• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion*

    2023-09-01 03:29:04XiuliCHAIXiuhuiCHENYakunMAFangZUOZhihuaGANYushuZHANG

    Xiuli CHAI ,Xiuhui CHEN ,Yakun MA ,Fang ZUO ,Zhihua GAN ,Yushu ZHANG

    1School of Artificial Intelligence,Henan Engineering Research Center for Industrial Internet of Things,Henan University,Zhengzhou 450046,China

    2Henan Key Laboratory of Cyberspace Situation Awareness,Zhengzhou 450001,China

    3School of Software,Intelligent Data Processing Engineering Research Center of Henan Province,Institute of Intelligent Network System,Henan University,Kaifeng 475004,China

    4College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China

    Abstract: With the substantial increase in image transmission,the demand for image security is increasing.Noise-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noise-like images cannot be directly previewed and retrieved.Based on the rank-then-encipher method,some researchers have designed a three-pixel exact thumbnail preserving encryption (TPE2) scheme,which can be applied to balance the security and availability of images,but this scheme has low encryption efficiency.In this paper,we introduce an efficient exact thumbnail preserving encryption scheme.First,blocking and bit-plane decomposition operations are performed on the plaintext image.The zigzag scrambling model is used to change the bit positions in the lower four bit planes.Subsequently,an operation is devised to permute the higher four bit planes,which is an extended application of the hidden Markov model.Finally,according to the difference in bit weights in each bit plane,a bit-level weighted diffusion rule is established to generate an encrypted image and still maintain the same sum of pixels within the block.Simulation results show that the proposed scheme improves the encryption efficiency and can guarantee the availability of images while protecting their privacy.

    Key words: Hidden Markov model;Weighted diffusion;Balance between usability and privacy;Image encryption

    1 Introduction

    With the development of the Internet and cloud service platforms,people upload their pictures and videos to cloud service platforms (Beaver et al.,2010).With fewer restrictions on hardware and easier file sharing,it is possible for users to access uploaded files at will (He et al.,2010).However,images may also contain sensitive information such as identity,location,and circumstances (Fan,2019),so people are more inclined to prevent others from viewing their private images.

    There are two main methods of privacy leakage:inside attacks and external attacks (Ashiq,2015).Inside attacks are the most easily ignored security issue.Inside attacks generally refer to malicious damage by insiders,collusion between insiders and outsiders,abuse of power by managers,and threats caused by natural disasters such as floods and earthquakes.Even righteous employees can inadvertently leak data due to weak security awareness or incorrect use of software.External attacks refer to the attacks on nodes inside the network by malicious nodes outside the network that have not been authenticated.With the explosion of information and the maturity of attack techniques,there are increasingly more incidents of illegal intrusion in the network,which brings numerous difficulties to network security protection.

    Some scholars have proposed conventional image encryption schemes to generate noise-like images (Joshi et al.,2020;Zhu et al.,2020).This prevents attackers from stealing the content in the image,but the image owners cannot identify the original image’s content through encrypted images.To balance the availability and security of encrypted images in the cloud,Wright et al.(2015) introduced two thumbnail preserving encryption (TPE) schemes,where the plaintext images and the encrypted images have the same thumbnails.In the generated encrypted images,users with a priori knowledge can quickly find the image they want,while those without a priori knowledge can recognize only the general outline of the images and cannot obtain more detailed information.A priori knowledge refers to the impressions left in the user’s mind by viewing the image.

    The TPE schemes presented by Wright et al.(2015) change only the position of the pixels within the block,and although the thumbnail of the plaintext image is accurately preserved,the attackers can obtain all the pixel values in the plaintext image.Some studies (Li et al.,2008;Jolfaei et al.,2016) have shown that only the scrambling operation in the encryption process cannot satisfy the security requirements.To improve the security of encrypted images,Marohn et al.(2017) proposed two approximate TPE schemes,where the thumbnails of encrypted images and those of plaintext images are similar but not identical.The first method works using dynamic range preserving encryption (DRPE),which retains only the minimum and maximum pixel values of the plaintext in each thumbnail block.The second approach is an extended application of the least significant bit (LSB) embedding technique in steganography,which reveals only the maximum pixel value and the average value of the plaintext in the blocks.However,the encrypted images still reveal more information than the plaintext image thumbnails and cannot be fully decrypted to the original images.Later,Zhang et al.(2022) proposed a high-fidelity TPE scheme (HF-TPE),which improves the perceptual quality of encrypted images.Decrypted images have a lower noise intensity and an upper limit of noise quantity.

    Tajik et al.(2019) achieved the first exact TPE scheme with nonce-respecting (NR) security.To preserve accurate thumbnails of the plaintext images,the adopted strategy is to ensure that the sum of pixels within a single block of a single channel remains unchanged.They summarized and employed the rank-then-encipher method proposed by Bellare et al.(2009).That is,first calculate the sumSof a vector,compute the rank of the vector through the function,and then encrypt the rank.Finally,the encrypted rank is converted into an integer vector via the function.All the vectors with the same sumSare numbered,and the rank of the vector is the corresponding number.This scheme encrypts the image in groups of two pixels,but it uses Markov chains to demonstrate its security.The fewer the number of pixels in a group,the worse the chain state connectivity.Therefore,based on the rank-then-encipher approach,Zhao et al.(2021) proposed the TPE2 scheme for encrypting images,which extended the exact TPE scheme to a group of three pixels for the first time;however,the TPE2 scheme has the problem of low efficiency.

    To solve the above problems,we propose an exact TPE algorithm based on a hidden Markov model and weighted diffusion (TPE-H2MWD).The encryption process takes the entire block as a unit while changing the position and value of the pixels and keeping the sum of the pixels constant.After multiple rounds of encryption,an encrypted image with the same thumbnail as the plaintext image is obtained,making it impossible for attackers to identify whether the encrypted image comes from the plaintext image or from another image with the same sum of pixels in the block (e.g.,a mosaic image of the plaintext) while improving the encryption efficiency.The main contributions of this paper are as follows:

    1.A new exact TPE-H2MWD is presented.Bitlevel permutation and diffusion methods are used to realize the exact TPE directly,which improves the encryption efficiency.

