CN104184921B - Encryption method and server and decryption method and terminal - Google Patents
Encryption method and server and decryption method and terminal Download PDFInfo
- Publication number
- CN104184921B CN104184921B CN201310198616.XA CN201310198616A CN104184921B CN 104184921 B CN104184921 B CN 104184921B CN 201310198616 A CN201310198616 A CN 201310198616A CN 104184921 B CN104184921 B CN 104184921B
- Authority
- CN
- China
- Prior art keywords
- terminal
- plate number
- dimension array
- value
- generates
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention provides a kind of encryption method and server and decryption methods and terminal.The encryption method, including:A bianry image is obtained as original image;The original image is ranked sequentially by coordinate, generates the first one-dimension array;Obtain the plate number of terminal;According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;Second one-dimension array is sequentially generated encrypted image according to coordinate.Present invention can apply to the digital image anti-fake technologies of terminal class product, using simple.
Description
Technical field
The present invention relates to image domains, a kind of encryption method and server and decryption method and terminal are particularly related to.
Background technology
Important branch of the digital watermark technology as field of information security technology is widely used and deep grinds
Study carefully.It is by the case where not causing perception, a kind of sightless label being embedded into multimedia messages product, to mark
Know ownership of the authorship to works or the integrality to information is verified.
Grow with the continuous development of terminal market, reinforcement is also more and more important to the property right protection of end product, still
In the prior art, digital image anti-fake Technical comparing is complicated.
Invention content
The present invention provides a kind of encryption method and server that application is easy and decryption method and terminal.
On the one hand, a kind of encryption method is provided, including:
A bianry image is obtained as original image;
The original image is ranked sequentially by coordinate, generates the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;
Second one-dimension array is sequentially generated encrypted image according to coordinate.
First one-dimension array is encrypted in the plate number according to the terminal, generates the 2nd 1 dimension
Group the step of include:
According to the plate number of the terminal, one-dimensional chaos sequence is generated;
According to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
The plate number according to the terminal, the step of generating one-dimensional chaos sequence include:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is
The sequence number of element;I=0,1,2...;x0For initial value.
The plate number according to the terminal, generate initial value the step of include:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
Key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key value M be more than or
Person is equal to 0 and is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
The plate number according to the terminal carries out binary conversion treatment to the one-dimensional chaos sequence, generates binary sequence
The step of include:
Obtain the corresponding threshold tau of plate number of the terminal, 0<τ<1;
According to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
On the other hand, a kind of decryption method is provided, including:
Extract encrypted image;
The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and the end are obtained from server
The corresponding threshold value of plate number at end;
According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates the 2nd 1
Dimension group;
Second one-dimension array is sequentially generated original image according to coordinate;
Show the original image.
It is described that first one-dimension array is decrypted according to the branch parameter and the threshold value, generate the
The step of two one-dimension arrays includes:
According to the branch parameter, one-dimensional chaos sequence is generated;
According to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
It is described according to the branch parameter, the step of generating one-dimensional chaos sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is
The sequence number of element;I=0,1,2...;x0For the initial value.
The plate number according to the terminal, generate initial value the step of include:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
The corresponding key value M of the plate number is obtained from server;
To the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value be more than or
Equal to 0 and it is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
It is described according to the threshold value, the step of carrying out binary conversion treatment to the one-dimensional chaos sequence, generate binary sequence
Including:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
On the other hand, a kind of server is provided, including:
Acquiring unit obtains a bianry image as original image;
The original image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the plate number of terminal;
Second generation unit is encrypted first one-dimension array according to the plate number of the terminal, generates the
Two one-dimension arrays;
Second one-dimension array is sequentially generated encrypted image by third generation unit according to coordinate.
On the other hand, a kind of terminal is provided, including:
Extraction unit extracts encrypted image;
The encrypted image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the corresponding branch parameter of plate number of the terminal from server according to the plate number of the terminal
And the corresponding threshold value of plate number of the terminal;
Place is decrypted to first one-dimension array according to the branch parameter and the threshold value in second generation unit
Reason generates the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit according to coordinate;
Display unit shows the original image.
On the other hand, a kind of decryption system is provided, including:Terminal and server;
The terminal extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and the terminal are obtained from the server
The corresponding threshold value of plate number;According to the branch parameter and the threshold value, first one-dimension array is decrypted, is generated
Second one-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original image.
The above-mentioned technical proposal of the present invention has the beneficial effect that:The present invention provides encryption method and server and decryption
Method and terminal generate encrypted image using encryption technology, then encrypted image are placed in end product, in subsequent process,
Encrypted image can be decrypted according to user instruction, and show the image after decryption so that user can be by checking solution
The mode of image after close carries out anti-fake authentication to end product.
Description of the drawings
Fig. 1 is a kind of flow diagram of encryption method of the present invention;
Fig. 2 is a kind of flow diagram of decryption method of the present invention;
Fig. 3 is a kind of structural schematic diagram of server of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal of the present invention;
Fig. 5 is a kind of structural schematic diagram of decryption system of the present invention;
Fig. 6 is the flow diagram of the application scenarios of the present invention;
Fig. 7 is the schematic diagram of original image;
Fig. 8 is the effect diagram by the encrypted encrypted image of the original image;
Fig. 9 is the schematic diagram of the information table of the database of server.
Specific implementation mode
To keep the technical problem to be solved in the present invention, technical solution and advantage clearer, below in conjunction with attached drawing and tool
Body embodiment is described in detail.
First, the Integral Thought of the present invention is described.A kind of encryption method of present invention offer and server and decryption method
And terminal, first, server by utilizing encryption technology generates encrypted image, then encrypted image is placed in end product, subsequently
In the process, terminal is decrypted encrypted image according to user instruction, and shows the image after decryption so that user can pass through
The mode for checking image after decrypting carries out anti-fake authentication to end product.Wherein, it is terminal to the key of encrypted image decryption
It is obtained in interactive process with server.
As shown in Figure 1, for a kind of encryption method of the present invention, including:
Step 11, a bianry image is obtained as original image;
Step 12, the original image is ranked sequentially by coordinate, generates the first one-dimension array;
Step 13, the plate number of terminal is obtained;
Step 14, according to the plate number of the terminal, first one-dimension array is encrypted, it is one-dimensional to generate second
Array;
Step 15, second one-dimension array is sequentially generated encrypted image according to coordinate.
First one-dimension array is encrypted in the plate number according to the terminal, generates the 2nd 1 dimension
Group step 14 include:
Step 141, according to the plate number of the terminal, one-dimensional chaos sequence is generated;
Step 142, according to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates two-value
Sequence;
Step 143, the binary sequence and first one-dimension array are subjected to XOR operation, generate the 2nd 1 dimension
Group.
The plate number according to the terminal, the step 141 for generating one-dimensional chaos sequence include:
Step 1411, according to the plate number of the terminal, initial value is generated;
Step 1412, according to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x
(k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is
The sequence number of element;I=0,1,2...;x0For initial value.
For example, it is assumed that μ=4, x0=0.7, by iterative formula, obtain X(4)=(0.84,0.5376,0.99434496,
0.0224922420903936).
The plate number according to the terminal, the step 1411 for generating initial value include:
Step 14111, the number on predetermined figure N in the plate number, the first numerical value of combination producing are obtained.For example, obtaining
Latter six of plate number form the first numerical value.
Step 14112, key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key
Value M is more than or equal to 0 and to be less than or equal to 2NNatural number;
Step 14113, by first numerical value divided by second value, the initial value is obtained.
The plate number according to the terminal carries out binary conversion treatment to the one-dimensional chaos sequence, generates binary sequence
Step 142 include:
Step 1421, the corresponding threshold tau of plate number of the terminal is obtained, 0<τ<1;
Step 1422, according to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
As shown in Fig. 2, for a kind of decryption method of the present invention, including:
Step 21, encrypted image is extracted;
Step 22, the encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
Step 23, according to the plate number of the terminal, obtained from server the corresponding branch parameter of plate number of the terminal with
And the corresponding threshold value of plate number of the terminal;
Step 24, according to the branch parameter and the threshold value, first one-dimension array is decrypted, is generated
Second one-dimension array;
Step 25, second one-dimension array is sequentially generated original image according to coordinate;
Step 26, the original image is shown.
It is described that first one-dimension array is decrypted according to the branch parameter and the threshold value, generate the
The step 24 of two one-dimension arrays includes:
Step 241, according to the branch parameter, one-dimensional chaos sequence is generated;
Step 242, according to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
Step 243, the binary sequence and first one-dimension array are subjected to XOR operation, generate the 2nd 1 dimension
Group.
It is described according to the branch parameter, the step 241 for generating one-dimensional chaos sequence includes:
Step 2411, according to the plate number of the terminal, initial value is generated;
Step 2412, according to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x
(k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is
The sequence number of element;I=0,1,2...;x0For the initial value.
The plate number according to the terminal, the step 2411 for generating initial value include:
Step 24111, the number on predetermined figure N in the plate number, the first numerical value of combination producing are obtained;
Step 24112, the corresponding key value M of the plate number is obtained from server;
Step 24113, to the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value
To be more than or equal to 0 and being less than or equal to 2NNatural number;
Step 24114, by first numerical value divided by second value, the initial value is obtained.
It is described according to the threshold value, the step of carrying out binary conversion treatment to the one-dimensional chaos sequence, generate binary sequence
242 are specially:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
As shown in figure 3, a kind of server is provided, including:
Acquiring unit 31 obtains a bianry image as original image;
First generation unit 32, the original image is ranked sequentially by coordinate, generates the first one-dimension array;
Acquiring unit 33 obtains the plate number of terminal;
Second generation unit 34 is encrypted first one-dimension array according to the plate number of the terminal, generates
Second one-dimension array;
Second one-dimension array is sequentially generated encrypted image by third generation unit 35 according to coordinate.
As shown in figure 4, a kind of terminal is provided, including:
Extraction unit 41 extracts encrypted image;
First generation unit 42, the encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
Acquiring unit 43 obtains the corresponding branch ginseng of plate number of the terminal from server according to the plate number of the terminal
The corresponding threshold value of plate number of the several and described terminal;
Second generation unit 44 is decrypted first one-dimension array according to the branch parameter and the threshold value
Processing generates the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit 45 according to coordinate;
Display unit 43 shows the original image.
As shown in figure 5, a kind of decryption system is provided, including:Terminal 51 and server 52;
The terminal 51 extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the one one dimension
Group;According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and described is obtained from the server 52
The corresponding threshold value of plate number of terminal;According to the branch parameter and the threshold value, place is decrypted to first one-dimension array
Reason generates the second one-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original graph
Picture.
The application scenarios of the present invention are described below.
The present invention provides a kind of terminal built-in image false-proof method based on Chaos Encryption Technology, can be applied to the production of terminal class
The digital image anti-fake technology of product, using easy, at low cost and safe and reliable.Terminal can be gone by wireless network from server
The relevant parameter for obtaining decryption completes the verification process of copyright information in terminal.Specially:First, chaos encryption skill is utilized
Art generates encrypted image(Black white image, i.e. only 0 and 1 two gray scale), encrypted image is placed in end product.Then, it uses
Family can carry out the anti-fake authentication of product by way of clicking manually, and after the authentication is passed, authenticating result is fed back by terminal
It is anti-fake to achieve the purpose that user.
As shown in fig. 6, the present invention includes Four processes:The generating process of encrypted image, user obtain the mistake of key data
Journey, decrypting process, UI interactive processes.
The generating process of encrypted image is described below.
First, prepare a width two-value original image(See Fig. 7), then, image is ranked sequentially by coordinate as one-dimension array.
