CN105119923A - Information-decoding method and terminal - Google Patents
Information-decoding method and terminal Download PDFInfo
- Publication number
- CN105119923A CN105119923A CN201510551708.0A CN201510551708A CN105119923A CN 105119923 A CN105119923 A CN 105119923A CN 201510551708 A CN201510551708 A CN 201510551708A CN 105119923 A CN105119923 A CN 105119923A
- Authority
- CN
- China
- Prior art keywords
- information
- lable
- key
- picture
- decoding method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses an information-decoding method and a terminal. The aim of the invention is to use an encryption technique to achieve the encrypted communication of information. The decoding process comprises the following steps: a receiving end receives a secrecy-loaded picture, and obtains an embedded enciphered message, specifically to obtain a length indicator of secrecy-loaded information and read the enciphered message according to the length indicator in turn; the receiving end calls a decryption module and obtains a decryption key pair to decrypt the enciphered message and display the enciphered message.
Description
Technical field
The present invention is applied to the field such as mobile communication and information security, particularly relates to a kind of information decoding method and terminal.
Background technology
By inquiry; in the market; also do not have mobile phone be directly encrypted transmission to short message content and store, do not have mobile phone products to use hardware encryption chip to carry out data protection yet, current software market has some software application can be encrypted transmission for some notes or store.The mode that transmission realizes usually is: the machine arranges a security password, this password is told to recipient simultaneously; When sending short messages, this password is encrypted as key note; Be decrypted according to the password known in advance after recipient receives Encrypted short message.The mode that storage realizes usually fixes certain key, specifies certain note to be encrypted, and then ciphertext is replaced and preserve in systems in which, what see when not deciphering is ciphertext.Only just can see expressly after the administration interface deciphering of correspondence.At least there is the deficiency of following several respects in this scheme or technology: (1) availability is not strong.Current application only realizes a part substantially, do not consider from the angle of system comprehensively, such as or be only realize encrypting at hop, be exactly only realize local SMS encryption, more do not consider to encrypt in what situations in use not encrypt in what situations, the safety for note does not accomplish overall consideration yet, from the secret generating of note, to encrypted transmission, then to consider to local this each stage of preservation.Therefore want the note safety system oneself doing complete set, need multiple software to coordinate, and be difficult to cooperate viewed from current application software.(2) ease for use is poor.Go out a key by transmit leg and recipient's as offered, not only use inconvenience, and add extra cost.Be inconvenient to be in, both sides need communication, perhaps phone, perhaps note, and if when having multiple contact person to use Encrypted short message, multiple password will be produced, be in this case just not easy to remember.Need during deciphering to look for clear crytpographic key temporarily.If each note is consulted once, although can obtain password, communications cost adds, and such as originally sends out a note, but ensures that the situation of safety produces three notes down to I haven't seen you for ages, and communications cost adds 2 times.And every bar note can only be expressly when preserving, otherwise the password of correspondence is lost and just cannot have been untied.For the application of storage encryption note, often it is seen that ciphertext, this is concerning the people wanting to check short message content, and be very painful, can not find out it is which bar note, needing every bar all to decipher could determine at a glance.(3) fail safe is not high.From the application software existed in the market, the safety problem that different application exists also is not quite similar.Main security risk is to apply the incomplete property realized.Not from the secret generating of note, to encrypted transmission, then carried out security consideration to local this each stage of preservation, but only realized a part, existing application is also substantially all very weak to the setting of key in addition, and fail safe is very poor.
Summary of the invention
The object of the present invention is to provide a kind of safe information encrypting transmission method.
For achieving the above object, first the present invention provides a kind of information decoding method, it is characterized in that: described decode procedure comprises the following steps:
(5) receiving terminal receives and carries close picture, obtains the enciphered message embedded, and specifically comprises obtaining carrying confidential information length mark, and reads enciphered message according to length mark order;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Within wherein said year, close picture is produced by following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal.
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
Described picture is PNG form.
Accompanying drawing explanation
Fig. 1 is transmitting terminal enciphered message process schematic of the present invention.
Enciphered message is of the present inventionly embedded picture flow chart by Fig. 2.
Fig. 3 is receiving terminal decryption information process schematic of the present invention.
Embodiment
Technical scheme for a better understanding of the present invention, describes embodiment provided by the invention in detail below in conjunction with accompanying drawing.
As shown in Figure 1, which show the flow process of transmitting terminal to information encryption, concrete following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.Wherein mobile phone logo can be receiving terminal, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms is often reducing in order to the quantity of guarantee information embedding the image pixel number carrying per bit quantity as far as possible, but in SMS environment, consider that the required data volume hidden can not be excessive, the image pixel number of greater number can be selected in Information hiding process, can avoid causing information steganography to be detected attack algorithm because information amendment is too intensive in information insertion process like this and find.The present invention proposes following one and hides incorporation model based on pixel RGB coefficient least significant bit partitioning of matrix parity informa-tion:
Step one: by each for PNG image pixel by length n piecemeal (n>1), take out a blocks of pixels, what obtain each pixel in this piecemeal comprises transparent channel (Alpha), the relevant parameter of color space RGB information, the data segment that this 24 bit parameter of each pixel can be separated into 48 bits represents this pixel transparency respectively, red component, the color parameter information of green component and blue colouring component, single pixel is got respectively to it is red, green, blue component parameters lowest order, the lowest order obtained is pressed R-G-B order and red with these other pixels of block of pixels, green, blue component parameters lowest order together forms the PNG image RGB coefficient least significant bit matrix D of a 3 × n, it meets:
Step 2: calculate this matrix D each element sum S and this matrix odd even specialty flags I, wherein S and I meets following formula:
I=Smod2
Step 3: take out a bit b from data to be embedded, if b=I, then this matrix-block does not revise any one data, otherwise gets random natural number R, C (R<n, C<3) and revise the element d in matrix D according to the following rules
rC:
If the piecemeal taken out is the first piecemeal that image takes out, then d
rCvalue+1, otherwise perform in operating with-1+1 with on once have revise operate performed by piecemeal in contrary operation.
Repeatedly perform step one to step 3, until all information is embedded into complete.
Information extraction algorithm is then relatively simple, by each for PNG image pixel by length n piecemeal (n>1), from one of them piecemeal of taking-up, the red, green, blue component parameters lowest order getting each pixel in this piecemeal forms the RGB coefficient least significant bit matrix D of a 3 × n, calculates this matrix element sum
The actual data b ' embedded meets
b’=S’mod2
Lightweight PNG pictorial information based on pixel RGB coefficient least significant bit partitioning of matrix parity is hidden model and is taken in the process of actual execution information insertion and mainly contains 3 steps: embedding data length computation and picture carrier are chosen, embedding data length mark, real data embeds, wherein:
Whether embedding data length computation and picture carrier are chosen can as carrier by calculating the information content detected image embedded, in specific implementation process, consider the disposal ability of mobile phone environment, n=4 is got in information hiding model in this paper, and the picture minimum dimension that can embed information requires that its total pixel value is no less than 64 pixels, and the image-region of embedding data can not be greater than 512 × 512 pixels (if total number of image pixels is greater than 512 × 512, at most only selecting front 512 × 512 pixels to carry out information insertion) in actual realization.
Embedding data length mark is mainly used in the length embedding actual write data in the picture, the information of relevant data length mark is write in the blocks of pixels that front 16 length of this image are 4, concrete mode is to calculate for representing that the 2 system numbers that 10 system numbers of embedding data byte length are converted into 16 represent, be one that each segmentation in the segmentation of 4 embeds this 2 system number in front 16 length of image, embedding grammar is identical with the mode of the information insertion proposed above.
Complete data length mark after will carry out real data telescopiny then, other length directly after image embedding data length be 4 piecemeal embed, until all information insertion are complete.Comprise carrier picture validation checking, data length mark embed and real data embed whole process as shown in Figure 2.
As shown in Figure 3, which show the process of receiving terminal data decryption, specifically comprise the following steps:
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Generally; the hardware encryption transmission of above-mentioned mobile phone privacy note of the present invention and memory technology; not occupying system resources; simple to operate; ease for use is strong; there is high-performance, high security, high reliability, compensate for the deficiency of prior art on secret communication realizes, effectively can meet the encipherment protection demand of people to secret communication or contact.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.
Claims (7)
1. an information decoding method, is characterized in that: described decode procedure comprises the following steps:
(5) receiving terminal receives and carries close picture, obtains the enciphered message embedded, and specifically comprises obtaining carrying confidential information length mark, and reads enciphered message according to length mark order;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
2. information decoding method as claimed in claim 1, is characterized in that:
Within wherein said year, close picture is produced by following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal.
3. information decoding method as claimed in claim 2, is characterized in that:
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
4. information decoding method as claimed in claim 2, is characterized in that:
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, carry out AES encryption using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used.
5. information decoding method as claimed in claim 2, is characterized in that:
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
6. information decoding method as claimed in claim 1, is characterized in that:
Described picture is PNG form.
7. one kind adopts information decoding method in claim 1-6 to carry out the terminal of information decoding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551708.0A CN105119923B (en) | 2015-09-01 | 2015-09-01 | A kind of information decoding method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551708.0A CN105119923B (en) | 2015-09-01 | 2015-09-01 | A kind of information decoding method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105119923A true CN105119923A (en) | 2015-12-02 |
CN105119923B CN105119923B (en) | 2018-03-23 |
Family
ID=54667811
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510551708.0A Expired - Fee Related CN105119923B (en) | 2015-09-01 | 2015-09-01 | A kind of information decoding method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105119923B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888611A (en) * | 2017-11-29 | 2018-04-06 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Communication means and device |
CN111010491A (en) * | 2019-12-26 | 2020-04-14 | 合肥道正企智大数据有限公司 | Image data transmission method, device and system based on hiding technology |
CN111107245A (en) * | 2019-12-26 | 2020-05-05 | 合肥道正企智大数据有限公司 | Efficient interrupt recoverable image hiding encryption transmission method, device and system |
CN112100639A (en) * | 2020-11-03 | 2020-12-18 | 广州市玄武无线科技股份有限公司 | Data encryption transmission method and system based on metadata service information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
-
2015
- 2015-09-01 CN CN201510551708.0A patent/CN105119923B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
Non-Patent Citations (1)
Title |
---|
金易琛: "移动终端短信安全传输系统", 《南京邮电大学硕士学位论文》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888611A (en) * | 2017-11-29 | 2018-04-06 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Communication means and device |
CN107888611B (en) * | 2017-11-29 | 2020-10-02 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Communication method and device |
CN111010491A (en) * | 2019-12-26 | 2020-04-14 | 合肥道正企智大数据有限公司 | Image data transmission method, device and system based on hiding technology |
CN111107245A (en) * | 2019-12-26 | 2020-05-05 | 合肥道正企智大数据有限公司 | Efficient interrupt recoverable image hiding encryption transmission method, device and system |
CN112100639A (en) * | 2020-11-03 | 2020-12-18 | 广州市玄武无线科技股份有限公司 | Data encryption transmission method and system based on metadata service information |
Also Published As
Publication number | Publication date |
---|---|
CN105119923B (en) | 2018-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105119924B (en) | A kind of information transferring method | |
Rashmi et al. | An improved method for reversible data hiding steganography combined with cryptography | |
CN104052658B (en) | A kind of intimacy protection system and method based on social networks | |
Saini et al. | A hybrid approach for image security by combining encryption and steganography | |
Gnanaguruparan et al. | Recursive hiding of secrets in visual cryptography | |
CN104993923A (en) | Radar data protection method based on combination of information hiding and encryption techniques | |
Phad Vitthal et al. | A novel security scheme for secret data using cryptography and steganography | |
CN103414842A (en) | Image data encryption method and system and image data decryption method and system | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN105119923B (en) | A kind of information decoding method and terminal | |
CN107426172A (en) | The matching method for pushing and device of a kind of identity information | |
Malalla et al. | Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography | |
CN105263136A (en) | Information encryption method and terminal | |
Prasetyadi et al. | File encryption and hiding application based on AES and append insertion steganography | |
CN118337498A (en) | Data transmission method based on symmetric key pool | |
EP3131230B1 (en) | Encryption method, program, and system | |
Kumari et al. | Data security using image steganography and weighing its techniques | |
CN117675189A (en) | Data encryption method, data decryption device and electronic equipment | |
CN111541652A (en) | System for improving security of secret information keeping and transmission | |
CN115001758A (en) | Short byte message security encryption method based on quantum encryption | |
JP2005114870A (en) | Cryptocommunication system | |
CN102761417A (en) | Method for processing data transmission of terminals and terminal | |
CN112069472A (en) | User login authentication method and system | |
Malik et al. | Development of medical image encryption system using byte-level base-64 encoding and aes encryption method | |
CN103746793A (en) | Number form text encryption and decryption methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180323 Termination date: 20180901 |
|
CF01 | Termination of patent right due to non-payment of annual fee |