CN104184921A - Encryption method and server, and decryption method and terminal - Google Patents

Encryption method and server, and decryption method and terminal Download PDF

Info

Publication number
CN104184921A
CN104184921A CN201310198616.XA CN201310198616A CN104184921A CN 104184921 A CN104184921 A CN 104184921A CN 201310198616 A CN201310198616 A CN 201310198616A CN 104184921 A CN104184921 A CN 104184921A
Authority
CN
China
Prior art keywords
dimension
plate number
terminal
dimension array
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310198616.XA
Other languages
Chinese (zh)
Other versions
CN104184921B (en
Inventor
李�昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310198616.XA priority Critical patent/CN104184921B/en
Priority to PCT/CN2013/080305 priority patent/WO2013167087A2/en
Publication of CN104184921A publication Critical patent/CN104184921A/en
Application granted granted Critical
Publication of CN104184921B publication Critical patent/CN104184921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Abstract

The invention provides an encryption method and a server, and a decryption method and a terminal. The encryption method comprises the steps that a binary image is obtained to act as an original image; the original image is arranged according to the coordinate order so that a first one-dimensional array is generated; the plate number of the terminal is acquired; the first one-dimensional array is encrypted according to the plate number of the terminal so that a second one-dimensional array is generated; and an encrypted image is generated via the second one-dimensional array according to the coordinate order. The encryption method can be applied to the digital image anti-counterfeit technology of terminal products so that application is simple.

