CN104868989B - Encryption method for view data safe transmission - Google Patents
Encryption method for view data safe transmission Download PDFInfo
- Publication number
- CN104868989B CN104868989B CN201510319969.XA CN201510319969A CN104868989B CN 104868989 B CN104868989 B CN 104868989B CN 201510319969 A CN201510319969 A CN 201510319969A CN 104868989 B CN104868989 B CN 104868989B
- Authority
- CN
- China
- Prior art keywords
- msub
- mrow
- image
- msubsup
- encryptions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The application is related to a kind of encryption method for view data safe transmission, comprises the following steps:Obtain image plaintext matrix A;3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;ECC encryptions are carried out to the 3D keys of 3D chaos encryptions;The 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting.The technical scheme of the application has merged the advantages of chaos encryption and ECC encryptions, effectively increases the enciphering rate, encryption efficiency and security of traditional images encryption method.
Description
Technical field
The application is related to image encryption processing, the more particularly, to encryption method of view data safe transmission.
Background technology
In the network technology highly developed information age, picture is wide as a kind of important network information transfer medium
General field, the safety problems of its transmitting procedure such as medical science, military affairs, social activity of being applied to increasingly highlights.Image information is different from text
Information, there is its own information characteristic, such as correlation is strong, big data quantity, High redundancy.
Currently used New chaotic image encryption Transmission system is mixed simply by linear chaos sequence to image sequence
Ignorant encryption, this method are poor to the related damage of image, and anti-reconstruct and collapse resistance aggressiveness are weaker.
The content of the invention
To overcome problem present in correlation technique, the application provides the encryption method for view data safe transmission.
According to the first aspect of the embodiment of the present application, there is provided a kind of encryption method for view data safe transmission, bag
Include following steps:
Obtain image plaintext matrix A;
3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
ECC (Elliptic Curves Cryptography, elliptic curve cipher are carried out to the 3D keys of 3D chaos encryptions
Coding theory) encryption;
The 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting;Wherein, to image in plain text
Matrix A carries out 3D chaos encryptions and comprised the following steps:
It is as follows to establish 3D Chaotic Systems:
ε=CTxi
E=(A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext square
Battle array A line number and columns, x0, y0, z0For the 3D key seeds generated at random, 0 < x0The < y of < 1,00The < z of < 1,00< 1,2.77
The < δ < 0.02, x of 3.0,0 < β < of < γ <, 0.18,0 < α < 0.02,0i, yj, zkFor the x of 3D chaos systems output, y, z directions
Random sequence, 0 < i < N, 0 < j < M, 0 < k < M × N,ε is time check controlled quentity controlled variable, when C is system
Between proofread Separation control matrix;
Wherein, the 3D keys progress ECC encryptions to 3D chaos encryptions comprise the following steps:
Obtain image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K;
K is set3D=x0||y0||z0||K1||K2||K3, wherein, | | to press or operator, i.e. step-by-step progress or computing;
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D;
Produce random big integer r;
Ciphertext C is set1=E3D+ rK, ciphertext C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing;
Wherein, the 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E includes following step
Suddenly:
Create binary file;
By C1, C2Be converted in binary system write-in binary file, and be ultimately written ECC ciphertext end marks;
Image ciphertext E is write into binary file in a manner of adding;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A also to be included being compressed coding to image ciphertext E.
The aspect and advantage that the application adds will be set forth in part in the description, and will partly become from the following description
Obtain substantially, or recognized by the practice of the application.It should be appreciated that the general description and following detailed description of the above are only
It is exemplary and explanatory, the application can not be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 shows the flow chart of the encryption method for view data safe transmission according to embodiments of the present invention;
Fig. 2 shows the flow of the encryption method according to the preferred embodiment of the invention for view data safe transmission
Figure;
Fig. 3 shows the flow chart of the decryption method for view data safe transmission according to embodiments of the present invention;
Fig. 4 shows the flow of the decryption method according to the preferred embodiment of the invention for view data safe transmission
Figure;
Fig. 5 shows the flow chart according to the preferred embodiment of the invention for view data safe transmission.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
Fig. 1 shows the flow chart of the encryption method for view data safe transmission according to embodiments of the present invention, bag
Include following steps:
Step S10, obtain image plaintext matrix A;
Step S20,3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
Step S30, ECC encryptions are carried out to the 3D keys of 3D chaos encryptions;
Step S40, the 3D keys of ECC encryptions are generated into encryption file jointly with image ciphertext E, for transmitting.
Currently used New chaotic image encryption Transmission system is mixed simply by linear chaos sequence to image sequence
Ignorant encryption, this method are poor to the related damage of image, and anti-reconstruct and collapse resistance aggressiveness are weaker, further, since not having
In view of influence of the actual hardware environment to chaos effect stability, chaos system is mixed in chaos-based secure communication transmitting procedure
Ignorant state stability is poor;Lack effective management to chaotic key in image encryption transmitting procedure, cause New chaotic image encryption
The problem of Key Exposure, often occurs for Transmission system.
And the advantages of chaos encryption and ECC encryptions have been merged in the present embodiment, effectively increase traditional images encryption method
Enciphering rate, encryption efficiency and security.The image encryption transmission method, it is effectively improved enciphering rate, anti-space weight
It is the attack of structure, strong based on Hui-Hui calendar attack performance, there is very high security performance.Provided for network image information exchange
One reliable and stable view data encrypted transmission scheme.
Fig. 2 shows the flow of the encryption method according to the preferred embodiment of the invention for view data safe transmission
Figure.
Preferably, as shown in Fig. 2 step S20 comprises the following steps:
A 3D chaos encryption processes) are started, including:
A. 3D key seeds x is generated at random0, y0, z0, wherein, 0 < x0The < y of < 1,00The < z of < 1,00< 1, and use x0,
y0, z03D chaos systems are initialized, the 3D Chaotic Systems used are as follows:
S=CTxi
Wherein, 2.77 < γ <, 3.0,0 < β <, 0.18,0 < α < 0.02,0 < δ < 0.02, xi, yj, zx is 3D chaos
System export x, y, the random sequence in z directions, 0<i<N, 0<j<M, 0<k<M × N, M are plaintext matrix A line number, and N is plaintext square
Battle array A columns,ε is time check controlled quentity controlled variable, and C is that system time proofreads Separation control matrix;
B. 3D chaos encryptions are carried out to image plaintext matrix A, including:
E (A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext square
Battle array A line number and columns;
C. coding is compressed to the image ciphertext E after 3D chaos encryptions, including:
Set Z=C (E), wherein C to represent Image Compression Coding Algorithm, can be that jpg or png image compression encodings are calculated
Method.
Preferably, as shown in Fig. 2 step S30 includes:
B ECC crypto process) is started, including:
A. image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K are obtained;
B. ECC encryptions are carried out to 3D chaos encryptions key, including:
K is set3D=x0||y0||0||K1||2||3;
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D;
Produce random big integer r;
C is set1=E3D+ rK, C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing.
Preferably, step S40 comprises the following steps:
A binary file imgname.en) is created, wherein filename is consistent with the filename for obtaining image, and suffix is with .en
Ending;
B) by C1, C2Be converted in binary system write-in file imgname.en, and be ultimately written ECC ciphertext end marks
0;
C the image ciphertext E after 3D chaos encryptions) is write into imgname.en in a manner of adding;
D imgname.en) is sent to by image-receptive side by network, with regard to its specific transmission and transmission means, this Shen
It is not any limitation as please.
Fig. 3 shows the flow chart of the decryption method for view data safe transmission according to embodiments of the present invention, bag
Include following steps:
Step S15, obtain encryption file;
Step S25, according to encryption file in ECC ciphertexts end mark from encryption file in obtain encryption 3D keys and
Image ciphertext E;
Step S35, the 3D keys progress ECC of encryption is decrypted to obtain 3D keys;
Step S45,3D chaos is carried out to image ciphertext E using 3D keys and decrypts to obtain image plaintext matrix A.
The encryption method that the present embodiment corresponds in above-described embodiment, uncompressed encoding method are used with being encoded in ciphering process
Method corresponding to compression method, can be jpg or png image decompression decoding algorithms, wherein having merged chaos encryption and ECC adds
The advantages of close, effectively increase the enciphering rate, encryption efficiency and security of traditional images encryption method.
Fig. 4 shows the flow of the decryption method according to the preferred embodiment of the invention for view data safe transmission
Figure.
Preferably, as shown in figure 4, step S35 comprises the following steps:
A) elliptic curve parameter Ep (a, b), basic point G and public key K are generated;
B) ECC decryption is carried out to the 3D keys of the encryption using elliptic curve parameter Ep (a, b), basic point G and public key K,
Obtain 3D keys:x0, y0, z0, K1, K2, K3。
Preferably, the 3D keys progress ECC decryption to the encryption includes:
A) C is extracted from cryptograph files imgname.en1, C2;
B) E is set3D=C1-kC2, wherein E3DFor by the 3D chaos encryption cipher key combinations values of Bose-Chaudhuri-Hocquenghem Code;
C) by BCH decoding algorithms to E3DDecoded to obtain 3D chaos encryption cipher key combinations values K3D;
D) from K3DIn pass through binary shift method and extract 3D chaos encryption keys x0, y0, z0, K1, K2, K3.
Preferably, step S45 comprises the following steps:
A x) is used0, y0, z03D chaos systems are initialized, the 3D Chaotic Systems used are as follows:
ε '=CT x′
Wherein, 2.77 < γ <, 3.0,0 < β <, 0.18,0 < α < 0.02,0 < δ < 0.02, xi, yj, zkFor 3D chaos systems
Export x, y, the random sequence in z directions, 0<i<N, 0<j<M, 0<k<M × N, M are image ciphertext E line number, and N is image ciphertext E's
Columns,ε is time check controlled quentity controlled variable, and C is that system time proofreads Separation control matrix, and L is check and correction gain, is passed through
Select appropriate L to cause system check and correction synchronous with encryption 3D chaos systems realization, allowed during check and correction
B 3D chaos decryption) is carried out to image ciphertext E, including:
A (E xor Y are setT+ EX) Z, wherein:
Xi=(tnteger (x × K1)modN)
Yi=(tnteger (x × K2)modM)
Zi=(integer (x × K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image ciphertext E's
Line number and columns.
Fig. 5 shows the flow chart according to the preferred embodiment of the invention for view data safe transmission, including:Image
Sender:Image plaintext A is obtained first from image file, then performing 3D chaos encryptions to A obtains 3D chaos encryption images
Ciphertext E, and coding is compressed to E and obtains the 3D chaos encryption ciphertexts Z after compressed encoding;Simultaneity factor performs ECC encryptions, right
3D chaos encryption keys x0, y0, z0, K1, K2, K3Combination binary number K3DIt is encrypted to obtain ciphertext C1, C2;Ultimately produce band
There is the encryption file imgname.en of key, image-receptive side is sent to by network.Image-receptive side:Received and schemed by network
As the encryption file imgname.en of sender, extraction ECC ciphertexts C1, C2, ECC is carried out to it and decrypts to obtain x0, y0, z0, K1,
K2, K3, the 3D chaos encryption ciphertext Z after compressed encoding are extracted, decompression decoding is carried out to it and obtains 3D chaos encryption ciphertext E, most
3D chaos is performed to E afterwards to decrypt to obtain image plaintext A.
Compared with prior art, it is the advantages of the above embodiment of the present invention:
1. this method has merged the advantages of chaos encryption and ECC encryptions, adding for traditional images encryption method is effectively increased
Close speed, encryption efficiency and security;
2. this method by build 3D chaos systems solve the encryption of one-dimensional chaos system image correlation is destroyed it is not strong
The problem of;
3. this method is mixed by the design time verification scheme in 3D Chaotic Encryption Systems to the 3D of encryption side and decryption side
Ignorant system carries out time synchronized verification and correction, effectively prevent changed over time in chaos system running chaos effect and
The decline of stability;
4. 3D chaos encryptions key is carried out by ECC AESs in encrypted image and 3D chaotic key transmitting procedures
Encrypted transmission, 3D chaotic keys transmission security and reliability are effectively increased, improve image transmitting security.
Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledges in the art of the application
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (1)
1. a kind of encryption method for view data safe transmission, it is characterised in that comprise the following steps:
Obtain image plaintext matrix A;
3D chaos encryptions are carried out to image plaintext matrix A and obtain image ciphertext E;
ECC (Elliptic Curves Cryptography, elliptic curve cipher coding are carried out to the 3D keys of 3D chaos encryptions
Learn) encryption;
The 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E, for transmitting;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A to comprise the following steps:
It is as follows to establish 3D Chaotic Systems:
<mrow>
<msub>
<mi>x</mi>
<mrow>
<mi>n</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<msub>
<mi>&gamma;x</mi>
<mi>n</mi>
</msub>
<mrow>
<mo>(</mo>
<mrow>
<mn>1</mn>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>n</mi>
</msub>
</mrow>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msubsup>
<mi>&beta;y</mi>
<mi>n</mi>
<mn>2</mn>
</msubsup>
<msub>
<mi>x</mi>
<mi>n</mi>
</msub>
<mo>+</mo>
<msubsup>
<mi>&alpha;z</mi>
<mi>n</mi>
<mn>3</mn>
</msubsup>
<mo>+</mo>
<mi>&delta;</mi>
<mi>f</mi>
<mrow>
<mo>(</mo>
<mi>&epsiv;</mi>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<msub>
<mi>y</mi>
<mrow>
<mi>n</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<msub>
<mi>&gamma;x</mi>
<mi>n</mi>
</msub>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>n</mi>
</msub>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msubsup>
<mi>&beta;z</mi>
<mi>n</mi>
<mn>2</mn>
</msubsup>
<msub>
<mi>y</mi>
<mi>n</mi>
</msub>
<mo>+</mo>
<msubsup>
<mi>&alpha;x</mi>
<mi>n</mi>
<mn>3</mn>
</msubsup>
</mrow>
<mrow>
<msub>
<mi>z</mi>
<mrow>
<mi>n</mi>
<mo>+</mo>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<msub>
<mi>&gamma;z</mi>
<mi>n</mi>
</msub>
<mrow>
<mo>(</mo>
<mrow>
<mn>1</mn>
<mo>-</mo>
<msub>
<mi>z</mi>
<mi>n</mi>
</msub>
</mrow>
<mo>)</mo>
</mrow>
<mo>+</mo>
<msubsup>
<mi>&beta;x</mi>
<mi>n</mi>
<mn>2</mn>
</msubsup>
<msub>
<mi>z</mi>
<mi>n</mi>
</msub>
<mo>+</mo>
<msubsup>
<mi>&alpha;y</mi>
<mi>n</mi>
<mn>3</mn>
</msubsup>
</mrow>
ε=CTxi
E=(A xor X are setT+A·Y)xor ZT, wherein:
Xi=(integer (xi×K1)modN)
Yi=(integer (yj×K2)modM)
Zi=(integer (zk×K3)mod256)
In formula, Xi, Yi, ZiFor matrix X, Y, Z i-th of element, K1, K2, K3For random integers, M, N are image plaintext matrix A's
Line number and columns, x0, y0, z0For the 3D key seeds generated at random, 0 < x0The < y of < 1,00The < z of < 1,00The < γ < of < 1,2.77
The < δ < 0.02, x of 3.0,0 < β <, 0.18,0 < α < 0.02,0i, yj, zkFor 3D chaos systems output x, y, z directions it is random
Sequence, 0<i<N, 0<j<M, 0<k<M × N,ε is time check controlled quentity controlled variable, and C is system time check and correction interval control
Matrix processed;
Wherein, the 3D keys progress ECC encryptions to 3D chaos encryptions comprise the following steps:
Obtain image-receptive side elliptic curve parameter Ep (a, b), basic point G and public key K;
K is set3D=x0||y0||z0||K1||K2||K3, wherein, | | to press or operator, i.e. step-by-step progress or computing;
Bose-Chaudhuri-Hocquenghem Code algorithm is performed by K3DThe point E being encoded on Ep (a, b)3D;
Produce random big integer r;
Ciphertext C is set1=E3D+ rK, ciphertext C2=rG, wherein rK and rG are Elliptic Curve Scalar Multiplication computing;
Wherein, the 3D keys of ECC encryptions are generated into encryption file jointly with described image ciphertext E to comprise the following steps:
Create binary file;
By C1, C2Be converted in binary system write-in binary file, and be ultimately written ECC ciphertext end marks;
Image ciphertext E is write into binary file in a manner of adding;
Wherein, 3D chaos encryptions are carried out to image plaintext matrix A also to be included being compressed coding to image ciphertext E.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510319969.XA CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510319969.XA CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104868989A CN104868989A (en) | 2015-08-26 |
CN104868989B true CN104868989B (en) | 2017-11-17 |
Family
ID=53914535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510319969.XA Active CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104868989B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106028063A (en) * | 2016-06-14 | 2016-10-12 | 广州小百合信息技术有限公司 | Method and device for transmitting video displayed by display screen |
CN108718232B (en) * | 2018-08-17 | 2021-03-26 | 中国矿业大学 | Image encryption method based on AES and chaos |
CN110855362B (en) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN114461988A (en) * | 2022-04-12 | 2022-05-10 | 恒生电子股份有限公司 | Image encryption method and device, image decryption method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic ciphering system and method based on broad sense information field |
US7720305B2 (en) * | 2003-12-05 | 2010-05-18 | New Jersey Institute Of Technology | System and method for robust lossless data hiding and recovering from the integer wavelet representation |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
-
2015
- 2015-06-11 CN CN201510319969.XA patent/CN104868989B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7720305B2 (en) * | 2003-12-05 | 2010-05-18 | New Jersey Institute Of Technology | System and method for robust lossless data hiding and recovering from the integer wavelet representation |
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic ciphering system and method based on broad sense information field |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
Non-Patent Citations (1)
Title |
---|
混沌密码和ECC组合法在数据加密传送中的应用;萧萍;《现代计算机》;20090225;第124-126页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104868989A (en) | 2015-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101593169B1 (en) | Feistel-based variable length block cipher apparatus and method thereof | |
KR101516574B1 (en) | Variable length block cipher apparatus for providing the format preserving encryption, and the method thereof | |
JP6740902B2 (en) | Authentication encryption method, authentication decryption method, and information processing apparatus | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
US20180205536A1 (en) | Stream cipher system | |
CA3051928A1 (en) | Equivocation augmentation | |
CN105556880A (en) | Method and apparatus for secure communication | |
TW200828938A (en) | Method for securely extending key stream to encrypt high-entropy data | |
CN104868989B (en) | Encryption method for view data safe transmission | |
US10587407B2 (en) | Data encryption apparatus and method using an encryption key based on puncturing of a generator matrix | |
Karthikeyan et al. | Enhanced security in steganography using encryption and quick response code | |
CN104396182A (en) | Method of encrypting data | |
JP2010524014A (en) | A low complexity encryption method for content encoded by rateless codes | |
Sermeno et al. | Modified Vigenere cryptosystem: An integrated data encryption module for learning management system | |
Hua et al. | Matrix-based secret sharing for reversible data hiding in encrypted images | |
CN105049176B (en) | Decryption method for view data safe transmission | |
US20170041133A1 (en) | Encryption method, program, and system | |
CN105959106B (en) | A kind of low-complexity digital encryption method | |
RU2016131164A (en) | METHOD FOR CODING AND DECODING DIGITAL INFORMATION IN THE FORM OF ULTRA-COMPRESSED NANOBAR CODE (OPTIONS) | |
CN115865313A (en) | Lightweight privacy protection longitudinal federal learning model parameter aggregation method | |
JP2017527225A (en) | Cryptographic system reproducible random sequence | |
US11196447B2 (en) | Computer-implemented method for error-correction-encoding and encrypting of a file | |
Hamsanandhini et al. | Securing Data in the Image Using SHA & ECC | |
Rajput et al. | An improved cryptographic technique to encrypt images using extended hill cipher | |
Charru et al. | Improved Cryptography Algorithm to Enhanced Data Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |