CN111260532A - Private image encryption method and device, electronic equipment and computer readable storage medium - Google Patents

Private image encryption method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN111260532A
CN111260532A CN202010024795.5A CN202010024795A CN111260532A CN 111260532 A CN111260532 A CN 111260532A CN 202010024795 A CN202010024795 A CN 202010024795A CN 111260532 A CN111260532 A CN 111260532A
Authority
CN
China
Prior art keywords
image
original
privacy
pixel
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010024795.5A
Other languages
Chinese (zh)
Other versions
CN111260532B (en
Inventor
张威
苏畅
盛威
陈维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Hangzhou Information Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010024795.5A priority Critical patent/CN111260532B/en
Publication of CN111260532A publication Critical patent/CN111260532A/en
Application granted granted Critical
Publication of CN111260532B publication Critical patent/CN111260532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/10Segmentation; Edge detection
    • G06T7/11Region-based segmentation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20021Dividing image into blocks, subimages or windows

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The embodiment of the invention relates to the field of information security, and discloses a privacy image encryption method. According to the method, an original image is divided into a plurality of original image blocks, a plurality of original image blocks are encrypted by using a pre-constructed stream password and XOR encryption operation to obtain a corresponding number of encrypted image blocks, pixel differences of diagonal pixels in the encrypted image blocks are calculated, the encrypted image blocks are divided into a smooth image area and a complex image area according to the pixel differences, a part of pixel sets of a privacy image are embedded into the smooth image area to obtain the privacy image area, and another part of pixel sets of the privacy image are compressed into the complex image area and the privacy image area according to a preset image compression rule. The invention also provides the electronic equipment and the device for encrypting the private image and a computer readable storage medium. The invention can effectively solve the problems of small amount of encrypted information and low encryption safety of the encrypted privacy image.

Description

Private image encryption method and device, electronic equipment and computer readable storage medium
Technical Field
The embodiment of the invention relates to the field of information security, in particular to a method, electronic equipment, a device and a computer readable storage medium for encrypting a private image.
Background
With social progress and information development, image information encryption is widely applied to politics, economy, national defense, education and other aspects, and at present, two ways of image information encryption are mainly used, namely encryption is firstly performed and then a private image is embedded, and secondly, a space is reserved for the private image before encryption and then encryption is performed. Both encryption methods can protect the private image, but the inventor finds that although the security of the first method is guaranteed, the information amount of the private image is not embedded well, and that although the embedding amount of the information amount of the private image is improved, the security is low.
Disclosure of Invention
An object of embodiments of the present invention is to provide a privacy image encryption method, an electronic device, an apparatus, and a computer-readable storage medium, which effectively solve the problems of small amount of encrypted information and low encryption security of an encrypted privacy image.
In order to solve the technical problem, an embodiment of the present invention provides a privacy image encryption method, including:
splitting an original image into a plurality of original image blocks;
encrypting the original image blocks by using a pre-constructed stream password and an XOR encryption operation to obtain a corresponding number of encrypted image blocks;
calculating pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a private image into the smooth image area to obtain the private image area;
and compressing the other part of the pixel set of the private image to the complex image area and the private image area according to a preset image compression rule.
In order to solve the above problem, the present invention also provides a privacy image encryption apparatus, comprising:
the original image splitting module is used for splitting an original image into a plurality of original image blocks;
the original image encryption module is used for encrypting the original image blocks to obtain encrypted image blocks with corresponding quantity by using a pre-constructed stream password and XOR encryption operation;
the pixel difference calculation module is used for calculating the pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a privacy image into the smooth image area to obtain the privacy image area;
and the private image embedding module is used for compressing the other part of pixel sets of the private image to the complex image area and the private image area according to a preset image compression rule.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the privacy image encryption method.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, having at least one instruction stored therein, where the at least one instruction is executed by a processor in an electronic device to implement the private image encryption method described above.
According to the method, an original image is divided into a plurality of original image blocks, the original image blocks are encrypted to obtain encrypted image blocks, a smooth image area with small pixel difference is obtained by calculating the pixel difference of the encrypted image blocks, pixels of a privacy image are replaced by the pixels of the smooth image area, and the encrypted information quantity of the encrypted privacy image is improved because the smooth image area of the original image block has little influence on the original image blocks and can carry a large amount of information quantity of the privacy image; the whole encryption stage comprises exclusive or encryption and stream cipher, and the privacy image is hidden in the original image, so that the encryption security is improved.
Preferably, the encrypting the plurality of original image blocks to obtain a corresponding number of encrypted image blocks by using a pre-constructed stream cipher and an exclusive or encryption operation includes:
converting each pixel value in a group of diagonals of the original image block into an original fixed bit value;
converting each pixel value in the other set of diagonal lines in the original image block into an original random bit value;
and according to a stream cipher mode, carrying out exclusive-or encryption operation on the original fixed bit value and the original random bit value to obtain an encrypted image block.
Before the original image block is encrypted, the pixel value of the original image block is changed into the original fixed bit value and the original random bit value, and the XOR encryption operation is carried out on the original fixed bit value and the original random bit value, so that the encryption safety is improved.
Preferably, the performing an exclusive-or encryption operation on the original fixed bit value and the original random bit value to obtain an encrypted image block includes:
according to a permutation and combination principle, respectively carrying out exclusive OR operation on the original fixed bit value and the original random bit value to obtain a standard fixed bit value and a primary random bit value;
calculating a bit difference value of the standard fixed bit value and the primary random bit value;
and according to the bit difference value, filling the primary random bit value with a pre-constructed key to obtain a standard random bit value, and collecting the standard fixed bit value and the standard random bit value to obtain the encrypted image block.
According to the invention, the bit data of part of the original random bit value is filled with the pre-constructed key, so that the embedding of the subsequent privacy image pixels is facilitated, and the bit data of part of the original random bit value can be filled in more privacy image images, thereby improving the encrypted information content of the encrypted privacy image.
Preferably, the calculating a pixel difference of diagonal pixels in the encrypted image block, and dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference includes:
calculating pixel differences between standard random bit values in the encrypted image block;
judging whether the pixel difference is larger than a preset pixel difference threshold value or not;
if the pixel difference is larger than the pixel difference threshold, the encrypted image block is a complex image area, and if the pixel difference is not larger than the pixel difference threshold, the encrypted image block is a smooth image area.
Preferably, the embedding a part of the pixel set of the privacy image into the smooth image area to obtain the privacy image area includes:
traversing standard random bit values in the smooth image area;
and replacing the value of one bit in the standard random bit values in the smooth image area by using a part of pixel set of the privacy image until the privacy image area is obtained after replacement.
Preferably, the compressing another partial pixel set of the privacy image to the complex image area and the privacy image area according to a preset image compression rule includes:
extracting all standard random bit values of the complex image area and the privacy image area to obtain a standard random bit value group;
constructing a binary matrix according to the standard random bit value group;
and compressing the binary matrix to obtain a fillable bit number, and filling the other part of the pixel set of the privacy image into the fillable bit number.
Preferably, the method further comprises:
receiving a decryption key and judging the category of the decryption key;
if the decryption key is an original image decryption key, decrypting according to the original image decryption key to obtain the original image;
and if the decryption key is a private image decryption key, decrypting according to the private image decryption key to obtain the private image.
Drawings
Embodiments are illustrated by way of example in the accompanying drawings which correspond to figures, and which are not to be construed as limiting the embodiments, in which elements having the same reference numeral designations represent like elements, and in which the drawings are not to scale unless otherwise specified.
Fig. 1 is a schematic flowchart of a private image encryption method according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of 2 × 2 original image blocks in a private image encryption method according to a first embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a detailed implementation flow of S2 in the privacy image encryption method according to the second embodiment of the present invention;
fig. 4 is a schematic diagram illustrating a detailed implementation flow of pixel difference calculation in a privacy image encryption method according to a second embodiment of the present invention;
fig. 5 is a schematic diagram illustrating a detailed implementation flow of S4 in the privacy image encryption method according to the third embodiment of the present invention;
FIG. 6 is a block diagram of an apparatus for encrypting a private image according to an embodiment of the present invention;
fig. 7 is a schematic internal structural diagram of an electronic device implementing a private image encryption method according to an embodiment of the present invention;
the objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
The implementation mode of the invention relates to a privacy image encryption method, which has the core that an original image block is encrypted to obtain an encrypted image block, and a privacy image is embedded into the encrypted image block to complete privacy image encryption by calculating the pixel difference of the encrypted image block, thereby effectively solving the problems of small amount of encrypted information and low encryption safety of the encrypted privacy image. The following describes details of implementation of the private image encryption according to the present embodiment in detail, and the following is only provided for easy understanding and is not necessary to implement the present embodiment.
Referring to fig. 1, fig. 1 is a flowchart of private image encryption according to a first embodiment of the present invention, including:
and S1, acquiring the original image and the private image, and splitting the original image into a plurality of original image blocks.
The private image is an image which is unwilling to be disclosed to the outside for some reason, for example, company a repulses huge capital to purchase a core production technology of company B, and company B securely sends a core production technology picture to company a under the condition that the core production technology is not disclosed to the outside, so that the core production technology picture needs to be encrypted, wherein the core production technology picture is the private picture.
If the privacy pictures are simply encrypted, the security of the encryption is low, so the present invention preferably obtains an encryption container first, and embeds the privacy pictures into the encryption container to improve the security, wherein the encryption container can be a picture, i.e. the original image in S1, such as the above-mentioned core production technology picture is a privacy picture, and the group photo pictures of the company a and the company B are taken as the original image.
In detail, the splitting the original image into a plurality of original image blocks includes: and calculating the pixel arrangement specification of the original image, and splitting the original image according to the pixel arrangement specification of the original image to obtain a plurality of original image blocks.
In order to improve the security of the core production technology picture, the group photo picture is split into 2 × 2 original image blocks, that is, each original image block includes 4 pixels, each pixel is arranged in a square form, which can be seen from fig. 2 regarding a schematic diagram of the 2 × 2 original image block, where diagonal pixels are marked with the same symbol, for example, fig. 2 is marked with a circle center and a rectangular symbol, respectively.
And S2, encrypting the original image block to obtain an encrypted image block by using a pre-constructed stream password and XOR encryption operation.
In detail, the S2 can be shown in the detailed implementation flow chart of fig. 3, and includes:
s21, converting each pixel value in one group of diagonals of the original image block into an original fixed bit value;
s22, converting each pixel value in another set of diagonal lines in the original image block into an original random bit value;
and S23, according to a stream cipher mode, carrying out XOR encryption operation on each group of original fixed bit values and each group of original random bit values to obtain an encrypted image block.
Further, the conversion method for converting into the original fixed bit value is as follows:
Figure BDA0002362064040000051
wherein the content of the first and second substances,
Figure BDA0002362064040000052
representing pixels within said original image block, (x, y) representing said original image blockThe position of the pixel within, i, j, represents the index of the original image block, which comprises B in total, as described for the 2 x 2 original image blocki,j (0,0),Bi,j (0,1),Bi,j (1,0)And Bi,j (1,1)Four pixels, Bi,j (0,0)Representing the upper left pixel in a 2 x 2 arrangement, Bi,j (1,1)Represents the lower right pixel in a 2 × 2 arrangement, and Bi,j (0,0)Bi,j (1,1)Form diagonal pixels, and so on Bi,j (0,1),Bi,j (1,0)The diagonal pixels are formed so that the pixels,
Figure BDA0002362064040000053
representing the original fixed bit value into which a pixel within an original image block of coordinates (x, y) is transformed, u representing the number of bits of said original fixed bit value, typically taking the value 8.
Such as Bi,j (0,0)Bi,j (1,1)Form diagonal pixels, and select Bi,j (0,0),Bi,j (1,1)Two pixels are converted into original fixed bit values, and the value u is fixed to be 8, then another group of diagonal pixels Bi,j (0,1),Bi,j (1,0)And converting the bit into an original random bit value, wherein the original random bit value, namely the value u, is uncertain, and the bit of the original random bit value is certainly smaller than the bit of the original fixed bit value.
Therefore, further, the conversion method for converting into the original random bit value is as follows:
Figure BDA0002362064040000054
wherein f is a bit of the original random bit value, and f is smaller than u.
Further, the performing an exclusive-or encryption operation on each group of the original fixed bit values and each group of the original random bit values to obtain an encrypted image block includes: according to a permutation and combination principle, respectively carrying out exclusive OR operation on each group of original fixed bit values and each group of original random bit values to obtain standard fixed bit values and primary random bit values, calculating bit difference values of the standard fixed bit values and the primary random bit values, filling the primary random bit values with a pre-constructed key according to the bit difference values to obtain standard random bit values, and collecting the standard fixed bit values and the standard random bit values to obtain the encrypted image block.
In detail, the exclusive or operation is:
Figure BDA0002362064040000061
wherein the content of the first and second substances,
Figure BDA0002362064040000062
which represents an exclusive or operation, is performed,
Figure BDA0002362064040000063
representing a standard fixed or primary random bit value, Ψ1Indicating the position and number of bits of a pixel within the original fixed bit value, Ψ2Representing the position and number of bits of a pixel within the original random bit value.
The original image blocks of 2 x 2 as described above comprise B in totali,j (0,0),Bi,j (0,1),Bi,j (1,0)And Bi,j (1,1)Four pixels, Bi,j (0,0),Bi,j (1,1)Two pixels are converted into the original fixed bit value, Bi,j (0,1),Bi,j (1,0)Converting into original random bit value, performing XOR operation by permutation and combination between two bits, Bi,j (0,0),Bi,j (1,1)Two pixels are converted into a standard fixed bit value, Bi,j (0,1),Bi,j (1,0)Converting into a primary random bit value, wherein the number of bits of the standard fixed bit value is still 8, the number of bits of the primary random bit value is less than 8, and if 4, the difference value of the bits of the primary random bit value is 4, so that the primary random bit value needs to be converted into a secondary random bit valueThe remaining 4 bits of the primary random bit value are padded by using a pre-constructed key, wherein the key A is used for padding the remaining 4 bits of the primary random bit valuei,jA binary random sequence can be used and the padding method is as follows:
Figure BDA0002362064040000064
wherein the content of the first and second substances,
Figure BDA0002362064040000065
indicating a bitwise inversion operation, such as when f is 7,
Figure BDA0002362064040000066
when the bit is negated
Figure BDA0002362064040000067
Ψ3Representing the position of a pixel within said original random bit value and the number of remaining bits, Ψ123The relationship between the three is as follows:
Ψ1the coordinates and u of a set of diagonal pixels { (x, y, u) | (x, y) ∈ 0,1,2, …,7}
Ψ2{ (x, y, f) | (x, y) ∈ wherein the coordinates and f of another set of diagonal pixels equals 0,1,2, …, t }, where t < 7 Ψ3{ (x, y, f) | (x, y) ∈ wherein the coordinates of another set of diagonal pixels and f ═ t +1, t +2, …,7}, where t < 7
Further, each group of standard fixed bit values and each group of standard random bit values are collected to obtain encrypted image blocks, and 100 encrypted image blocks can be obtained after calculation if the 100 original image blocks are split from the group photo picture of the company A high layer and the company B high layer.
S3, calculating pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a privacy image into the smooth image area to obtain the privacy image area.
In detail, the calculating the pixel difference of the diagonal pixels in the encrypted image block, and dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference may refer to a detailed implementation flow diagram of 4-pixel difference calculation, including:
s31, calculating the pixel difference between the standard random bit values in the encrypted image block;
s32, judging whether the pixel difference is larger than a preset pixel difference threshold value;
s33, if the pixel difference is larger than the pixel difference threshold, the encrypted image block is a complex image area;
and S34, if the pixel difference is not larger than the pixel difference threshold, the encrypted image block is a smooth image area.
As described above, the group photo pictures of the company a and the company B are calculated to obtain 100 encrypted image blocks, and the operation of S3 is performed on each encrypted image block to obtain 37 complex image areas and 63 smooth image areas.
Further, the embedding a part of the pixel set of the privacy image into the smooth image area to obtain the privacy image area includes: traversing the standard random bit value in the smooth image area, and replacing the number of one bit of the standard random bit value in the smooth image area by using a part of pixel set of the privacy image until the privacy image area is obtained after replacement.
Preferably, replacing the number of one of the bits is generally the bit where the pre-constructed key is padded, and when 63 smooth image regions are obtained as above, 2 standard random bit values are traversed for the first smooth image region, each standard random bit value having a bit number of 8, wherein the highest 4 bits are obtained by padding in S2, and therefore one bit is selected to be replaced in the highest 4 bits, for example, the highest bit is selected to be replaced by the pixel value of the core production technology picture.
And S4, compressing the other part of pixel set of the privacy image to the complex image area and the privacy image area according to a preset image compression rule.
In detail, the compressing another part of the pixel sets of the private image to the complex image area and the private image area according to the preset image compression rule may be as shown in the detailed implementation flow diagram of fig. 5, and includes:
s41, extracting all standard random bit values of the complex image area and the privacy image area to obtain a standard random bit value group;
s42, constructing a binary matrix according to the standard random bit value group;
s43, compressing the binary matrix to obtain a fillable bit number, and filling the other part of the pixel set of the privacy image into the fillable bit number.
As the standard random bit values are extracted from the 37 complex image regions and the 63 private image regions, and further according to S2, the bit values of 0-t bits in the standard random bit values in the 37 complex image regions and the 63 private image regions are preferably extracted, and the bit values of 0-t bits are divided into k groups of v (1, q) for each group1),v(2,q2),…v(i,qi),…,v(k,qk),qiIndicating the number of bit values included in the ith group.
Further, the binary matrix is:
M=[I,Q]
wherein M is the binary matrix, I is an identity matrix of the binary matrix, and Q is a random binary matrix.
The compression formula for compressing the binary matrix to obtain the fillable bit number is as follows:
Figure BDA0002362064040000081
wherein s is the number of the padded bits.
And S5, receiving the decryption key, and judging whether the decryption key is the original image decryption key.
And S6, if the decryption key is the original image decryption key, decrypting the original image according to the original image decryption key to obtain the original image.
Specifically, if the decryption key is the original image decryption key, the decryption may be performed in reverse according to the encryption process of S2, but since the exclusive-or operation is performed on the original image in the process of S2, and when the private image is embedded, a part of the pixel set of the private image is used to replace the number of the partial bits in the original image, when the original image is decrypted, the restored image is an approximate image of the original image.
Preferably, the number of the partial bits in the original image is restored and replaced by an eight-neighborhood pixel average method, that is, eight pixel values adjacent to the replaced pixel are selected from the original image, and the average value of the eight pixel values is taken as the pixel value of the replaced pixel.
And S7, if the decryption key is a private image decryption key, decrypting the private image according to the private image decryption key to obtain the private image.
If the decryption key is a private image decryption key, finding a smooth image area according to the pixel difference threshold value of S3, restoring the replaced pixel value in the smooth image area, and repeating the steps in the same way, restoring according to the bit value compressed in the binary matrix to obtain the pixel value, and further obtaining the private image.
As shown in fig. 6, a functional block diagram of the private image encryption apparatus according to the present invention is shown.
The privacy image encryption apparatus 100 according to the present invention may be installed in an electronic device. According to the implemented functions, the privacy image encryption apparatus may include an original image splitting module 101, an original image encryption module 102, a pixel difference calculation module 103, and a privacy image embedding module 104. A module according to the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
an original image splitting module 101, configured to be used in the original image splitting module, and configured to split the original image into a plurality of original image blocks.
