CN101459807A - Image ciphering/deciphering system and method - Google Patents
Image ciphering/deciphering system and method Download PDFInfo
- Publication number
- CN101459807A CN101459807A CNA2007102030177A CN200710203017A CN101459807A CN 101459807 A CN101459807 A CN 101459807A CN A2007102030177 A CNA2007102030177 A CN A2007102030177A CN 200710203017 A CN200710203017 A CN 200710203017A CN 101459807 A CN101459807 A CN 101459807A
- Authority
- CN
- China
- Prior art keywords
- picture file
- password
- picture
- file
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Facsimile Transmission Control (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an image encrypting and decrypting system used for encrypting and decrypting image files, wherein a state flag bit is arranged on the file head position of an image file. The image encrypting and decrypting system comprises an encrypting module and a decrypting module, wherein the encrypting module selects the image file, enquires whether the selected image file need to be encrypted, if the file needs encrypting, encrypting codes are set, the state sign bit is changed into the encrypting codes to execute image coding secrecy according to the image format criterion, and then the image file after the secrecy is stored. The decrypting module selects the stored image file after the secrecy, enquires whether the selected image file needs decrypting, if the file needs decrypting, the input codes are obtained, and judges whether the input codes and the encrypting codes are the same, if the codes are not same, the input codes are newly obtained, and the image file is hidden, if the codes are the same, the encrypting codes are modified into the sign bit to execute the image encoding decrypting according to the image format criterion, and the image file is displayed. The invention further relates to method for encrypting/decrypting images.
Description
Technical field
The present invention relates to data processing technique, relate in particular to image ciphering/deciphering system and method in a kind of electronic installation.
Background technology
Usually, the digital camera user often is temporary in the image picture of taking in the built-in storage or external memorizer of digital camera, and when needing by the time or memory when being filled with, just the image picture can be transferred to electronic equipment, in computer.Yet, since traditional digital camera to the image picture without any secrecy provision, anyone can watch storage image picture wherein by function of browse, in case digital camera is not lost when also the image picture being transferred to electronic equipment, user's image picture just may outflow.In addition, the mobile phone scope of application that has camera function at present is more and more wider, and some higher confidentiality minutes picture or private important picture of meeting storage in the mobile phone, steal picture file if mobile phone is lost or had the inclination the transmission means of personage with bluetooth, because traditional mobile phone is not taked encryption function to picture, picture file equally also can outflow and be in unsafe condition, in case utilized and will bring great puzzlement to the user by immoral person.
Therefore, electronic installations such as digital camera or mobile phone can't guarantee that on reality is used the picture file of high secret or privacy is viewed or be stolen that this point need be improved.
Summary of the invention
In view of this, be necessary to provide a kind of image ciphering/deciphering system and method that can effectively guarantee picture file crypticity in the electronic installation.
A kind of image ciphering/deciphering system, it is used for picture file is carried out encrypt/decrypt, and described picture file is provided with state flag bit in a shelves position.Described image ciphering/deciphering system comprises an encrypting module and a deciphering module.Described encrypting module is in order to choose described picture file, inquire whether the described picture file of choosing needs to encrypt, if need encrypt, then create Crypted password, according to the picture format standard described state flag bit is revised as Crypted password and maintains secrecy with the execution graph slice encode, and the picture file behind the storage security.Described deciphering module is in order to the picture file after the maintaining secrecy of selected described storage, inquire whether described selected picture file needs to be decrypted, if need be decrypted, then obtain the password of input, judge whether described input password is identical with described Crypted password, if described input password and described Crypted password are inequality, then obtain the input password again, and hiding picture file, if described input password is identical with described Crypted password, then described Crypted password is revised as described state flag bit with the deciphering of execution graph slice encode according to the picture format standard, and the file that Shows Picture.
A kind of image ciphering method, it may further comprise the steps: choose the picture file that a shelves position is provided with state flag bit; Inquire whether the described picture file of choosing needs to encrypt, if do not need to encrypt, then store the picture file of not encrypted, if need encrypt, then create Crypted password, according to the picture format standard described state flag bit is revised as Crypted password and maintains secrecy with the picture file execution graph slice encode that needs are encrypted; Picture file behind the storage security.
A kind of picture decryption method, it may further comprise the steps: the shelves position behind the selected storage security is provided with the picture file of state flag bit; Inquire whether described selected picture file needs to be decrypted, if need be decrypted, then obtain the password of input, judge whether described input password is identical with described Crypted password,, then obtain the input password again if described input password and described Crypted password are inequality, and hiding picture file, if described input password is identical with described Crypted password, then described Crypted password is revised as described state flag bit with the deciphering of execution graph slice encode according to the picture format standard, and the file that Shows Picture.
Compared with prior art, the picture that described image ciphering/deciphering system and method utilize encrypting module and deciphering module that needs are encrypted is encrypted, and the picture after encrypting is decrypted, and can effectively guarantee the crypticity of picture file.
Description of drawings
Fig. 1 is the functional block diagram of the image ciphering/deciphering system of embodiment of the present invention;
Fig. 2 is the image ciphering flow chart of steps of embodiment of the present invention;
Fig. 3 is the picture decryption step flow chart of embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
See also Fig. 1, the image ciphering/deciphering system 100 that is used for picture file is carried out encrypt/decrypt that provides for embodiment of the present invention.Described image ciphering/deciphering system 100 comprises an encrypting module 10 and a deciphering module 20.
Described encrypting module 10 comprises that a picture file chooses 14, one passwords of 12, one encrypted challenge submodules of submodule and create 16, one encryption submodules 18 of submodule and a sub module stored 19.Described picture file is chosen submodule 12 in order to choose picture file, and the picture file form is that (its shelves position is provided with state flag bit to JPEG (joint photographic experts group) for Joint PhotographicExpert Group, JPEG) form in the present embodiment.Described encrypted challenge submodule 14 is in order to inquire whether the described picture file of choosing needs to encrypt.Described password is created submodule 16 in order to create Crypted password.Described encryption submodule 18 is revised as Crypted password according to the JPEG standard with described state flag bit maintains secrecy with the execution graph slice encode.Described sub module stored 19 is in order to the picture file of storing described not encrypted and the picture file after the described encryption.Whether the described picture file of choosing of described encrypted challenge submodule 14 inquiries needs to encrypt, do not encrypt if do not need, the picture file of 19 storages of described sub module stored not encrypted, if need to encrypt, 19 encrypted picture files of storage of described sub module stored.
Described deciphering module 20 comprises that a picture file chooses 24, one passwords of 22, one of submodules deciphering inquiry submodule and obtain 26, one passwords of submodule and judge 27, one decryption processing submodules 28 of submodule and a picture file display sub-module 29.Described picture file is chosen the picture file of submodule 22 after in order to the encryption of selected described storage.Described deciphering inquiry submodule 24 is in order to inquire whether described picture selected file needs to be decrypted.Described password obtains submodule 26 in order to obtain the password of input.Described password judges that submodule 27 is in order to judge by a minute position comparison mode whether the password of described input is identical with described Crypted password.Described decryption processing submodule 28 is revised as described state flag bit with described Crypted password and deciphers with the execution graph slice encode when described input password is identical with described Crypted password.Whether the described picture selected file of described deciphering inquiry submodule 24 inquiries needs to be decrypted, if do not need to be decrypted, then returns picture file and chooses submodule 22 selected other picture files.Described password judges that password that submodule 27 modes judge described input by minute position comparison when inequality, then obtains password and hiding picture file with described Crypted password again.
See also Fig. 2, be the image ciphering flow chart of steps of invention execution mode, described image ciphering may further comprise the steps:
Step S100: choose the jpeg format picture file;
Step S102: inquire whether the described picture file of choosing needs to encrypt;
Step S104:, then store the picture file of not encrypted if do not need to encrypt;
Step S106: if need encrypt, then create Crypted password, and execution in step S108 and step S109;
Step S108: the execution graph slice encode is maintained secrecy.According to the JPEG standard state flag bit of a jpeg format picture file shelves position is revised as Crypted password, thereby the picture file execution graph slice encode that needs are encrypted is maintained secrecy;
Step S109: the picture file behind the storage security.
See also Fig. 3, be the picture decryption step flow chart of invention execution mode, described picture deciphering may further comprise the steps:
Step S200: the picture file after selected the maintaining secrecy of storing;
Step S202: inquire whether described selected picture file needs to be decrypted;
Step S204: if do not need to be decrypted, then return the picture file after the maintaining secrecy of selected other storages;
Step S205:, then obtain the password of input, and execution in step S206 is to step S208 if need be decrypted;
Step S206: divide the position comparison to judge whether described input password is identical with described Crypted password;
Step S207: if described input password and described Crypted password are inequality, then obtain the input password again, and hiding picture file;
Step S208: if described input password is identical with described Crypted password, then execution graph slice encode deciphering, and the file that Shows Picture.
The picture that image ciphering/deciphering system of the present invention and method utilize encrypting module and deciphering module that needs are encrypted is encrypted, and the picture after encrypting is decrypted, and can effectively guarantee the crypticity of picture file.
Be understandable that, for the person of ordinary skill of the art, can make other various corresponding changes and distortion by technical conceive according to the present invention, and all these change the protection range that all should belong to claim of the present invention with distortion.
Claims (11)
- [claim 1] a kind of image ciphering/deciphering system, it is used for picture file is carried out encrypt/decrypt, and described picture file is provided with state flag bit in a shelves position, it is characterized in that, and described image ciphering/deciphering system comprises:An encrypting module, it is in order to choose described picture file, inquire whether the described picture file of choosing needs to encrypt, if need encrypt, then create Crypted password, according to the picture format standard described state flag bit is revised as Crypted password and maintains secrecy with the execution graph slice encode, and the picture file behind the storage security; AndA deciphering module, it is in order to the picture file after the maintaining secrecy of selected described storage, inquire whether described selected picture file needs to be decrypted, if need be decrypted, then obtain the password of input, judge whether described input password is identical with described Crypted password, if described input password and described Crypted password are inequality, then obtain the input password again, and hiding picture file, if described input password is identical with described Crypted password, then described Crypted password is revised as described state flag bit with the deciphering of execution graph slice encode according to the picture format standard, and the file that Shows Picture.
- [claim 2] image ciphering/deciphering system as claimed in claim 1 is characterized in that, described encrypting module comprises that a picture file chooses submodule, and it is in order to choose picture file; An encrypted challenge submodule, it is in order to inquire whether the described picture file of choosing needs to encrypt; A password is created submodule, and it is in order to create Crypted password; An encryption submodule, it is revised as Crypted password in order to foundation picture format standard with described state flag bit maintains secrecy with the picture file execution graph slice encode that needs are encrypted; A sub module stored, it is in order to the picture file of storage not encrypted and the picture file after the described encryption.
- [claim 3] image ciphering/deciphering system as claimed in claim 1 is characterized in that, described deciphering module comprises that a picture file chooses submodule, and it is in order to the picture file after the maintaining secrecy of selected described storage; A deciphering inquiry submodule, it is in order to inquire whether described picture selected file needs to be decrypted; A password obtains submodule, and it is in order to obtain the password of input; A password is judged submodule, and it is in order to judge whether described input password is identical with described Crypted password; A decryption processing submodule, it is revised as described state flag bit according to the picture format standard with described Crypted password and deciphers with the execution graph slice encode in order to when described input password is identical with described Crypted password; A picture file display sub-module, it is in order to show the picture file after deciphering.
- [claim 4] image ciphering/deciphering system as claimed in claim 1 is characterized in that, the described picture file form of choosing is the JPEG (joint photographic experts group) form.
- [claim 5] image ciphering/deciphering system as claimed in claim 1 is characterized in that, described deciphering module judges whether identical employing divides comparison mode in position to judge to described input password with described Crypted password.
- [claim 6] image ciphering/deciphering system as claimed in claim 2, it is characterized in that, after whether the described picture file of choosing of described encrypted challenge submodule inquiry needed to encrypt, if do not need to encrypt, then sub module stored was stored the picture file of not encrypted.
- [claim 7] image ciphering/deciphering system as claimed in claim 3, it is characterized in that, after described deciphering inquiry submodule inquires whether described selected picture file needs to be decrypted, if do not need to be decrypted, then return, and choose selected other picture files of submodule by described picture file.
- [claim 8] a kind of image ciphering method, it may further comprise the steps:Choose the picture file that a shelves position is provided with state flag bit;Inquire whether the described picture file of choosing needs to encrypt, if do not need to encrypt, then store the picture file of not encrypted, if need encrypt, then create Crypted password, according to the picture format standard described state flag bit is revised as Crypted password and maintains secrecy with the picture file execution graph slice encode that needs are encrypted;Picture file behind the storage security.
- [claim 9] image ciphering method as claimed in claim 8, the described picture file form of choosing is the JPEG (joint photographic experts group) form.
- [claim 10] a kind of picture decryption method, it may further comprise the steps:Shelves position behind the selected storage security is provided with the picture file of state flag bit;Inquire whether described selected picture file needs to be decrypted, if need be decrypted, then obtain the password of input, judge whether described input password is identical with described Crypted password,, then obtain the input password again if described input password and described Crypted password are inequality, and hiding picture file, if described input password is identical with described Crypted password, then described Crypted password is revised as described state flag bit with the deciphering of execution graph slice encode according to the picture format standard, and the file that Shows Picture.
- [claim 11] picture decryption method as claimed in claim 10 is characterized in that, described judge described input password and described Crypted password whether identical be to adopt to divide a comparison mode in position to judge.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007102030177A CN101459807A (en) | 2007-12-12 | 2007-12-12 | Image ciphering/deciphering system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007102030177A CN101459807A (en) | 2007-12-12 | 2007-12-12 | Image ciphering/deciphering system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101459807A true CN101459807A (en) | 2009-06-17 |
Family
ID=40770396
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007102030177A Pending CN101459807A (en) | 2007-12-12 | 2007-12-12 | Image ciphering/deciphering system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101459807A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049491A (en) * | 2012-12-07 | 2013-04-17 | 深圳市同洲电子股份有限公司 | Method and device for managing picture file |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN104615917A (en) * | 2015-01-20 | 2015-05-13 | 中兴通讯股份有限公司 | Picture camouflaging method, picture viewing method, system and terminal |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
CN104680074A (en) * | 2013-11-27 | 2015-06-03 | 中国科学院深圳先进技术研究院 | Mobile terminal image encryption method and device |
CN104680078A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Method and system for taking photos and checking images and terminal |
CN104915610A (en) * | 2015-06-15 | 2015-09-16 | 广州市久邦数码科技有限公司 | Privacy picture implementation method and privacy picture implementation system |
CN105183315A (en) * | 2015-08-31 | 2015-12-23 | 联想(北京)有限公司 | Control method and electronic device |
-
2007
- 2007-12-12 CN CNA2007102030177A patent/CN101459807A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049491A (en) * | 2012-12-07 | 2013-04-17 | 深圳市同洲电子股份有限公司 | Method and device for managing picture file |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN103488918B (en) * | 2013-09-18 | 2016-09-14 | 广东欧珀移动通信有限公司 | Intelligent terminal applies encryption method and device |
CN104680074A (en) * | 2013-11-27 | 2015-06-03 | 中国科学院深圳先进技术研究院 | Mobile terminal image encryption method and device |
CN104615917A (en) * | 2015-01-20 | 2015-05-13 | 中兴通讯股份有限公司 | Picture camouflaging method, picture viewing method, system and terminal |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
CN104680078A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Method and system for taking photos and checking images and terminal |
WO2016115887A1 (en) * | 2015-01-20 | 2016-07-28 | 中兴通讯股份有限公司 | Image camouflaging method, method viewing method, system, and terminal |
US10922435B2 (en) | 2015-01-20 | 2021-02-16 | Zte Corporation | Image encryption method, image viewing method, system, and terminal |
CN104680078B (en) * | 2015-01-20 | 2021-09-03 | 中兴通讯股份有限公司 | Method for shooting picture, method, system and terminal for viewing picture |
CN104915610A (en) * | 2015-06-15 | 2015-09-16 | 广州市久邦数码科技有限公司 | Privacy picture implementation method and privacy picture implementation system |
CN105183315A (en) * | 2015-08-31 | 2015-12-23 | 联想(北京)有限公司 | Control method and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101459807A (en) | Image ciphering/deciphering system and method | |
CN103106372B (en) | For lightweight privacy data encryption method and the system of android system | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
Seth et al. | Security enhancement: combining cryptography and steganography | |
CN101296349A (en) | Video file enciphering/deciphering system and method | |
CN102523086A (en) | Key recovery method in privacy protection cloud storage system | |
CN109525388B (en) | Combined encryption method and system with separated keys | |
KR20180001749A (en) | Method and system for data management | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
EP1143656A2 (en) | Copyright protection system, encryption device, decryption device, and recording medium | |
JP2007206762A (en) | Communication method and communication device using two-dimensional code | |
CN105007256A (en) | Security module for secure function execution on untrusted platform | |
US11438156B2 (en) | Method and system for securing data | |
CN107342862B (en) | Method and system for realizing key generation and protection by cloud plus-end triple-authority separation | |
US11163892B2 (en) | Buffering data until encrypted destination is unlocked | |
Sharma et al. | Compression and encryption: An integrated approach | |
CN103002117A (en) | Phone information encryption method and phone information encryption system | |
CN103491384A (en) | Encrypting method and device of video and decrypting method and device of video | |
CN101639928A (en) | Image data encryption and decryption method and system thereof | |
JP2000172566A (en) | Electronic data management device and method and recording medium recording electronic data management program | |
CN110730188A (en) | Method for encrypting, storing and transmitting static pictures | |
JP2010219603A (en) | Secret information management system, secret information management device, and program | |
JP4338185B2 (en) | How to encrypt / decrypt files | |
Hambali et al. | Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm | |
KR101808313B1 (en) | Method of encrypting data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090617 |