CN104184921B - Encryption method and server and decryption method and terminal - Google Patents

Encryption method and server and decryption method and terminal Download PDF

Info

Publication number
CN104184921B
CN104184921B CN201310198616.XA CN201310198616A CN104184921B CN 104184921 B CN104184921 B CN 104184921B CN 201310198616 A CN201310198616 A CN 201310198616A CN 104184921 B CN104184921 B CN 104184921B
Authority
CN
China
Prior art keywords
terminal
plate number
dimension array
value
generates
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310198616.XA
Other languages
Chinese (zh)
Other versions
CN104184921A (en
Inventor
李�昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310198616.XA priority Critical patent/CN104184921B/en
Priority to PCT/CN2013/080305 priority patent/WO2013167087A2/en
Publication of CN104184921A publication Critical patent/CN104184921A/en
Application granted granted Critical
Publication of CN104184921B publication Critical patent/CN104184921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The present invention provides a kind of encryption method and server and decryption methods and terminal.The encryption method, including:A bianry image is obtained as original image;The original image is ranked sequentially by coordinate, generates the first one-dimension array;Obtain the plate number of terminal;According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;Second one-dimension array is sequentially generated encrypted image according to coordinate.Present invention can apply to the digital image anti-fake technologies of terminal class product, using simple.

Description

Encryption method and server and decryption method and terminal
Technical field
The present invention relates to image domains, a kind of encryption method and server and decryption method and terminal are particularly related to.
Background technology
Important branch of the digital watermark technology as field of information security technology is widely used and deep grinds Study carefully.It is by the case where not causing perception, a kind of sightless label being embedded into multimedia messages product, to mark Know ownership of the authorship to works or the integrality to information is verified.
Grow with the continuous development of terminal market, reinforcement is also more and more important to the property right protection of end product, still In the prior art, digital image anti-fake Technical comparing is complicated.
Invention content
The present invention provides a kind of encryption method and server that application is easy and decryption method and terminal.
On the one hand, a kind of encryption method is provided, including:
A bianry image is obtained as original image;
The original image is ranked sequentially by coordinate, generates the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;
Second one-dimension array is sequentially generated encrypted image according to coordinate.
First one-dimension array is encrypted in the plate number according to the terminal, generates the 2nd 1 dimension Group the step of include:
According to the plate number of the terminal, one-dimensional chaos sequence is generated;
According to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
The plate number according to the terminal, the step of generating one-dimensional chaos sequence include:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is The sequence number of element;I=0,1,2...;x0For initial value.
The plate number according to the terminal, generate initial value the step of include:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
Key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key value M be more than or Person is equal to 0 and is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
The plate number according to the terminal carries out binary conversion treatment to the one-dimensional chaos sequence, generates binary sequence The step of include:
Obtain the corresponding threshold tau of plate number of the terminal, 0<τ<1;
According to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
On the other hand, a kind of decryption method is provided, including:
Extract encrypted image;
The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and the end are obtained from server The corresponding threshold value of plate number at end;
According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates the 2nd 1 Dimension group;
Second one-dimension array is sequentially generated original image according to coordinate;
Show the original image.
It is described that first one-dimension array is decrypted according to the branch parameter and the threshold value, generate the The step of two one-dimension arrays includes:
According to the branch parameter, one-dimensional chaos sequence is generated;
According to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
It is described according to the branch parameter, the step of generating one-dimensional chaos sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is The sequence number of element;I=0,1,2...;x0For the initial value.
The plate number according to the terminal, generate initial value the step of include:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
The corresponding key value M of the plate number is obtained from server;
To the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value be more than or Equal to 0 and it is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
It is described according to the threshold value, the step of carrying out binary conversion treatment to the one-dimensional chaos sequence, generate binary sequence Including:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
On the other hand, a kind of server is provided, including:
Acquiring unit obtains a bianry image as original image;
The original image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the plate number of terminal;
Second generation unit is encrypted first one-dimension array according to the plate number of the terminal, generates the Two one-dimension arrays;
Second one-dimension array is sequentially generated encrypted image by third generation unit according to coordinate.
On the other hand, a kind of terminal is provided, including:
Extraction unit extracts encrypted image;
The encrypted image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the corresponding branch parameter of plate number of the terminal from server according to the plate number of the terminal And the corresponding threshold value of plate number of the terminal;
Place is decrypted to first one-dimension array according to the branch parameter and the threshold value in second generation unit Reason generates the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit according to coordinate;
Display unit shows the original image.
On the other hand, a kind of decryption system is provided, including:Terminal and server;
The terminal extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array; According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and the terminal are obtained from the server The corresponding threshold value of plate number;According to the branch parameter and the threshold value, first one-dimension array is decrypted, is generated Second one-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original image.
The above-mentioned technical proposal of the present invention has the beneficial effect that:The present invention provides encryption method and server and decryption Method and terminal generate encrypted image using encryption technology, then encrypted image are placed in end product, in subsequent process, Encrypted image can be decrypted according to user instruction, and show the image after decryption so that user can be by checking solution The mode of image after close carries out anti-fake authentication to end product.
Description of the drawings
Fig. 1 is a kind of flow diagram of encryption method of the present invention;
Fig. 2 is a kind of flow diagram of decryption method of the present invention;
Fig. 3 is a kind of structural schematic diagram of server of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal of the present invention;
Fig. 5 is a kind of structural schematic diagram of decryption system of the present invention;
Fig. 6 is the flow diagram of the application scenarios of the present invention;
Fig. 7 is the schematic diagram of original image;
Fig. 8 is the effect diagram by the encrypted encrypted image of the original image;
Fig. 9 is the schematic diagram of the information table of the database of server.
Specific implementation mode
To keep the technical problem to be solved in the present invention, technical solution and advantage clearer, below in conjunction with attached drawing and tool Body embodiment is described in detail.
First, the Integral Thought of the present invention is described.A kind of encryption method of present invention offer and server and decryption method And terminal, first, server by utilizing encryption technology generates encrypted image, then encrypted image is placed in end product, subsequently In the process, terminal is decrypted encrypted image according to user instruction, and shows the image after decryption so that user can pass through The mode for checking image after decrypting carries out anti-fake authentication to end product.Wherein, it is terminal to the key of encrypted image decryption It is obtained in interactive process with server.
As shown in Figure 1, for a kind of encryption method of the present invention, including:
Step 11, a bianry image is obtained as original image;
Step 12, the original image is ranked sequentially by coordinate, generates the first one-dimension array;
Step 13, the plate number of terminal is obtained;
Step 14, according to the plate number of the terminal, first one-dimension array is encrypted, it is one-dimensional to generate second Array;
Step 15, second one-dimension array is sequentially generated encrypted image according to coordinate.
First one-dimension array is encrypted in the plate number according to the terminal, generates the 2nd 1 dimension Group step 14 include:
Step 141, according to the plate number of the terminal, one-dimensional chaos sequence is generated;
Step 142, according to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates two-value Sequence;
Step 143, the binary sequence and first one-dimension array are subjected to XOR operation, generate the 2nd 1 dimension Group.
The plate number according to the terminal, the step 141 for generating one-dimensional chaos sequence include:
Step 1411, according to the plate number of the terminal, initial value is generated;
Step 1412, according to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is The sequence number of element;I=0,1,2...;x0For initial value.