Original image usually carries certain meaning information, such as operator or the logo information of equipment supplier.
Then, according to the corresponding initial value of product, one-dimensional chaos sequence is produced, and binaryzation is carried out according to threshold value to sequence
Processing.
Specific method and principle are as follows:Logistic mappings are a kind of very simple dynamical systems in chaos system,
It is defined as follows:
xi+1=μ xi(1-xi) formula 1
Wherein, 0≤μ≤4 are known as branch parameter (bifurcation parameter), x1∈(0,1).When
3.5699456... when < μ≤4, Logistic mappings works are in chaos state.That is, by initial value x0It is reflected in Logistic
Generated sequence { x under the action of penetratingi| i=0,1,2... } it is aperiodic, do not restrain and very sensitive to initial value.
Chaos initial value an x0 and μ are set, is iterated by formula 1, obtains chaos sequence x (k).Initial value can be according to
Last 6 digit divided by 1XXXXXX of device board number carry out value, and XXXXXX is the corresponding key information of product(Institute namely above
The key value M stated), value range is 0 to 999999, if last 6 of plate number is full 0, x0 if is defaulted as 0.5.
Then, 0-1 sequence L (k) (k=1,2 ..., M1 × M2), the definition of threshold values threshold method are obtained using threshold value threshold method
It is as follows:
Wherein, τ is threshold value, value range 0<τ<1.
Then, binary bitmap is encrypted with the 0-1 sequence L (k) of generation, obtains encrypted watermark vector sequence
Row.Specially:Wm=Wa ⊕ L (k) (m=1,2 ... M1 × M2), ⊕ indicate XOR operation.As shown in figure 9, XXXXXX, μ and τ will
In the network data base for storing server together as the corresponding encryption information of product and production board number.
Finally, as shown in figure 8, encrypted one-dimensional vector is reverted back two-dimensional array according to coordinate(Image), thus
Complete the generation of encrypted image.The encrypted image of generation will be placed in terminal EFS file system, be shown for UI.It should
In embodiment, x0=0.890111, XXXXXX=123456, μ=3.7, τ=0.4.The production of entire encrypted image and key information
Database purchase was completed in the production phase.
User is described below and obtains key data process.
Terminal is connected on network server, obtains the corresponding key information of product.
Format is as follows:
Terminal transmission data format --- Get(Product IDs);
Terminal receives data format --- Receive(Product IDs, XXXXXX, μ, τ);
After network server receives the key request of terminal, reference chart searches corresponding key information, and these are believed
Breath is sent to terminal according to set format, completes the acquisition process of key information.
Decrypting process is described below.
Decrypting process is exactly the inverse process of ciphering process.First, according to the key information knot obtained from network data base
Latter 6 of plywood number carry out operation according to the algorithm in ciphering process, to obtain decryption chaos sequence;Then, threshold value is utilized
The binary sequence that threshold method is decrypted.The binary sequence of decryption and the two-value encrypted image progress in terminal EFS subregions is different
Or operation has just obtained original image, so as to complete entire decrypting process.Decrypting process is independently performed by terminal.
UI interactive processes are described below:
User initiates the operation of authentication by the interfaces UI, and checks authenticating result.
Detailed process please refers to attached drawing 5.
It is usage scenario below:After user buys end product, by the anti-fake authentication functions of terminal built-in to product
Truth identification is carried out, to achieve the purpose that allow user can intuitively judge the true and false of product.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, without departing from the principles of the present invention, it can also make several improvements and retouch, these improvements and modifications
It should be regarded as protection scope of the present invention.
Claims (13)
1. a kind of encryption method, which is characterized in that including:
A bianry image is obtained as original image;
The original image is ranked sequentially by coordinate, generates the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;
Second one-dimension array is sequentially generated encrypted image according to coordinate.
2. encryption method according to claim 1, which is characterized in that the plate number according to the terminal, to described
One one-dimension array is encrypted, generate the second one-dimension array the step of include:
According to the plate number of the terminal, one-dimensional chaos sequence is generated;
According to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
3. encryption method according to claim 2, which is characterized in that the plate number according to the terminal generates one-dimensional
The step of chaos sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is element
Sequence number;I=0,1,2...;x0For initial value.
4. encryption method according to claim 3, which is characterized in that the plate number according to the terminal generates initial
The step of value includes:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
Key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key value M is to be more than or wait
In 0 and be less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
5. encryption method according to claim 2, which is characterized in that the plate number according to the terminal, to described one
Tieing up the step of chaos sequence carries out binary conversion treatment, generates binary sequence includes:
Obtain the corresponding threshold tau of plate number of the terminal, 0<τ<1;
According to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
6. a kind of decryption method, which is characterized in that including:
Extract encrypted image;
The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
According to the plate number of terminal, the corresponding branch parameter of plate number of the terminal and the plate number of the terminal are obtained from server
Corresponding threshold value;
According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates the 2nd 1 dimension
Group;
Second one-dimension array is sequentially generated original image according to coordinate;
Show the original image.
7. decryption method according to claim 6, which is characterized in that it is described according to the branch parameter and the threshold value,
First one-dimension array is decrypted, generate the second one-dimension array the step of include:
According to the branch parameter, one-dimensional chaos sequence is generated;
According to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
8. decryption method according to claim 7, which is characterized in that it is described according to the branch parameter, it generates one-dimensional mixed
The step of ignorant sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is element
Sequence number;I=0,1,2...;x0For the initial value.
9. decryption method according to claim 8, which is characterized in that the plate number according to the terminal generates initial
The step of value includes:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;N is the nature more than or equal to 1
Number;
The corresponding key value M of the plate number is obtained from server;
To the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value is more than or equal to 0
And it is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
10. decryption method according to claim 7, which is characterized in that it is described according to the threshold value, to the one-dimensional chaos
Sequence carry out binary conversion treatment, generate binary sequence the step of include:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
11. a kind of server, which is characterized in that including:
Acquiring unit obtains a bianry image as original image;
The original image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the plate number of terminal;
Second generation unit is encrypted first one-dimension array according to the plate number of the terminal, generates the 2nd 1
Dimension group;
Second one-dimension array is sequentially generated encrypted image by third generation unit according to coordinate.
12. a kind of terminal, which is characterized in that including:
Extraction unit extracts encrypted image;
The encrypted image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit, according to the plate number of the terminal, obtained from server the terminal the corresponding branch parameter of plate number and
The corresponding threshold value of plate number of the terminal;
Second generation unit is decrypted first one-dimension array according to the branch parameter and the threshold value, raw
At the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit according to coordinate;
Display unit shows the original image.
13. a kind of decryption system, which is characterized in that including:Terminal and server;
The terminal extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;According to
The plate number of the terminal obtains the corresponding branch parameter of plate number of the terminal and the plate number of the terminal from the server
Corresponding threshold value;According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates second
One-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original image.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310198616.XA CN104184921B (en) | 2013-05-24 | 2013-05-24 | Encryption method and server and decryption method and terminal |
PCT/CN2013/080305 WO2013167087A2 (en) | 2013-05-24 | 2013-07-29 | Encryption method, server, decryption method, terminal and encryption/decryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310198616.XA CN104184921B (en) | 2013-05-24 | 2013-05-24 | Encryption method and server and decryption method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104184921A CN104184921A (en) | 2014-12-03 |
CN104184921B true CN104184921B (en) | 2018-10-12 |
Family
ID=49551378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310198616.XA Active CN104184921B (en) | 2013-05-24 | 2013-05-24 | Encryption method and server and decryption method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104184921B (en) |
WO (1) | WO2013167087A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110098915B (en) * | 2018-01-30 | 2022-09-23 | 阿里巴巴集团控股有限公司 | Authentication method and system, and terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196320A (en) * | 2011-04-15 | 2011-09-21 | 江苏省现代企业信息化应用支撑软件工程技术研发中心 | Image encrypting and decrypting system |
CN102547297A (en) * | 2012-02-28 | 2012-07-04 | 中国传媒大学 | MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient |
CN102801947A (en) * | 2012-07-02 | 2012-11-28 | 西南科技大学 | Semantic information transmission and protection method based on H264 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1209730C (en) * | 2001-11-30 | 2005-07-06 | 温天 | Digital anti-fake method |
JP4655452B2 (en) * | 2003-03-24 | 2011-03-23 | 富士ゼロックス株式会社 | Information processing device |
US20070189518A1 (en) * | 2005-03-30 | 2007-08-16 | Nanni Richard A | 3-D quaternion quantum fractal encryption |
CN1932852A (en) * | 2005-09-14 | 2007-03-21 | 上海新跃仪表厂 | Tax control machine material characteristic encrypted antifaking method |
US20070288752A1 (en) * | 2006-06-08 | 2007-12-13 | Weng Chong Chan | Secure removable memory element for mobile electronic device |
CN102938132A (en) * | 2012-11-20 | 2013-02-20 | 海南大学 | Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap |
-
2013
- 2013-05-24 CN CN201310198616.XA patent/CN104184921B/en active Active
- 2013-07-29 WO PCT/CN2013/080305 patent/WO2013167087A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196320A (en) * | 2011-04-15 | 2011-09-21 | 江苏省现代企业信息化应用支撑软件工程技术研发中心 | Image encrypting and decrypting system |
CN102547297A (en) * | 2012-02-28 | 2012-07-04 | 中国传媒大学 | MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient |
CN102801947A (en) * | 2012-07-02 | 2012-11-28 | 西南科技大学 | Semantic information transmission and protection method based on H264 |
Non-Patent Citations (2)
Title |
---|
《QR码二值图像混沌加密与解密》;张定会,郭静波,江平,单俊涛;《移动通信》;20110228;第35卷(第3-4期);131-133 * |
《基于混沌序列的二值图像加密算法》;杨格兰,张建明,向德生;《计算机技术与发展》;20060210;第16卷(第2期);148-150 * |
Also Published As
Publication number | Publication date |
---|---|
WO2013167087A2 (en) | 2013-11-14 |
CN104184921A (en) | 2014-12-03 |
WO2013167087A3 (en) | 2014-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI670621B (en) | Information encryption and decryption method and device | |
CN103646264B (en) | A kind of dimension code anti-counterfeit method of multiple information encryption | |
WO2017045594A1 (en) | Anti-counterfeit method | |
CN102572314B (en) | Image sensor and payment authentication method | |
CN101355684B (en) | Method for transmitting and receiving image series digital content as well as transmitter and receiver | |
Lee et al. | Digital image sharing by diverse image media | |
CN102930317A (en) | Device for generating two-dimension code identifiers of books, two-dimension code identification device and system | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
CN103020682A (en) | Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book | |
CN104537600A (en) | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method | |
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
CN101409813A (en) | Image encoding method for preventing and identifying image tamper | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN111010490A (en) | Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium | |
CN108334919A (en) | A kind of product false proof verification method and its system based on Quick Response Code | |
CN103020496A (en) | Digital watermark encryption realization method | |
CN104408684A (en) | Digital watermarking method with high robustness | |
CN108199836B (en) | Method and device for binding and unbinding key and equipment | |
Mandal | Reversible steganography and authentication via transform encoding | |
CN104184921B (en) | Encryption method and server and decryption method and terminal | |
Mohan et al. | Secure visual cryptography scheme with meaningful shares | |
CN104346544A (en) | Data processing method, data embedding device and data separating device | |
Shivani et al. | Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence | |
CN117729053B (en) | Anti-counterfeiting verification method, device and storage medium based on quantum invisible transmission state | |
CN109064380A (en) | A kind of 3D printing works hide watermark addition verifying system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |