CN100461211C - Encryption method for army fighting - Google Patents

Encryption method for army fighting Download PDF

Info

Publication number
CN100461211C
CN100461211C CNB2005100361227A CN200510036122A CN100461211C CN 100461211 C CN100461211 C CN 100461211C CN B2005100361227 A CNB2005100361227 A CN B2005100361227A CN 200510036122 A CN200510036122 A CN 200510036122A CN 100461211 C CN100461211 C CN 100461211C
Authority
CN
China
Prior art keywords
image
encryption
encrypted
template
painted areas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100361227A
Other languages
Chinese (zh)
Other versions
CN1904938A (en
Inventor
刘畅
董德周
刘江海
胡一
Original Assignee
Liu Chang International Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu Chang International Co Ltd filed Critical Liu Chang International Co Ltd
Priority to CNB2005100361227A priority Critical patent/CN100461211C/en
Publication of CN1904938A publication Critical patent/CN1904938A/en
Application granted granted Critical
Publication of CN100461211C publication Critical patent/CN100461211C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relate to a encrypt method for arm battling image. It includes the following steps: creating image encrypt template that has the different coloring area, dividing the image and rearranging to form interspace encrypt image, diving the interspace encrypt image in coloring area on image encrypt template. The invention could create one or plural image encrypt image template and dividing and rearranging the images to generate one or plural image encrypt area, and finally form a encrypt image. One or plural encrypt image would be processed priority or synchronously to accelerate decrypt process.

Description

The encryption method of army fighting
[technical field]
The present invention relates to a kind of encryption method of army fighting, relate in particular to a kind of army fighting encryption method based on four-color conjecture.
[background technology]
Painted is one of foremost field in the figure opinion.Four-color conjecture refers to the problem that requires proof such, promptly at the most with 4 kinds of colors to the map overlay on plane or the sphere, neighboring countries or regional formed zone are shown with different colours.There is more than 150 year in four-colour problem as a famous in the world mathematics difficult problem, and long-term nothing is separated.On June 13rd, 1878, the mathematics that four-color conjecture is held in London by famous mathematician Kai Lai (Cayley) at that time can be gone up formally and propose, and agree the paper that general (A.b.Kempe) deliver at U.S.'s mathematics magazine in 1879 and does not solve four-colour problem.1890 the famous mathematician Xi Wude of Britain (Heawood) provided the conclusion of a mistake.The document " graph theory " of publishing house of Beijing Institute of Technology publication in 1997 is pointed out: " four-color conjecture is a famous mathematics difficult problem that does not still obtain theoretical proof so far." document " set theory and graph theory " published of 1998 years BJ University Presses points out: " up to the present, four-color conjecture is not solved completely.”
The paper of one piece " about discussion of maximum planes graph coloring " being submitted to by Dong Dezhou that the 18th the 4th phase of volume of " science and technology circular " July in 2002 delivers has disclosed the part Study achievement about four-color conjecture.To this, the algebraic process man of department of mathematics of Changsa Univ. points out old 10 days Mays in 2004 of advancing: " this paper is a breakthrough of maximum planes map colouring problem ".
Fig. 1 is the synoptic diagram of a famous counter-example of four-color conjecture.In the counter-example of Fig. 1, there is a y-g path that connects yellow dots will (y) and green point (g), constitutes a closed-loop path C 1(the empty thick line among Fig. 1), because its existence resembles a blockade line r-b chain is separated into two parts, a part is enclosed in C 1In, another part is by every at C 1Outward.These two parts are kept apart by y-g chain, constitute relatively independent zone.At C 1Outward r, b dichromatism are exchanged (expression in the drawings is a standardized horizontal stroke below r, b, as r, b), the point that soon was coated with the r look originally all changes and is coated with the b look, and the point that is coated with the b look all changes and is coated with the r look.Because C 1In and C 1Outer all is relatively independent zone, so exchange the back like this to C 1In can not exert an influence.Result after exchanging as shown in Figure 2.Fig. 2 is the synoptic diagram of Dong De look Thursday guess theorem to the intermediate proof process of counter-example.In the adjacent vertex of Fig. 2 vertex v to be colored, there is a path that all belongs to r-y chain between the 3rd r and the 5th the y, this path adds v, just constitutes a closed-loop path C 2(the empty thick line among Fig. 2).In like manner, at C 2In b, g dichromatism are exchanged, after exchanging, 5 summits around the v are followed successively by r, b, r, b, three kinds of colors of y, at last V are coated g.So just make whole summits all coat color, and make adjacent vertex different colours, four kinds of colors altogether, as shown in Figure 3.Fig. 3 is a key to exercises synoptic diagram of Dong De look Thursday guess certification theory.Fig. 4 is an effect synoptic diagram of Dong De look Thursday guess certification theory.Can see by this figure, by the regional random alignment that 23 arbitrary shapes of black, dark-grey, light gray, Bai Si kind color showing constitute, the color difference of adjacent area, zone institute color be 4 kinds.
[summary of the invention]
The present invention encrypts the part Study application of result of four-color conjecture and deciphering in army fighting.
The invention provides a kind of army fighting encryption method.This encryption method comprises: create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of each image encryption template; Treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image; Middle encrypted image is cut apart and is aligned in the painted areas of a certain color on the image encryption template.
According to a method for optimizing of the present invention, image encryption template of the present invention can be one or more.
According to a method for optimizing of the present invention, painted areas of the present invention be shaped as polygon, circle or oval.
According to a method for optimizing of the present invention, the painted color of painted areas of the present invention is at least two kinds.
According to a method for optimizing of the present invention, the painted color of painted areas of the present invention is four kinds.
According to a method for optimizing of the present invention, image to be encrypted of the present invention can be several, wherein, after each image to be encrypted cut apart and rearrange, respectively each intermediate cryptographic image is aligned to the painted areas of the different colours of image encryption template.
According to a method for optimizing of the present invention, image to be encrypted of the present invention can be several, respectively each image to be encrypted is cut apart and rearranged and each intermediate cryptographic image is aligned to the painted areas of the different colours of image encryption template.
According to a method for optimizing of the present invention, encryption method of the present invention is different with the position of this cut zone in the intermediate cryptographic image that forms after rearranging with the position that rearranges at least one cut zone that makes image to be encrypted by cutting apart.
According to a method for optimizing of the present invention, encryption method of the present invention is treated encrypted image and is carried out repeated segmentation and rearrange formation intermediate cryptographic image.
The present invention also provides a kind of fight of army encrypted image, and this encrypted image is formed by following steps: create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of each image encryption template; Treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image; Middle encrypted image is cut apart and is aligned in the painted areas of a certain color on the image encryption template.