For example, it is assumed that μ=4, x0=0.7, by iterative formula, obtain X(4)=(0.84,0.5376,0.99434496, 0.0224922420903936).
The plate number according to the terminal, the step 1411 for generating initial value include:
Step 14111, the number on predetermined figure N in the plate number, the first numerical value of combination producing are obtained.For example, obtaining Latter six of plate number form the first numerical value.
Step 14112, key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key Value M is more than or equal to 0 and to be less than or equal to 2NNatural number;
Step 14113, by first numerical value divided by second value, the initial value is obtained.
The plate number according to the terminal carries out binary conversion treatment to the one-dimensional chaos sequence, generates binary sequence Step 142 include:
Step 1421, the corresponding threshold tau of plate number of the terminal is obtained, 0<τ<1;
Step 1422, according to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
As shown in Fig. 2, for a kind of decryption method of the present invention, including:
Step 21, encrypted image is extracted;
Step 22, the encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
Step 23, according to the plate number of the terminal, obtained from server the corresponding branch parameter of plate number of the terminal with And the corresponding threshold value of plate number of the terminal;
Step 24, according to the branch parameter and the threshold value, first one-dimension array is decrypted, is generated Second one-dimension array;
Step 25, second one-dimension array is sequentially generated original image according to coordinate;
Step 26, the original image is shown.
It is described that first one-dimension array is decrypted according to the branch parameter and the threshold value, generate the The step 24 of two one-dimension arrays includes:
Step 241, according to the branch parameter, one-dimensional chaos sequence is generated;
Step 242, according to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
Step 243, the binary sequence and first one-dimension array are subjected to XOR operation, generate the 2nd 1 dimension Group.
It is described according to the branch parameter, the step 241 for generating one-dimensional chaos sequence includes:
Step 2411, according to the plate number of the terminal, initial value is generated;
Step 2412, according to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is The sequence number of element;I=0,1,2...;x0For the initial value.
The plate number according to the terminal, the step 2411 for generating initial value include:
Step 24111, the number on predetermined figure N in the plate number, the first numerical value of combination producing are obtained;
Step 24112, the corresponding key value M of the plate number is obtained from server;
Step 24113, to the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value To be more than or equal to 0 and being less than or equal to 2NNatural number;
Step 24114, by first numerical value divided by second value, the initial value is obtained.
It is described according to the threshold value, the step of carrying out binary conversion treatment to the one-dimensional chaos sequence, generate binary sequence 242 are specially:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
As shown in figure 3, a kind of server is provided, including:
Acquiring unit 31 obtains a bianry image as original image;
First generation unit 32, the original image is ranked sequentially by coordinate, generates the first one-dimension array;
Acquiring unit 33 obtains the plate number of terminal;
Second generation unit 34 is encrypted first one-dimension array according to the plate number of the terminal, generates Second one-dimension array;
Second one-dimension array is sequentially generated encrypted image by third generation unit 35 according to coordinate.
As shown in figure 4, a kind of terminal is provided, including:
Extraction unit 41 extracts encrypted image;
First generation unit 42, the encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
Acquiring unit 43 obtains the corresponding branch ginseng of plate number of the terminal from server according to the plate number of the terminal The corresponding threshold value of plate number of the several and described terminal;
Second generation unit 44 is decrypted first one-dimension array according to the branch parameter and the threshold value Processing generates the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit 45 according to coordinate;
Display unit 43 shows the original image.
As shown in figure 5, a kind of decryption system is provided, including:Terminal 51 and server 52;
The terminal 51 extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the one one dimension Group;According to the plate number of the terminal, the corresponding branch parameter of plate number of the terminal and described is obtained from the server 52 The corresponding threshold value of plate number of terminal;According to the branch parameter and the threshold value, place is decrypted to first one-dimension array Reason generates the second one-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original graph Picture.
The application scenarios of the present invention are described below.
The present invention provides a kind of terminal built-in image false-proof method based on Chaos Encryption Technology, can be applied to the production of terminal class The digital image anti-fake technology of product, using easy, at low cost and safe and reliable.Terminal can be gone by wireless network from server The relevant parameter for obtaining decryption completes the verification process of copyright information in terminal.Specially:First, chaos encryption skill is utilized Art generates encrypted image(Black white image, i.e. only 0 and 1 two gray scale), encrypted image is placed in end product.Then, it uses Family can carry out the anti-fake authentication of product by way of clicking manually, and after the authentication is passed, authenticating result is fed back by terminal It is anti-fake to achieve the purpose that user.
As shown in fig. 6, the present invention includes Four processes:The generating process of encrypted image, user obtain the mistake of key data Journey, decrypting process, UI interactive processes.
The generating process of encrypted image is described below.
First, prepare a width two-value original image(See Fig. 7), then, image is ranked sequentially by coordinate as one-dimension array. Original image usually carries certain meaning information, such as operator or the logo information of equipment supplier.
Then, according to the corresponding initial value of product, one-dimensional chaos sequence is produced, and binaryzation is carried out according to threshold value to sequence Processing.
Specific method and principle are as follows:Logistic mappings are a kind of very simple dynamical systems in chaos system, It is defined as follows:
xi+1=μ xi(1-xi) formula 1
Wherein, 0≤μ≤4 are known as branch parameter (bifurcation parameter), x1∈(0,1).When 3.5699456... when < μ≤4, Logistic mappings works are in chaos state.That is, by initial value x0It is reflected in Logistic Generated sequence { x under the action of penetratingi| i=0,1,2... } it is aperiodic, do not restrain and very sensitive to initial value.
Chaos initial value an x0 and μ are set, is iterated by formula 1, obtains chaos sequence x (k).Initial value can be according to Last 6 digit divided by 1XXXXXX of device board number carry out value, and XXXXXX is the corresponding key information of product(Institute namely above The key value M stated), value range is 0 to 999999, if last 6 of plate number is full 0, x0 if is defaulted as 0.5.
Then, 0-1 sequence L (k) (k=1,2 ..., M1 × M2), the definition of threshold values threshold method are obtained using threshold value threshold method It is as follows:
Wherein, τ is threshold value, value range 0<τ<1.
Then, binary bitmap is encrypted with the 0-1 sequence L (k) of generation, obtains encrypted watermark vector sequence Row.Specially:Wm=Wa ⊕ L (k) (m=1,2 ... M1 × M2), ⊕ indicate XOR operation.As shown in figure 9, XXXXXX, μ and τ will In the network data base for storing server together as the corresponding encryption information of product and production board number.
Finally, as shown in figure 8, encrypted one-dimensional vector is reverted back two-dimensional array according to coordinate(Image), thus Complete the generation of encrypted image.The encrypted image of generation will be placed in terminal EFS file system, be shown for UI.It should In embodiment, x0=0.890111, XXXXXX=123456, μ=3.7, τ=0.4.The production of entire encrypted image and key information Database purchase was completed in the production phase.
User is described below and obtains key data process.
Terminal is connected on network server, obtains the corresponding key information of product.
Format is as follows:
Terminal transmission data format --- Get(Product IDs);
Terminal receives data format --- Receive(Product IDs, XXXXXX, μ, τ);
After network server receives the key request of terminal, reference chart searches corresponding key information, and these are believed Breath is sent to terminal according to set format, completes the acquisition process of key information.
Decrypting process is described below.
Decrypting process is exactly the inverse process of ciphering process.First, according to the key information knot obtained from network data base Latter 6 of plywood number carry out operation according to the algorithm in ciphering process, to obtain decryption chaos sequence;Then, threshold value is utilized The binary sequence that threshold method is decrypted.The binary sequence of decryption and the two-value encrypted image progress in terminal EFS subregions is different Or operation has just obtained original image, so as to complete entire decrypting process.Decrypting process is independently performed by terminal.
UI interactive processes are described below:
User initiates the operation of authentication by the interfaces UI, and checks authenticating result.
Detailed process please refers to attached drawing 5.
It is usage scenario below:After user buys end product, by the anti-fake authentication functions of terminal built-in to product Truth identification is carried out, to achieve the purpose that allow user can intuitively judge the true and false of product.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, without departing from the principles of the present invention, it can also make several improvements and retouch, these improvements and modifications It should be regarded as protection scope of the present invention.

Claims (13)

1. a kind of encryption method, which is characterized in that including:
A bianry image is obtained as original image;
The original image is ranked sequentially by coordinate, generates the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of the terminal, first one-dimension array is encrypted, generates the second one-dimension array;
Second one-dimension array is sequentially generated encrypted image according to coordinate.
2. encryption method according to claim 1, which is characterized in that the plate number according to the terminal, to described One one-dimension array is encrypted, generate the second one-dimension array the step of include:
According to the plate number of the terminal, one-dimensional chaos sequence is generated;
According to the plate number of the terminal, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
3. encryption method according to claim 2, which is characterized in that the plate number according to the terminal generates one-dimensional The step of chaos sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is element Sequence number;I=0,1,2...;x0For initial value.
4. encryption method according to claim 3, which is characterized in that the plate number according to the terminal generates initial The step of value includes:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;
Key value M and 10 corresponding to the plate numberNIt sums, obtains second value;The key value M is to be more than or wait In 0 and be less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
5. encryption method according to claim 2, which is characterized in that the plate number according to the terminal, to described one Tieing up the step of chaos sequence carries out binary conversion treatment, generates binary sequence includes:
Obtain the corresponding threshold tau of plate number of the terminal, 0<τ<1;
According to the threshold value, calculation formula:
L (k) is binary sequence;X (k) is one-dimensional chaos sequence.
6. a kind of decryption method, which is characterized in that including:
Extract encrypted image;
The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;
According to the plate number of terminal, the corresponding branch parameter of plate number of the terminal and the plate number of the terminal are obtained from server Corresponding threshold value;
According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates the 2nd 1 dimension Group;
Second one-dimension array is sequentially generated original image according to coordinate;
Show the original image.
7. decryption method according to claim 6, which is characterized in that it is described according to the branch parameter and the threshold value, First one-dimension array is decrypted, generate the second one-dimension array the step of include:
According to the branch parameter, one-dimensional chaos sequence is generated;
According to the threshold value, binary conversion treatment is carried out to the one-dimensional chaos sequence, generates binary sequence;
The binary sequence and first one-dimension array are subjected to XOR operation, generate the second one-dimension array.
8. decryption method according to claim 7, which is characterized in that it is described according to the branch parameter, it generates one-dimensional mixed The step of ignorant sequence includes:
According to the plate number of the terminal, initial value is generated;
According to the initial value, by formula xi+1=μ xi(1-xi) be iterated, obtain one-dimensional chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4;K is the serial number of iterations;xiFor the element of one-dimensional chaos sequence;I is element Sequence number;I=0,1,2...;x0For the initial value.
9. decryption method according to claim 8, which is characterized in that the plate number according to the terminal generates initial The step of value includes:
Obtain the number on predetermined figure N in the plate number, the first numerical value of combination producing;N is the nature more than or equal to 1 Number;
The corresponding key value M of the plate number is obtained from server;
To the corresponding key value of the plate number and 10NIt sums, obtains second value;The key value is more than or equal to 0 And it is less than or equal to 2NNatural number;
By first numerical value divided by second value, the initial value is obtained.
10. decryption method according to claim 7, which is characterized in that it is described according to the threshold value, to the one-dimensional chaos Sequence carry out binary conversion treatment, generate binary sequence the step of include:
According to the threshold value, calculation formula:
L (k) is 0-1 sequences;X (k) is one-dimensional chaos sequence;τ is threshold value, 0<τ<1.
11. a kind of server, which is characterized in that including:
Acquiring unit obtains a bianry image as original image;
The original image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit obtains the plate number of terminal;
Second generation unit is encrypted first one-dimension array according to the plate number of the terminal, generates the 2nd 1 Dimension group;
Second one-dimension array is sequentially generated encrypted image by third generation unit according to coordinate.
12. a kind of terminal, which is characterized in that including:
Extraction unit extracts encrypted image;
The encrypted image is ranked sequentially by the first generation unit by coordinate, generates the first one-dimension array;
Acquiring unit, according to the plate number of the terminal, obtained from server the terminal the corresponding branch parameter of plate number and The corresponding threshold value of plate number of the terminal;
Second generation unit is decrypted first one-dimension array according to the branch parameter and the threshold value, raw At the second one-dimension array;
Second one-dimension array is sequentially generated original image by third generation unit according to coordinate;
Display unit shows the original image.
13. a kind of decryption system, which is characterized in that including:Terminal and server;
The terminal extracts encrypted image;The encrypted image is ranked sequentially by coordinate, generates the first one-dimension array;According to The plate number of the terminal obtains the corresponding branch parameter of plate number of the terminal and the plate number of the terminal from the server Corresponding threshold value;According to the branch parameter and the threshold value, first one-dimension array is decrypted, generates second One-dimension array;Second one-dimension array is sequentially generated original image according to coordinate;Show the original image.
CN201310198616.XA 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal Active CN104184921B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310198616.XA CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal
PCT/CN2013/080305 WO2013167087A2 (en) 2013-05-24 2013-07-29 Encryption method, server, decryption method, terminal and encryption/decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310198616.XA CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal

Publications (2)

Publication Number Publication Date
CN104184921A CN104184921A (en) 2014-12-03
CN104184921B true CN104184921B (en) 2018-10-12

Family

ID=49551378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310198616.XA Active CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal

Country Status (2)

Country Link
CN (1) CN104184921B (en)
WO (1) WO2013167087A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098915B (en) * 2018-01-30 2022-09-23 阿里巴巴集团控股有限公司 Authentication method and system, and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system
CN102547297A (en) * 2012-02-28 2012-07-04 中国传媒大学 MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient
CN102801947A (en) * 2012-07-02 2012-11-28 西南科技大学 Semantic information transmission and protection method based on H264

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1209730C (en) * 2001-11-30 2005-07-06 温天 Digital anti-fake method
JP4655452B2 (en) * 2003-03-24 2011-03-23 富士ゼロックス株式会社 Information processing device
US20070189518A1 (en) * 2005-03-30 2007-08-16 Nanni Richard A 3-D quaternion quantum fractal encryption
CN1932852A (en) * 2005-09-14 2007-03-21 上海新跃仪表厂 Tax control machine material characteristic encrypted antifaking method
US20070288752A1 (en) * 2006-06-08 2007-12-13 Weng Chong Chan Secure removable memory element for mobile electronic device
CN102938132A (en) * 2012-11-20 2013-02-20 海南大学 Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system
CN102547297A (en) * 2012-02-28 2012-07-04 中国传媒大学 MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient
CN102801947A (en) * 2012-07-02 2012-11-28 西南科技大学 Semantic information transmission and protection method based on H264

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《QR码二值图像混沌加密与解密》;张定会,郭静波,江平,单俊涛;《移动通信》;20110228;第35卷(第3-4期);131-133 *
《基于混沌序列的二值图像加密算法》;杨格兰,张建明,向德生;《计算机技术与发展》;20060210;第16卷(第2期);148-150 *

Also Published As

Publication number Publication date
WO2013167087A2 (en) 2013-11-14
CN104184921A (en) 2014-12-03
WO2013167087A3 (en) 2014-04-24

Similar Documents

Publication Publication Date Title
TWI670621B (en) Information encryption and decryption method and device
CN103646264B (en) A kind of dimension code anti-counterfeit method of multiple information encryption
WO2017045594A1 (en) Anti-counterfeit method
CN102572314B (en) Image sensor and payment authentication method
CN101355684B (en) Method for transmitting and receiving image series digital content as well as transmitter and receiver
Lee et al. Digital image sharing by diverse image media
CN102930317A (en) Device for generating two-dimension code identifiers of books, two-dimension code identification device and system
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN103020682A (en) Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN104537600A (en) Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN101409813A (en) Image encoding method for preventing and identifying image tamper
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN111010490A (en) Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium
CN108334919A (en) A kind of product false proof verification method and its system based on Quick Response Code
CN103020496A (en) Digital watermark encryption realization method
CN104408684A (en) Digital watermarking method with high robustness
CN108199836B (en) Method and device for binding and unbinding key and equipment
Mandal Reversible steganography and authentication via transform encoding
CN104184921B (en) Encryption method and server and decryption method and terminal
Mohan et al. Secure visual cryptography scheme with meaningful shares
CN104346544A (en) Data processing method, data embedding device and data separating device
Shivani et al. Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence
CN117729053B (en) Anti-counterfeiting verification method, device and storage medium based on quantum invisible transmission state
CN109064380A (en) A kind of 3D printing works hide watermark addition verifying system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant