CN113704701A - Method and system for encrypting and decrypting data - Google Patents
Method and system for encrypting and decrypting data Download PDFInfo
- Publication number
- CN113704701A CN113704701A CN202011096368.4A CN202011096368A CN113704701A CN 113704701 A CN113704701 A CN 113704701A CN 202011096368 A CN202011096368 A CN 202011096368A CN 113704701 A CN113704701 A CN 113704701A
- Authority
- CN
- China
- Prior art keywords
- data
- picture
- video
- characteristic value
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000004044 response Effects 0.000 claims abstract description 17
- 238000000605 extraction Methods 0.000 claims abstract description 9
- 230000003993 interaction Effects 0.000 claims description 5
- 239000013598 vector Substances 0.000 claims description 3
- 238000003491 array Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 2
- 210000000554 iris Anatomy 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention provides a method and a system for encrypting and decrypting data. The system comprises: the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time; the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time; the data encryption module is used for encrypting data by using the characteristic value as a key; a storage module for storing the live-shot picture or video in association with the data; and a data decryption module configured to: in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted; extracting a characteristic value of the picture or the video; and decrypting the data using the characteristic value as a key.
Description
Technical Field
The present invention relates to the field of information security, and more particularly, to methods and systems for encrypting and decrypting data.
Background
At present, there are many protection forms for data security, such as fingerprint identification, iris authentication, face identification, etc., which are all used to verify whether a user is legal or not, whether an operation authority for data exists or not, etc. But the security of the data file in the process of propagation cannot be controlled, because once the password is given to other people, the password can be transmitted to other people indefinitely, and the existence of the password becomes possible or impossible.
In addition, if an independent password is set for massive data files, the requirements of human faces, irises, fingerprints and the like cannot be met, and the safety protection of independent encryption cannot be performed on massive independent files due to the characteristics of safety authentication. Only the password in the character string format needs to be changed continuously to meet the requirement, but the requirement is also very inconvenient, and a user needs to actively store the massive passwords, otherwise, the password cannot be changed only by memory.
Accordingly, in order to greatly increase the security level and achieve encryption of mass data files, it is desirable to provide an improved method and system for encrypting and decrypting data.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The invention provides a method and a system for encrypting and decrypting data by using pictures or videos. The invention uses the picture or video shot in real time as the data encryption form, can encrypt each required data individually, and can remotely control to keep the data file in a controllable state in the process of transmission.
According to an aspect of the present invention, there is provided a method of encrypting data, the method comprising:
taking a picture or video in real time in response to a request to encrypt data;
extracting characteristic values of pictures or videos shot in real time; and
and encrypting the data by using the characteristic value as a key.
According to an embodiment of the present invention, extracting the feature value of the picture or video taken in real time further includes:
converting the picture or video to a color waveform; and
and generating a continuous coordinate point array set on the color waveform as the characteristic value.
According to a further embodiment of the invention, the method further comprises:
storing the live-taken picture or video on a local or remote server in association with the data.
According to another aspect of the present invention, there is provided a method of decrypting data, the method comprising:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
According to one embodiment of the invention, the obtaining step and the extracting step are performed by a remote server, and the method further comprises:
and the server sends the extracted characteristic value to the terminal requesting to decrypt the data.
According to still another aspect of the present invention, there is provided a system for encrypting and decrypting data, the system including:
the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time;
the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time;
the data encryption module is used for encrypting data by using the characteristic value as a key;
a storage module for storing the live-shot picture or video in association with the data; and
a data decryption module configured to:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
According to one embodiment of the invention, the storage module is located locally or on a remote server.
According to a further embodiment of the invention, the characteristic values comprise at least one of: an array of sets of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vectors, hash values, MD5, or combinations thereof.
According to a further embodiment of the invention, the system further comprises:
an interaction control module configured to:
responding to clicking or long data to be encrypted as required, popping up a picture or video encryption option; and
and opening the picture video acquisition module in response to clicking the picture or video encryption using option.
According to a further embodiment of the invention, the interaction control module is further configured to:
responding to clicking or long data to be decrypted as required, popping up a picture or video decryption option; and
and operating the data decryption module in response to clicking the use picture or video decryption option.
Compared with the scheme in the prior art, the method and the system for encrypting and decrypting data provided by the invention have the advantages that:
(1) the method makes a breakthrough in the form of data encryption, has extremely strong theft prevention, theoretically, each shot picture or shot video file has uniqueness, and because the current environment, the picture or video formed by the imaging of an object in a lens, the shake of a hand during shooting, light rays and the like are unique in the expression form of a color waveform, an array set formed by each coordinate point forming the ripple is unique. When data is encrypted by these massive two-dimensional arrays, the probability of being cracked is extremely small.
(2) The remote protection of data, the existing data protection form is a given password, and the user can not control the password to unlock the data.
(3) The password generation mode is simple and can not be repeated, and a specific password can be generated for a single data file.
These and other features and advantages will become apparent upon reading the following detailed description and upon reference to the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Drawings
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only some typical aspects of this invention and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
Fig. 1 is an exemplary architecture diagram of a system for encrypting and decrypting data using pictures and video according to one embodiment of the present invention.
Fig. 2 is a flowchart of a method for encrypting data using pictures and video according to one embodiment of the present invention.
Fig. 3 is a flowchart of a method for decrypting data using pictures and video according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the attached drawings, and the features of the present invention will be further apparent from the following detailed description.
Fig. 1 is an exemplary architecture diagram of a system 100 for encrypting and decrypting data using pictures and video, according to one embodiment of the invention. As shown in fig. 1, the system 100 of the present invention comprises: the system comprises an interaction control module 101, a picture video acquisition module 102, a picture video characteristic value extraction module 103, a data encryption module 104, a storage module 105 and a data decryption module 106.
In the encryption process, the interactive control module 101 pops up a picture taking or video recording button according to the relevant interactive operation. As an example, the picture video control module 101 may use a picture or video encryption option by clicking or long-pressing a data file pop-up, and run the picture video capture module 102 by clicking on the option. The picture video acquisition module 102 then records live videos or takes live pictures in response to a data encryption request, ensuring the uniqueness thereof, and these pictures or videos are stored in the storage module 105 as keys for data in association with the data. For example, if local decryption is required, the storage module 105 may be located locally, i.e., saving the picture or video locally. If remote decryption is required, the storage module 105 may be located at a remote server, i.e. uploading pictures or video to the server. The picture video feature value extraction module 103 extracts feature values in a shot picture or a recorded video. The feature value may be, for example, an array set of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vector, a hash value, MD5, or a combination thereof. As another example, the feature value may also be an array set of consecutive coordinate points of a voiceprint waveform of the recorded video. As another example, the feature value may also be a combination of a set of arrays of consecutive coordinate points of a voiceprint waveform of the video and a set of arrays of consecutive coordinate points of a color waveform of each frame of a picture in the video. The data encryption module 104 then encrypts the data using the extracted feature value as a key.
In the decryption process, the data decryption module 106, in response to a request to decrypt data, retrieves from the storage module 105 (located at a local or remote server) respective pictures or video files stored in association with the data, wherein the pictures or videos were taken in real-time at the time of the request to encrypt the data. The data decryption module 106 then extracts feature values (e.g., a set of arrays of consecutive coordinate points of a color waveform) of these pictures or videos by the picture video feature value extraction module 103, and decrypts the data using these feature values as a key. If the storage module 105 is located at a remote server, the above operations of acquiring a picture or video and extracting feature values are performed by the remote server, and these extracted feature values are transmitted to a terminal requesting decryption of data for decryption.
Those skilled in the art will appreciate that the system of the present invention and its various modules may be implemented in either hardware or software, and that the modules may be combined or combined in any suitable manner.
Fig. 2 is a flow diagram of a method 200 for encrypting data using pictures and video according to one embodiment of the invention. The method begins at step 201 with a request to encrypt data. For example, the user may click on data encrypted or as long as desired by the interactive control module 101, pop up a use picture or video encryption option in response to the operation, click on this option, and open the picture video capture module 102.
At step 202, a picture or video is taken in real-time in response to a request to encrypt data. For example, a picture or video may be taken in real-time by operating the picture video acquisition module 102. Alternatively, the captured picture or video may be stored in the storage module 105 (e.g., a local or remote server) in association with the data.
In step 203, the picture video feature value extraction module 103 is operated to extract feature values included in the shot picture or video. For example, a picture or a video may be converted into a color waveform by the picture video feature value extraction module 103 and coordinates of all points of the waveform are recorded as feature values in a set form.
The data encryption module 104 then encrypts the data using the extracted feature value as a key at step 204.
Fig. 3 is a flow diagram of a method 300 for decrypting data using pictures and video according to one embodiment of the invention. The method begins at step 301 with requesting decryption of data. For example, the user clicks or has a data file decrypted as needed through the interactive control module 101, pops up a usage picture or video decryption option in response to the operation, clicks this option, and runs the data decryption module 106.
In step 302, in response to a request to decrypt data, a picture or video stored in association with the data is obtained, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted. For example, if it is remote decryption, the data decryption module 106 obtains a corresponding picture or video from a remote server. If the decryption is local, the data decryption module 106 obtains the corresponding picture or video locally.
In step 303, feature values are extracted from the acquired picture or video by the picture video feature value extraction module 103. For example, a feature value may be extracted from the acquired picture or video in correspondence with an extracted feature value in the encryption method.
At step 304, the data is decrypted using the extracted feature value as a key.
What has been described above includes examples of aspects of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.
Claims (10)
1. A method of encrypting data, the method comprising:
taking a picture or video in real time in response to a request to encrypt data;
extracting characteristic values of pictures or videos shot in real time; and
and encrypting the data by using the characteristic value as a key.
2. The method of claim 1, wherein extracting feature values of a picture or video taken in real-time further comprises:
converting the picture or video to a color waveform; and
and generating a continuous coordinate point array set on the color waveform as the characteristic value.
3. The method of claim 1, wherein the method further comprises:
storing the live-taken picture or video on a local or remote server in association with the data.
4. A method of decrypting data, the method comprising:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
5. The method of decrypting data according to claim 4, wherein the obtaining step and the extracting step are performed by a remote server, and the method further comprises:
and the server sends the extracted characteristic value to the terminal requesting to decrypt the data.
6. A system for encrypting and decrypting data, the system comprising:
the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time;
the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time;
the data encryption module is used for encrypting data by using the characteristic value as a key;
a storage module for storing the live-shot picture or video in association with the data; and
a data decryption module configured to:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
7. The system of claim 6, wherein the storage module is located locally or on a remote server.
8. The system of claim 6, wherein the characteristic values comprise at least one of: an array of sets of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vectors, hash values, MD5, or combinations thereof.
9. The system of claim 6, further comprising:
an interaction control module configured to:
responding to clicking or long data to be encrypted as required, popping up a picture or video encryption option; and
and opening the picture video acquisition module in response to clicking the picture or video encryption using option.
10. The system of claim 9, wherein the interaction control module is further configured to:
responding to clicking or long data to be decrypted as required, popping up a picture or video decryption option; and
and operating the data decryption module in response to clicking the use picture or video decryption option.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011096368.4A CN113704701A (en) | 2020-10-14 | 2020-10-14 | Method and system for encrypting and decrypting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011096368.4A CN113704701A (en) | 2020-10-14 | 2020-10-14 | Method and system for encrypting and decrypting data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113704701A true CN113704701A (en) | 2021-11-26 |
Family
ID=78646717
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011096368.4A Pending CN113704701A (en) | 2020-10-14 | 2020-10-14 | Method and system for encrypting and decrypting data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113704701A (en) |
-
2020
- 2020-10-14 CN CN202011096368.4A patent/CN113704701A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102015215120B4 (en) | METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE | |
US10181952B2 (en) | Encryption using biometric image-based key | |
US10284885B1 (en) | Method and apparatus for redacting video for compression and identification of releasing party | |
EP2813961B1 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
US20080285751A1 (en) | Deterring Theft of Media Recording Devices by Encrypting Recorded Media Files | |
US20020056043A1 (en) | Method and apparatus for securely transmitting and authenticating biometric data over a network | |
JP7024788B2 (en) | Devices and methods for authenticating user equipment | |
KR20020021080A (en) | Method and apparatus for securely transmitting and authenticating biometric data over a network | |
US20200382308A1 (en) | User Apparatus and Method for the Protection of Confidential Data | |
Moon et al. | An efficient selective encryption of fingerprint images for embedded processors | |
KR101847618B1 (en) | Method for privacy object masking and key management for user authentication in video surveillance system and video surveillance system using the same | |
KR20210084806A (en) | Method for Restoring Distortion Video Based on Iris Recognition | |
CN113704701A (en) | Method and system for encrypting and decrypting data | |
Suruthikeerthana et al. | An Extended Visual Cryptography With Dynamically Authenticated Error Avoidance Scheme For Bank Applications | |
KR102258957B1 (en) | Door control apparatus for controlling the lock and unlock the door based on facial recognition and the operating method thereof | |
KR102236897B1 (en) | Video data protection system and method | |
CN116158072A (en) | Image processing circuit and image processing method | |
KR20210084805A (en) | Method for Restoring Distortion Video Based on Finger Print Recognition | |
CN111353168A (en) | Multimedia file management method, device, equipment and storage medium | |
KR20210084804A (en) | Method for Restoring Distortion Video Based on Identification Card Recognition | |
Maček et al. | Secure modular authentication systems based on conventional XOR biometrics | |
Muhammed | A secured approach to visual cryptographic biometric template | |
KR102469380B1 (en) | Method and system for de-identifying and restoring personal information of image data | |
KR102530463B1 (en) | Image security device and method using pedestrian face detection information | |
Alshaikhli et al. | Security threats of finger print biometric in network system environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220210 Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200072 Applicant after: Tianyi Digital Life Technology Co.,Ltd. Address before: 201702 3rd floor, 158 Shuanglian Road, Qingpu District, Shanghai Applicant before: Tianyi Smart Family Technology Co.,Ltd. |