CN105119923B - A kind of information decoding method and terminal - Google Patents

A kind of information decoding method and terminal Download PDF

Info

Publication number
CN105119923B
CN105119923B CN201510551708.0A CN201510551708A CN105119923B CN 105119923 B CN105119923 B CN 105119923B CN 201510551708 A CN201510551708 A CN 201510551708A CN 105119923 B CN105119923 B CN 105119923B
Authority
CN
China
Prior art keywords
information
encryption
key
lable
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510551708.0A
Other languages
Chinese (zh)
Other versions
CN105119923A (en
Inventor
刘金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU HARMONY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU HARMONY TECHNOLOGY Co Ltd filed Critical CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority to CN201510551708.0A priority Critical patent/CN105119923B/en
Publication of CN105119923A publication Critical patent/CN105119923A/en
Application granted granted Critical
Publication of CN105119923B publication Critical patent/CN105119923B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of information decoding method and terminal, it is intended to the encryption communication of information is realized using encryption technology, the decoding process comprises the following steps:Receiving terminal, which receives, carries close picture, obtains embedded encryption information, specifically includes and obtains containing information length mark, and reads encryption information according to length mark order;Receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.

Description

A kind of information decoding method and terminal
Technical field
The present invention is applied to the fields such as mobile communication and information security, more particularly to a kind of information decoding method and terminal.
Background technology
By inquiry, in the market, also no mobile phone directly short message content is encrypted transmission and storage, does not also have Mobile phone productses carry out data protection using hardware encryption chip, have some software applications to be directed to one in software market at present Transmission or storage is encrypted in a little short messages.The mode generally realized in transmission is:The machine sets a security password, while handle This password is told to recipient;Short message is encrypted using this password as key when sending short messages;It is short that recipient receives encryption It is decrypted after letter according to the password known in advance.The mode generally realized in storage is to fix some key, is specified certain short Letter is encrypted, and then ciphertext is replaced and preserved in systems, what is seen when not decrypting is ciphertext.Only corresponding It can just see in plain text after administration interface decryption.The deficiency of following several respects at least be present in this scheme or technology:(1) availability is not By force.A part is substantially only realized in current application, is not considered comprehensively from the angle of system, otherwise for example it is only to realize passing Defeated Partial encryption, otherwise it is exactly only to realize to local SMS encryption do not account for more that what is encrypting in what situations using upper In the case of do not encrypt, do not accomplish overall consideration for the safety of short message yet, generated from the key of short message, to encrypted transmission, Arrive again and local preserve this each stage and will consider.Therefore the short message security system of complete set oneself is done, it is necessary to multiple soft Part coordinates, and is difficult to mate in terms of current application software.(2) ease for use is poor.Pass through sender and recipient's thing A key is first negotiated, not only in-convenience in use, and adds extra cost.Be inconvenient to be in both sides need logical Letter, perhaps phone, perhaps short message, and if multiple contact persons use Encrypted short message when, multiple passwords will be produced, it is this In the case of be just not easy to remember.Need to look for clear crytpographic key temporarily during decryption.If each short message is consulted once, although can be with Password is obtained, but communications cost adds, such as one short message of hair originally, but ensure at least produce three in the case of safety Short message, communications cost add 2 times.And every short message can only be that otherwise corresponding password, which is lost, just can not in plain text when preserving Untie.For the application for storing Encrypted short message, often it is seen that ciphertext, this is to wanting to check that the people of short message content comes Say, be very painful, it is impossible to be seen to be any bar short message at a glance, it is necessary to which every all decryption just can determine that.(3) security is not high. From the point of view of the application software that currently there are, safety problem existing for different applications is also not quite similar.Main safety It is a risk that using the incomplete property realized.Do not generated from the key of short message, it is each to encrypted transmission, then to locally this is preserved Stage has all carried out security consideration, but only realizes a part, and setting of the existing application to key in addition is also substantially all very Weak, security is very poor.
The content of the invention
It is an object of the invention to provide a kind of safe information encrypting transmission method.
To reach above-mentioned purpose, present invention firstly provides a kind of information decoding method, it is characterised in that:The decoding process Comprise the following steps:
(5) receiving terminal, which receives, carries close picture, obtains embedded encryption information, specifically includes and obtain the long scale of containing information Know, and encryption information is read according to length mark order;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
The wherein described close picture of load is produced by following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network.
Receiving terminal and the transmitting terminal mark can be telephone number or other only one account numbers.
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.
The step of encryption information is embedded into picture includes:
Encrypted data length calculates, and can be used as carrier selected by judgement when image;
Embedded encrypted data length mark, it is write-in encryption data length in 4 blocks of pixels in preceding 16 length of image Spend identification information;
Embedded encryption data, the piecemeal that the length after embedded length identification information piecemeal is 4 enter row information insertion, until All information insertions finish.
The step of encryption information is extracted from picture includes:
Obtain encryption information data length;Described information is extracted according to the length sequence.
The picture is PNG format.
Brief description of the drawings
Fig. 1 is transmitting terminal encryption information process schematic of the present invention.
Encryption information is embedded in picture flow chart by Fig. 2 to be of the present invention.
Fig. 3 is that receiving terminal of the present invention decrypts information process schematic diagram.
Embodiment
In order to be better understood from technical scheme, implementation provided by the invention is described in detail below in conjunction with the accompanying drawings Example.
As shown in figure 1, which show the flow that transmitting terminal is encrypted to information, specific following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.Wherein mobile phone logo can be to connect Receiving end, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms are often reducing carrying per bit as far as possible in order to ensure the quantity of information insertion The image pixel number of quantity, but consider that required hiding data volume will not be excessive in SMS environment, Information hiding During can select greater number of image pixel number, can so avoid in information telescopiny because information was changed In it is intensive and cause information steganography be detected attack algorithm find.The present invention proposes following one kind based on pixel RGB coefficients most Low order partitioning of matrix parity informa-tion hides incorporation model:
Step 1:Each pixel of PNG images is pressed into length n piecemeals (n>1) blocks of pixels, is taken out, obtains this piecemeal In each pixel include transparent channel (Alpha), the relevant parameter of color space RGB information, each pixel this 24 ratio Special parameter can be separated into 48 bits data segment represent respectively the pixel transparency, red component, green component and The color parameter information of blue component, its red, green, blue component parameters lowest order is taken respectively to single pixel, by the minimum of acquisition Position together forms a 3 × n by R-G-B order and with the red, green, blue component parameters lowest order of the block of pixels other pixels PNG image RGB coefficient least significant bit matrix Ds, its meet:
Step 2:Calculate each element sum S of the matrix D and the matrix odd even specialty flags I, wherein S and I meet such as Lower formula:
I=S mod 2
Step 3:A bit b is taken out from data to be embedded, if b=I, the matrix-block does not change any one Data, otherwise take random natural number R, C (R<n,C<3) the element d in matrix D and is changed according to the following rulesRC
If the piecemeal taken out is the first piecemeal that image is taken out, dRCValue+1, otherwise+1 with being held in -1 operation Row has operation opposite in the performed operation of modification piecemeal with the last time.
Step 1 is performed repeatedly to step 3, is finished until all information are embedded into.
Information extraction algorithm is then relatively easy, and each pixel of PNG images is pressed into length n piecemeals (n>1), from take out one of them Piecemeal, take one 3 × n of red, green, blue component parameters lowest order composition of each pixel in this piecemeal RGB coefficients minimum Significance bit matrix D, calculate the matrix element sum
The data b ' being actually embedded in meets
B '=S ' mod 2
Lightweight PNG pictorial informations based on pixel RGB coefficient least significant bit partitioning of matrix parities hide model Take mainly has 3 steps during actual execution information is embedded in:Embedding data length computation is chosen with picture carrier, embedded Data length identifies, real data insertion, wherein:
Whether embedding data length computation and picture carrier are chosen by calculating embedded information content detection image can be with As carrier, in specific implementation process, it is contemplated that the disposal ability of mobile phone environment, set forth herein information hiding model in take n =4, and can the picture minimum dimension of embedding information require that its total pixel value is no less than 64 pixels, and it is actual realize in embedded number According to image-region be not more than 512 × 512 pixels (if total number of image pixels be more than 512 × 512, at most only select before 512 × 512 pixels enter row information insertion).
Embedding data length mark is mainly used in being embedded in the length for being actually written into data in the picture, 16 before the image The information of the relevant data length mark of write-in in the blocks of pixels that length is 4, concrete mode is that will calculate for representing embedded The 2 system numbers that 10 system numbers of data byte length are converted into 16 represent that 16 length are every in 4 segmentation before image One of the embedded 2 system number of one segmentation, the mode of information insertion of the embedding grammar with proposing above are identical.
Complete that real data telescopiny will be carried out then after data length mark, directly after image embedding data length Other length be 4 piecemeal be embedded in, until all information insertion finish.Including carrier picture validation checking, data The whole process of length mark insertion and real data insertion is as shown in Figure 2.
As shown in figure 3, which show the process of receiving terminal ciphertext data, following steps are specifically included:
(5) receiving terminal receives the picture, obtains embedded encryption information;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Generally, the hardware encryption transmission and memory technology of above-mentioned mobile phone privacy short message of the present invention, is not take up System resource, it is simple to operate, it is easily used, there is high-performance, high security, high reliability, compensate for prior art in secret The deficiency that communication is realized, can effectively meet people to secret communication or the encipherment protection demand of contact.
Above content is only presently preferred embodiments of the present invention, for one of ordinary skill in the art, according to the present invention's Thought, there will be changes, this specification content should not be construed as to the present invention in specific embodiments and applications Limitation.

Claims (5)

  1. A kind of 1. information decoding method, it is characterised in that:The decoding process comprises the following steps:(5) it is close to receive load for receiving terminal Picture, embedded encryption information is obtained, specifically include and obtain containing information length mark, and read and added according to length mark order Confidential information;(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown;
    The wherein described close picture of load is produced by following steps:(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, passes through Key used in key production module generation encryption and decryption;(2) transmitting terminal uses encryption/decryption module, the key is called, in information Hold and carry out hardware encryption;(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;(4) send out The picture of embedded encryption information is sent to receiving terminal by sending end by network;
    The method of wherein key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time t ime, using lable_s, lable_r and t ime are as ginseng is become, using lable_s as Key, Encrypted by metadata of lable_r, it is Keyl=El (lable_s, lable_ to obtain encrypted data using AES encryption algorithm R), afterwards again using Keyl as Key, AES encryption is carried out using t ime as source data, obtains Key2=El (Key1, t ime), Using Key2 as the key used in encryption and decryption.
  2. 2. information decoding method as claimed in claim 1, it is characterised in that:Receiving terminal and the transmitting terminal mark can be phone Number or other only one account numbers.
  3. 3. information decoding method as claimed in claim 1, it is characterised in that:The step of encryption information is embedded into picture wraps Include:Encrypted data length calculates, and can be used as carrier selected by judgement when image;Embedded encrypted data length mark, in image Preceding 16 length be 4 blocks of pixels in write-in encrypted data length identification information;Embedded encryption data, in embedded length mark Know the piecemeal that the length after block sort is 4 and enter row information insertion, until the insertion of all information finishes.
  4. 4. information decoding method as claimed in claim 1, it is characterised in that:The picture is PNG format.
  5. 5. information decoding method enters the terminal of row information decoding in a kind of 1-4 using claim.
CN201510551708.0A 2015-09-01 2015-09-01 A kind of information decoding method and terminal Expired - Fee Related CN105119923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510551708.0A CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510551708.0A CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Publications (2)

Publication Number Publication Date
CN105119923A CN105119923A (en) 2015-12-02
CN105119923B true CN105119923B (en) 2018-03-23

Family

ID=54667811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510551708.0A Expired - Fee Related CN105119923B (en) 2015-09-01 2015-09-01 A kind of information decoding method and terminal

Country Status (1)

Country Link
CN (1) CN105119923B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888611B (en) * 2017-11-29 2020-10-02 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Communication method and device
CN111107245A (en) * 2019-12-26 2020-05-05 合肥道正企智大数据有限公司 Efficient interrupt recoverable image hiding encryption transmission method, device and system
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN112100639B (en) * 2020-11-03 2021-02-19 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动终端短信安全传输系统;金易琛;《南京邮电大学硕士学位论文》;20130630;正文第26-43页 *

Also Published As

Publication number Publication date
CN105119923A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
CN105119924B (en) A kind of information transferring method
Rashmi et al. An improved method for reversible data hiding steganography combined with cryptography
Marwaha et al. Visual cryptographic steganography in images
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
CN107809644B (en) A kind of encryption area image reversible data concealing method of double-encryption
CN106251278A (en) A kind of image encryption territory based on histogram feature reversible information hidden method
CN105119923B (en) A kind of information decoding method and terminal
US20190363876A1 (en) Methods and Apparatus for Cryptography
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
CN104243149A (en) Encrypting and decrypting method, device and server
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN104796534A (en) Method and device for processing information contents
GB2526636A (en) Encoder, decoder and methods employing partial data encryption
CN107155113B (en) Method and server for protecting bullet screen information
Taqa et al. New framework for high secure data hidden in the MPEG using AES encryption algorithm
CN103338106A (en) Methods and devices for ciphering and deciphering file
Malalla et al. Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography
CN105391677A (en) Information transmission method and mobile terminal
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
CN105263136A (en) Information encryption method and terminal
CN117834186A (en) Data encryption transmission method and system
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN115883744A (en) Watermark method, device and storage medium based on fractional order chaotic mapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180323

Termination date: 20180901