期刊文献+

物联网中基于混沌模型的隐私安全算法研究 被引量:1

Research on privacy preservation algorithm based on chaos in IoT
下载PDF
导出
摘要 在物联网应用中,各种物体可与物联网互联,人们可以得到便捷的服务。但在信息传输过程中用户隐私信息可能被泄露,如何解决此问题受到人们的广泛关注。针对2个问题:一是隐私数据生命周期中前期工作需要加强,二是用户参与到数据隐藏工作中,根据实际需求选择需要隐藏的数据。研究提出在数据采集前,根据用户需求进行数据隐密传输。为了保障隐私信息在传输中不被泄露,本文设计一种轻量级加密方法、即数字水印安全套装结构,进行数据隐藏,保障隐私信息安全。该方法基于离散余弦变换和混沌算法,在图像载体频域内隐藏隐私信息,隐私信息具体嵌入位置通过利用混沌算法,和人眼视觉特性的关系动态进行调整,考虑到混沌算法中的初值和参数万一被破解导致隐私信息被破解问题,对混沌算法产生的随机数位置进行进一步的自创公式选择隐藏位置,这样非法截获者肉眼无法察觉隐密信息的存在,也无法对用户内容解密。仿真结果从隐蔽性、隐藏容量和鲁棒性三方面分析,表明该算法可以实现隐私信息的加解密,对其进行攻击实验,仍可获得信息,相比于直接传输敏感信息更安全可靠。 In the application of the Internet of Things,various objects can be connected with the Internet of Things,and people can get convenient services.however,User privacy information may be leaked in the process of information transmission,how to solve this problem is widely concerned by people.This paper deals with two problems:one is that the preliminary work in the privacy data life cycle needs to be strengthened;the other is that user participates in hiding the data and dynamically selects the data that needs to be hidden.The research presents data need to be encrypted according to user requirements before data acquisition.In this paper,a lightweight encryption method"digital watermark security package structure"is designed for privacy information hiding.This method is based on discrete cosine transformation(DCT)and chaos algorithm,and hides privacy information in frequency domain of image carrier,The specific embedding position of privacy information is adjusted dynamically by using chaos algorithm to generate random numbers and the relationship between human visual characteristics.Moreover,if the initial value and parameters of chaos algorithm are cracked,it can lead to privacy information being cracked,so the random number position generated by the chaos algorithm can be further self-created to select the hidden position.Thus,the illegal interceptors cannot visually detect the existence of the hidden information,nor can they decrypt the user’s content.Simulation results are analyzed from three aspects such as concealment,hiding capacity and robustness,showing that the algorithm can achieve encryption and decryption of privacy information,and the processing time is short.The privacy information can still be obtained by attacking it,and it is more secure and reliable compared with direct transmission of privacy information.
作者 宫海梅 王伟 许桂月 GONG Haimei;WANG Wei;XU Guiyue(Department of Information Engineering,Hainan Technology and Business College,Haikou 570203,China)
出处 《智能计算机与应用》 2020年第1期144-148,共5页 Intelligent Computer and Applications
基金 海南省高等学校科学研究项目(Hnky2018-95).
关键词 隐私保护 离散余弦变换 混沌算法 物联网 privacy preservation discrete cosine transformation chaos algorithm IoT
  • 相关文献

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部