1. 贵州大学 公共大数据国家重点实验室,贵州 贵阳 550025
2. 贵州大学 计算机科学与技术学院,贵州 贵阳 550025
3. 贵州大学 密码学与数据安全研究所,贵州 贵阳 550025
4. 贵州大学 贵州省密码学与区块链技术特色重点实验室,贵州 贵阳 550025
5. 福建师范大学 计算机与网络空间安全学院,福建 福州 350117
[ "王林冬(1997—),男,贵州大学硕士研究生,E-mail:[email protected];" ]
田有亮(1982—),男,教授,E-mail:[email protected]
[ "杨科迪(1990—),男,贵州大学博士研究生,E-mail:[email protected];" ]
[ "肖 曼(1997—),女,贵州大学硕士研究生,E-mail:[email protected];" ]
[ "熊金波(1981—),男,教授,E-mail:[email protected]" ]
扫 描 看 全 文
王林冬, 田有亮, 杨科迪, 等. 可验证可追溯电子证照共享存证方案[J]. 西安电子科技大学学报, 2023,50(5):142-155.
王林冬, 田有亮, 杨科迪, 等. 可验证可追溯电子证照共享存证方案[J]. 西安电子科技大学学报, 2023,50(5):142-155. DOI: 10.19665/j.issn1001-2400.20230408.
可验证性及可追溯性是电子证照共享留存面临的重要挑战,传统方法仅通过电子签章技术确保发证方的可验证性,但持证方、存证方的可验证性以及证照泄露的可追溯性却难以得到保证。为此,提出可验证可追溯电子证照共享存证方案。首先,针对电子证照非授权使用问题以及泄露后无法追溯问题,构建电子证照共享存证系统模型;其次,针对传统强鲁棒水印算法中的水印信息丢失问题,基于BCH码改进现有强鲁棒水印算法,从而实现水印信息失真可纠错;最后,为实现发证方、持证方、存证方三方可验证性以及电子证照泄露后的高效可追溯,结合所提鲁棒水印以及可逆信息隐藏技术,构建可验证可追溯电子证照模型,并在此基础上设计电子证照共享存证协议,从而确保证照的真实授权使用以及泄露后的高效可追溯。通过安全性及效率分析表明,该方案能在确保三方可验证的前提下实现证照泄露后的高效可追溯,且具有较好的抗共谋攻击检测能力,同时其执行时间消耗较少,足以满足实际应用的需求。
Verifiability and traceability are important challenges to the sharing and retention of electronic licenses.Traditional methods only ensure the verifiability of the issuer through electronic signature technology,but the verifiability of the holder and the depositor and the traceability of the license leakage are difficult to guarantee.Therefore,a verifiable and traceable electronic license sharing deposit scheme is proposed.First,aiming at the problem of unauthorized use of electronic licenses and the inability to trace after leakage,a model of the electronic license sharing and deposit system is constructed.Second,aiming at the problem of watermark information loss in the traditional strong robust watermarking algorithm,the existing strong robust watermarking algorithm is improved based on the BCH code,so as to realize the error correction of watermark information distortion.Finally,in order to realize the verifiability of the issuer,the holder and the depositor as well as the efficient traceability after the leakage of the electronic license,the verifiable and traceable electronic license model is constructed by combining the proposed robust watermark and reversible information hiding technology,on the basis of which the electronic license sharing and deposit protocol is designed to ensure the real authorized use of the license and the efficient traceability after the leakage.The analysis of security and efficiency shows that this scheme can achieve an efficient traceability after license leakage and has a good anti-collusion attack detection ability under the premise of ensuring the verifiability of the three parties,and that its execution time consumption is low enough to meet the needs of practical applications.
鲁棒水印可逆信息隐藏电子证照可验证可追溯
robust watermarkingreversible information hidingelectronic licenseverifiabletraceable
SI-JIN C, SEN M, LI H, et al. A Solution to Electronic License Based on Blockchain[C]//2020 International Conference on Computer Engineering and Application (ICCEA).Piscataway:IEEE, 2020:6-10.
LIU W, MENG L, WANG H, et al. Multi-Dimensional Constraints-Based PPVO for High Fidelity Reversible Data Hiding[J]. Expert Systems with Applications, 2023, 213:119190-119200. DOI:10.1016/j.eswa.2022.119190http://doi.org/10.1016/j.eswa.2022.119190https://linkinghub.elsevier.com/retrieve/pii/S0957417422022084https://linkinghub.elsevier.com/retrieve/pii/S0957417422022084
HE W, CAI Z. Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion[J]. IEEE Transactions on Image Processing, 2021, 30:5045-5055. DOI:10.1109/TIP.2021.3078088http://doi.org/10.1109/TIP.2021.3078088https://ieeexplore.ieee.org/document/9429907/https://ieeexplore.ieee.org/document/9429907/
欧博, 姜溪源, 熊剑琴. 用于对比度增强的医学图像可逆信息隐藏算法[J]. 湖南大学学报(自然科学版), 2022, 49(4):26-34.
OU Bo, JIANG Xiyuan, XIONG Jianqin. Algorithm of Medical Image Reversible Data Hiding for Contrast Enhancement[J]. Journal of Hunan University(Natural Sciences), 2022, 49(4):26-34.
BEGUM M, FERDUSH J, UDDIN M S. A Hybrid Robust Watermarking System Based on Discrete Cosine Transform,Discrete Wavelet Transform,and Singular Value Decomposition[J]. Journal of King Saud University-Computer and Information Sciences, 2022, 34(8):5856-5867. DOI:10.1016/j.jksuci.2021.07.012http://doi.org/10.1016/j.jksuci.2021.07.012https://linkinghub.elsevier.com/retrieve/pii/S1319157821001798https://linkinghub.elsevier.com/retrieve/pii/S1319157821001798
LI Q, WANG X, MA B, et al. Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 32(8):5695-5706. DOI:10.1109/TCSVT.2021.3138795http://doi.org/10.1109/TCSVT.2021.3138795https://ieeexplore.ieee.org/document/9663305/https://ieeexplore.ieee.org/document/9663305/
YAMNI M, DAOUI A, KARMOUNI H, et al. Fractional Charlier Moments for Image Reconstruction and Image Watermarking[J]. Signal Processing, 2020, 171:107509-107524. DOI:10.1016/j.sigpro.2020.107509http://doi.org/10.1016/j.sigpro.2020.107509https://linkinghub.elsevier.com/retrieve/pii/S0165168420300529https://linkinghub.elsevier.com/retrieve/pii/S0165168420300529
WANG J, WAN W B, LIX X, et al. Color Image Watermarking Based on Orientation Diversity and Color Complexity[J]. Expert Systems with Applications, 2020, 140:112868-112884. DOI:10.1016/j.eswa.2019.112868http://doi.org/10.1016/j.eswa.2019.112868https://linkinghub.elsevier.com/retrieve/pii/S0957417419305780https://linkinghub.elsevier.com/retrieve/pii/S0957417419305780
LIU D, SU Q, YUAN Z, et al. A Fusion-Domain Color Image Watermarking Based on Haar Transform and Image Correction[J]. Expert Systems with Applications, 2021, 170:114540-114552. DOI:10.1016/j.eswa.2020.114540http://doi.org/10.1016/j.eswa.2020.114540https://linkinghub.elsevier.com/retrieve/pii/S0957417420311842https://linkinghub.elsevier.com/retrieve/pii/S0957417420311842
ZHONG X, HUANG P C, MASTORAKIS S, et al. An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks[J]. IEEE Transactions on Multimedia, 2020, 23:1951-1961. DOI:10.1109/TMM.2020.3006415http://doi.org/10.1109/TMM.2020.3006415https://ieeexplore.ieee.org/document/9133124/https://ieeexplore.ieee.org/document/9133124/
HUANG Y, NIU B, GUAN H, et al. Enhancing Image Watermarking with Adaptive Embedding Parameter and PSNR Guarantee[J]. IEEE Transactions on Multimedia, 2019, 21(10):2447-2460. DOI:10.1109/TMM.6046http://doi.org/10.1109/TMM.6046https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6046https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6046
JIA Y, YIN Z, ZHANG X, et al. Reversible Data Hiding Based on Reducing Invalid Shifting of Pixels in Histogram Shifting[J]. Signal Processing, 2019, 163:238-246. DOI:10.1016/j.sigpro.2019.05.020http://doi.org/10.1016/j.sigpro.2019.05.020https://linkinghub.elsevier.com/retrieve/pii/S0165168419301859https://linkinghub.elsevier.com/retrieve/pii/S0165168419301859
HAN G, BAI X, GENG S, et al. Efficient Two-Party SM2 Signing Protocol Based on Secret Sharing[J]. Journal of Systems Architecture, 2022, 132:102738-102746. DOI:10.1016/j.sysarc.2022.102738http://doi.org/10.1016/j.sysarc.2022.102738https://linkinghub.elsevier.com/retrieve/pii/S1383762122002235https://linkinghub.elsevier.com/retrieve/pii/S1383762122002235
LIU D, YUAN Y, XUE T, et al. An Efficient Batch Verification Scheme for SM2 Signatures[C]//2021 8th International Conference on Dependable Systems and Their Applications (DSA).Piscataway:IEEE, 2021:208-212.
ZHANG Z, YANG K, ZHANG J, et al. Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks[C]//International Conference on Research in Security Standardisation. Heidelberg:Springer, 2015:140-153.
SHOUP V. Lower Bounds for Discrete Logarithms and Related Problems[C]//International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg:Springer, 1997:256-266.
王小云, 于红波. SM3密码杂凑算法[J]. 信息安全研究, 2016, 2(11):983-994.
WANG Xiaoyun, YU Hongbo. SM3 Cryptographic Hash Algorithm[J]. Journal of Information Security Research, 2016, 2(11):983-994.
李雪莲, 张夏川, 高军涛, 等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报, 2022, 49(1):1-16.
LI Xuelian, ZHANG Xiachuan, GAO Juntao, et al. Blockchain Data Sharing Scheme Supporting Attribute and Proxy Re-Encryption[J]. Journal of Xidian University, 2022, 49(1):1-16.
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019, 40(11):101-111. DOI:10.11959/j.issn.1000-436x.2019222http://doi.org/10.11959/j.issn.1000-436x.2019222
TIAN Youliang, YANG Kedi, WANG Zuan, et al. Algorithm of Blockchain Data Provenance Based on ABE[J]. Journal on Communications, 2019, 40(11):101-111. DOI:10.11959/j.issn.1000-436x.2019222http://doi.org/10.11959/j.issn.1000-436x.2019222
HU R, XIANG S. Cover-Lossless Robust Image Watermarking Against Geometric Deformations[J]. IEEE Transactions on Image Processing, 2020, 30:318-331. DOI:10.1109/TIP.83http://doi.org/10.1109/TIP.83https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=83https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=83
SUN W, ZHOU J,LIY, et al. Robust High-Capacity Watermarking over Online Social Network Shared Images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 31(3):1208-1221. DOI:10.1109/TCSVT.76http://doi.org/10.1109/TCSVT.76https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=76https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=76
ZHAI S, LI X, WANG Y. Research on the Storage and Sharing Model of Electronic License Based on Blockchain[C]//The International Conference on Natural Computation,Fuzzy Systems and Knowledge Discovery. Heidelberg:Springer, 2021:1321-1330.
王浩亮, 廉玉忠, 王丽莉. 面向电子证照共享的区块链技术方案研究与实现[J]. 计算机工程, 2020, 46(8):277-283. DOI:10.19678/j.issn.1000-3428.0057715http://doi.org/10.19678/j.issn.1000-3428.0057715
WANG Haoliang, LIAN Yuzhong, WANG Lili. Research and lmplementation of Blockchain Technology Scheme for Electronic License Sharing[J]. Computer Engineering, 2020, 46(8):277-283. DOI:10.19678/j.issn.1000-3428.0057715http://doi.org/10.19678/j.issn.1000-3428.0057715
NEZHADARYA E, WANG Z J, WARD R K. Robust Image Watermarking Based on Multiscale Gradient Direction Quantization[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(4):1200-1213. DOI:10.1109/TIFS.2011.2163627http://doi.org/10.1109/TIFS.2011.2163627http://ieeexplore.ieee.org/document/5975215/http://ieeexplore.ieee.org/document/5975215/
SADEGHI M, TOOSI R, AKHAEE M A. Blind Gain Invariant Image Watermarking Using Random Projection Approach[J]. Signal Processing, 2019, 163:213-224. DOI:10.1016/j.sigpro.2019.05.026http://doi.org/10.1016/j.sigpro.2019.05.026https://linkinghub.elsevier.com/retrieve/pii/S0165168419301914https://linkinghub.elsevier.com/retrieve/pii/S0165168419301914
SALEHNIA T, FATHI A. Fault Tolerance in LWT-SVD Based Image Watermarking Systems Using Three Module Redundancy Technique[J]. Expert Systems with Applications, 2021, 179:115058-115073. DOI:10.1016/j.eswa.2021.115058http://doi.org/10.1016/j.eswa.2021.115058https://linkinghub.elsevier.com/retrieve/pii/S0957417421004991https://linkinghub.elsevier.com/retrieve/pii/S0957417421004991
胡坤, 李聪, 胡建平, 等. 基于BEMD与DCT的彩色图像多重水印鲁棒算法[J]. 北京航空航天大学学报, 2021, 49(1):165-176.
HU Kun, LI Cong, HU Jianping, et al. Robust Multiple Watermarking Algorithm for Color Image via BEMD and DCT[J]. Journal of Beijing University of Aeronautics and Astronautics, 2021, 49(1):165-176.
ZHU P, JIANG Z, ZHANG J, et al. Remote Sensing Image Watermarking Based on Motion Blur Degeneration and Restoration Model[J]. Optik, 2021, 248:168018-168030. DOI:10.1016/j.ijleo.2021.168018http://doi.org/10.1016/j.ijleo.2021.168018https://linkinghub.elsevier.com/retrieve/pii/S0030402621015795https://linkinghub.elsevier.com/retrieve/pii/S0030402621015795
0
浏览量
2
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构