:若满足a>γ&&b>r/2&&b<2r,则
    Figure PCTCN2018121122-appb-100212
    令n=n+1,ε=ε+{j};
    Step 2-3: If a> γ &&b> r / 2 && b <2r is satisfied, then
    Figure PCTCN2018121122-appb-100212
    Let n = n + 1, ε = ε + {j};
    步骤2-4:令j=j+1,若j≤l D,返回步骤2-2重新执行,否则转至步骤3; Step 2-4: Let j = j + 1, if j≤l D , return to step 2-2 and execute again, otherwise go to step 3;
    步骤3:若n≥δ,则对于所有的j∈ε 1
    Figure PCTCN2018121122-appb-100213
    令E(T (1)(j,1),T (1)(j,2))=i,E(T (1)(j,3),T (1)(j,4))=-i;
    Step 3: If n≥δ, then for all j∈ε 1 ,
    Figure PCTCN2018121122-appb-100213
    Let E (T (1) (j, 1), T (1) (j, 2)) = i, E (T (1) (j, 3), T (1) (j, 4)) =- i;
    步骤4:
    Figure PCTCN2018121122-appb-100214
    寻找将所有E(j,k)=i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
    Figure PCTCN2018121122-appb-100215
    令E(j′,k′)=i;
    Step 4:
    Figure PCTCN2018121122-appb-100214
    Find the smallest circle that includes all points (j, k) where E (j, k) = i, and get all points (j ′, k ′) located inside the circle
    Figure PCTCN2018121122-appb-100215
    Let E (j ′, k ′) = i;
    步骤5:
    Figure PCTCN2018121122-appb-100216
    寻找将所有E(j,k)=-i的点(j,k)包含起来的最小圆形,并获得所有位于圆形内部的点(j′,k′),
    Figure PCTCN2018121122-appb-100217
    令E(j′,k′)=-i;
    Step 5:
    Figure PCTCN2018121122-appb-100216
    Find the smallest circle that includes all points (j, k) where E (j, k) = -i, and obtain all points (j ′, k ′) located inside the circle
    Figure PCTCN2018121122-appb-100217
    Let E (j ′, k ′) =-i;
    步骤6:令i=i+1,若i≤5,返回步骤2-3重新执行,否则结束执行;Step 6: Let i = i + 1, if i≤5, return to step 2-3 and execute again, otherwise end execution;
    计算后,
    Figure PCTCN2018121122-appb-100218
    p=1,2,拥有疑似篡改区域E。
    After calculation,
    Figure PCTCN2018121122-appb-100218
    p = 1, 2 and has a suspected tampering area E.
  10. 根据权利要求9所述的支持隐私保护功能的图像区域复制检测方法,其特征在于,步骤S3,用户端
    Figure PCTCN2018121122-appb-100219
    获得检测结果和疑似篡改区域具体包括:
    The method for detecting a copy of an image area supporting privacy protection according to claim 9, characterized in that, in step S3, the user terminal
    Figure PCTCN2018121122-appb-100219
    Obtaining detection results and suspected tampering areas include:
    计算前,
    Figure PCTCN2018121122-appb-100220
    拥有疑似篡改区域E,拼接的两个区域分布被标注为i和-i,i∈{1,…,5};
    Before calculation,
    Figure PCTCN2018121122-appb-100220
    With the suspected tampering area E, the two areas of the stitching are labeled as i and -i, i ∈ {1, ..., 5}
    步骤1:
    Figure PCTCN2018121122-appb-100221
    将E通过安全信道发送给
    Figure PCTCN2018121122-appb-100222
    step 1:
    Figure PCTCN2018121122-appb-100221
    Send E over a secure channel to
    Figure PCTCN2018121122-appb-100222
    计算后,
    Figure PCTCN2018121122-appb-100223
    拥有疑似篡改区域E。
    After calculation,
    Figure PCTCN2018121122-appb-100223
    Possess suspected tampering area E.
PCT/CN2018/121122 2018-06-20 2018-12-14 Image area copy detection method supporting privacy protection function WO2019242254A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2018402494A AU2018402494B2 (en) 2018-06-20 2018-12-14 Privacy-preserving image region duplication detection method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810634217.6 2018-06-20
CN201810634217.6A CN108881663B (en) 2018-06-20 2018-06-20 Image area copying detection method supporting privacy protection function

Publications (1)

Publication Number Publication Date
WO2019242254A1 true WO2019242254A1 (en) 2019-12-26

Family

ID=64339969

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/121122 WO2019242254A1 (en) 2018-06-20 2018-12-14 Image area copy detection method supporting privacy protection function

Country Status (3)

Country Link
CN (1) CN108881663B (en)
AU (1) AU2018402494B2 (en)
WO (1) WO2019242254A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881663B (en) * 2018-06-20 2019-12-24 暨南大学 Image area copying detection method supporting privacy protection function
CN112214777B (en) * 2020-10-20 2021-05-11 豪符密码检测技术(成都)有限责任公司 Data encryption protection and use detection method supporting ciphertext data calculation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016023996A1 (en) * 2014-08-14 2016-02-18 Nagravision S.A. Mitigation of collusion attacks against watermarked content
CN105681365A (en) * 2016-04-18 2016-06-15 北京小米移动软件有限公司 File transmission method and device
CN106096548A (en) * 2016-06-12 2016-11-09 北京电子科技学院 Multi-intelligent-terminal shared face secret recognition method based on cloud environment
CN107968780A (en) * 2017-11-20 2018-04-27 上海海事大学 A kind of method for secret protection of mobile cloud storage shared data
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108881663A (en) * 2018-06-20 2018-11-23 暨南大学 A kind of image zone duplicating detection method for supporting privacy protection function

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7680447B2 (en) * 2005-11-15 2010-03-16 International Business Machines Corporation Method and apparatus for duplicating secure documents
JP2007334631A (en) * 2006-06-15 2007-12-27 Sony Corp Image monitoring system and method for tracing object area
CN102693522A (en) * 2012-04-28 2012-09-26 中国矿业大学 Method for detecting region duplication and forgery of color image
US9818315B2 (en) * 2013-06-04 2017-11-14 At&T Intellectual Property I, L.P. Secure multi-party device pairing using sensor data
CN104268825B (en) * 2014-09-28 2017-06-06 西安交通大学 A kind of method that image procossing is carried out to ciphertext graph picture
US20160300068A1 (en) * 2015-04-07 2016-10-13 Dell Products, Lp System and Method to View Encrypted Information on a Security Enabled Display Device
CN106059988B (en) * 2015-12-16 2019-03-12 湖南科技大学 Method for protecting track privacy based on location-based service

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016023996A1 (en) * 2014-08-14 2016-02-18 Nagravision S.A. Mitigation of collusion attacks against watermarked content
CN105681365A (en) * 2016-04-18 2016-06-15 北京小米移动软件有限公司 File transmission method and device
CN106096548A (en) * 2016-06-12 2016-11-09 北京电子科技学院 Multi-intelligent-terminal shared face secret recognition method based on cloud environment
CN107968780A (en) * 2017-11-20 2018-04-27 上海海事大学 A kind of method for secret protection of mobile cloud storage shared data
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108881663A (en) * 2018-06-20 2018-11-23 暨南大学 A kind of image zone duplicating detection method for supporting privacy protection function

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XIA, ZHIHUA ET AL.: "A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 11, no. 11, 30 November 2016 (2016-11-30), XP011621475, DOI: 10.1109/TIFS.2016.2590944 *

Also Published As

Publication number Publication date
CN108881663A (en) 2018-11-23
AU2018402494A1 (en) 2020-01-23
CN108881663B (en) 2019-12-24
AU2018402494B2 (en) 2020-10-22

Similar Documents

Publication Publication Date Title
Xia et al. Secure image LBP feature extraction in cloud-based smart campus
Xia et al. A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
Xia et al. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Qin et al. Towards efficient privacy-preserving image feature extraction in cloud computing
Zhang et al. Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices
Lu et al. Secure video processing: Problems and challenges
Li et al. A secure cloud storage system supporting privacy-preserving fuzzy deduplication
CN111083631A (en) Efficient query processing method for protecting location privacy and query privacy
JP6256624B2 (en) Information processing apparatus and cooperative distributed storage system
Qin et al. SecSIFT: Secure image SIFT feature extraction in cloud computing
WO2019242254A1 (en) Image area copy detection method supporting privacy protection function
CN108256031A (en) A kind of multi-source encrypted image search method for supporting secret protection
Gupta et al. SELI: Statistical evaluation based leaker identification stochastic scheme for secure data sharing
CN111914264A (en) Index creation method and device, and data verification method and device
Qin et al. Privacy-preserving outsourcing of image global feature detection
Palmieri et al. Spatial bloom filters: Enabling privacy in location-aware applications
Mohanty et al. e-PRNU: Encrypted domain PRNU-based camera attribution for preserving privacy
Jin et al. Private video foreground extraction through chaotic mapping based encryption in the cloud
Ji et al. The curse of correlations for robust fingerprinting of relational databases
Abduljabbar et al. Secure biometric image retrieval in IoT-cloud
Cui et al. Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices
Hwang et al. A reversible hiding technique using LSB matching for relational databases
Kawamura et al. Privacy-preserving machine learning using EtC images
CN106156349A (en) Image search method based on information security
Jiang et al. Robust Fingerprint of Location Trajectories Under Differential Privacy

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2018402494

Country of ref document: AU

Date of ref document: 20181214

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18923532

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18923532

Country of ref document: EP

Kind code of ref document: A1