The original image encryption module 102 is configured to encrypt a plurality of original image blocks to obtain a corresponding number of encrypted image blocks by using a pre-established stream cipher and an exclusive or encryption operation.
The pixel difference calculating module 103 is configured to calculate a pixel difference of diagonal pixels in the encrypted image block, divide the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embed a part of pixel sets of a privacy image into the smooth image area to obtain the privacy image area.
A private image embedding module 104, configured to compress another part of the pixel sets of the private image to the complex image area and the private image area according to a preset image compression rule.
The module in the device provided by the application can be based on the privacy image encryption method, when in use, the original image block is encrypted to obtain the encrypted image block, the privacy image is embedded into the encrypted image block to complete privacy image encryption by calculating the pixel difference of the encrypted image block, and the technical effect same as that of the embodiment of the method can be achieved when the device is specifically operated, namely the problems of small amount of encryption information and low encryption safety of the encrypted privacy image are effectively solved.
Fig. 7 is a schematic structural diagram of an electronic device implementing the private image encryption method according to the present invention.
The electronic device 1 may comprise a processor 12, a memory 11 and a bus, and may further comprise a computer program stored in the memory 11 and executable on the processor 12.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic apparatus 1 and various types of data, such as a code of a privacy image encryption program, but also to temporarily store data that has been output or is to be output.
The processor 12 may be formed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 12 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (for example, executing a private image encryption program and the like) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 12 or the like.
Fig. 7 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 7 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The request privacy image encryption program 12 stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, may implement:
the method comprises the steps of firstly, obtaining an original image and a privacy image, and splitting the original image into a plurality of original image blocks.
The private image is an image which is unwilling to be disclosed to the outside for some reason, for example, company a repulses huge capital to purchase a core production technology of company B, and company B securely sends a core production technology picture to company a under the condition that the core production technology is not disclosed to the outside, so that the core production technology picture needs to be encrypted, wherein the core production technology picture is the private picture.
If the privacy pictures are simply encrypted, the security of the encryption is low, so the present invention preferably obtains an encryption container first, and embeds the privacy pictures into the encryption container to improve the security, wherein the encryption container can be a picture, i.e. the original image in S1, such as the above-mentioned core production technology picture is a privacy picture, and the group photo pictures of the company a and the company B are taken as the original image.
In detail, the splitting the original image into a plurality of original image blocks includes: and calculating the pixel arrangement specification of the original image, and splitting the original image according to the pixel arrangement specification of the original image to obtain a plurality of original image blocks.
In order to improve the security of the core production technology picture, the group photo picture is split into 2 × 2 original image blocks, that is, each original image block includes 4 pixels, each pixel is arranged in a square form, which can be seen from the arrangement form of 2 × 2 original image blocks in fig. 2, where the pixels of the diagonal line are marked with the same symbol, for example, fig. 2 is marked with the circle center and the rectangular symbol.
And secondly, encrypting the original image block by using a pre-constructed stream password and XOR encryption operation to obtain an encrypted image block.
In detail, the second step includes: converting each pixel value in one group of diagonal lines of the original image block into an original fixed bit value, converting each pixel value in the other group of diagonal lines of the original image block into an original random bit value, and performing exclusive-or encryption operation on each group of original fixed bit values and each group of original random bit values according to a stream cipher mode to obtain an encrypted image block.
Further, the conversion method for converting into the original fixed bit value is as follows:
Figure BDA0002362064040000111
wherein the content of the first and second substances,
Figure BDA0002362064040000112
representing pixels within said original image block, (x, y) representing the location of pixels within said original image block, i, j representing the index of said original image block, as described above for the 2 x 2 original image block comprising B in totali,j (0,0),Bi,j (0,1),Bi,j (1,0)And Bi,j (1,1)Four pixels, Bi,j (0,0)Representing the upper left pixel in a 2 x 2 arrangement, Bi,j (1,1)Represents the lower right pixel in a 2 × 2 arrangement, and Bi,j (0,0)Bi,j (1,1)Form diagonal pixels, and so on Bi,j (0,1),Bi,j (1,0)The diagonal pixels are formed so that the pixels,
Figure BDA0002362064040000113
representing the original fixed bit value into which a pixel within an original image block of coordinates (x, y) is transformed, u representing the number of bits of said original fixed bit value, typically taking the value 8.
Such as Bi,j (0,0)Bi,j (1,1)Form diagonal pixels, and select Bi,j (0,0),Bi,j (1,1)Two pixels are converted into original fixed bit values, and the value u is fixed to be 8, then another group of diagonal pixels Bi,j (0,1),Bi,j (1,0)And converting the bit into an original random bit value, wherein the original random bit value, namely the value u, is uncertain, and the bit of the original random bit value is certainly smaller than the bit of the original fixed bit value.
Therefore, further, the conversion method for converting into the original random bit value is as follows:
Figure BDA0002362064040000114
wherein f is a bit of the original random bit value, and f is smaller than u.
Further, the performing an exclusive-or encryption operation on each group of the original fixed bit values and each group of the original random bit values to obtain an encrypted image block includes: according to a permutation and combination principle, respectively carrying out exclusive OR operation on each group of original fixed bit values and each group of original random bit values to obtain standard fixed bit values and primary random bit values, calculating bit difference values of the standard fixed bit values and the primary random bit values, filling the primary random bit values with a pre-constructed key according to the bit difference values to obtain standard random bit values, and collecting the standard fixed bit values and the standard random bit values to obtain the encrypted image block.
In detail, the exclusive or operation is:
Figure BDA0002362064040000121
wherein the content of the first and second substances,
Figure BDA0002362064040000122
which represents an exclusive or operation, is performed,
Figure BDA0002362064040000123
representing a standard fixed or primary random bit value, Ψ1Indicating the position and number of bits of a pixel within the original fixed bit value, Ψ2Representing the position and number of bits of a pixel within the original random bit value.
The original image blocks of 2 x 2 as described above comprise B in totali,j (0,0),Bi,j (0,1),Bi,j (1,0)And Bi,j (1,1)Four pixels, Bi,j (0,0),Bi,j (1,1)Two pixels are converted into the original fixed bit value, Bi,j (0,1),Bi,j (1,0)Converting into original random bit value, performing XOR operation by permutation and combination between two bits, Bi,j (0,0),Bi,j (1,1)Two pixels are converted into a standard fixed bit value, Bi,j (0,1),Bi,j (1,0)Converting the bit number of the standard fixed bit value into a primary random bit value, wherein the bit number of the standard fixed bit value is still 8, the bit number of the primary random bit value is less than 8, if the bit number of the primary random bit value is 4, the bit difference value of the primary random bit value is 4, and therefore the rest 4 bits of the primary random bit value need to be encrypted and filledi,jA binary random sequence can be used and the padding method is as follows:
Figure BDA0002362064040000124
wherein the content of the first and second substances,
Figure BDA0002362064040000125
indicating a bitwise inversion operation, such as when f is 7,
Figure BDA0002362064040000127
when the bit is negated
Figure BDA0002362064040000126
Ψ3Representing the position of a pixel within said original random bit value and the number of remaining bits, Ψ123The relationship between the three is as follows:
Ψ1the coordinates and u of a set of diagonal pixels { (x, y, u) | (x, y) ∈ 0,1,2, …,7} Ψ2{ (x, y, f) | (x, y) ∈ wherein the coordinates and f of another set of diagonal pixels equals 0,1,2, …, t }, where t < 7 Ψ3{ (x, y, f) | (x, y) ∈ wherein the coordinates of another set of diagonal pixels and f ═ t +1, t +2, …,7}, where t < 7
Further, each group of standard fixed bit values and each group of standard random bit values are collected to obtain encrypted image blocks, and 100 encrypted image blocks can be obtained after calculation if the 100 original image blocks are split from the group photo picture of the company A high layer and the company B high layer.
And step three, calculating pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a privacy image into the smooth image area to obtain the privacy image area.
In detail, the calculating a pixel difference of diagonal pixels in the encrypted image block, and dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference includes: calculating pixel differences among standard random bit values in the encrypted image block, judging whether the pixel differences are larger than a preset pixel difference threshold, if so, determining the encrypted image block to be a complex image area, and if not, determining the encrypted image block to be a smooth image area.
As described above, the group photo pictures of the company a and the company B are calculated to obtain 100 encrypted image blocks, and the operation of S3 is performed on each encrypted image block to obtain 37 complex image areas and 63 smooth image areas.
Further, the embedding a part of the pixel set of the privacy image into the smooth image area to obtain the privacy image area includes: traversing the standard random bit value in the smooth image area, and replacing the number of one bit of the standard random bit value in the smooth image area by using a part of pixel set of the privacy image until the privacy image area is obtained after replacement.
Preferably, the number of the replaced one bit is generally the bit where the pre-constructed key is filled, and when 63 smooth image regions are obtained as above, 2 standard random bit values are traversed for the first smooth image region, the number of each standard random bit value is 8, wherein the highest 4 bits are obtained by the filling in step two, and therefore one bit is selected from the highest 4 bits to be replaced, for example, the highest bit is selected to be replaced by the pixel value of the core production technology picture.
And step four, compressing the other part of pixel sets of the private image to the complex image area and the private image area according to a preset image compression rule.
In detail, the compressing the another partial set of pixels of the privacy image to the complex image area and the privacy image area includes: extracting all standard random bit value groups of the complex image area and the privacy image area to obtain a standard random bit value group, constructing a binary matrix according to the standard random bit value group, compressing the binary matrix to obtain a fillable bit number, and filling another part of the pixel set of the privacy image into the fillable bit number.
As mentioned in the second step, preferably, the bit values of 0-t bits in the standard random bit values in the 37 complex image regions and the 63 private image regions are extracted, and the bit values of 0-t bits are divided into k groups, where each group is v (1, q)1),v(2,q2),…v(i,qi),…,v(k,qk),qiIndicating the number of bit values included in the ith group.
Further, the binary matrix is:
M=[I,Q]
wherein M is the binary matrix, I is an identity matrix of the binary matrix, and Q is a random binary matrix.
The compression formula for compressing the binary matrix to obtain the fillable bit number is as follows:
Figure BDA0002362064040000141
wherein s is the number of the padded bits.
And step five, receiving a decryption key, and judging whether the decryption key is the original image decryption key.
And step six, if the decryption key is an original image decryption key, decrypting the original image according to the original image decryption key to obtain the original image.
Specifically, if the decryption key is an original image decryption key, the decryption process in the second step is performed in reverse, but since the xor operation is performed on the original image in the second step, and when the private image is embedded, part of the pixel set of the private image is used to replace the number of the partial bits in the original image, when the original image is decrypted, the restored image is an approximate image of the original image.
Preferably, the number of the partial bits in the original image is restored and replaced by an eight-neighborhood pixel average method, that is, eight pixel values adjacent to the replaced pixel are selected from the original image, and the average value of the eight pixel values is taken as the pixel value of the replaced pixel.
And seventhly, if the decryption key is a private image decryption key, decrypting according to the private image decryption key to obtain the private image.
If the decryption key is a private image decryption key, finding a smooth image area according to the pixel difference threshold value in the step three, restoring the replaced pixel value in the smooth image area, and repeating the steps in the same way, restoring according to the bit value compressed in the binary matrix to obtain the pixel value, and further obtaining the private image.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A privacy image encryption method, characterized in that the method comprises:
splitting an original image into a plurality of original image blocks;
encrypting the original image blocks by using a pre-constructed stream password and an XOR encryption operation to obtain a corresponding number of encrypted image blocks;
calculating pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a private image into the smooth image area to obtain the private image area;
and compressing the other part of the pixel set of the private image to the complex image area and the private image area according to a preset image compression rule.
2. The private image encryption method according to claim 1, wherein the encrypting the plurality of original image blocks to obtain a corresponding number of encrypted image blocks using a pre-constructed stream cipher and exclusive-or encryption operation comprises:
converting each pixel value in a group of diagonals of the original image block into an original fixed bit value;
converting each pixel value in the other set of diagonal lines in the original image block into an original random bit value;
and according to a stream cipher mode, carrying out exclusive-or encryption operation on the original fixed bit value and the original random bit value to obtain an encrypted image block.
3. The private image encryption method according to claim 2, wherein the exclusive-or encryption of the original fixed bit value and the original random bit value to obtain an encrypted image block comprises:
according to a permutation and combination principle, respectively carrying out exclusive OR operation on the original fixed bit value and the original random bit value to obtain a standard fixed bit value and a primary random bit value;
calculating a bit difference value of the standard fixed bit value and the primary random bit value;
and according to the bit difference value, filling the primary random bit value with a pre-constructed key to obtain a standard random bit value, and collecting the standard fixed bit value and the standard random bit value to obtain the encrypted image block.
4. The private image encryption method according to claim 3, wherein said calculating a pixel difference of diagonal pixels within the encrypted image block, and dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference comprises:
calculating pixel differences between standard random bit values in the encrypted image block;
judging whether the pixel difference is larger than a preset pixel difference threshold value or not;
if the pixel difference is larger than the pixel difference threshold, the encrypted image block is a complex image area, and if the pixel difference is not larger than the pixel difference threshold, the encrypted image block is a smooth image area.
5. The privacy image encryption method according to any one of claims 3 to 4, wherein the embedding a part of the pixel set of the privacy image into the smooth image area results in a privacy image area, comprising:
traversing standard random bit values in the smooth image area;
and replacing the value of one bit in the standard random bit values in the smooth image area by using a part of pixel set of the privacy image until the privacy image area is obtained after replacement.
6. The privacy image encryption method according to claim 5, wherein the compressing another partial pixel set of the privacy image into the complex image area and the privacy image area according to a preset image compression rule comprises:
extracting all standard random bit values of the complex image area and the privacy image area to obtain a standard random bit value group;
constructing a binary matrix according to the standard random bit value group;
and compressing the binary matrix to obtain a fillable bit number, and filling the other part of the pixel set of the privacy image into the fillable bit number.
7. The privacy image encryption method according to claim 1, further comprising:
receiving a decryption key and judging the category of the decryption key;
if the decryption key is an original image decryption key, decrypting according to the original image decryption key to obtain the original image;
and if the decryption key is a private image decryption key, decrypting according to the private image decryption key to obtain the private image.
8. An apparatus for encrypting a private image, the apparatus comprising:
the original image splitting module is used for splitting an original image into a plurality of original image blocks;
the original image encryption module is used for encrypting the original image blocks to obtain encrypted image blocks with corresponding quantity by using a pre-constructed stream password and XOR encryption operation;
the pixel difference calculation module is used for calculating the pixel difference of diagonal pixels in the encrypted image block, dividing the encrypted image block into a smooth image area and a complex image area according to the pixel difference, and embedding a part of pixel sets of a privacy image into the smooth image area to obtain the privacy image area;
and the private image embedding module is used for compressing the other part of pixel sets of the private image to the complex image area and the private image area according to a preset image compression rule.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the private image encryption method of any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the privacy image encryption method according to any one of claims 1 to 7.
CN202010024795.5A 2020-01-10 2020-01-10 Privacy image encryption method, device, electronic equipment and computer readable storage medium Active CN111260532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010024795.5A CN111260532B (en) 2020-01-10 2020-01-10 Privacy image encryption method, device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010024795.5A CN111260532B (en) 2020-01-10 2020-01-10 Privacy image encryption method, device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111260532A true CN111260532A (en) 2020-06-09
CN111260532B CN111260532B (en) 2023-04-28

Family

ID=70950306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010024795.5A Active CN111260532B (en) 2020-01-10 2020-01-10 Privacy image encryption method, device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111260532B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996745A (en) * 2022-07-29 2022-09-02 湖南工商大学 Public opinion event intelligent search-based media asset management system
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810664A (en) * 2012-11-13 2014-05-21 中兴通讯股份有限公司 Information hiding method and device
CN105160694A (en) * 2015-10-15 2015-12-16 深圳大学 Data hiding method and data hiding system
US20160189325A1 (en) * 2014-12-30 2016-06-30 University Of Macau Method for reversible image data hiding
CN106228501A (en) * 2016-07-13 2016-12-14 西安电子科技大学 A kind of self adaptation reversible digital watermarking process based on integer transform
US20170076416A1 (en) * 2015-09-16 2017-03-16 Institute For Information Industry Method and device for picture-based barcode encoding and decoding
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN109635576A (en) * 2018-11-30 2019-04-16 哈尔滨工业大学(深圳) A kind of hiding data method and system in the picture
CN109981918A (en) * 2019-03-01 2019-07-05 上海电力学院 A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810664A (en) * 2012-11-13 2014-05-21 中兴通讯股份有限公司 Information hiding method and device
US20160189325A1 (en) * 2014-12-30 2016-06-30 University Of Macau Method for reversible image data hiding
US20170076416A1 (en) * 2015-09-16 2017-03-16 Institute For Information Industry Method and device for picture-based barcode encoding and decoding
CN105160694A (en) * 2015-10-15 2015-12-16 深圳大学 Data hiding method and data hiding system
CN106228501A (en) * 2016-07-13 2016-12-14 西安电子科技大学 A kind of self adaptation reversible digital watermarking process based on integer transform
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN109635576A (en) * 2018-11-30 2019-04-16 哈尔滨工业大学(深圳) A kind of hiding data method and system in the picture
CN109981918A (en) * 2019-03-01 2019-07-05 上海电力学院 A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张巧妹;顾军华;侯向丹;: "基于阈值划分的加密域信息隐藏算法" *
阿不都热西提 海米提;郭雷;: "基于彩色图像的分块随机化信息隐藏算法" *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996745A (en) * 2022-07-29 2022-09-02 湖南工商大学 Public opinion event intelligent search-based media asset management system
CN114996745B (en) * 2022-07-29 2022-11-22 湖南工商大学 Public opinion event intelligent search-based media asset management system
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device

Also Published As

Publication number Publication date
CN111260532B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
CN112732297B (en) Method and device for updating federal learning model, electronic equipment and storage medium
CN1184294A (en) System for embedding authentication information into image and image alteration detecting system
CN112949760A (en) Model precision control method and device based on federal learning and storage medium
CN111260532B (en) Privacy image encryption method, device, electronic equipment and computer readable storage medium
CN112217642A (en) Data encryption sharing method and device, electronic equipment and computer storage medium
CN111695097A (en) Login checking method and device and computer readable storage medium
CN115048664A (en) Data security storage method, device, equipment and medium based on solid state disk
CN112508145A (en) Electronic seal generation and verification method and device, electronic equipment and storage medium
CN113420049A (en) Data circulation method and device, electronic equipment and storage medium
CN115374150A (en) Character string data query method and device, electronic equipment and storage medium
Yampolskiy et al. Password protected visual cryptography via cellular automaton rule 30
CN112069479B (en) Face data calling method and device based on block chain
Lin et al. Pixel-based fragile image watermarking based on absolute moment block truncation coding
Lee et al. Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique
CN111211887B (en) Resource encryption method, system, device and computer readable storage medium
CN112217639B (en) Data encryption sharing method and device, electronic equipment and computer storage medium
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN113255456B (en) Inactive living body detection method, inactive living body detection device, electronic equipment and storage medium
CN113918517A (en) Multi-type file centralized management method, device, equipment and storage medium
CN113887408A (en) Method, device and equipment for detecting activated face video and storage medium
CN112329599A (en) Digital signature identification method and device, electronic equipment and storage medium
CN111611601A (en) Multi-data-party user analysis model joint training method and device and storage medium
CN113868690B (en) Trusted deposit certificate based privacy calculation method and system
CN115311061B (en) Electronic transaction management method, device, equipment and storage medium based on digital authentication
CN116340984B (en) User information management method and system based on intelligent community

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant