CN104868989B - Encryption method for view data safe transmission - Google Patents

Encryption method for view data safe transmission Download PDF

Info

Publication number
CN104868989B
CN104868989B CN201510319969.XA CN201510319969A CN104868989B CN 104868989 B CN104868989 B CN 104868989B CN 201510319969 A CN201510319969 A CN 201510319969A CN 104868989 B CN104868989 B CN 104868989B
Authority
CN
China
Prior art keywords
msub
mrow
image
msubsup
encryptions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510319969.XA
Other languages
Chinese (zh)
Other versions
CN104868989A (en
Inventor
吴亚联
龙辉
胡洪波
龚能
雷天齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiangtan University
Original Assignee
Xiangtan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiangtan University filed Critical Xiangtan University
Priority to CN201510319969.XA priority Critical patent/CN104868989B/en
Publication of CN104868989A publication Critical patent/CN104868989A/en
Application granted granted Critical
Publication of CN104868989B publication Critical patent/CN104868989B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The application is related to a kind of encryption method for view data safe transmission, comprises the following steps:Obtain image plaintext matrix A;3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;ECC encryptions are carried out to the 3D keys of 3D chaos encryptions;The 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting.The technical scheme of the application has merged the advantages of chaos encryption and ECC encryptions, effectively increases the enciphering rate, encryption efficiency and security of traditional images encryption method.

Description

Encryption method for view data safe transmission
Technical field
The application is related to image encryption processing, the more particularly, to encryption method of view data safe transmission.
Background technology
In the network technology highly developed information age, picture is wide as a kind of important network information transfer medium General field, the safety problems of its transmitting procedure such as medical science, military affairs, social activity of being applied to increasingly highlights.Image information is different from text Information, there is its own information characteristic, such as correlation is strong, big data quantity, High redundancy.
Currently used New chaotic image encryption Transmission system is mixed simply by linear chaos sequence to image sequence Ignorant encryption, this method are poor to the related damage of image, and anti-reconstruct and collapse resistance aggressiveness are weaker.
The content of the invention
To overcome problem present in correlation technique, the application provides the encryption method for view data safe transmission.
According to the first aspect of the embodiment of the present application, there is provided a kind of encryption method for view data safe transmission, bag Include following steps:
Obtain image plaintext matrix A;
3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
ECC (Elliptic Curves Cryptography, elliptic curve cipher are carried out to the 3D keys of 3D chaos encryptions Coding theory) encryption;
The 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting;Wherein, to image in plain text Matrix A carries out 3D chaos encryptions and comprised the following steps:
It is as follows to establish 3D Chaotic Systems:
ε=CTxi
E=(A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext square Battle array A line number and columns, x0, y0, z0For the 3D key seeds generated at random, 0 < x0The < y of < 1,00The < z of < 1,00< 1,2.77 The < δ < 0.02, x of 3.0,0 < β < of < γ <, 0.18,0 < α < 0.02,0i, yj, zkFor the x of 3D chaos systems output, y, z directions Random sequence, 0 < i < N, 0 < j < M, 0 < k < M × N,ε is time check controlled quentity controlled variable, when C is system Between proofread Separation control matrix;
Wherein, the 3D keys progress ECC encryptions to 3D chaos encryptions comprise the following steps:
Obtain image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K;
K is set3D=x0||y0||z0||K1||K2||K3, wherein, | | to press or operator, i.e. step-by-step progress or computing;
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D
Produce random big integer r;
Ciphertext C is set1=E3D+ rK, ciphertext C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing;
Wherein, the 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E includes following step Suddenly:
Create binary file;
By C1, C2Be converted in binary system write-in binary file, and be ultimately written ECC ciphertext end marks;
Image ciphertext E is write into binary file in a manner of adding;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A also to be included being compressed coding to image ciphertext E.
The aspect and advantage that the application adds will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by the practice of the application.It should be appreciated that the general description and following detailed description of the above are only It is exemplary and explanatory, the application can not be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention Example, and for explaining principle of the invention together with specification.
Fig. 1 shows the flow chart of the encryption method for view data safe transmission according to embodiments of the present invention;
Fig. 2 shows the flow of the encryption method according to the preferred embodiment of the invention for view data safe transmission Figure;
Fig. 3 shows the flow chart of the decryption method for view data safe transmission according to embodiments of the present invention;
Fig. 4 shows the flow of the decryption method according to the preferred embodiment of the invention for view data safe transmission Figure;
Fig. 5 shows the flow chart according to the preferred embodiment of the invention for view data safe transmission.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
Fig. 1 shows the flow chart of the encryption method for view data safe transmission according to embodiments of the present invention, bag Include following steps:
Step S10, obtain image plaintext matrix A;
Step S20,3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
Step S30, ECC encryptions are carried out to the 3D keys of 3D chaos encryptions;
Step S40, the 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting.
Currently used New chaotic image encryption Transmission system is mixed simply by linear chaos sequence to image sequence Ignorant encryption, this method are poor to the related damage of image, and anti-reconstruct and collapse resistance aggressiveness are weaker, further, since not having In view of influence of the actual hardware environment to chaos effect stability, chaos system is mixed in chaos-based secure communication transmitting procedure Ignorant state stability is poor;Lack effective management to chaotic key in image encryption transmitting procedure, cause New chaotic image encryption The problem of Key Exposure, often occurs for Transmission system.
And the advantages of chaos encryption and ECC encryptions have been merged in the present embodiment, effectively increase traditional images encryption method Enciphering rate, encryption efficiency and security.The image encryption transmission method, it is effectively improved enciphering rate, anti-space weight It is the attack of structure, strong based on Hui-Hui calendar attack performance, there is very high security performance.Provided for network image information exchange One reliable and stable view data encrypted transmission scheme.
Fig. 2 shows the flow of the encryption method according to the preferred embodiment of the invention for view data safe transmission Figure.
Preferably, as shown in Fig. 2 step S20 comprises the following steps:
A 3D chaos encryption processes) are started, including:
A. 3D key seeds x is generated at random0, y0, z0, wherein, 0 < x0The < y of < 1,00The < z of < 1,00< 1, and use x0, y0, z03D chaos systems are initialized, the 3D Chaotic Systems used are as follows:
S=CTxi
Wherein, 2.77 < γ <, 3.0,0 < β <, 0.18,0 < α < 0.02,0 < δ < 0.02, xi, yj, zx is 3D chaos System export x, y, the random sequence in z directions, 0<i<N, 0<j<M, 0<k<M × N, M are plaintext matrix A line number, and N is plaintext square Battle array A columns,ε is time check controlled quentity controlled variable, and C is that system time proofreads Separation control matrix;
