Laser & Optoelectronics Progress, Volume. 59, Issue 18, 1815012(2022)

Commutative Encryption and Watermarking Algorithm for High-Resolution Remote Sensing Images Based on Homomorphic Encryption

Yu Li1,2,3, Liming Zhang1,2,3、*, Hao Wang1,2,3, and Xiaolong Wang1,2,3
Author Affiliations
  • 1Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, Gansu , China
  • 2National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, Gansu , China
  • 3Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, Gansu , China
  • show less
    Figures & Tables(14)
    CEW algorithm model for HRRS image
    Division of HRRS image
    Original images. (a) Image A; (b) image B; (c) image C
    Watermark images. (a) Original watermark; (b) shuffled watermark
    CEW experiment results. (a)-(c) CEWed image (A1, B1, C1); (d)-(f) D-Wed image (A2, B2, C2)
    Analysis result of key sensitivity. (a)-(c) CEWed image (A3, B3, C3) with the key pk2; (d)-(f) D-Wed image (A4, B4, C4) with sk2
    Comparison result of imperceptibility
    Comparison result of robustness
    • Table 1. MAE of CEWed/D-Wed images using different secret keys

      View table

      Table 1. MAE of CEWed/D-Wed images using different secret keys

      HRRS imageMAE between CEWed imagesMAE between D-Wed images
      A9.58×10142.55×107
      B9.39×10142.39×107
      C9.06×10142.01×107
    • Table 2. Adjacent pixel correlation between original images and encrypted images

      View table

      Table 2. Adjacent pixel correlation between original images and encrypted images

      DirectionOriginal imageCEWed image
      ABCA1B1C1
      Horizontal0.96850.96570.94790.00650.01180.0521
      Vertical0.97550.97230.92740.08090.09910.0855
      Diagonal0.95060.94620.8936-0.00380.00720.0311
    • Table 3. PSNR of D-Wed images with different embedding intensities

      View table

      Table 3. PSNR of D-Wed images with different embedding intensities

      Embedding strengthA2B2C2
      148.096747.272248.0991
      242.076941.251742.0784
      338.556837.729938.5599
    • Table 4. Experimental results of robustness

      View table

      Table 4. Experimental results of robustness

      ParameterNo attackSalt-and-pepper noiseGaussian noiseMedian filteringUpper part cutArbitrary cutArbitrary cut
      0.010.0033×31/21/81/4
      NCA21.00.98030.98480.87931.01.00.9675
      B21.00.98050.98390.89711.01.00.9838
      C21.00. 98050.98430.92661.01.01.0
    • Table 5. Comparison of algorithm running time

      View table

      Table 5. Comparison of algorithm running time

      ProcedureProposed CEW algorithmCEW algorithm in Ref.[26
      ABCABC
      Encryption and watermark embedding2.28.935.78.745.698.6
      Decryption and watermark extraction3.213.555.410.549.2105.9
    • Table 6. Result of accuracy evaluation

      View table

      Table 6. Result of accuracy evaluation

      ParameterD-Wed image A2D-Wed image B2D-Wed image C2
      OA /%99.483599.180699.2253
      Kappa coefficient0.99330.98960.9898
    Tools

    Get Citation

    Copy Citation Text

    Yu Li, Liming Zhang, Hao Wang, Xiaolong Wang. Commutative Encryption and Watermarking Algorithm for High-Resolution Remote Sensing Images Based on Homomorphic Encryption[J]. Laser & Optoelectronics Progress, 2022, 59(18): 1815012

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Machine Vision

    Received: Jul. 19, 2021

    Accepted: Aug. 10, 2021

    Published Online: Aug. 29, 2022

    The Author Email: Zhang Liming (zhang_lm@163.com)

    DOI:10.3788/LOP202259.1815012

    Topics