    2.A bit-level permutation method based on the hidden Markov model is presented.First,blocking and bit-plane decomposition operations are performed on the plaintext image to obtain eight bit planes,and then different scrambling operations are performed on different bit planes.This makes the permutation process more random while improving the security of the encryption scheme.

    3.A weighted diffusion method is introduced under the condition that the sum of pixels is unchanged.This method modifies the bit values and is able to prevent the leakage of statistical information of the bits.

    4.In the TPE-H2MWD,the thumbnails of the ciphertext images and those of the plaintext images are absolutely identical,and the encrypted images can be recovered completely by the decryption process.Simulation results show that the proposed scheme balances the security and usability of encrypted images.In addition,there is good retrieval performance for thumbnails of ciphertext images.

    2 Fundamentals

    In this section,the definition of TPE and the fundamental knowledge of the hidden Markov model are presented.

    2.1 Thumbnail preserving encryption

    TPE is a special type of format-preserving encryption,which is the encryption of plaintext images into ciphertext images with the same properties.The definition of TPE is provided below.

    Definition 1In the TPE,a collection of images M is selected.An encryption scheme is claimed to beΦ-preserving within the plaintext image group M,if it satisfies the following criteria:

    where the plaintext imageM∈M,with the keyK,nonceT,and the plaintext imageMas input and the ciphertext imageCas output in the encryption process,while with the keyK,nonceT,and the ciphertext imageCas input and the plaintext imageMas output in the decryption process,as well as the plaintext image and the corresponding encrypted image having the same dimensionality and thumbnail.

    Definition 2Let FΦbe the set of functionsF:{0,1}*× M→M,whereFsatisfies theΦ-preserving property,andΦ(F(T,M))=Φ(M) is met for allTandM.If for any probabilistic polynomial time (PPT) oracle machineA,the following condition is satisfied (Bellare et al.,2009):

    where negl(λ) is negligible inλ,the format-preserving encryption scheme is deemed to satisfy the pseudo random permutation (PRP) security.

    Definition 3Let A be the PPT oracle machine with two parameters.A is denoted as NR if A never takes the same first parameter (i.e.,nonceT) to make two oracle calls.A format-preserving encryption scheme is considered NR-secure if it can satisfy Definition 2 under only the condition that Definition 3 is respected (Tajik et al.,2019).

    2.2 Hidden Markov model

    Hidden Markov models are the statistical models (Franzese and Iuliano,2019) that are used to describe Markov processes with hidden uncertain parameters.There are three elements:

    1.Visible random sequence.This is used to describe the physical quantity of interest,which changes over time.

    2.Hidden state sequence.Each physical quantity at each time point corresponds to a state quantity,and each state quantity cannot be directly observed.

    3.Relationships among variables.The initial state quantity,the relationship between the current hidden state quantity and the next hidden state quantity,and the relationship between the current hidden state quantity and the visible random variable,all these three relationships or variables are described in probabilistic terms.

    The hidden Markov model is a kind of statistical model with quite common applications.The theory was proposed by Baum and Petrie (1966) and subsequently became an important direction of signal processing over a decade of development.At present,the hidden Markov model has also started to be widely applied to the fields of speech recognition (Srivastava et al.,2022),smart home applications (Youngblood and Cook,2007),and behavior recognition (Hartmann et al.,2022;Xue and Liu,2022),among which the application of the hidden Markov model in image processing is also relatively successful and effective.

    In our scheme,the hidden state chains and the visible state chains are generated based on one bit plane,and then another bit plane is scrambled based on the generated sequences.The data in each bit plane are different,making the permutation process more random and not easy to predict.

    3 Proposed TPE-H2MWD

    After performing bit-plane decomposition on the plaintext image,one may obtain eight bit planes,as shown in Fig.1.From this figure,we can see that the lower four bit planes contain less information about the plaintext image,and the higher four bit planes contain more information about the image.

    Fig.1 Bit-plane decomposition:(a) 8th bit plane;(b) 7th bit plane;(c) 6th bit plane;(d) 5th bit plane;(e) 4th bit plane;(f) 3rd bit plane;(g) 2nd bit plane;(h) 1st bit plane

    Inspired by this,an exact TPE-H2MWD is proposed,and the specific algorithm framework is illustrated in Fig.2.First,the plaintext imageP(M×N×3) is decomposed to obtain the red,green,and blue components,and then blocking and binary decompositions are performed on each component in turn to yield eight bit planes.The lower four bit planes are randomly zigzag scrambled,and then the scrambled lower four bit planes are used to generate two hidden state sequences and two visible state sequences.The higher four bit planes are scrambled with these sequences,and then,a weighted diffusion operation is performed between two adjacent bit planes.Finally,an encrypted image is obtained.

    Fig.2 Flowchart of the proposed scheme (ZMP:zigzag model permutation;PMH2M:permutation method based on hidden Markov model;WDPCS:weighted diffusion preserving constant sum)

    3.1 Zigzag model permutation (ZMP) for the lower four bit planes

    The pixel blockBof sizeK×Kis binarily decomposed to obtain eight bit planes,denoted asB8,B7,B6,B5,B4,B3,B2,andB1.Zigzag scrambling operations are performed on the lower four bit planesB1,B2,B3,andB4to obtain four new bit planesB'1,B'2,B'3,andB'4,respectively.Generally,there are eight types of zigzag scrambling models,as shown in Fig.3,where the traversal rules of different models will be changed.

    Fig.3 Eight types of zigzag models

    In this scheme,to improve the randomness of confusion,different zigzag models and starting positions are selected for different bit planes,and accordingly,the data in this bit plane are scrambled.The selected zigzag model is determined by ((count1–count0) % 8),and the starting position can be computed by ((count0 %K)+1,(count1 %K)+1),where count1 indicates the total number of bits with value 1 in the current bit plane,and count0 indicates the total number of bits with value 0 in the current bit plane.

    3.2 Permutation method based on hidden Markov model (PMH2M) for the higher four bit planes

    Step 1:Based on the bit values in the bit plane,two hidden state sequences (Imp1,Imp2) and two visible state sequences (Vis1,Vis2) are created,and all of them have lengthK.The process of sequence generation is expressed by

    wheretis an integer,t∈[1,K].

    where Imp1tand Imp2tare thetthelements in the hidden state sequences Imp1 and Imp2,respectively.

    where Vis1tand Vis2tare thetthelements in the visible state sequences Vis1 and Vis2,respectively.

    To generate the sequence Imp1,the,andbits of the first row inB'iare taken,three bits are converted to a decimal number,and the remainder of the number divided by 4 is thetthdata Imp1t.Similarly,to generate the sequence Imp2,the,andbits of the first column inare selected,and then thetthdata Imp2tare obtained.

    To generate the sequence Vis1,the total number of bits 1 in the,andcolumns ofis taken,and the remainder of the total number divided byKis thetthdata Vis1t.Similarly,to generate the sequence Vis2,the total number of bits 1 in the,androws ofis obtained,and the remainder of the total number divided byKis thetthdata Vis2t.

    A complete example of generating sequences is shown in Fig.4.

    Fig.4 Generating two hidden state sequences (Imp1,Imp2) and two visible state sequences (Vis1,Vis2)

    Step 2:According to the data in Imp1 and Vis1,the bit populations and the moving distance of the bits will be determined.In bit planeBj,the first row of bits is used as a reference to change the position of the bits,and the new bit planeis obtained.

    For bit populations in the minor and principal diagonal directions,circular downwards shift operations will be performed,and the moving distances are determined by the data in the corresponding visible state sequence.For bit populations in the row direction (as shown in Algorithm 1),bits in odd positions shift sequentially to the left,and bits in even positions shift sequentially to the right.For bit populations in the column direction,bits in odd positions shift successively upwards,and bits in even positions shift successively downwards.After moving the corresponding distance,if there are already data at the target location,continue moving one bit per time until a vacant location is found.

    As shown in Fig.5,the first data point in Imp1 is 1,and then the set of bits in the column where the first bit in the first row in the planeBjis located is called the bit population.The first data point in the visible state sequence Vis1 is 1.When finding the target position in this bit population,it moves one bit first.The 1stbit is moved up cyclically by one bit,reaching the 5thposition of the first column inBj1;the 2ndbit is moved down cyclically by one bit,reaching the 3rdposition of the first column inBj1;the 3rdbit is moved up cyclically by one bit,reaching the 2ndposition of the first column inBj1;the 4thbit is moved down cyclically by one bit,reaching the 5thposition of the first column,but there are already data in the 5thposition,so it continues down one bit to the 1stposition in the first column inBj1;the 5thbit is moved up cyclically by one bit,reaching the 4thposition of the first column inBj1(the resulting bit population is outlined by the blue line inBj1).The other operations are similar.

    Fig.5 Illustration of the shift of bits based on data in the hidden and visible state sequences (References to color refer to the online version of this figure)

    Step 3:According to the data in Imp2 and Vis2,the bit populations and the moving distance of the bits will be determined.In bit plane,the first column of bits is used as a reference to change the position of the bits,and the new bit planeis obtained.

    3.3 Weighted diffusion preserving constant sum (WDPCS)

    A bit-level weighted diffusion scheme that maintains sum invariance is proposed using the different weights occupied by bits in various bit planes.

    For eight bit planes,two adjacent bit planes are selected as a group,which can be divided into seven groups in total.Starting from the group containing the lowest bit plane,perform the following operations on each group successively:for two adjacent bit planesBiandBi+1with dimensionsK×K,the weights occupied by the bits inBi+1are twice the weights of the bits inBi.Each bit plane is divided into two equal parts on the left and right.IfKis odd,the firstK?1 columns are picked for the operation.Then,three bits are chosen fromBiandBi+1,one bit is from the left part ofBi+1,and two bits correspond to the same position in the left and right parts ofBi.If the three bits are 0,1,1 (or 1,0,0),the bits can be converted to 1,0,0 (or 0,1,1),and the sum of the values represented by all bits inBiandBi+1remains constant.Repeat this operation until all the bits in the left part ofBihave been selected.A concrete example is shown in Fig.6.

    Fig.6 Variation of bits in two adjacent bit planes (References to color refer to the online version of this figure)

    In Fig.6,the weight of each bit inBi+1is 2i,and the weight of each bit inBiis 2i?1.When the three selected bits are 1,0,0 (or 0,1,1),they are marked with the same color and modified to 0,1,1 (or 1,0,0).Before and after modification,the sum of the values represented by all bits inBiandBi+1is 17×2i.

    4 Simulations

    In this section,a Helen dataset (Zhao et al.,2021) containing 500 face images with a size of 512×512 and a Holiday dataset (Jegou et al.,2008) containing 1491 holiday photos with a size of 512×512 are used to assess the empirical evaluation of the proposed scheme.

    4.1 Analysis of the encryption effect

    The encrypted images are obtained by iterating the encryption process for 10 rounds.As shown in Fig.7,the block size can be adjusted to achieve a balance between the privacy and availability of the image.WhenK=0,the image indicates a plaintext image;whenKreaches 8 and 16,many details are shown in the encrypted images,which is not secure enough;when the block size is 32×32,the encrypted image retains the rough information of the plaintext image for availability,and it also has a certain level of security.

    Fig.7 TPE-H2MWD encrypted images with different block sizes (original,8×8,16×16,32×32,and 64×64) and corresponding preserved thumbnails

    4.2 Ciphertext image perception quality

    The peak signal-to-noise ratio (PSNR) is an objective standard for evaluating image quality (Chai et al.,2022a).The larger the value is,the less distortion of the images is.Structural similarity (SSIM) (Wu et al.,2022) is another metric for measuring the similarity of two images in terms of brightness,contrast,and structure,and the closer its value is to 1,the more similar the two images are.

    Five hundred images from the Helen dataset are used for testing.The block sizes are set to 8×8,16×16,and 32×32,corresponding to thumbnail sizes of 64×64,32×32,and 16×16,respectively.That is,the pixel average value within each block corresponds to a value in the thumbnail.From the data in Tables 1 and 2,it can be seen that the mean value of PSNR for the TPE-H2MWD and TPE2 schemes reached +∞ and the mean value of SSIM reached 1,indicating that encrypted images completely preserve the thumbnails of the corresponding plaintext images.

    Table 1 Peak signal-to-noise ratio (PSNR) values between 500 plaintext and encrypted image thumbnails

    Table 2 Structural similarity (SSIM) values between 500 plaintext and encrypted image thumbnails

    4.3 Information entropy analysis

    Information entropy is used to reflect the randomness of the information.Information entropy can be computed by (Mishra et al.,2021)

    wherep(mi) denotes the probability of occurrence of the pixel valuemi,andnrefers to the bit depth of the image,which has 8-bit depth for grayscale images.

    When the block size is 32×32,the plaintext image shown in Fig.7 is encrypted with different schemes,and the information entropies of the obtained ciphertext images are listed in Table 3.It is clear that among the approximate TPE schemes,the information entropy obtained by the TPE-LSB (1-bit) scheme is the largest;in the exact TPE schemes,the information entropy obtained by the TPE2 scheme is slightly larger than the result in TPE-H2MWD,indicating that the ciphertext image in the TPE2 scheme has stronger randomness.

    Table 3 Information entropy of plaintext and ciphertext images

    4.4 Histogram analysis

    In image processing,the pixel values of specific channels of an image are used as thexaxis of the histogram,the number of occurrences of each value is used as theyaxis,and the resulting histogram is the image histogram.The histogram of the image reflects the distribution density of image pixels.The images in Fig.7 are selected for testing,and the histograms of the plaintext image and ciphertext images are shown in Fig.8.The ciphertext image histogram contains some features of the plaintext image thumbnail,thus allowing effective use of the encrypted image (Chai et al.,2022b).

    Fig.8 Histogram in plaintext image and ciphertext images:(a)–(c) are histograms of the R component of the plaintext image and ciphertext images with K=8 and 32,respectively;(d)–(f) are histograms of the G component of the plaintext image and ciphertext images with K=8 and 32,respectively;(g)–(i) are histograms of the B component of the plaintext image and ciphertext images with K=8 and 32,respectively

    4.5 Adjacent pixel correlation analysis

    The adjacent pixel correlation reflects the degree of correlation between pixel values at adjacent locations in the image,including mainly the correlation among horizontal pixels,vertical pixels,and diagonal pixels in the image.Here,we randomly select 5000 pairs of neighboring pixels (horizontal,vertical,and diagonal directions) from the plaintext and ciphertext images and then calculate the correlation coefficient by (Chen et al.,2021)

    wherexandyrefer to the values of two adjacent pixels in the image,Nrefers to the pair of pixels selected from the image,andE(x) andD(x) refer to the mathematical expectation and variance ofx,respectively,where the larger the correlation coefficient is,the greater the adjacent pixel correlation is,and vice versa.

    The plaintext image shown in Fig.7 is encrypted when the block size is 32×32,and the results are shown in Fig.9.In addition,the adjacent pixel correlations of the encrypted images corresponding to the different encryption schemes are listed in Table 4.It can be concluded that compared to the approximate TPE scheme (TPE-LSB),the ciphertext image obtained by the TPEH2MWD scheme has the lower adjacent pixel correlation;furthermore,compared to the exact TPE scheme (TPE2),our data still have significant advantages.

    Table 4 Correlation coefficients of plaintext and ciphertext images

    Fig.9 Correlation analysis of the R channel in the image:(a)?(c) are the results of correlation of plaintext image in the horizontal,vertical,and diagonal directions,respectively;(d)?(f) are the results of correlation of encrypted image with K=32 in the horizontal,vertical,and diagonal directions,respectively

    4.6 Running time

    The time complexity of the TPE2 scheme isO(mnd3),wheremandnare the dimensions of the plaintext image anddis the maximum value of pixels in the plaintext image,and the time complexity of the TPE-H2MWD scheme isO(mn).Here,we intercept a subblock of a single channel in the color image for encryption,where the block size is 32×32.The data in Table 5 show that the encryption time of the exact TPE scheme (TPE2) grows rapidly with increasing subblock size and is longer than the running time in TPE-H2MWD.The approximate TPE scheme (TPE-LSB) has the shortest encryption time.

    Table 5 Running time

    Table 6 Mean average precision (mAP) values of image retrieval on encrypted image thumbnails based on the color histogram features

    Table 7 Mean average precision (mAP) values of image retrieval on encrypted image thumbnails based on VGG16 depth features

    4.7 Image retrieval effect test

    At present,content-based image retrieval is a mainstream retrieval method.Encrypted image thumbnails are obtained using in-block averaging,and then the color histogram feature and the depth feature based on VGG16 are extracted from the ciphertext image thumbnails.The cosine distance between feature vectors is used to calculate the similarity between images,and finally,the image retrieval accuracy is obtained.Encrypted image thumbnails from the Holiday dataset are tested,and the mean average precision (mAP) results are listed in Tables 6 and 7.The larger the mAP value is,the higher the retrieval accuracy is.Plaintext images have the highest retrieval accuracy.In addition,when the block size reaches 16×16,32×32,and 64×64,the highest retrieval accuracy can be obtained if the thumbnail size is 32×32;when the block size reaches 8×8,the highest retrieval accuracy can be obtained if the thumbnail size is 64×64.Thus,users can choose the block size and thumbnail size according to their specific requirements.

    4.8 Security analysis

    Most likely,the biggest threat to TPE algorithms is super resolution (SR) technology,which reconstru?cts low-resolution images into corresponding highresolution images by specific algorithms.Fig.10a shows an image with a resolution of 128×128,Fig.10b corresponds to a thumbnail with a resolution of 32×32,and the results obtained by reconstructing the thumbnail with advanced SR algorithms FSRCNN (Dong et al.,2016) and DASR (Wang et al.,2021) are shown in Figs.10c and 10d,respectively.While the SR technique can enhance the visual quality of thumbnail images,the details of the reconstructed images and the original images differ,suggesting that the SR scheme restores only the approximate images but not the real ones.

    Fig.10 Super resolution simulation results:(a) image with a resolution of 128×128;(b) a thumbnail with a resolution of 32×32;(c) results obtained by reconstructing the thumbnail with FSRCNN;(d) results obtained by reconstructing the thumbnail with DASR

    4.9 Size expansion rate

    In this subsection,we use the PNG images obtained from the Helen dataset to evaluate the expansion rate of the encrypted images.Suppose that the file size of the encrypted image isxand the file size of the plaintext image isy.Then,the encrypted image expansion rate is equal tox/y.For images in lossless PNG format,the redundancy of image information is used to accomplish lossless image compression.The redundancy of the plaintext image tends to be more than the redundancy of the encrypted image,resulting in a lower compression rate of the encrypted image than the plaintext image.As shown in Fig.11,the average encrypted image expansion rates in different methods are demonstrated.In the TPE-H2MWD scheme,the cipher image expansion rate expands with increasing block size because the larger the block size is,the greater the number of available bit random shift positions,the more severely the adjacent pixel correlation is broken,and the lower the compression efficiency.

    Fig.11 Average size expansion rate of encrypted images

    5 Conclusions

    In this paper,an exact TPE is implemented with hidden Markov model and weighted diffusion,and the specific encryption process and simulation results are given.The proposed TPE-H2MWD consists of two stages:bit-level permutation and weighted diffusion.In the scrambling phase,the zigzag models are applied in the lower four bit planes,and the hidden Markov model is used in the higher four bit planes.In the diffusion phase,the sum of the pixel values is kept constant.Simulation results show that the TPEH2MWD can effectively balance the security and availability of images,where illegal users cannot obtain detailed information about the plaintext images from the encrypted images,while image owners can achieve image usability based on the relevant information about the plaintext images retained in the encrypted images.

    Contributors

    Xiuhui CHEN processed the data.Yakun MA validated the study.Fang ZUO supervised the study.Xiuli CHAI drafted the paper.Zhihua GAN helped organize the paper.Yushu ZHANG revised and finalized the paper.

    Compliance with ethics guidelines

    Xiuli CHAI,Xiuhui CHEN,Yakun MA,Fang ZUO,Zhihua GAN,and Yushu ZHANG declare that they have no conflict of interest.

    Data availability

    The data that support the findings of this study are available from the corresponding authors upon reasonable request.

    免费人成视频x8x8入口观看| 蜜臀久久99精品久久宅男| 午夜福利成人在线免费观看| 51国产日韩欧美| 观看美女的网站| 国产成人精品婷婷| 亚洲熟妇中文字幕五十中出| 色吧在线观看| 婷婷色综合大香蕉| 亚洲自拍偷在线| 亚洲成人久久性| 伦理电影大哥的女人| 国产av麻豆久久久久久久| 亚洲美女搞黄在线观看| 国产黄色视频一区二区在线观看 | 神马国产精品三级电影在线观看| 国产精品久久久久久久电影| 成年版毛片免费区| 婷婷亚洲欧美| 精品少妇黑人巨大在线播放 | 蜜桃亚洲精品一区二区三区| 久久久国产成人免费| 超碰av人人做人人爽久久| 久久亚洲精品不卡| 日本五十路高清| 插逼视频在线观看| 久久久a久久爽久久v久久| 午夜激情欧美在线| 精品久久久久久久末码| 久久久久久久久大av| 亚洲精品自拍成人| 久久精品91蜜桃| 国产午夜精品论理片| 久久精品国产亚洲av天美| 少妇熟女欧美另类| 高清毛片免费观看视频网站| 免费观看人在逋| 五月玫瑰六月丁香| 看非洲黑人一级黄片| 久久热精品热| 国产精品乱码一区二三区的特点| 蜜桃久久精品国产亚洲av| 午夜精品在线福利| 亚洲av一区综合| 丰满人妻一区二区三区视频av| 国产av在哪里看| 波野结衣二区三区在线| av在线亚洲专区| 国产色爽女视频免费观看| 午夜爱爱视频在线播放| 亚洲精品影视一区二区三区av| 免费大片18禁| 国产精品久久久久久精品电影| 欧美+亚洲+日韩+国产| 少妇熟女aⅴ在线视频| 精品久久久噜噜| 日本黄色片子视频| 三级毛片av免费| 亚洲va在线va天堂va国产| 国产精品爽爽va在线观看网站| 成人国产麻豆网| 欧美日韩精品成人综合77777| 人人妻人人澡欧美一区二区| 日韩av不卡免费在线播放| 夫妻性生交免费视频一级片| 久久亚洲国产成人精品v| 可以在线观看毛片的网站| 精品久久久久久久久久免费视频| 成人亚洲精品av一区二区| 亚洲成a人片在线一区二区| 热99re8久久精品国产| 一级黄片播放器| 秋霞在线观看毛片| 可以在线观看的亚洲视频| av女优亚洲男人天堂| 亚洲欧美日韩无卡精品| 91精品一卡2卡3卡4卡| 国产av在哪里看| 在线免费观看不下载黄p国产| 一级毛片电影观看 | 永久网站在线| 99久国产av精品| 亚洲婷婷狠狠爱综合网| 丰满的人妻完整版| 日本-黄色视频高清免费观看| 欧美变态另类bdsm刘玥| 夜夜爽天天搞| 变态另类丝袜制服| 国产精品免费一区二区三区在线| 国产午夜精品久久久久久一区二区三区| 寂寞人妻少妇视频99o| 成人永久免费在线观看视频| 免费黄网站久久成人精品| 亚洲成人久久爱视频| 亚洲精品影视一区二区三区av| АⅤ资源中文在线天堂| 少妇丰满av| 日本黄色视频三级网站网址| 国产亚洲精品av在线| 亚洲国产精品久久男人天堂| 一级av片app| 欧美成人a在线观看| avwww免费| 欧美精品一区二区大全| 亚洲在久久综合| 国产亚洲av片在线观看秒播厂 | 国产精品久久久久久久电影| 黄色欧美视频在线观看| 欧美极品一区二区三区四区| 中文字幕精品亚洲无线码一区| 精品久久久久久久末码| 综合色丁香网| 亚洲内射少妇av| 国产真实伦视频高清在线观看| 亚洲中文字幕一区二区三区有码在线看| 久久久久久久久中文| 亚洲人成网站高清观看| 精品日产1卡2卡| 亚洲av免费高清在线观看| 欧美性猛交黑人性爽| 菩萨蛮人人尽说江南好唐韦庄 | 免费观看人在逋| 男女下面进入的视频免费午夜| 亚洲自拍偷在线| 天堂中文最新版在线下载 | 嘟嘟电影网在线观看| 亚洲一区高清亚洲精品| 国产亚洲精品久久久com| 亚洲五月天丁香| av在线天堂中文字幕| 26uuu在线亚洲综合色| 蜜臀久久99精品久久宅男| 91午夜精品亚洲一区二区三区| 欧美三级亚洲精品| 插逼视频在线观看| 亚洲经典国产精华液单| 日韩欧美国产在线观看| 久久久久性生活片| 一边摸一边抽搐一进一小说| 日本爱情动作片www.在线观看| 观看美女的网站| 免费电影在线观看免费观看| 亚洲国产精品sss在线观看| 边亲边吃奶的免费视频| 欧美人与善性xxx| 精品国内亚洲2022精品成人| 最近最新中文字幕大全电影3| 久久国产乱子免费精品| 男人的好看免费观看在线视频| 青青草视频在线视频观看| 欧美性猛交╳xxx乱大交人| 欧美bdsm另类| 亚洲激情五月婷婷啪啪| 亚洲性久久影院| 午夜视频国产福利| 午夜视频国产福利| av专区在线播放| 欧美潮喷喷水| 国产在线男女| 亚洲国产日韩欧美精品在线观看| 国产欧美日韩精品一区二区| 欧美一级a爱片免费观看看| 黄色欧美视频在线观看| 国产精品久久电影中文字幕| 成人亚洲精品av一区二区| 韩国av在线不卡| 久久人人爽人人片av| 日本av手机在线免费观看| 成人午夜高清在线视频| 久久6这里有精品| 亚洲七黄色美女视频| 18禁在线播放成人免费| 久久久久久大精品| 国内揄拍国产精品人妻在线| 国产一区二区三区av在线 | 成人毛片a级毛片在线播放| 欧美+日韩+精品| 中文字幕av在线有码专区| 中文字幕久久专区| 一级毛片aaaaaa免费看小| 蜜桃久久精品国产亚洲av| 国产69精品久久久久777片| 亚洲成a人片在线一区二区| 色视频www国产| 亚洲欧美日韩高清专用| 亚洲国产精品成人久久小说 | 一进一出抽搐动态| 美女cb高潮喷水在线观看| 99国产精品一区二区蜜桃av| 激情 狠狠 欧美| 在线观看美女被高潮喷水网站| 在线观看美女被高潮喷水网站| 日本av手机在线免费观看| 嫩草影院新地址| 天堂√8在线中文| 久久精品综合一区二区三区| 床上黄色一级片| 免费av毛片视频| 日日撸夜夜添| 国产伦精品一区二区三区视频9| 哪个播放器可以免费观看大片| 22中文网久久字幕| 国产极品精品免费视频能看的| 亚洲国产高清在线一区二区三| 国产伦在线观看视频一区| 欧美一级a爱片免费观看看| 99久久人妻综合| 久久久久久久久久久丰满| 99热全是精品| 国内精品宾馆在线| 久久精品国产亚洲网站| 国产美女午夜福利| 国产真实乱freesex| 一进一出抽搐动态| 美女 人体艺术 gogo| 国产视频内射| 久久精品国产99精品国产亚洲性色| 国产中年淑女户外野战色| 亚洲精品日韩av片在线观看| 成人永久免费在线观看视频| 欧美日韩国产亚洲二区| 在线播放无遮挡| 久久久久久久久久成人| h日本视频在线播放| 伦理电影大哥的女人| 国产毛片a区久久久久| 在线观看免费视频日本深夜| 三级男女做爰猛烈吃奶摸视频| 插逼视频在线观看| 成人毛片a级毛片在线播放| 日本成人三级电影网站| 你懂的网址亚洲精品在线观看 | 91麻豆精品激情在线观看国产| 黄片无遮挡物在线观看| 26uuu在线亚洲综合色| 久久精品夜夜夜夜夜久久蜜豆| 国产精品av视频在线免费观看| 国产一区亚洲一区在线观看| a级毛片a级免费在线| a级毛片a级免费在线| 欧美成人a在线观看| 国产精华一区二区三区| 狂野欧美白嫩少妇大欣赏| 欧美3d第一页| 如何舔出高潮| 美女高潮的动态| 欧美成人免费av一区二区三区| 亚洲久久久久久中文字幕| 观看免费一级毛片| 搞女人的毛片| 老熟妇乱子伦视频在线观看| 欧美区成人在线视频| 欧美精品一区二区大全| 欧美精品一区二区大全| 日本与韩国留学比较| 亚洲欧美成人综合另类久久久 | 国产精品久久电影中文字幕| 老女人水多毛片| 啦啦啦观看免费观看视频高清| 欧美最新免费一区二区三区| 我的老师免费观看完整版| 久久99精品国语久久久| 亚洲国产精品sss在线观看| 国产男人的电影天堂91| 亚洲18禁久久av| 中文字幕熟女人妻在线| av在线播放精品| 一边摸一边抽搐一进一小说| 一进一出抽搐动态| 中文字幕免费在线视频6| 国产激情偷乱视频一区二区| 亚洲人成网站在线观看播放| 麻豆一二三区av精品| 国产成人精品久久久久久| 91午夜精品亚洲一区二区三区| 3wmmmm亚洲av在线观看| 国产不卡一卡二| 成人国产麻豆网| 国产av不卡久久| 99国产精品一区二区蜜桃av| av女优亚洲男人天堂| 国产麻豆成人av免费视频| 久久精品国产99精品国产亚洲性色| 日韩欧美国产在线观看| 内地一区二区视频在线| 99精品在免费线老司机午夜| 国产精品久久久久久久久免| 日本三级黄在线观看| 国产在线男女| 波野结衣二区三区在线| 免费看a级黄色片| 国产伦精品一区二区三区视频9| 国产精品日韩av在线免费观看| 男女视频在线观看网站免费| 性欧美人与动物交配| 又爽又黄a免费视频| kizo精华| 国产精品久久久久久久电影| 97人妻精品一区二区三区麻豆| 在线免费观看的www视频| 中文字幕熟女人妻在线| 久久久色成人| 欧美成人免费av一区二区三区| 欧美一级a爱片免费观看看| 国产精品一区二区在线观看99 | 夜夜夜夜夜久久久久| 欧洲精品卡2卡3卡4卡5卡区| 少妇的逼水好多| 国产极品精品免费视频能看的| 边亲边吃奶的免费视频| 26uuu在线亚洲综合色| 天堂√8在线中文| 亚洲婷婷狠狠爱综合网| 如何舔出高潮| 99热这里只有是精品50| 国产精品一区二区三区四区免费观看| 国内精品美女久久久久久| 欧美日韩在线观看h| 国产成人精品婷婷| 亚洲欧美日韩卡通动漫| 国产精品久久久久久精品电影小说 | 国内精品美女久久久久久| 91aial.com中文字幕在线观看| 久久人人爽人人爽人人片va| 色播亚洲综合网| 免费看av在线观看网站| 尤物成人国产欧美一区二区三区| 国产伦精品一区二区三区四那| 亚洲最大成人中文| 99久久久亚洲精品蜜臀av| 深夜a级毛片| 国产视频首页在线观看| 一本一本综合久久| a级一级毛片免费在线观看| 成人特级黄色片久久久久久久| 免费观看a级毛片全部| 最近视频中文字幕2019在线8| 亚洲va在线va天堂va国产| 高清毛片免费看| 18禁在线播放成人免费| 免费观看的影片在线观看| 国产v大片淫在线免费观看| 国产综合懂色| 内射极品少妇av片p| 亚洲电影在线观看av| 久久欧美精品欧美久久欧美| 亚洲国产欧美在线一区| 97热精品久久久久久| 亚洲人成网站在线播| 国产精品人妻久久久久久| 三级国产精品欧美在线观看| 热99在线观看视频| 免费大片18禁| 在线免费十八禁| 精品久久久久久久久久久久久| 亚洲最大成人中文| 男人的好看免费观看在线视频| 国产精品免费一区二区三区在线| 国产精品精品国产色婷婷| 久久久色成人| 亚洲图色成人| 久久久久久久久久成人| 男的添女的下面高潮视频| 日韩精品有码人妻一区| avwww免费| 日本免费a在线| 麻豆乱淫一区二区| 国产成人a区在线观看| 天天一区二区日本电影三级| 久久欧美精品欧美久久欧美| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | ponron亚洲| 亚洲美女视频黄频| 听说在线观看完整版免费高清| 插阴视频在线观看视频| 校园春色视频在线观看| av专区在线播放| 成人毛片60女人毛片免费| 少妇被粗大猛烈的视频| 久久久久久久午夜电影| 18禁裸乳无遮挡免费网站照片| 尤物成人国产欧美一区二区三区| 99热这里只有精品一区| 亚洲国产精品久久男人天堂| 久久久久久久久久成人| 啦啦啦韩国在线观看视频| 国产免费男女视频| 免费看日本二区| 搞女人的毛片| 国产精品久久久久久久电影| 精品国产三级普通话版| 丝袜美腿在线中文| 欧美成人精品欧美一级黄| 久久久久久久久久成人| ponron亚洲| 最好的美女福利视频网| 成人漫画全彩无遮挡| 精品久久国产蜜桃| 亚洲精品粉嫩美女一区| а√天堂www在线а√下载| 亚洲最大成人手机在线| 中文字幕免费在线视频6| 国产免费男女视频| 亚洲乱码一区二区免费版| 国产精品日韩av在线免费观看| 国产私拍福利视频在线观看| 一个人观看的视频www高清免费观看| 免费看美女性在线毛片视频| 我要看日韩黄色一级片| 美女被艹到高潮喷水动态| 国产高潮美女av| 久久99精品国语久久久| 日韩欧美三级三区| a级毛片免费高清观看在线播放| 成人性生交大片免费视频hd| 99热精品在线国产| 欧美最新免费一区二区三区| 国产蜜桃级精品一区二区三区| 亚洲欧美清纯卡通| 日本熟妇午夜| 麻豆国产97在线/欧美| 亚洲国产精品久久男人天堂| 日日啪夜夜撸| 一级毛片我不卡| 久久精品国产亚洲av涩爱 | 久久99热6这里只有精品| 久久精品91蜜桃| 最近视频中文字幕2019在线8| 亚洲在线自拍视频| 亚洲成人精品中文字幕电影| 99在线视频只有这里精品首页| 国产白丝娇喘喷水9色精品| or卡值多少钱| 老女人水多毛片| 午夜a级毛片| 免费在线观看成人毛片| 日韩,欧美,国产一区二区三区 | 丰满人妻一区二区三区视频av| 最后的刺客免费高清国语| av黄色大香蕉| 国产精品.久久久| 国产高清激情床上av| 男人的好看免费观看在线视频| 国产日韩欧美在线精品| 两性午夜刺激爽爽歪歪视频在线观看| 日韩精品青青久久久久久| 亚洲18禁久久av| 免费人成视频x8x8入口观看| 成人亚洲精品av一区二区| 秋霞在线观看毛片| 欧美日本视频| 91aial.com中文字幕在线观看| 夜夜爽天天搞| 十八禁国产超污无遮挡网站| 成年女人看的毛片在线观看| 亚洲精品粉嫩美女一区| 久久精品国产亚洲网站| 欧美+日韩+精品| 黄片无遮挡物在线观看| 性插视频无遮挡在线免费观看| 亚洲在线自拍视频| 久久欧美精品欧美久久欧美| 国产黄片视频在线免费观看| 亚洲久久久久久中文字幕| 老熟妇乱子伦视频在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 乱系列少妇在线播放| 亚洲精华国产精华液的使用体验 | 99九九线精品视频在线观看视频| 午夜激情欧美在线| av在线亚洲专区| 亚洲成人av在线免费| 日产精品乱码卡一卡2卡三| av在线观看视频网站免费| 午夜福利在线在线| 日日啪夜夜撸| 久久草成人影院| 国产一区二区三区在线臀色熟女| 欧美日韩乱码在线| 亚洲一区高清亚洲精品| 亚洲欧美成人精品一区二区| 日韩av不卡免费在线播放| 国产精品日韩av在线免费观看| 性欧美人与动物交配| 久久久久久久久久久免费av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久久久久大精品| 非洲黑人性xxxx精品又粗又长| 成年版毛片免费区| 男人舔女人下体高潮全视频| 亚洲最大成人手机在线| 直男gayav资源| 夜夜看夜夜爽夜夜摸| 色哟哟·www| 欧美成人精品欧美一级黄| 日本黄色视频三级网站网址| 精品久久久久久久久av| 非洲黑人性xxxx精品又粗又长| 晚上一个人看的免费电影| a级一级毛片免费在线观看| 日产精品乱码卡一卡2卡三| 欧美精品国产亚洲| 午夜激情福利司机影院| 亚洲欧美日韩东京热| 国产成人91sexporn| 99在线视频只有这里精品首页| av在线老鸭窝| 久久99精品国语久久久| 卡戴珊不雅视频在线播放| 可以在线观看毛片的网站| 日日啪夜夜撸| 日日干狠狠操夜夜爽| 在线播放国产精品三级| 免费观看在线日韩| 国产一区二区激情短视频| 嘟嘟电影网在线观看| 国产极品精品免费视频能看的| 色综合站精品国产| 午夜福利成人在线免费观看| 大香蕉久久网| 国产av不卡久久| 亚洲人与动物交配视频| 白带黄色成豆腐渣| 亚洲精品色激情综合| 亚洲成a人片在线一区二区| 大香蕉久久网| 久久久久久久久久黄片| 一级黄片播放器| 婷婷精品国产亚洲av| 久久久久久久久久黄片| 亚洲欧美日韩高清专用| 国产伦在线观看视频一区| 在线免费观看的www视频| 一进一出抽搐动态| 伦理电影大哥的女人| 久久久久久国产a免费观看| 最近2019中文字幕mv第一页| 国产毛片a区久久久久| 亚洲av.av天堂| 国产麻豆成人av免费视频| 在线播放无遮挡| 男女做爰动态图高潮gif福利片| 嘟嘟电影网在线观看| 国产一区二区在线观看日韩| 国产精品免费一区二区三区在线| 天堂影院成人在线观看| av在线播放精品| 黄色一级大片看看| 岛国在线免费视频观看| 久久精品国产亚洲av涩爱 | 99在线视频只有这里精品首页| 一区二区三区高清视频在线| 亚洲国产精品成人久久小说 | 亚洲国产色片| 22中文网久久字幕| 在线免费观看不下载黄p国产| 12—13女人毛片做爰片一| 久99久视频精品免费| 一进一出抽搐gif免费好疼| 成人av在线播放网站| 一区二区三区高清视频在线| 日韩 亚洲 欧美在线| 国产极品天堂在线| 国产69精品久久久久777片| 国产精品无大码| 人妻久久中文字幕网| 国产高清激情床上av| 国产在视频线在精品| 爱豆传媒免费全集在线观看| 亚洲av成人精品一区久久| 有码 亚洲区| 成人午夜精彩视频在线观看| 丰满乱子伦码专区| 日韩在线高清观看一区二区三区| 久久久精品欧美日韩精品| 尾随美女入室| 亚洲欧美日韩卡通动漫| 欧美不卡视频在线免费观看| 成人无遮挡网站| 夜夜看夜夜爽夜夜摸| 老司机影院成人| 欧美一区二区精品小视频在线| 久久精品国产亚洲网站| 国产一区二区三区av在线 | av天堂在线播放| 嘟嘟电影网在线观看| 成人国产麻豆网| 国产亚洲av片在线观看秒播厂 | 日本黄色片子视频| 国产真实伦视频高清在线观看| 一级av片app| 亚洲欧美成人综合另类久久久 | 日本一本二区三区精品| 欧美精品国产亚洲| 国产精品人妻久久久久久| 亚洲av一区综合| 国产精品乱码一区二三区的特点| 日韩av在线大香蕉| 99视频精品全部免费 在线| 国产真实乱freesex| av天堂在线播放| 校园春色视频在线观看| 色综合亚洲欧美另类图片| 国产又黄又爽又无遮挡在线| 国产成人福利小说| 青春草视频在线免费观看| 青春草亚洲视频在线观看| 少妇高潮的动态图| 久久九九热精品免费| 久久精品人妻少妇| 久久精品久久久久久久性| 搡女人真爽免费视频火全软件| 欧美一级a爱片免费观看看| a级毛片免费高清观看在线播放| 伊人久久精品亚洲午夜|