信息网络安全 ›› 2021, Vol. 21 ›› Issue (4): 10-20.doi: 10.3969/j.issn.1671-1122.2021.04.002

• 技术研究 • 上一篇    下一篇

面向雾计算的压缩感知图像秘密传输和篡改恢复方案

郑洪英, 李琳, 肖迪()   

  1. 重庆大学计算机学院,重庆 400044
  • 收稿日期:2021-01-22 出版日期:2021-04-10 发布日期:2021-05-14
  • 通讯作者: 肖迪 E-mail:dixiao@cqu.edu.cn
  • 作者简介:郑洪英(1975—),女,重庆,副教授,博士,主要研究方向为多媒体安全|李琳(1996—),女,重庆,硕士研究生,主要研究方向为多媒体安全|肖迪(1975—),男,重庆,教授,博士,主要研究方向为多媒体安全、隐私保护
  • 基金资助:
    国家自然科学基金(62072063)

Secret Image Transmission and Tamper Recovery Based on Compressed Sensing for Fog Computing

ZHENG Hongying, LI Lin, XIAO Di()   

  1. College of Computer Science, Chongqing University, Chongqing 400044, China
  • Received:2021-01-22 Online:2021-04-10 Published:2021-05-14
  • Contact: XIAO Di E-mail:dixiao@cqu.edu.cn

摘要:

在雾计算三层数据传输框架下,用户的图像数据隐私泄露依然是最严重的问题之一,特别是大多数加密方法都不适用于物理终端资源受限的情况。因此,针对这类场景,需要设计合适的数据隐私保护方法。压缩感知具有轻量级和保密性,可以解决该问题。文章提出一种基于压缩感知的图像数据三层传输方案,不仅可以实现数据的安全传输,还可以结合里德-所罗门码(RS)应对篡改攻击,实现篡改定位和恢复。保密性方面,终端利用块压缩感知实现轻量级加密。由于测量值可能泄露明文能量,在雾服务器上将测量值进行局部归一化,对产生的能量值进行高强度加密,使传输过程达到完美保密。完整性方面,利用压缩感知的鲁棒性和RS编码的冗余性实现数据的篡改定位和双重篡改恢复。仿真结果和分析验证了该方案的性能。

关键词: 雾计算, 压缩感知, 图像加密, 篡改恢复

Abstract:

In the three-layer data transmission framework of fog computing, the image data privacy leakage is still one of the most serious problems. In particular, most of the encryption methods are not suitable for the situation of limited physical terminal resources. Therefore, for these scenarios, we need to design an appropriate method to protect data privacy. Compressed sensing(CS) is promising to solve this problem because of its lightweight and confidentiality. In this paper, a three-layer transmission scheme of image data based on CS encryption algorithm is proposed: it can not only realize the secure transmission of data, but also realize the tamper location and recovery by combining with Reed-solomon code(RS) to deal with tamper attacks. In the aspect of confidentiality, the block CS is used to achieve lightweight encryption on the terminal, then the measured value is locally normalized in the fog server due to that the measured values may leak the plaintext energy, and then the generated energy values is encrypted with high intensity so that the transmission process can achieve perfect confidentiality. In the aspect of integrity, the robustness of CS and the redundancy of RS coding are used to achieve the location and recovery of tampered data. Simulation results and analyses verify the performance of the proposed scheme.

Key words: fog computing, compressed sensing, image encryption, tamper recovery

中图分类号: