CN105119923A - Information-decoding method and terminal - Google Patents

Information-decoding method and terminal Download PDF

Info

Publication number
CN105119923A
CN105119923A CN201510551708.0A CN201510551708A CN105119923A CN 105119923 A CN105119923 A CN 105119923A CN 201510551708 A CN201510551708 A CN 201510551708A CN 105119923 A CN105119923 A CN 105119923A
Authority
CN
China
Prior art keywords
information
lable
key
picture
decoding method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510551708.0A
Other languages
Chinese (zh)
Other versions
CN105119923B (en
Inventor
刘金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU HARMONY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU HARMONY TECHNOLOGY Co Ltd filed Critical CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority to CN201510551708.0A priority Critical patent/CN105119923B/en
Publication of CN105119923A publication Critical patent/CN105119923A/en
Application granted granted Critical
Publication of CN105119923B publication Critical patent/CN105119923B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an information-decoding method and a terminal. The aim of the invention is to use an encryption technique to achieve the encrypted communication of information. The decoding process comprises the following steps: a receiving end receives a secrecy-loaded picture, and obtains an embedded enciphered message, specifically to obtain a length indicator of secrecy-loaded information and read the enciphered message according to the length indicator in turn; the receiving end calls a decryption module and obtains a decryption key pair to decrypt the enciphered message and display the enciphered message.

Description

A kind of information decoding method and terminal
Technical field
The present invention is applied to the field such as mobile communication and information security, particularly relates to a kind of information decoding method and terminal.
Background technology
By inquiry; in the market; also do not have mobile phone be directly encrypted transmission to short message content and store, do not have mobile phone products to use hardware encryption chip to carry out data protection yet, current software market has some software application can be encrypted transmission for some notes or store.The mode that transmission realizes usually is: the machine arranges a security password, this password is told to recipient simultaneously; When sending short messages, this password is encrypted as key note; Be decrypted according to the password known in advance after recipient receives Encrypted short message.The mode that storage realizes usually fixes certain key, specifies certain note to be encrypted, and then ciphertext is replaced and preserve in systems in which, what see when not deciphering is ciphertext.Only just can see expressly after the administration interface deciphering of correspondence.At least there is the deficiency of following several respects in this scheme or technology: (1) availability is not strong.Current application only realizes a part substantially, do not consider from the angle of system comprehensively, such as or be only realize encrypting at hop, be exactly only realize local SMS encryption, more do not consider to encrypt in what situations in use not encrypt in what situations, the safety for note does not accomplish overall consideration yet, from the secret generating of note, to encrypted transmission, then to consider to local this each stage of preservation.Therefore want the note safety system oneself doing complete set, need multiple software to coordinate, and be difficult to cooperate viewed from current application software.(2) ease for use is poor.Go out a key by transmit leg and recipient's as offered, not only use inconvenience, and add extra cost.Be inconvenient to be in, both sides need communication, perhaps phone, perhaps note, and if when having multiple contact person to use Encrypted short message, multiple password will be produced, be in this case just not easy to remember.Need during deciphering to look for clear crytpographic key temporarily.If each note is consulted once, although can obtain password, communications cost adds, and such as originally sends out a note, but ensures that the situation of safety produces three notes down to I haven't seen you for ages, and communications cost adds 2 times.And every bar note can only be expressly when preserving, otherwise the password of correspondence is lost and just cannot have been untied.For the application of storage encryption note, often it is seen that ciphertext, this is concerning the people wanting to check short message content, and be very painful, can not find out it is which bar note, needing every bar all to decipher could determine at a glance.(3) fail safe is not high.From the application software existed in the market, the safety problem that different application exists also is not quite similar.Main security risk is to apply the incomplete property realized.Not from the secret generating of note, to encrypted transmission, then carried out security consideration to local this each stage of preservation, but only realized a part, existing application is also substantially all very weak to the setting of key in addition, and fail safe is very poor.
Summary of the invention
The object of the present invention is to provide a kind of safe information encrypting transmission method.
For achieving the above object, first the present invention provides a kind of information decoding method, it is characterized in that: described decode procedure comprises the following steps:
(5) receiving terminal receives and carries close picture, obtains the enciphered message embedded, and specifically comprises obtaining carrying confidential information length mark, and reads enciphered message according to length mark order;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Within wherein said year, close picture is produced by following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal.
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
Described picture is PNG form.
Accompanying drawing explanation
Fig. 1 is transmitting terminal enciphered message process schematic of the present invention.
Enciphered message is of the present inventionly embedded picture flow chart by Fig. 2.
Fig. 3 is receiving terminal decryption information process schematic of the present invention.
Embodiment
Technical scheme for a better understanding of the present invention, describes embodiment provided by the invention in detail below in conjunction with accompanying drawing.
As shown in Figure 1, which show the flow process of transmitting terminal to information encryption, concrete following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.Wherein mobile phone logo can be receiving terminal, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms is often reducing in order to the quantity of guarantee information embedding the image pixel number carrying per bit quantity as far as possible, but in SMS environment, consider that the required data volume hidden can not be excessive, the image pixel number of greater number can be selected in Information hiding process, can avoid causing information steganography to be detected attack algorithm because information amendment is too intensive in information insertion process like this and find.The present invention proposes following one and hides incorporation model based on pixel RGB coefficient least significant bit partitioning of matrix parity informa-tion:
Step one: by each for PNG image pixel by length n piecemeal (n>1), take out a blocks of pixels, what obtain each pixel in this piecemeal comprises transparent channel (Alpha), the relevant parameter of color space RGB information, the data segment that this 24 bit parameter of each pixel can be separated into 48 bits represents this pixel transparency respectively, red component, the color parameter information of green component and blue colouring component, single pixel is got respectively to it is red, green, blue component parameters lowest order, the lowest order obtained is pressed R-G-B order and red with these other pixels of block of pixels, green, blue component parameters lowest order together forms the PNG image RGB coefficient least significant bit matrix D of a 3 × n, it meets:
D = d 0 r d 0 g d 0 b d 1 r d 1 g d 1 b . . . . . . . . . d ( n - 1 ) r d ( n - 1 ) g d ( n - 1 ) b
Step 2: calculate this matrix D each element sum S and this matrix odd even specialty flags I, wherein S and I meets following formula:
I=Smod2
Step 3: take out a bit b from data to be embedded, if b=I, then this matrix-block does not revise any one data, otherwise gets random natural number R, C (R<n, C<3) and revise the element d in matrix D according to the following rules rC:
If the piecemeal taken out is the first piecemeal that image takes out, then d rCvalue+1, otherwise perform in operating with-1+1 with on once have revise operate performed by piecemeal in contrary operation.
Repeatedly perform step one to step 3, until all information is embedded into complete.
Information extraction algorithm is then relatively simple, by each for PNG image pixel by length n piecemeal (n>1), from one of them piecemeal of taking-up, the red, green, blue component parameters lowest order getting each pixel in this piecemeal forms the RGB coefficient least significant bit matrix D of a 3 × n, calculates this matrix element sum
The actual data b ' embedded meets
b’=S’mod2
Lightweight PNG pictorial information based on pixel RGB coefficient least significant bit partitioning of matrix parity is hidden model and is taken in the process of actual execution information insertion and mainly contains 3 steps: embedding data length computation and picture carrier are chosen, embedding data length mark, real data embeds, wherein:
Whether embedding data length computation and picture carrier are chosen can as carrier by calculating the information content detected image embedded, in specific implementation process, consider the disposal ability of mobile phone environment, n=4 is got in information hiding model in this paper, and the picture minimum dimension that can embed information requires that its total pixel value is no less than 64 pixels, and the image-region of embedding data can not be greater than 512 × 512 pixels (if total number of image pixels is greater than 512 × 512, at most only selecting front 512 × 512 pixels to carry out information insertion) in actual realization.
Embedding data length mark is mainly used in the length embedding actual write data in the picture, the information of relevant data length mark is write in the blocks of pixels that front 16 length of this image are 4, concrete mode is to calculate for representing that the 2 system numbers that 10 system numbers of embedding data byte length are converted into 16 represent, be one that each segmentation in the segmentation of 4 embeds this 2 system number in front 16 length of image, embedding grammar is identical with the mode of the information insertion proposed above.
Complete data length mark after will carry out real data telescopiny then, other length directly after image embedding data length be 4 piecemeal embed, until all information insertion are complete.Comprise carrier picture validation checking, data length mark embed and real data embed whole process as shown in Figure 2.
As shown in Figure 3, which show the process of receiving terminal data decryption, specifically comprise the following steps:
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Generally; the hardware encryption transmission of above-mentioned mobile phone privacy note of the present invention and memory technology; not occupying system resources; simple to operate; ease for use is strong; there is high-performance, high security, high reliability, compensate for the deficiency of prior art on secret communication realizes, effectively can meet the encipherment protection demand of people to secret communication or contact.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.

Claims (7)

1. an information decoding method, is characterized in that: described decode procedure comprises the following steps:
(5) receiving terminal receives and carries close picture, obtains the enciphered message embedded, and specifically comprises obtaining carrying confidential information length mark, and reads enciphered message according to length mark order;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
2. information decoding method as claimed in claim 1, is characterized in that:
Within wherein said year, close picture is produced by following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal.
3. information decoding method as claimed in claim 2, is characterized in that:
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
4. information decoding method as claimed in claim 2, is characterized in that:
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, carry out AES encryption using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used.
5. information decoding method as claimed in claim 2, is characterized in that:
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
6. information decoding method as claimed in claim 1, is characterized in that:
Described picture is PNG form.
7. one kind adopts information decoding method in claim 1-6 to carry out the terminal of information decoding.
CN201510551708.0A 2015-09-01 2015-09-01 A kind of information decoding method and terminal Expired - Fee Related CN105119923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510551708.0A CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510551708.0A CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Publications (2)

Publication Number Publication Date
CN105119923A true CN105119923A (en) 2015-12-02
CN105119923B CN105119923B (en) 2018-03-23

Family

ID=54667811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510551708.0A Expired - Fee Related CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Country Status (1)

Country Link
CN (1) CN105119923B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888611A (en) * 2017-11-29 2018-04-06 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Communication means and device
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN111107245A (en) * 2019-12-26 2020-05-05 合肥道正企智大数据有限公司 Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN112100639A (en) * 2020-11-03 2020-12-18 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
金易琛: "移动终端短信安全传输系统", 《南京邮电大学硕士学位论文》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888611A (en) * 2017-11-29 2018-04-06 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Communication means and device
CN107888611B (en) * 2017-11-29 2020-10-02 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Communication method and device
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN111107245A (en) * 2019-12-26 2020-05-05 合肥道正企智大数据有限公司 Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN112100639A (en) * 2020-11-03 2020-12-18 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information

Also Published As

Publication number Publication date
CN105119923B (en) 2018-03-23

Similar Documents

Publication Publication Date Title
CN105119924B (en) A kind of information transferring method
Rashmi et al. An improved method for reversible data hiding steganography combined with cryptography
CN104052658B (en) A kind of intimacy protection system and method based on social networks
Saini et al. A hybrid approach for image security by combining encryption and steganography
Gnanaguruparan et al. Recursive hiding of secrets in visual cryptography
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
Phad Vitthal et al. A novel security scheme for secret data using cryptography and steganography
CN103414842A (en) Image data encryption method and system and image data decryption method and system
CN104243149A (en) Encrypting and decrypting method, device and server
CN105119923B (en) A kind of information decoding method and terminal
CN107426172A (en) The matching method for pushing and device of a kind of identity information
Malalla et al. Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography
CN105263136A (en) Information encryption method and terminal
Prasetyadi et al. File encryption and hiding application based on AES and append insertion steganography
CN118337498A (en) Data transmission method based on symmetric key pool
EP3131230B1 (en) Encryption method, program, and system
Kumari et al. Data security using image steganography and weighing its techniques
CN117675189A (en) Data encryption method, data decryption device and electronic equipment
CN111541652A (en) System for improving security of secret information keeping and transmission
CN115001758A (en) Short byte message security encryption method based on quantum encryption
JP2005114870A (en) Cryptocommunication system
CN102761417A (en) Method for processing data transmission of terminals and terminal
CN112069472A (en) User login authentication method and system
Malik et al. Development of medical image encryption system using byte-level base-64 encoding and aes encryption method
CN103746793A (en) Number form text encryption and decryption methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180323

Termination date: 20180901

CF01 Termination of patent right due to non-payment of annual fee