CN102625025A - Encryption/decryption method and system based on image transmission - Google Patents

Encryption/decryption method and system based on image transmission Download PDF

Info

Publication number
CN102625025A
CN102625025A CN2012100837002A CN201210083700A CN102625025A CN 102625025 A CN102625025 A CN 102625025A CN 2012100837002 A CN2012100837002 A CN 2012100837002A CN 201210083700 A CN201210083700 A CN 201210083700A CN 102625025 A CN102625025 A CN 102625025A
Authority
CN
China
Prior art keywords
picture
encryption
row
image
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100837002A
Other languages
Chinese (zh)
Inventor
罗笑南
王佳
林格
陈湘萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN2012100837002A priority Critical patent/CN102625025A/en
Publication of CN102625025A publication Critical patent/CN102625025A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention discloses an encryption method based on image transmission. The method comprises the steps as follows: the MD5 value of the digital image of a picture to be encrypted is calculated and obtained according to the fifth edition of message abstract algorithm; the pixel array of the digital image is analyzed; according to the block sequence of the pixel, XOR operation of the pixel array formed by blocks including 16 pixels and the MD5 value is carried out, and an encryption image is formed; and the encryption image is transmitted to a decryption end. The invention also discloses a decryption method and an encryption/decryption system based on image transmission, by implementing the embodiment of the invention, the algorithm is easy to achieve, the algorithm load is low, the application is variable, the effect is good, the completeness function of the verification image is achieved, and at the same time, safe transmission of the image is ensured.