B. 3D chaos encryptions are carried out to image plaintext matrix A, including:
E (A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext square Battle array A line number and columns;
C. coding is compressed to the image ciphertext E after 3D chaos encryptions, including:
Set Z=C (E), wherein C to represent Image Compression Coding Algorithm, can be that jpg or png image compression encodings are calculated Method.
Preferably, as shown in Fig. 2 step S30 includes:
B ECC crypto process) is started, including:
A. image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K are obtained;
B. ECC encryptions are carried out to 3D chaos encryptions key, including:
K is set3D=x0||y0||0||K1||2||3
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D
Produce random big integer r;
C is set1=E3D+ rK, C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing.
Preferably, step S40 comprises the following steps:
A binary file imgname.en) is created, wherein filename is consistent with the filename for obtaining image, and suffix is with .en Ending;
B) by C1, C2Be converted in binary system write-in file imgname.en, and be ultimately written ECC ciphertext end marks 0;
C the image ciphertext E after 3D chaos encryptions) is write into imgname.en in a manner of adding;
D imgname.en) is sent to by image-receptive side by network, with regard to its specific transmission and transmission means, this Shen It is not any limitation as please.
Fig. 3 shows the flow chart of the decryption method for view data safe transmission according to embodiments of the present invention, bag Include following steps:
Step S15, obtain encryption file;
Step S25, according to encryption file in ECC ciphertexts end mark from encryption file in obtain encryption 3D keys and Image ciphertext E;
Step S35, the 3D keys progress ECC of encryption is decrypted to obtain 3D keys;
Step S45,3D chaos is carried out to image ciphertext E using 3D keys and decrypts to obtain image plaintext matrix A.
The encryption method that the present embodiment corresponds in above-described embodiment, uncompressed encoding method are used with being encoded in ciphering process Method corresponding to compression method, can be jpg or png image decompression decoding algorithms, wherein having merged chaos encryption and ECC adds The advantages of close, effectively increase the enciphering rate, encryption efficiency and security of traditional images encryption method.
Fig. 4 shows the flow of the decryption method according to the preferred embodiment of the invention for view data safe transmission Figure.
Preferably, as shown in figure 4, step S35 comprises the following steps:
A) elliptic curve parameter Ep (a, b), basic point G and public key K are generated;
B) ECC decryption is carried out to the 3D keys of the encryption using elliptic curve parameter Ep (a, b), basic point G and public key K, Obtain 3D keys:x0, y0, z0, K1, K2, K3
Preferably, the 3D keys progress ECC decryption to the encryption includes:
A) C is extracted from cryptograph files imgname.en1, C2
B) E is set3D=C1-kC2, wherein E3DFor by the 3D chaos encryption cipher key combinations values of Bose-Chaudhuri-Hocquenghem Code;
C) by BCH decoding algorithms to E3DDecoded to obtain 3D chaos encryption cipher key combinations values K3D
D) from K3DIn pass through binary shift method and extract 3D chaos encryption keys x0, y0, z0, K1, K2, K3.
Preferably, step S45 comprises the following steps:
A x) is used0, y0, z03D chaos systems are initialized, the 3D Chaotic Systems used are as follows:
ε '=CT x
Wherein, 2.77 < γ <, 3.0,0 < β <, 0.18,0 < α < 0.02,0 < δ < 0.02, xi, yj, zkFor 3D chaos systems Export x, y, the random sequence in z directions, 0<i<N, 0<j<M, 0<k<M × N, M are image ciphertext E line number, and N is image ciphertext E's Columns,ε is time check controlled quentity controlled variable, and C is that system time proofreads Separation control matrix, and L is check and correction gain, is passed through Select appropriate L to cause system check and correction synchronous with encryption 3D chaos systems realization, allowed during check and correction
B 3D chaos decryption) is carried out to image ciphertext E, including:
A (E xor Y are setT+ EX) Z, wherein:
Xi=(tnteger (x × K1)modN)
Yi=(tnteger (x × K2)modM)
Zi=(integer (x × K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image ciphertext E's Line number and columns.
Fig. 5 shows the flow chart according to the preferred embodiment of the invention for view data safe transmission, including:Image Sender:Image plaintext A is obtained first from image file, then performing 3D chaos encryptions to A obtains 3D chaos encryption images Ciphertext E, and coding is compressed to E and obtains the 3D chaos encryption ciphertexts Z after compressed encoding;Simultaneity factor performs ECC encryptions, right 3D chaos encryption keys x0, y0, z0, K1, K2, K3Combination binary number K3DIt is encrypted to obtain ciphertext C1, C2;Ultimately produce band There is the encryption file imgname.en of key, image-receptive side is sent to by network.Image-receptive side:Received and schemed by network As the encryption file imgname.en of sender, extraction ECC ciphertexts C1, C2, ECC is carried out to it and decrypts to obtain x0, y0, z0, K1, K2, K3, the 3D chaos encryption ciphertext Z after compressed encoding are extracted, decompression decoding is carried out to it and obtains 3D chaos encryption ciphertext E, most 3D chaos is performed to E afterwards to decrypt to obtain image plaintext A.
Compared with prior art, it is the advantages of the above embodiment of the present invention:
1. this method has merged the advantages of chaos encryption and ECC encryptions, adding for traditional images encryption method is effectively increased Close speed, encryption efficiency and security;
2. this method by build 3D chaos systems solve the encryption of one-dimensional chaos system image correlation is destroyed it is not strong The problem of;
3. this method is mixed by the design time verification scheme in 3D Chaotic Encryption Systems to the 3D of encryption side and decryption side Ignorant system carries out time synchronized verification and correction, effectively prevent changed over time in chaos system running chaos effect and The decline of stability;
4. 3D chaos encryptions key is carried out by ECC AESs in encrypted image and 3D chaotic key transmitting procedures Encrypted transmission, 3D chaotic keys transmission security and reliability are effectively increased, improve image transmitting security.
Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledges in the art of the application Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (1)

1. a kind of encryption method for view data safe transmission, it is characterised in that comprise the following steps:
Obtain image plaintext matrix A;
3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
ECC (Elliptic Curves Cryptography, elliptic curve cipher coding are carried out to the 3D keys of 3D chaos encryptions Learn) encryption;
The 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E, for transmitting;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A to comprise the following steps:
It is as follows to establish 3D Chaotic Systems:
<mrow> <msub> <mi>x</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <msub> <mi>&amp;gamma;x</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>-</mo> <msub> <mi>x</mi> <mi>n</mi> </msub> </mrow> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;beta;y</mi> <mi>n</mi> <mn>2</mn> </msubsup> <msub> <mi>x</mi> <mi>n</mi> </msub> <mo>+</mo> <msubsup> <mi>&amp;alpha;z</mi> <mi>n</mi> <mn>3</mn> </msubsup> <mo>+</mo> <mi>&amp;delta;</mi> <mi>f</mi> <mrow> <mo>(</mo> <mi>&amp;epsiv;</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <msub> <mi>y</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <msub> <mi>&amp;gamma;x</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <msub> <mi>y</mi> <mi>n</mi> </msub> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;beta;z</mi> <mi>n</mi> <mn>2</mn> </msubsup> <msub> <mi>y</mi> <mi>n</mi> </msub> <mo>+</mo> <msubsup> <mi>&amp;alpha;x</mi> <mi>n</mi> <mn>3</mn> </msubsup> </mrow>
<mrow> <msub> <mi>z</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <msub> <mi>&amp;gamma;z</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>-</mo> <msub> <mi>z</mi> <mi>n</mi> </msub> </mrow> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;beta;x</mi> <mi>n</mi> <mn>2</mn> </msubsup> <msub> <mi>z</mi> <mi>n</mi> </msub> <mo>+</mo> <msubsup> <mi>&amp;alpha;y</mi> <mi>n</mi> <mn>3</mn> </msubsup> </mrow>
ε=CTxi
E=(A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext matrix A's Line number and columns, x0, y0, z0For the 3D key seeds generated at random, 0 < x0The < y of < 1,00The < z of < 1,00The < γ < of < 1,2.77 The < δ < 0.02, x of 3.0,0 < β <, 0.18,0 < α < 0.02,0i, yj, zkFor 3D chaos systems output x, y, z directions it is random Sequence, 0<i<N, 0<j<M, 0<k<M × N,ε is time check controlled quentity controlled variable, and C is system time check and correction interval control Matrix processed;
Wherein, the 3D keys progress ECC encryptions to 3D chaos encryptions comprise the following steps:
Obtain image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K;
K is set3D=x0||y0||z0||K1||K2||K3, wherein, | | to press or operator, i.e. step-by-step progress or computing;
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D
Produce random big integer r;
Ciphertext C is set1=E3D+ rK, ciphertext C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing;
Wherein, the 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E to comprise the following steps:
Create binary file;
By C1, C2Be converted in binary system write-in binary file, and be ultimately written ECC ciphertext end marks;
Image ciphertext E is write into binary file in a manner of adding;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A also to be included being compressed coding to image ciphertext E.
CN201510319969.XA 2015-06-11 2015-06-11 Encryption method for view data safe transmission Active CN104868989B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510319969.XA CN104868989B (en) 2015-06-11 2015-06-11 Encryption method for view data safe transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510319969.XA CN104868989B (en) 2015-06-11 2015-06-11 Encryption method for view data safe transmission

Publications (2)

Publication Number Publication Date
CN104868989A CN104868989A (en) 2015-08-26
CN104868989B true CN104868989B (en) 2017-11-17

Family

ID=53914535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510319969.XA Active CN104868989B (en) 2015-06-11 2015-06-11 Encryption method for view data safe transmission

Country Status (1)

Country Link
CN (1) CN104868989B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028063A (en) * 2016-06-14 2016-10-12 广州小百合信息技术有限公司 Method and device for transmitting video displayed by display screen
CN108718232B (en) * 2018-08-17 2021-03-26 中国矿业大学 Image encryption method based on AES and chaos
CN110855362B (en) * 2019-11-18 2021-08-03 南京工程学院 Secret communication method and system based on visible light LED matrix
CN114461988A (en) * 2022-04-12 2022-05-10 恒生电子股份有限公司 Image encryption method and device, image decryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383703A (en) * 2008-09-12 2009-03-11 华南理工大学 Dynamic ciphering system and method based on broad sense information field
US7720305B2 (en) * 2003-12-05 2010-05-18 New Jersey Institute Of Technology System and method for robust lossless data hiding and recovering from the integer wavelet representation
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7720305B2 (en) * 2003-12-05 2010-05-18 New Jersey Institute Of Technology System and method for robust lossless data hiding and recovering from the integer wavelet representation
CN101383703A (en) * 2008-09-12 2009-03-11 华南理工大学 Dynamic ciphering system and method based on broad sense information field
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
混沌密码和ECC组合法在数据加密传送中的应用;萧萍;《现代计算机》;20090225;第124-126页 *

Also Published As

Publication number Publication date
CN104868989A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
KR101593169B1 (en) Feistel-based variable length block cipher apparatus and method thereof
KR101516574B1 (en) Variable length block cipher apparatus for providing the format preserving encryption, and the method thereof
JP6740902B2 (en) Authentication encryption method, authentication decryption method, and information processing apparatus
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
US20180205536A1 (en) Stream cipher system
CA3051928A1 (en) Equivocation augmentation
CN105556880A (en) Method and apparatus for secure communication
TW200828938A (en) Method for securely extending key stream to encrypt high-entropy data
CN104868989B (en) Encryption method for view data safe transmission
US10587407B2 (en) Data encryption apparatus and method using an encryption key based on puncturing of a generator matrix
Karthikeyan et al. Enhanced security in steganography using encryption and quick response code
CN104396182A (en) Method of encrypting data
JP2010524014A (en) A low complexity encryption method for content encoded by rateless codes
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
Hua et al. Matrix-based secret sharing for reversible data hiding in encrypted images
CN105049176B (en) Decryption method for view data safe transmission
US20170041133A1 (en) Encryption method, program, and system
CN105959106B (en) A kind of low-complexity digital encryption method
RU2016131164A (en) METHOD FOR CODING AND DECODING DIGITAL INFORMATION IN THE FORM OF ULTRA-COMPRESSED NANOBAR CODE (OPTIONS)
CN115865313A (en) Lightweight privacy protection longitudinal federal learning model parameter aggregation method
JP2017527225A (en) Cryptographic system reproducible random sequence
US11196447B2 (en) Computer-implemented method for error-correction-encoding and encrypting of a file
Hamsanandhini et al. Securing Data in the Image Using SHA & ECC
Rajput et al. An improved cryptographic technique to encrypt images using extended hill cipher
Charru et al. Improved Cryptography Algorithm to Enhanced Data Security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant