• Laser & Optoelectronics Progress
  • Vol. 59, Issue 18, 1815012 (2022)
Yu Li1、2、3, Liming Zhang1、2、3、*, Hao Wang1、2、3, and Xiaolong Wang1、2、3
Author Affiliations
  • 1Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, Gansu , China
  • 2National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, Gansu , China
  • 3Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, Gansu , China
  • show less
    DOI: 10.3788/LOP202259.1815012 Cite this Article Set citation alerts
    Yu Li, Liming Zhang, Hao Wang, Xiaolong Wang. Commutative Encryption and Watermarking Algorithm for High-Resolution Remote Sensing Images Based on Homomorphic Encryption[J]. Laser & Optoelectronics Progress, 2022, 59(18): 1815012 Copy Citation Text show less
    CEW algorithm model for HRRS image
    Fig. 1. CEW algorithm model for HRRS image
    Division of HRRS image
    Fig. 2. Division of HRRS image
    Original images. (a) Image A; (b) image B; (c) image C
    Fig. 3. Original images. (a) Image A; (b) image B; (c) image C
    Watermark images. (a) Original watermark; (b) shuffled watermark
    Fig. 4. Watermark images. (a) Original watermark; (b) shuffled watermark
    CEW experiment results. (a)-(c) CEWed image (A1, B1, C1); (d)-(f) D-Wed image (A2, B2, C2)
    Fig. 5. CEW experiment results. (a)-(c) CEWed image (A1, B1, C1); (d)-(f) D-Wed image (A2, B2, C2)
    Analysis result of key sensitivity. (a)-(c) CEWed image (A3, B3, C3) with the key pk2; (d)-(f) D-Wed image (A4, B4, C4) with sk2
    Fig. 6. Analysis result of key sensitivity. (a)-(c) CEWed image (A3, B3, C3) with the key pk2; (d)-(f) D-Wed image (A4, B4, C4) with sk2
    Comparison result of imperceptibility
    Fig. 7. Comparison result of imperceptibility
    Comparison result of robustness
    Fig. 8. Comparison result of robustness
    HRRS imageMAE between CEWed imagesMAE between D-Wed images
    A9.58×10142.55×107
    B9.39×10142.39×107
    C9.06×10142.01×107
    Table 1. MAE of CEWed/D-Wed images using different secret keys
    DirectionOriginal imageCEWed image
    ABCA1B1C1
    Horizontal0.96850.96570.94790.00650.01180.0521
    Vertical0.97550.97230.92740.08090.09910.0855
    Diagonal0.95060.94620.8936-0.00380.00720.0311
    Table 2. Adjacent pixel correlation between original images and encrypted images
    Embedding strengthA2B2C2
    148.096747.272248.0991
    242.076941.251742.0784
    338.556837.729938.5599
    Table 3. PSNR of D-Wed images with different embedding intensities
    ParameterNo attackSalt-and-pepper noiseGaussian noiseMedian filteringUpper part cutArbitrary cutArbitrary cut
    0.010.0033×31/21/81/4
    NCA21.00.98030.98480.87931.01.00.9675
    B21.00.98050.98390.89711.01.00.9838
    C21.00. 98050.98430.92661.01.01.0
    Table 4. Experimental results of robustness
    ProcedureProposed CEW algorithmCEW algorithm in Ref.[26
    ABCABC
    Encryption and watermark embedding2.28.935.78.745.698.6
    Decryption and watermark extraction3.213.555.410.549.2105.9
    Table 5. Comparison of algorithm running time
    ParameterD-Wed image A2D-Wed image B2D-Wed image C2
    OA /%99.483599.180699.2253
    Kappa coefficient0.99330.98960.9898
    Table 6. Result of accuracy evaluation
    Yu Li, Liming Zhang, Hao Wang, Xiaolong Wang. Commutative Encryption and Watermarking Algorithm for High-Resolution Remote Sensing Images Based on Homomorphic Encryption[J]. Laser & Optoelectronics Progress, 2022, 59(18): 1815012
    Download Citation