Description

A kind of encrypting and decrypting method and system based on the image transmission
Technical field
The present invention relates to digital home technical field, relate in particular to a kind of encrypting and decrypting method and system based on the image transmission.
Background technology
Along with network and fast development of computer technology, remote message transmission becomes more and more simpler, thereby impels the working method of social every field to present diversity.Such as at medical domain, long-range expert consultation is a particular service that grew up in recent years.This business both improved some small and medium-sized cities medical technique level more saved the time cost and the transportation cost of expert consultation.The expert is when remote diagnosis; Patient's pathology picture (such as X-ray sheet etc.) plays crucial effects to diagnostic result; So the requirement to the pathology picture is just very high; Often need picture very fine, must guarantee the integrality of image in transmission course again simultaneously, can not occur even the mistake of a pixel perhaps is maliciously tampered.The pathology picture relates to a lot of privacies in addition, so must carry out certain safety encipher to picture.
In existing encrypted image scheme based on algorithm; Relatively safety will belong to the md5 encryption algorithm based on the hash function; Cryptography Hash function can be used in data integrity and message authentication; It wants to regard the Hash functional value as the eap-message digest of input basically, when any one binary digit in the input changes, all will cause the variation of Hash functional value.The Hash function can be accepted long arbitrarily message and be input, and the output that produces fixed length, and the hash value of generation can be regarded " fingerprint " of file, message and other data blocks as, and it satisfies the cryptography character that is used for message authentication.It has characteristics such as one-way, anti-weak collision and anti-strong collision.Therefore the Hash function can be used for the integrity check of message or file.
The full name of MD5 is Message2 DigestAlgorithm 5 (md5-challenge); Ronald L.Rivest by M ITLaborat ory for Computer Sci2ence and RS A Data Security I nc develops in the early 1990s, through MD2, MD3 and MD4 development.Its effect is to let big capacity information become a kind of secret form (be exactly the big integer that be transformed into the byte serial of a random length one fixed length) by " compression " with the signature of digital signature software before the private close spoon.It can utilize a message input (such as a width of cloth digital picture) at random to produce one 128 informative abstract.Different files then can obtain 128 different informative abstract outputs.Therefore the typical application of MD5 is that a segment information is produced informative abstract, is distorted preventing, figure is as shown in Figure 1 for its transfer process.
Traditional AES can not be encrypted to image bit map itself effectively, and the encryption of just image file itself being carried out is if certain several pixel goes wrong then can't find.The conventional cryptography algorithm has been announced the feasibility that algorithm cracks, and no longer safety or fail safe are very low.
Summary of the invention
Problem based on the prior art existence; The embodiment of the invention provides a kind of encrypting and decrypting method and system based on the image transmission; The malice that it has solved in the image transmission course is distorted and the transmission error problem, utilizes the image bit encryption technology simultaneously, with the MD5 value of image itself as the periodic sequence of encrypting; Adopt unique encryption method that image is carried out the encryption of rational and orderly, thereby reach the purpose of safety of image transmission.This algorithm be prone to be realized, operand is little, applications is various, effective, in realization authentication image integrity function, solved safety of image property problem.
Based on the problems referred to above, the embodiment of the invention provides a kind of encryption method based on the image transmission, comprising:
Obtain the MD5 value of digital picture in the picture to be encrypted according to Message Digest Algorithm 5 MD5 algorithm computation;
Resolve the picture element matrix of said digital picture;
According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form and encrypt picture;
Said encryption picture is transferred to decrypting end.
Said method also comprises:
Detect the cipher round results of encrypting picture,, then encrypt once more encrypting picture, reach the threshold value that is provided with in advance up to said cipher round results based on the D5 algorithm if cipher round results does not reach the threshold value that is provided with in advance.
Specifically comprise:
In ciphering process, take the row picture element matrix from left to right, row pixel order from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In ciphering process, take the row picture element matrix from right to left, row pixel order from top to bottom, Row Column and MD5 value are carried out XOR; And/or
In ciphering process, take the row pixel from left to right, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In encrypted process, take the row pixel from right to left, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR.
Accordingly, the embodiment of the invention also provides a kind of decryption method based on the image transmission, comprising:
Receive and encrypt the encryption picture that end sends;
Resolve the picture element matrix of encrypting in the picture;
According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form the deciphering picture.
Also comprise after the said method:
Calculate said decrypted image MD5 value and whether judge said encrypted image through distorting, if through distorting, then terminating operation if do not have through distorting, then carries out corresponding decryption oprerations according to known encryption number of times to the deciphering picture.
Accordingly, the embodiment of the invention also provides a kind of encrypting and decrypting system based on the image transmission, and said system comprises encrypts end and decrypting end, wherein:
Encrypt and hold the MD5 value that is used for obtaining picture digital picture to be encrypted according to Message Digest Algorithm 5 MD5 algorithm computation; Resolve the picture element matrix of said digital picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form and encrypt picture; Said encryption picture is transferred to decrypting end;
Decrypting end is used to receive the encryption picture of encrypting the end transmission; Resolve the picture element matrix of encrypting in the picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form the deciphering picture.
Said encryption end also is used to detect the cipher round results of encrypting picture, if cipher round results does not reach the threshold value that is provided with in advance, then gives the D5 algorithm and encrypts once more encrypting picture, reaches the threshold value that is provided with in advance up to said cipher round results.
Under repeatedly encryption situation, said decrypting end also is used to calculate said decrypted image MD5 value and judges that said encrypted image whether distort by process, distorts if pass through, then terminating operation; If do not have through distorting, then decrypted image carried out corresponding decryption oprerations according to known encryption number of times.
The mode that said encryption end is encrypted comprises:
In ciphering process, take the row picture element matrix from left to right, row pixel order from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In ciphering process, take the row picture element matrix from right to left, row pixel order from top to bottom, Row Column and MD5 value are carried out XOR; And/or
In ciphering process, take the row pixel from left to right, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In encrypted process, take the row pixel from right to left, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR.
Said encryption end adopts with a kind of cipher mode and encrypts or four kinds of combinations that cipher mode is mutual in ciphering process repeatedly.
To sum up, through embodiment of the present invention embodiment, this algorithm has made full use of the advantage of MD5 algorithm; And it is technological to have increased bit encryption; Make it to be more suitable for to use, increased the difficulty of decoding, all having tangible performance to improve than traditional algorithm aspect fail safe and the distribution efficient with image encryption.The present invention utilizes the image bit encryption technology, as the periodic sequence of encrypting, adopts unique encryption method that image is carried out the encryption of rational and orderly the MD5 value of image itself, thereby reaches the purpose of safety of image transmission.This algorithm be prone to be realized, operand is little, applications is various, effective, in realization authentication image integrity function, guaranteed the transmission of safety of image property.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the method flow diagram based on the MD5 algorithm for encryption of the prior art;
Fig. 2 is the encryption method flow chart based on the image transmission in the embodiment of the invention;
Fig. 3 is the picture element matrix cipher mode sketch map in the encryption method in the embodiment of the invention;
Fig. 4 is the decryption method flow chart based on the image transmission in the embodiment of the invention;
Fig. 5 is the encrypting and decrypting system structure chart based on the image transmission in the embodiment of the invention.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
The embodiment of the invention mainly is based on the application of bit encryption technology in image encryption: image encryption carries out certain conversion to image exactly, makes that there are qualitative or quantitative vision differences such as color, brightness or profile in image and the original image after the conversion.The thought of bit arithmetic encrypted image is exactly to utilize that to obtain at random a series of or pseudorandom someway be the data of unit with the byte, carries out specific bit arithmetic the data of they and piece image are byte-by-byte then, to change the data message of original image.Because the image after encrypting must be at receiving terminal by deciphering correctly, therefore, this bit arithmetic must have invertibity.The bit arithmetic that this paper adopted is an XOR.The bit arithmetic encryption method mainly contains two kinds,, a kind of is to adopt stream cipher encrypting, a kind of in addition is to adopt block cipher to encrypt.What this paper adopted is grouping encryption method, and 128 informative abstracts that this method utilizes image itself to obtain are 128 grouping with expressly being divided into length, carry out XOR, obtain ciphertext.Suppose that A is a grouping expressly, B is an informative abstract, and C is a ciphertext, then C=A XOR B.According to the characteristics of XOR, with C XOR B, just can obtain A, so just accomplished the decrypt ciphertext operation.
Concrete, Fig. 2 shows the encryption method flow chart based on the image transmission in the embodiment of the invention, comprises the steps:
Beginning;
S201: the MD5 value that calculates digital picture in the picture to be encrypted according to Message Digest Algorithm 5 MD5 value-based algorithm;
In this step, obtain the MD5 value of digital picture to be encrypted according to the MD5 algorithm computation, convert 128 binary sequence into.
S202: the picture element matrix of resolution digital image;
Here can utilize MAT LAB instrument to read in this digital picture, and form the picture element matrix storage.
S203: according to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR, form and encrypt picture with 16 pixels;
S204: detect the cipher round results of encrypting picture, judge to add whether reach the threshold value that is provided with in advance;
If cipher round results does not reach the threshold value that is provided with in advance, then encrypt once more encrypting picture based on the D5 algorithm, promptly enter into S201 and carry out superencipher, reach the threshold value that is provided with in advance up to said cipher round results.
Need be to step S203 and S204 explanation be that one of characteristics of this algorithm can satisfy the demand of practical application four times according to can repeatedly the encrypting of image encryption effect exactly generally speaking fully with interior encryption.Because ciphering sequence exists periodically, how image array B being carried out piecemeal will influence final cipher round results.Therefore in order to improve cipher round results, this algorithm can be taked pixels with different piecemeal order to each ciphering process.Encrypt for the first time and take the row pixel from left to right, row pixel order from top to bottom, Row Column is shown in Fig. 3 (a); Encrypt for the second time and take the row pixel from right to left, row pixel order from top to bottom, Row Column is shown in Fig. 3 (b); Encrypt for the third time and take the row pixel from left to right, the row pixel from top to bottom, Row Column is shown in Fig. 3 (c); Encrypt for the 4th time and take the row pixel from right to left, the row pixel from top to bottom, Row Column is shown in Fig. 3 (d).
If when having a ciphering process, this algorithm can take the arbitrary mode among Fig. 3 to go to encrypt in ciphering process.Certainly in ciphering process repeatedly; Can take this four kinds of cipher mode various combinations; Also same mode can be taked, for example in four ciphering process, the ciphering process shown in Fig. 3 (a) can be all taked for four times; Also can all take the combination of four kinds of cipher modes, promptly this encrypted combination mode can be following form: AAAA, ABCD, AABB, AAAB, ABCA, AABC, ABAB, ABBB etc.; In twice ciphering process, can take the AA combination also can take the AB combination.
S205: said encryption picture is transferred to decrypting end.
Finish.
Concrete, Fig. 4 shows the decryption method flow chart based on the image transmission in the embodiment of the invention, comprises the steps:
Beginning;
S401: receive and encrypt the encryption picture that end sends;
S402: resolve the picture element matrix of encrypting in the picture;
S403: according to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR, form the deciphering picture with 16 pixels;
S404: judge that encrypted image whether through distorting, distorted if advance, process ends then was not if advanced to distort then entered into S405;
S405: judge whether that according to encrypting number of times needs encrypt again, deciphering then enters into S402 more if desired, otherwise deciphering is accomplished;
Finish.
Need to prove that if there is ciphering process here one time, it can accomplish decrypting process after S403,, then need enter into S404 and identifying is repeatedly deciphered and distorted to the S405 step if exist twice or repeatedly above ciphering process.Store the encryption end in decrypting end and encrypt corresponding deciphering rule, its encrypt and decrypt is realized concerning one to one.
Accordingly, Fig. 5 also shows the encrypting and decrypting system based on the image transmission in the embodiment of the invention, and this encrypting and decrypting system comprises encrypts end and decrypting end, wherein:
Encrypt and hold the MD5 value that is used for obtaining picture digital picture to be encrypted according to Message Digest Algorithm 5 MD5 algorithm computation; Resolve the picture element matrix of said digital picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form and encrypt picture; Said encryption picture is transferred to decrypting end;
Decrypting end is used to receive the encryption picture of encrypting the end transmission; Resolve the picture element matrix of encrypting in the picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form the deciphering picture.
The said encryption end here also is used to detect the cipher round results of encrypting picture, if cipher round results does not reach the threshold value that is provided with in advance, then gives the D5 algorithm and encrypts once more encrypting picture, reaches the threshold value that is provided with in advance up to said cipher round results.Under repeatedly encryption situation, this decrypting end also is used for secure processing device encrypts image M D5 value and judges that said encrypted image whether distort by process, distorts if pass through, then terminating operation; If do not have through distorting, then decrypted image carried out corresponding decryption oprerations according to known encryption number of times.
The mode that the encryption end is here encrypted comprises:
In ciphering process, take the row picture element matrix from left to right, row pixel order from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In ciphering process, take the row picture element matrix from right to left, row pixel order from top to bottom, Row Column and MD5 value are carried out XOR; And/or
In ciphering process, take the row pixel from left to right, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In encrypted process, take the row pixel from right to left, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR.
This encrypts end in ciphering process repeatedly, can adopt with a kind of cipher mode and encrypt continuously, also can adopt four kinds of mutual combinations of cipher mode to encrypt.
To sum up, through embodiment of the present invention embodiment, this algorithm has made full use of the advantage of MD5 algorithm; And it is technological to have increased bit encryption; Make it to be more suitable for to use, increased the difficulty of decoding, all having tangible performance to improve than traditional algorithm aspect fail safe and the distribution efficient with image encryption.The present invention utilizes the image bit encryption technology, as the periodic sequence of encrypting, adopts unique encryption method that image is carried out the encryption of rational and orderly the MD5 value of image itself, thereby reaches the purpose of safety of image transmission.This algorithm be prone to be realized, operand is little, applications is various, effective, in realization authentication image integrity function, guaranteed the transmission of safety of image property.
More than carried out detailed introduction to the embodiment of the invention provides based on the encrypting and decrypting method and the system of image transmission; Used concrete example among this paper principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that on embodiment and range of application, all can change, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. the encryption method based on the image transmission is characterized in that, comprising:
Obtain the MD5 value of digital picture in the picture to be encrypted according to Message Digest Algorithm 5 MD5 algorithm computation;
Resolve the picture element matrix of said digital picture;
According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form and encrypt picture;
Said encryption picture is transferred to decrypting end.
2. the encryption method based on the image transmission as claimed in claim 1 is characterized in that said method also comprises:
Detect the cipher round results of encrypting picture,, then encrypt once more encrypting picture, reach the threshold value that is provided with in advance up to said cipher round results based on the D5 algorithm if cipher round results does not reach the threshold value that is provided with in advance.
3. according to claim 1 or claim 2 the encryption method based on image transmission is characterized in that said piecemeal order according to pixel is that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, and formation encryption picture specifically comprises:
In ciphering process, take the row picture element matrix from left to right, row pixel order from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In ciphering process, take the row picture element matrix from right to left, row pixel order from top to bottom, Row Column and MD5 value are carried out XOR; And/or
In ciphering process, take the row pixel from left to right, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In encrypted process, take the row pixel from right to left, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR.
4. the decryption method based on the image transmission is characterized in that, comprising:
Receive and encrypt the encryption picture that end sends;
Resolve the picture element matrix of encrypting in the picture;
According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form the deciphering picture.
5. the decryption method based on the image transmission as claimed in claim 4 is characterized in that, also comprises after the said method:
Calculate said decrypted image MD5 value and whether judge said encrypted image through distorting, if through distorting, then terminating operation if do not have through distorting, then carries out corresponding decryption oprerations according to known encryption number of times to the deciphering picture.
6. the encrypting and decrypting system based on the image transmission is characterized in that, said system comprises encrypts end and decrypting end, wherein:
Encrypt and hold the MD5 value that is used for obtaining picture digital picture to be encrypted according to Message Digest Algorithm 5 MD5 algorithm computation; Resolve the picture element matrix of said digital picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form and encrypt picture; Said encryption picture is transferred to decrypting end;
Decrypting end is used to receive the encryption picture of encrypting the end transmission; Resolve the picture element matrix of encrypting in the picture; According to the piecemeal order of pixel, be that picture element matrix and the MD5 value that piecemeal forms carried out XOR with 16 pixels, form the deciphering picture.
7. the encrypting and decrypting system based on the image transmission as claimed in claim 6 is characterized in that,
Said encryption end also is used to detect the cipher round results of encrypting picture, if cipher round results does not reach the threshold value that is provided with in advance, then gives the D5 algorithm and encrypts once more encrypting picture, reaches the threshold value that is provided with in advance up to said cipher round results.
8. the encrypting and decrypting system based on the image transmission as claimed in claim 7; It is characterized in that under repeatedly encryption situation, said decrypting end also is used to calculate said decrypted image MD5 value and judges that whether said encrypted image is through distorting; If process is distorted, then terminating operation; If do not have through distorting, then decrypted image carried out corresponding decryption oprerations according to known encryption number of times.
9. like each described encrypting and decrypting system of claim 6 to 8, it is characterized in that the mode that said encryption end is encrypted comprises based on the image transmission:
In ciphering process, take the row picture element matrix from left to right, row pixel order from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In ciphering process, take the row picture element matrix from right to left, row pixel order from top to bottom, Row Column and MD5 value are carried out XOR; And/or
In ciphering process, take the row pixel from left to right, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR; And/or
In encrypted process, take the row pixel from right to left, the row pixel from top to bottom, Row Column and MD5 are to carrying out XOR.
10. the encrypting and decrypting system based on image transmission as claimed in claim 9 is characterized in that, said encryption end adopts with a kind of cipher mode and encrypts or four kinds of combinations that cipher mode is mutual in ciphering process repeatedly.
CN2012100837002A 2012-03-26 2012-03-26 Encryption/decryption method and system based on image transmission Pending CN102625025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100837002A CN102625025A (en) 2012-03-26 2012-03-26 Encryption/decryption method and system based on image transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100837002A CN102625025A (en) 2012-03-26 2012-03-26 Encryption/decryption method and system based on image transmission

Publications (1)

Publication Number Publication Date
CN102625025A true CN102625025A (en) 2012-08-01

Family

ID=46564696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100837002A Pending CN102625025A (en) 2012-03-26 2012-03-26 Encryption/decryption method and system based on image transmission

Country Status (1)

Country Link
CN (1) CN102625025A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263136A (en) * 2015-09-01 2016-01-20 成都汇合乾元科技有限公司 Information encryption method and terminal
CN105451060A (en) * 2014-08-26 2016-03-30 深圳市海思半导体有限公司 Boot screen replacing method, boot screen replacing system, mobile terminal and playing terminal
CN106685635A (en) * 2015-11-07 2017-05-17 上海复旦微电子集团股份有限公司 Convolution checking method and convolution checking device
CN106846233A (en) * 2017-01-20 2017-06-13 宇龙计算机通信科技(深圳)有限公司 A kind of photo encryption method and encryption device
CN108805813A (en) * 2018-06-06 2018-11-13 沈文策 A kind of picture joining method and device
CN108919680A (en) * 2018-07-10 2018-11-30 北京贞宇科技有限公司 Update auxiliary device for intelligent robot
CN109257520A (en) * 2018-11-12 2019-01-22 北京东土科技股份有限公司 A kind of image ciphering method, verification method, device, equipment and medium
CN109492657A (en) * 2018-09-18 2019-03-19 平安科技(深圳)有限公司 Handwriting samples digitizing solution, device, computer equipment and storage medium
CN112559999A (en) * 2020-12-07 2021-03-26 中国平安人寿保险股份有限公司 Identity authentication method, identity authentication system, electronic device, and storage medium
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment
CN114549274A (en) * 2022-04-25 2022-05-27 南通市现代印务有限责任公司 Digital watermark method for preventing bill from being tampered
CN115002292A (en) * 2022-06-02 2022-09-02 宜宾市辰安智能制造有限公司 Mobile phone information communication method, system and mobile phone

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882082A (en) * 2006-05-11 2006-12-20 北京经天科技有限公司 Selective encryption algorithm aiming at network video
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882082A (en) * 2006-05-11 2006-12-20 北京经天科技有限公司 Selective encryption algorithm aiming at network video
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
葛锦环等: "一种基于MD5值的数字图像加密新算法", 《计算机应用与软件》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105451060A (en) * 2014-08-26 2016-03-30 深圳市海思半导体有限公司 Boot screen replacing method, boot screen replacing system, mobile terminal and playing terminal
CN105263136A (en) * 2015-09-01 2016-01-20 成都汇合乾元科技有限公司 Information encryption method and terminal
CN106685635A (en) * 2015-11-07 2017-05-17 上海复旦微电子集团股份有限公司 Convolution checking method and convolution checking device
CN106846233A (en) * 2017-01-20 2017-06-13 宇龙计算机通信科技(深圳)有限公司 A kind of photo encryption method and encryption device
CN108805813A (en) * 2018-06-06 2018-11-13 沈文策 A kind of picture joining method and device
CN108919680A (en) * 2018-07-10 2018-11-30 北京贞宇科技有限公司 Update auxiliary device for intelligent robot
CN109492657A (en) * 2018-09-18 2019-03-19 平安科技(深圳)有限公司 Handwriting samples digitizing solution, device, computer equipment and storage medium
CN109257520A (en) * 2018-11-12 2019-01-22 北京东土科技股份有限公司 A kind of image ciphering method, verification method, device, equipment and medium
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment
CN112559999A (en) * 2020-12-07 2021-03-26 中国平安人寿保险股份有限公司 Identity authentication method, identity authentication system, electronic device, and storage medium
CN114549274A (en) * 2022-04-25 2022-05-27 南通市现代印务有限责任公司 Digital watermark method for preventing bill from being tampered
CN115002292A (en) * 2022-06-02 2022-09-02 宜宾市辰安智能制造有限公司 Mobile phone information communication method, system and mobile phone

Similar Documents

Publication Publication Date Title
CN102625025A (en) Encryption/decryption method and system based on image transmission
CN101401141B (en) Information processing system and information processing method
Li et al. Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps
Abood et al. Investigation of cryptography algorithms used for security and privacy protection in smart grid
CN102611549B (en) Data encryption equipment and storage card
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
Philjon et al. Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption
Singh et al. A comprehensive survey on encryption techniques for digital images
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN107425971A (en) Terminal and its data method for encryption/decryption and device without certificate
CN102598575B (en) Method and system for the accelerated decryption of cryptographically protected user data units
CN104348625A (en) Encryption and decryption device and encryption and decryption method thereof
CN112054896B (en) White box encryption method, white box encryption device, terminal and storage medium
CN103414552B (en) One utilizes binary tree traversal mode to be encrypted, decryption method and device
CN103973439A (en) Multivariable public key encryption method
CN102394746B (en) Data transmission method of weighing system based on digital sensor
Li et al. Cryptanalysis of a secure image encryption scheme based on a novel 2D sine–cosine cross‑chaotic map
Ahmad et al. A secure network communication protocol based on text to barcode encryption algorithm
CN106941406B (en) Identify-based encryption endorsement method, decryption sign test method and device thereof
CN107104788B (en) Terminal and non-repudiation encryption signature method and device thereof
Chen et al. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN101515853B (en) Information terminal and information safety device thereof
Li et al. Cryptanalysis of an image encryption scheme based on the Hill cipher
CN106534077B (en) A kind of identifiable proxy re-encryption system and method based on symmetric cryptography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120801