地球信息科学学报 ›› 2015, Vol. 17 ›› Issue (1): 8-14.doi: 10.3724/SP.J.1047.2015.00008

• • 上一篇    下一篇

一种面向遥感影像内容认证的多级权限管理方法

丁凯孟(), 朱长青*()   

  1. 南京师范大学 虚拟地理环境教育部重点实验室,南京 210023
  • 收稿日期:2014-06-30 修回日期:2014-11-23 出版日期:2015-01-10 发布日期:2015-01-05
  • 通讯作者: 朱长青 E-mail:dingkaimeng@foxmail.com;zcq88@263.com
  • 作者简介:

    作者简介:丁凯孟(1985-),男,山西长治人,博士生,研究方向为地理数据安全。E-mail:dingkaimeng@foxmail.com

  • 基金资助:
    国家社科基金重大项目(11&ZD162);国家自然科学基金项目(41301413);江苏省自然科学基金资助项目(BK20130903);江苏省普通高校研究生科研创新计划资助项目(CXLX13_378)

A Multi-level Authentication Authorization Approach for Remote Sensing Image

DING Kaimeng(), ZHU Changqing*()   

  1. Key Laboratory of Virtual Geographic Environment of Ministry of Education, Nanjing Normal University, Nanjing 210023, China
  • Received:2014-06-30 Revised:2014-11-23 Online:2015-01-10 Published:2015-01-05
  • Contact: ZHU Changqing E-mail:dingkaimeng@foxmail.com;zcq88@263.com
  • About author:

    *The author: CHEN Nan, E-mail:fjcn99@163.com

摘要:

完整性认证是遥感影像获得有效利用的前提,完整性无法确定的遥感影像,其使用价值将大打折扣。传统认证技术没有顾及遥感影像认证过程中的特殊性,并不是所有用户都有权甄别遥感影像是否经过扰动。而且,传统认证技术对数据进行二进制级别的认证,已不能满足遥感影像的内容认证需求。本文从内容认证的角度研究遥感影像的多级权限管理,提出一种基于感知哈希技术与单向函数的遥感影像多级认证权限的管理方法。感知哈希技术能用很少的信息表征遥感影像的有效内容,并对不改变影像内容的操作保持鲁棒性,与密码学Hash函数有着显著的区别。多级权限的管理则通过建立与权限矢量对应的密钥矢量来实现,权限较高的用户可以通过自己的密钥计算出低权限用户的密钥,反之则不行。本方法首先以单向函数生成不同等级的权限密钥,然后,根据不同区域的地物影像进行敏感等级的划分,最后,计算不同区域影像的感知哈希序列,并通过不同级别的密钥加密生成的感知哈希序列。用户认证影像内容完整性时,根据权限的不同认证不同敏感度的影像。实验与分析表明,该算法能有效实现遥感影像的认证权限管理,并具有较高的实现效率和安全性。

关键词: 遥感影像, 认证权限, 单向函数, 感知哈希

Abstract:

Integrity authentication is proved to be the prerequisite of remote sensing image applications. In other words, an image with poor integrity would have little value in further utilizations. The special nature of the authentication process is not taken into account in conventional authentication technologies, which makes it difficult for all users to be authorized to discriminate whether the images have been destabilized. Moreover, traditional authentication technologies are based on the binary data, which can not meet the requirements of content authentication for remote sensing image. According to the actual requirements of remote sensing image authentication, a multi-level authorization method for remote sensing image based on perceptual hashing and one-way function is proposed from the perspective of content authentication. Perceptual hash technology is different from the cryptographic hash function, that it can express the content of remote sensing image with little information, at the same time, it can keep the robustness for operations that do not change the content of image. Multi-level authorization management is realized by establishing a key vector corresponding to the permission vector. So the higher privileged users can calculate the keys of users with lower priorities, based on their own keys. First, the key vector was produced for multi-level authorization management based on one-way function. Second, the image is partitioned into regions with different sensitivity levels according to the contained objects. Then, the perceptual hash values of the regions are generated and used for authentication, and are encrypted with hierarchical keys. Users with different priorities can authenticate the corresponding contents with relevant sensitivity levels from the remote sensing image, after decrypting the perceptual hash values. The experiment results show that the proposed approach effectively achieved the multi-level authentication for remote sensing images with high computing efficiency and confidentiality.

Key words: remote sensing image, authentication authority, one-way function, perceptual hashing