Description

Encryption method and server and decryption method and terminal
Technical field
The present invention relates to image field, refer to especially a kind of encryption method and server and decryption method and terminal.
Background technology
Digital watermark technology, as the important branch of field of information security technology, is widely used and deep research.It is embedded into sightless one mark in multimedia messages product by the situation that not causing perception, in order to identify the ownership of authorship to works or information integrity is verified.
Along with the development of terminal market grows, strengthen also more and more important to the property right protection of end product, but in prior art, digital image anti-fake technology more complicated.
Summary of the invention
The invention provides a kind of easy encryption method and server and decryption method and terminal applied.
On the one hand, provide a kind of encryption method, comprising:
Obtain a bianry image as original image;
Described original image is pressed to coordinate order and arrange, generate the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of described terminal, described the first one-dimension array is encrypted, generate the second one-dimension array;
Described the second one-dimension array is generated to encrypted image according to coordinate order.
Described according to the plate number of described terminal, described the first one-dimension array is encrypted, the step that generates the second one-dimension array comprises:
According to the plate number of described terminal, generate one dimension chaos sequence;
According to the plate number of described terminal, described one dimension chaos sequence is carried out to binary conversion treatment, generate binary sequence;
Described binary sequence and described the first one-dimension array are carried out to XOR, generate the second one-dimension array.
Described according to the plate number of described terminal, the step that generates one dimension chaos sequence comprises:
According to the plate number of described terminal, generate initial value;
According to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for initial value.
Described according to the plate number of described terminal, the step that generates initial value comprises:
Obtain the numeral on predetermined figure N in described plate number, combination producing the first numerical value;
To described plate number corresponding key value M and 10 nsue for peace, obtain second value; Described key value M is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Described the first numerical value, divided by second value, is obtained to described initial value.
Described according to the plate number of described terminal, described one dimension chaos sequence is carried out to binary conversion treatment, the step that generates binary sequence comprises:
Obtain the plate number corresponding threshold tau of described terminal, 0< τ <1;
According to described threshold value, computing formula:
L (k) is binary sequence; X (k) is one dimension chaos sequence.
On the other hand, provide a kind of decryption method, comprising:
Extract encrypted image;
Described encrypted image is pressed to coordinate order and arrange, generate the first one-dimension array;
According to the plate number of described terminal, obtain branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
According to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, generate the second one-dimension array;
Described the second one-dimension array is generated to original image according to coordinate order;
Show described original image.
Described according to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, the step that generates the second one-dimension array comprises:
According to described branch parameter, generate one dimension chaos sequence;
According to described threshold value, described one dimension chaos sequence is carried out to binary conversion treatment, generate binary sequence;
Described binary sequence and described the first one-dimension array are carried out to XOR, generate the second one-dimension array.
Described according to described branch parameter, the step that generates one dimension chaos sequence comprises:
According to the plate number of described terminal, generate initial value;
According to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for described initial value.
Described according to the plate number of described terminal, the step that generates initial value comprises:
Obtain the numeral on predetermined figure N in described plate number, combination producing the first numerical value;
Obtain described plate number corresponding key value M from server;
To described plate number corresponding key value and 10 nsue for peace, obtain second value; Described key value is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Described the first numerical value, divided by second value, is obtained to described initial value.
Described according to described threshold value, described one dimension chaos sequence is carried out to binary conversion treatment, the step that generates binary sequence comprises:
According to described threshold value, computing formula:
L (k) is 0-1 sequence; X (k) is one dimension chaos sequence; τ is threshold value, 0< τ <1.
On the other hand, provide a kind of server, comprising:
Acquiring unit, obtains a bianry image as original image;
The first generation unit, presses coordinate order by described original image and arranges, and generates the first one-dimension array;
Acquiring unit, obtains the plate number of terminal;
The second generation unit, according to the plate number of described terminal, is encrypted described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit, generates encrypted image by described the second one-dimension array according to coordinate order.
On the other hand, provide a kind of terminal, comprising:
Extraction unit, extracts encrypted image;
The first generation unit, presses coordinate order by described encrypted image and arranges, and generates the first one-dimension array;
Acquiring unit, according to the plate number of described terminal, obtains branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
The second generation unit, according to described branch parameter and described threshold value, is decrypted processing to described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit, generates original image by described the second one-dimension array according to coordinate order;
Display unit, shows described original image.
On the other hand, provide a kind of decryption system, comprising: terminal and server;
Described terminal, extracts encrypted image; Described encrypted image is pressed to coordinate order and arrange, generate the first one-dimension array; According to the plate number of described terminal, obtain branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from described server; According to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, generate the second one-dimension array; Described the second one-dimension array is generated to original image according to coordinate order; Show described original image.
The beneficial effect of technique scheme of the present invention is as follows: the invention provides encryption method and server and decryption method and terminal, utilize encryption technology to generate encrypted image, then encrypted image is placed in to end product, in subsequent process, can be decrypted encrypted image according to user instruction, and show the image after deciphering, make user by checking the mode of the rear image of deciphering, to carry out false proof authentication to end product.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of a kind of encryption method of the present invention;
Fig. 2 is the schematic flow sheet of a kind of decryption method of the present invention;
Fig. 3 is the structural representation of a kind of server of the present invention;
Fig. 4 is the structural representation of a kind of terminal of the present invention;
Fig. 5 is the structural representation of a kind of decryption system of the present invention;
Fig. 6 is the schematic flow sheet of application scenarios of the present invention;
Fig. 7 is the schematic diagram of original image;
The serve as reasons effect schematic diagram of the described original image encrypted image after encrypting of Fig. 8;
Fig. 9 is the schematic diagram of the information table of the database of server.
Embodiment
For making the technical problem to be solved in the present invention, technical scheme and advantage clearer, be described in detail below in conjunction with the accompanying drawings and the specific embodiments.
First, Integral Thought of the present invention is described.The invention provides a kind of encryption method and server and decryption method and terminal, first, server by utilizing encryption technology generates encrypted image, then encrypted image is placed in to end product, in subsequent process, terminal is decrypted encrypted image according to user instruction, and shows the image after deciphering, make user by checking the mode of the rear image of deciphering, to carry out false proof authentication to end product.Wherein, be that terminal and server obtain in reciprocal process to the key of encrypted image deciphering.
As shown in Figure 1, be a kind of encryption method of the present invention, comprising:
Step 11, obtains a bianry image as original image;
Step 12, presses coordinate order by described original image and arranges, and generates the first one-dimension array;
Step 13, obtains the plate number of terminal;
Step 14, according to the plate number of described terminal, is encrypted described the first one-dimension array, generates the second one-dimension array;
Step 15, generates encrypted image by described the second one-dimension array according to coordinate order.
Described according to the plate number of described terminal, described the first one-dimension array is encrypted, the step 14 that generates the second one-dimension array comprises:
Step 141, according to the plate number of described terminal, generates one dimension chaos sequence;
Step 142, according to the plate number of described terminal, carries out binary conversion treatment to described one dimension chaos sequence, generates binary sequence;
Step 143, carries out XOR by described binary sequence and described the first one-dimension array, generates the second one-dimension array.
Described according to the plate number of described terminal, the step 141 that generates one dimension chaos sequence comprises:
Step 1411, according to the plate number of described terminal, generates initial value;
Step 1412, according to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for initial value.
For example, suppose μ=4, x 0=0.7, by iterative formula, obtain X(4)=(0.84,0.5376,0.99434496,0.0224922420903936).
Described according to the plate number of described terminal, the step 1411 that generates initial value comprises:
Step 14111, obtains the numeral on predetermined figure N in described plate number, combination producing the first numerical value.For example, obtain plate number latter six, composition the first numerical value.
Step 14112, to described plate number corresponding key value M and 10 nsue for peace, obtain second value; Described key value M is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Step 14113, divided by second value, obtains described initial value by described the first numerical value.
Described according to the plate number of described terminal, described one dimension chaos sequence is carried out to binary conversion treatment, the step 142 that generates binary sequence comprises:
Step 1421, obtains the plate number corresponding threshold tau of described terminal, 0< τ <1;
Step 1422, according to described threshold value, computing formula:
L (k) is binary sequence; X (k) is one dimension chaos sequence.
As shown in Figure 2, be a kind of decryption method of the present invention, comprising:
Step 21, extracts encrypted image;
Step 22, presses coordinate order by described encrypted image and arranges, and generates the first one-dimension array;
Step 23, according to the plate number of described terminal, obtains branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
Step 24, according to described branch parameter and described threshold value, is decrypted processing to described the first one-dimension array, generates the second one-dimension array;
Step 25, generates original image by described the second one-dimension array according to coordinate order;
Step 26, shows described original image.
Described according to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, the step 24 that generates the second one-dimension array comprises:
Step 241, according to described branch parameter, generates one dimension chaos sequence;
Step 242, according to described threshold value, carries out binary conversion treatment to described one dimension chaos sequence, generates binary sequence;
Step 243, carries out XOR by described binary sequence and described the first one-dimension array, generates the second one-dimension array.
Described according to described branch parameter, the step 241 that generates one dimension chaos sequence comprises:
Step 2411, according to the plate number of described terminal, generates initial value;
Step 2412, according to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for described initial value.
Described according to the plate number of described terminal, the step 2411 that generates initial value comprises:
Step 24111, obtains the numeral on predetermined figure N in described plate number, combination producing the first numerical value;
Step 24112, obtains described plate number corresponding key value M from server;
Step 24113, to described plate number corresponding key value and 10 nsue for peace, obtain second value; Described key value is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Step 24114, divided by second value, obtains described initial value by described the first numerical value.
Described according to described threshold value, described one dimension chaos sequence is carried out to binary conversion treatment, the step 242 that generates binary sequence is specially:
According to described threshold value, computing formula:
L (k) is 0-1 sequence; X (k) is one dimension chaos sequence; τ is threshold value, 0< τ <1.
As shown in Figure 3, provide a kind of server, comprising:
Acquiring unit 31, obtains a bianry image as original image;
The first generation unit 32, presses coordinate order by described original image and arranges, and generates the first one-dimension array;
Acquiring unit 33, obtains the plate number of terminal;
The second generation unit 34, according to the plate number of described terminal, is encrypted described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit 35, generates encrypted image by described the second one-dimension array according to coordinate order.
As shown in Figure 4, provide a kind of terminal, comprising:
Extraction unit 41, extracts encrypted image;
The first generation unit 42, presses coordinate order by described encrypted image and arranges, and generates the first one-dimension array;
Acquiring unit 43, according to the plate number of described terminal, obtains branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
The second generation unit 44, according to described branch parameter and described threshold value, is decrypted processing to described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit 45, generates original image by described the second one-dimension array according to coordinate order;
Display unit 43, shows described original image.
As shown in Figure 5, provide a kind of decryption system, comprising: terminal 51 and server 52;
Described terminal 51, extracts encrypted image; Described encrypted image is pressed to coordinate order and arrange, generate the first one-dimension array; According to the plate number of described terminal, obtain branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from described server 52; According to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, generate the second one-dimension array; Described the second one-dimension array is generated to original image according to coordinate order; Show described original image.
Application scenarios of the present invention is below described.
The invention provides the built-in image false-proof method of a kind of terminal based on Chaos Encryption Technology, can be applicable to the digital image anti-fake technology of terminal series products, apply easy, cost is low and safe and reliable.Terminal can remove to obtain by wireless network the relevant parameter of deciphering from server, complete the verification process of copyright information in terminal.Be specially: first, utilize Chaos Encryption Technology to generate encrypted image (black and white image only has 0 and 1 two gray scale), encrypted image is placed in to end product.Then, user can carry out by the mode of manual click the false proof authentication of product, after authentication is passed through, by authenticating result by terminal feedback to user, thereby reach false proof object.
As shown in Figure 6, the present invention includes Four processes: the generative process of encrypted image, process, decrypting process, the UI reciprocal process that user obtains key data.
The generative process of encrypted image is below described.
First, prepare a width two-value original image (see figure 7), then, image is arranged as to one-dimension array by coordinate order.Original image is conventionally with certain implication information, as operator or equipment supplier's logo information.
Then, the initial value corresponding according to product, produces one dimension chaos sequence, and sequence is carried out to binary conversion treatment according to threshold value.
Concrete grammar and principle are as follows: Logistic mapping is the very simple dynamical system of the one in chaos system, and it is defined as follows:
X i+1=μ x i(1-x i) formula 1
Wherein, 0≤μ≤4 are called branch parameter (bifurcation parameter), x 1∈ (0,1).In the time of 3.5699456... < μ≤4, Logistic mappings work is in chaos state.That is to say, by initial value x 0sequence { the x producing under the effect of Logistic mapping i| i=0,1,2...} is aperiodic, do not restrain and very responsive to initial value.
Set a chaos initial value x0 and μ, carry out iteration by formula 1, obtain chaos sequence x (k).Initial value can carry out value divided by 1XXXXXX according to last 6 figure places of device board number, XXXXXX is the key information that product is corresponding (namely key value M mentioned above), span is 0 to 999999, if plate numbers last 6 is full 0, x0 is defaulted as 0.5.
Then, utilize threshold value threshold method obtain 0-1 sequence L (k) (k=1,2 ..., M1 × M2), threshold values threshold method is defined as follows:
L ( k ) = 1 IF x ( k ) &GreaterEqual; &tau; 0 IF x ( k ) < &tau; .
Wherein, τ is threshold value, and span is 0< τ <1.
Then, with generate 0-1 sequence L (k) binary bitmap is encrypted, obtain encrypt after watermark vector sequence.Be specially: Wm=Wa ⊕ L (k) (m=1,2 ... M1 × M2), ⊕ represents XOR.As shown in Figure 9, XXXXXX, μ and τ store in the network data base of server together with the enciphered message corresponding as product and production board number.
Finally, as shown in Figure 8, the one-dimensional vector after encrypting is reverted back to two-dimensional array (image) according to coordinate, so just completed the generation of encrypted image.The encrypted image generating will be placed in terminal EFS file system, show for UI.In this embodiment, x0=0.890111, XXXXXX=123456, μ=3.7, τ=0.4.The database storage of the production of whole encrypted image and key information all completes in the production phase.
Below describe user and obtain key data process.
Terminal is connected on the webserver, obtains the key information that product is corresponding.
Form is as follows:
Terminal sends data format---Get(product IDs);
Terminal receives data format---Receive(product IDs, XXXXXX, μ, τ);
The webserver receives after the key request of terminal, and reference diagram is searched corresponding key information, and these information are sent to terminal according to set form, completes the acquisition process of key information.
Decrypting process is below described.
Decrypting process is exactly the inverse process of ciphering process.First,, according to latter 6 of the key information board obtaining from network data base number, carry out computing according to the algorithm in ciphering process, thereby obtain deciphering chaos sequence; Then, utilize threshold value threshold method to obtain the binary sequence of deciphering.Two-value encrypted image in the binary sequence of deciphering and terminal EFS subregion is carried out to XOR and just obtained original image, thereby completed whole decrypting process.Decrypting process is by terminal complete independently.
UI reciprocal process is below described:
User initiates the operation of authentication by UI interface, and checks authenticating result.
Detailed process please refer to accompanying drawing 5.
Be below use scenes: user buys after end product, by the false proof authentication functions that terminal is built-in, product is carried out to truth identification, thereby reaches the object that user can be judged the true and false of product intuitively.
The above is the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, do not departing under the prerequisite of principle of the present invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (13)

1. an encryption method, is characterized in that, comprising:
Obtain a bianry image as original image;
Described original image is pressed to coordinate order and arrange, generate the first one-dimension array;
Obtain the plate number of terminal;
According to the plate number of described terminal, described the first one-dimension array is encrypted, generate the second one-dimension array;
Described the second one-dimension array is generated to encrypted image according to coordinate order.
2. encryption method according to claim 1, is characterized in that, described according to the plate number of described terminal, and described the first one-dimension array is encrypted, and the step that generates the second one-dimension array comprises:
According to the plate number of described terminal, generate one dimension chaos sequence;
According to the plate number of described terminal, described one dimension chaos sequence is carried out to binary conversion treatment, generate binary sequence;
Described binary sequence and described the first one-dimension array are carried out to XOR, generate the second one-dimension array.
3. encryption method according to claim 2, is characterized in that, described according to the plate number of described terminal, and the step that generates one dimension chaos sequence comprises:
According to the plate number of described terminal, generate initial value;
According to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for initial value.
4. encryption method according to claim 3, is characterized in that, described according to the plate number of described terminal, and the step that generates initial value comprises:
Obtain the numeral on predetermined figure N in described plate number, combination producing the first numerical value;
To described plate number corresponding key value M and 10 nsue for peace, obtain second value; Described key value M is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Described the first numerical value, divided by second value, is obtained to described initial value.
5. encryption method according to claim 2, is characterized in that, described according to the plate number of described terminal, and described one dimension chaos sequence is carried out to binary conversion treatment, and the step that generates binary sequence comprises:
Obtain the plate number corresponding threshold tau of described terminal, 0< τ <1;
According to described threshold value, computing formula:
L (k) is binary sequence; X (k) is one dimension chaos sequence.
6. a decryption method, is characterized in that, comprising:
Extract encrypted image;
Described encrypted image is pressed to coordinate order and arrange, generate the first one-dimension array;
According to the plate number of described terminal, obtain branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
According to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, generate the second one-dimension array;
Described the second one-dimension array is generated to original image according to coordinate order;
Show described original image.
7. decryption method according to claim 6, is characterized in that, described according to described branch parameter and described threshold value, and described the first one-dimension array is decrypted to processing, and the step that generates the second one-dimension array comprises:
According to described branch parameter, generate one dimension chaos sequence;
According to described threshold value, described one dimension chaos sequence is carried out to binary conversion treatment, generate binary sequence;
Described binary sequence and described the first one-dimension array are carried out to XOR, generate the second one-dimension array.
8. decryption method according to claim 7, is characterized in that, described according to described branch parameter, and the step that generates one dimension chaos sequence comprises:
According to the plate number of described terminal, generate initial value;
According to described initial value, by formula x i+1=μ x i(1-x i) carry out iteration, obtain one dimension chaos sequence x (k);
Wherein, μ is branch parameter, 0≤μ≤4; K is the sequence number of iterations; x ifor the element of one dimension chaos sequence; I is the sequence number of element; I=0,1,2...; x 0for described initial value.
9. decryption method according to claim 8, is characterized in that, described according to the plate number of described terminal, and the step that generates initial value comprises:
Obtain the numeral on predetermined figure N in described plate number, combination producing the first numerical value; N is greater than or equal to 1 natural number;
Obtain described plate number corresponding key value M from server;
To described plate number corresponding key value and 10 nsue for peace, obtain second value; Described key value is for being greater than or equal to 0 and be less than or equal to 2 nnatural number;
Described the first numerical value, divided by second value, is obtained to described initial value.
10. decryption method according to claim 7, is characterized in that, described according to described threshold value, and described one dimension chaos sequence is carried out to binary conversion treatment, and the step that generates binary sequence comprises:
According to described threshold value, computing formula:
L (k) is 0-1 sequence; X (k) is one dimension chaos sequence; τ is threshold value, 0< τ <1.
11. 1 kinds of servers, is characterized in that, comprising:
Acquiring unit, obtains a bianry image as original image;
The first generation unit, presses coordinate order by described original image and arranges, and generates the first one-dimension array;
Acquiring unit, obtains the plate number of terminal;
The second generation unit, according to the plate number of described terminal, is encrypted described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit, generates encrypted image by described the second one-dimension array according to coordinate order.
12. 1 kinds of terminals, is characterized in that, comprising:
Extraction unit, extracts encrypted image;
The first generation unit, presses coordinate order by described encrypted image and arranges, and generates the first one-dimension array;
Acquiring unit, according to the plate number of described terminal, obtains branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from server;
The second generation unit, according to described branch parameter and described threshold value, is decrypted processing to described the first one-dimension array, generates the second one-dimension array;
The 3rd generation unit, generates original image by described the second one-dimension array according to coordinate order;
Display unit, shows described original image.
13. 1 kinds of decryption systems, is characterized in that, comprising: terminal and server;
Described terminal, extracts encrypted image; Described encrypted image is pressed to coordinate order and arrange, generate the first one-dimension array; According to the plate number of described terminal, obtain branch parameter that the plate of described terminal is number corresponding and the plate number corresponding threshold value of described terminal from described server; According to described branch parameter and described threshold value, described the first one-dimension array is decrypted to processing, generate the second one-dimension array; Described the second one-dimension array is generated to original image according to coordinate order; Show described original image.
CN201310198616.XA 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal Active CN104184921B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310198616.XA CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal
PCT/CN2013/080305 WO2013167087A2 (en) 2013-05-24 2013-07-29 Encryption method, server, decryption method, terminal and encryption/decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310198616.XA CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal

Publications (2)

Publication Number Publication Date
CN104184921A true CN104184921A (en) 2014-12-03
CN104184921B CN104184921B (en) 2018-10-12

Family

ID=49551378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310198616.XA Active CN104184921B (en) 2013-05-24 2013-05-24 Encryption method and server and decryption method and terminal

Country Status (2)

Country Link
CN (1) CN104184921B (en)
WO (1) WO2013167087A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098915A (en) * 2018-01-30 2019-08-06 阿里巴巴集团控股有限公司 Authentication method and system, terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1421814A (en) * 2001-11-30 2003-06-04 温天 Digital anti-fake method
JP2004289699A (en) * 2003-03-24 2004-10-14 Fuji Xerox Co Ltd Information processing apparatus
CN1932852A (en) * 2005-09-14 2007-03-21 上海新跃仪表厂 Tax control machine material characteristic encrypted antifaking method
US20070189518A1 (en) * 2005-03-30 2007-08-16 Nanni Richard A 3-D quaternion quantum fractal encryption
US20070288752A1 (en) * 2006-06-08 2007-12-13 Weng Chong Chan Secure removable memory element for mobile electronic device
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system
CN102547297A (en) * 2012-02-28 2012-07-04 中国传媒大学 MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient
CN102801947A (en) * 2012-07-02 2012-11-28 西南科技大学 Semantic information transmission and protection method based on H264
CN102938132A (en) * 2012-11-20 2013-02-20 海南大学 Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1421814A (en) * 2001-11-30 2003-06-04 温天 Digital anti-fake method
JP2004289699A (en) * 2003-03-24 2004-10-14 Fuji Xerox Co Ltd Information processing apparatus
US20070189518A1 (en) * 2005-03-30 2007-08-16 Nanni Richard A 3-D quaternion quantum fractal encryption
CN1932852A (en) * 2005-09-14 2007-03-21 上海新跃仪表厂 Tax control machine material characteristic encrypted antifaking method
US20070288752A1 (en) * 2006-06-08 2007-12-13 Weng Chong Chan Secure removable memory element for mobile electronic device
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system
CN102547297A (en) * 2012-02-28 2012-07-04 中国传媒大学 MPEG2 (Moving Picture Experts Group 2) video watermarking realization method based on DC (Discrete Cosine) coefficient
CN102801947A (en) * 2012-07-02 2012-11-28 西南科技大学 Semantic information transmission and protection method based on H264
CN102938132A (en) * 2012-11-20 2013-02-20 海南大学 Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张定会,郭静波,江平,单俊涛: "《QR码二值图像混沌加密与解密》", 《移动通信》 *
杨格兰,张建明,向德生: "《基于混沌序列的二值图像加密算法》", 《计算机技术与发展》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098915A (en) * 2018-01-30 2019-08-06 阿里巴巴集团控股有限公司 Authentication method and system, terminal

Also Published As

Publication number Publication date
WO2013167087A2 (en) 2013-11-14
WO2013167087A3 (en) 2014-04-24
CN104184921B (en) 2018-10-12

Similar Documents

Publication Publication Date Title
TWI670621B (en) Information encryption and decryption method and device
CN107194266B (en) Method for verifying whether paper certificate is tampered
CN102572314B (en) Image sensor and payment authentication method
CN102164037B (en) Digital signing system and method
WO2017045594A1 (en) Anti-counterfeit method
CN103020682B (en) Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
CN105847005B (en) Encryption device and method
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN104734851A (en) Electronic seal method and system
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN104268610A (en) Method for generating and reading graded QR code
CN111010490A (en) Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium
CN107665314B (en) The trusted processes method and device signed on the electronic document
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN107104788B (en) Terminal and non-repudiation encryption signature method and device thereof
CN115883052A (en) Data encryption method, data decryption method, device and storage medium
CN114780923A (en) Electronic seal management and control method and system
CN111866547B (en) Novel video tamper-proofing method
Mohan et al. Secure visual cryptography scheme with meaningful shares
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
Sazaki et al. Implementation of affine transform method and advanced hill cipher for securing digital images
CN104184921A (en) Encryption method and server, and decryption method and terminal
CN104883260A (en) Certificate information processing and verification methods, processing terminal, and verification server
CN103401681A (en) Modulus taking method, modulus taking device and chip
CN110474967B (en) Block chain experiment system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant