• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Dongmei, Dai Liang, Wei Lifei, Wei Quanmiao, Wu Guojian. A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images[J]. Journal of Computer Research and Development, 2017, 54(10): 2378-2389. DOI: 10.7544/issn1000-1239.2017.20170427
Citation: Huang Dongmei, Dai Liang, Wei Lifei, Wei Quanmiao, Wu Guojian. A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images[J]. Journal of Computer Research and Development, 2017, 54(10): 2378-2389. DOI: 10.7544/issn1000-1239.2017.20170427

A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images

More Information
  • Published Date: September 30, 2017
  • Remote sensing image denoising is a hot research topic in the field of image processing. The improvement of remote sensing image acquisition equipment and technology has made it possible to collect multiple images from the same scene in a short period of time. However, the processing huge number of the remote sensing images on the ordinary computers has caused the low processing capability and poor concurrency. It is a trend to store and compute the big data outsourced to the cloud. To protect the security of outsourced remote sensing images, the article presents a secure outsourced fusion denoising scheme in multiple encrypted remote sensing images to implement the fusion denoising based on dynamic filtering parameters. In the schemes, the ciphertext from Johnson-Lindenstrauss transform is used to weight calculatation as well as the plaintext and the ciphertext from Paillier homomorphic encryption is used to fusion denoise by the linear calculation of ciphertext. The experiments use several 512×512 pixels remote sensing images based on the Spark alone-server environment to simulate the cloud platform. The experimental results show that the outsourcing schemes can effectively ensure the security of the remote sensing images and get better denoising quality with different sizes of noise than the existing schemes.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [5]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [9]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.

Catalog

    Article views (1285) PDF downloads (685) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return