The invention has the beneficial effects as follows: by the method for a kind of army fighting encryption of the present invention and deciphering, create a width of cloth and/or multiple image encrypted template, a width of cloth to be encrypted and/or multiple image are cut apart, upset, generate the upset image encryption zone of a width of cloth and/or multiple image encrypted template, at last that it is synthetic to produce encrypted image; In deciphering, can preferentially and/or simultaneously handle a width of cloth and/or several encrypted images respectively according to actual needs, accelerate decrypting process.
[description of drawings]
Fig. 1 is the synoptic diagram that the counter-example of general theory is agree in uncommon Wood denunciation in 1890.
Fig. 2 is the synoptic diagram of Dong De look Thursday guess proof to the intermediate proof process of counter-example.
Fig. 3 is a key to exercises synoptic diagram of Dong De look Thursday guess proof.
Fig. 4 is an effect synoptic diagram of Dong De look Thursday guess proof.
Fig. 5-Fig. 9 is the synoptic diagram of the employed image encryption template of encryption method of the present invention.
Figure 10 is the schematic flow sheet of encryption method one embodiment of the present invention;
Figure 11 is the schematic flow sheet of another embodiment image of encryption method of the present invention.
[embodiment]
The present invention is further described below in conjunction with drawings and Examples.
With reference to Fig. 5-Fig. 9, Fig. 5-Fig. 9 is the synoptic diagram of the employed image encryption template of encryption method of the present invention.In the present invention, image encryption template 5,6,7,8 and 9 is divided into some variform painted areas, and the shape of painted areas can be arbitrarily, and size can be identical or different.The position of painted areas can be designed arbitrary position on the image encryption template at random, but the painted color difference of adjacent area.As shown in the figure, image encryption template 7 among Fig. 7 is made up of painted areas black, white two kinds of colors, image encryption template 9 among Fig. 9 comprises the painted areas of three kinds of different colours, the image encryption template 6 of Fig. 6 is made up of the painted areas of five kinds of colors, and the image encryption template 5,8 among Fig. 5 and Fig. 8 comprises the painted areas of four kinds of different colours.According to the four-color conjecture theory in the background technology, use two or can't carry out during three kind of color paintedly to the painted areas of combination in any, thereby preferably adopt four kinds of colors to carry out painted to the image encryption template.
With reference to Figure 10, Figure 10 is the schematic flow sheet of encryption method one embodiment of the present invention.In Figure 10, image 101 to be encrypted is through over-segmentation and rearrange formation intermediate cryptographic image 103, wherein, treat that encrypted image 101 is cut apart and the method that rearranges to form intermediate cryptographic image 103 is described in detail in the patented claim of " image picture encipher and decryption method " at the title that the applicant submitted on May 27th, 2005, will repeat no more in this application.Variation has taken place at least one cut zone in the image 101 to be encrypted in the intermediate cryptographic image 103 that rearranges back formation, subsequently according to the position at the specific painted areas place on the image encryption template 5 that is pre-created, middle encrypted image 103 is cut apart and arranged according to painted areas specific on the image encryption template 5, form image encryption zone 105, encrypt separately if treat encrypted image 101, image encryption zone 105 is exactly final required encrypted image.
Referring to Figure 11, Figure 11 is the synoptic diagram to another embodiment of encryption method of the present invention.In the present embodiment, image 111 to be encrypted, 131,151 and 171 form intermediate cryptographic image 113 through over-segmentation and after rearranging, 133,153 and 173, again according to the position at the painted areas place of four kinds of particular colors on the image encryption template 8 that is pre-created, respectively with intermediate cryptographic image 113,133,153 and 173 cut apart and place according to painted areas specific on the image encryption template 5 is corresponding one by one, form image encryption zone 115,135,155 and 175, formed image encryption zone 115,135,155 and 175 can be directly as last required encrypted image, perhaps with image encryption district 115,135,155 and 175 are merged together, thereby finish the encryption of all images, produce final desired encrypted image 119.In addition, also intermediate cryptographic image 113,133,153 that can respectively image 111,131,151 to be encrypted and 171 be formed after cutting apart and rearranging and 173 positions according to the painted areas place of four kinds of particular colors on the image encryption template 5 that is pre-created directly are aligned in the same image, can omit follow-up merging process like this.
In addition, encryption method of the present invention can be simultaneously with being aligned in the final encrypted image, so that improve cipher round results with the painted areas of irrelevant other image of encrypted image according to encrypted template.Also can treat encrypted image and carry out repeated segmentation and rearrange, so that improve the cipher round results of intermediate cryptographic image.
When needs are decrypted, can preferentially decipher wherein any width of cloth original image as required, at first from encrypted image, preferentially select a certain specific image and encrypt zone (the image encryption zone of a certain particular color), to cut apart and rearrange according to forming this image encryption zone inverse process again, restore original image.Adopt this method, can accelerate the decrypting process of computing machine.Can certainly decompose four width of cloth images simultaneously, promptly according to the method for zone deciphering, restore original image simultaneously, adopt this method, internal memory that can the reasonable distribution computing machine reaches the purpose of accelerating decrypting process equally.
Above-mentioned detailed description only is exemplary description, and those skilled in the art can design various embodiments according to different actual needs under the situation of the scope and spirit that do not break away from the present invention and protected

Claims (9)

1. the encryption method of an army fighting, it is characterized in that: described encryption method comprises:
A. create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of described each image encryption template;
B. treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image;
C. described intermediate cryptographic image is cut apart and be aligned in the painted areas of a certain color on the described image encryption template.
2. encryption method according to claim 1 is characterized in that: described image encryption template is one or more.
3. encryption method according to claim 1 is characterized in that: described painted areas be shaped as polygon, circle or oval.
4. encryption method according to claim 1 is characterized in that: the painted color of described painted areas is at least two kinds.
5. encryption method according to claim 4 is characterized in that: the painted color of described painted areas is four kinds.
6. encryption method according to claim 1, it is characterized in that: described image to be encrypted is several, respectively each described image to be encrypted is cut apart and rearranged and each intermediate cryptographic image is aligned to the painted areas of the different colours of described image encryption template.
7. encryption method according to claim 1 is characterized in that: step b makes the position of at least one cut zone of described image to be encrypted different with the position of cut zone described in the intermediate cryptographic image that forms after rearranging.
8. encryption method according to claim 1 is characterized in that: in step b, described image to be encrypted is carried out repeated segmentation and rearranges formation intermediate cryptographic image.
9. fight of army encrypted image, it is characterized in that: described encrypted image is formed by following steps:
A. create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of described each image encryption template;
B. treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image;
C. described intermediate cryptographic image is cut apart and be aligned in the painted areas of a certain color on the described image encryption template.
CNB2005100361227A 2005-07-28 2005-07-28 Encryption method for army fighting Expired - Fee Related CN100461211C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100361227A CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100361227A CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Publications (2)

Publication Number Publication Date
CN1904938A CN1904938A (en) 2007-01-31
CN100461211C true CN100461211C (en) 2009-02-11

Family

ID=37674196

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100361227A Expired - Fee Related CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Country Status (1)

Country Link
CN (1) CN100461211C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4952627B2 (en) * 2008-03-21 2012-06-13 富士通株式会社 Image processing apparatus, image processing method, and image processing program

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997012459A1 (en) * 1995-09-26 1997-04-03 Xian Kan Lin A method for encryption of file
CN1471019A (en) * 2003-06-26 2004-01-28 上海交通大学 Digital waterprint imbedding and extracting method based on remainder image

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997012459A1 (en) * 1995-09-26 1997-04-03 Xian Kan Lin A method for encryption of file
CN1471019A (en) * 2003-06-26 2004-01-28 上海交通大学 Digital waterprint imbedding and extracting method based on remainder image

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
关于最大平面图着色的探讨. 董德周.科技通报,第18卷第4期. 2002
关于最大平面图着色的探讨. 董德周.科技通报,第18卷第4期. 2002 *
用混沌序列对数字图像进行魔方加密. 叶永伟,杨庆华,王颖玉.浙江工业大学学报,第31卷第2期. 2003
用混沌序列对数字图像进行魔方加密. 叶永伟,杨庆华,王颖玉.浙江工业大学学报,第31卷第2期. 2003 *

Also Published As

Publication number Publication date
CN1904938A (en) 2007-01-31

Similar Documents

Publication Publication Date Title
US8175265B2 (en) Systems and methods for implementing block cipher algorithms on attacker-controlled systems
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN105913368B (en) More image encryptions and authentication method and system based on sparse constraint
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
CN107086913A (en) A kind of color 2 D code encipher-decipher method under high-dimension chaotic system
CN108322622A (en) A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN110417539A (en) A kind of color image encrypting method of dynamic chaos and matrix convolution operation
CN103679625A (en) Single-channel color image encryption method based on chaos and phase retrieval process
CN106301760A (en) A kind of 3D point cloud model encryption method based on chaotic maps
US20150324302A1 (en) White box encryption system and method
CN106558015A (en) A kind of new intersection composite chaotic multicolor image encryption algorithm
CN102546157A (en) Random mixed encryption system for resisting energy analysis and implementation method thereof
CN103440613A (en) Color-image encryption method for hyperchaotic Rossler system
CN102795008A (en) Dynamic Mohr encryption method of anti-counterfeiting image
CN103077211A (en) Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data
CN106598882A (en) Secure memory data protection method and device
CN106059752A (en) White-box cryptography encryption-decryption method based on expansion ciphertext
Wu et al. Color visual cryptography scheme using meaningful shares
CN100461211C (en) Encryption method for army fighting
Singh et al. Image encryption scheme based on Knight's tour problem
CN102946315B (en) A kind of method and system adopting packet mode to construct MAC code
CN104158796A (en) Method for evaluating block cipher linear attack resistant safety
CN104240177B (en) A kind of color image encrypting method based on chaos system and fraction Fourier conversion
CN104202147B (en) A kind of encryption method based on geo-information product feature
CN107169911A (en) A kind of image encryption method converted based on Arnold transformation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211