CN105119924A - Information transmission method - Google Patents

Information transmission method Download PDF

Info

Publication number
CN105119924A
CN105119924A CN201510551787.5A CN201510551787A CN105119924A CN 105119924 A CN105119924 A CN 105119924A CN 201510551787 A CN201510551787 A CN 201510551787A CN 105119924 A CN105119924 A CN 105119924A
Authority
CN
China
Prior art keywords
information
key
picture
lable
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510551787.5A
Other languages
Chinese (zh)
Other versions
CN105119924B (en
Inventor
刘金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU HARMONY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU HARMONY TECHNOLOGY Co Ltd filed Critical CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority to CN201510551787.5A priority Critical patent/CN105119924B/en
Publication of CN105119924A publication Critical patent/CN105119924A/en
Application granted granted Critical
Publication of CN105119924B publication Critical patent/CN105119924B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an information encrypted-transmission method and aims at realizing the encrypted communication of information using an encryption technology. The information encrypted-transmission method comprises the following steps: (1) a transmitting end obtains the identification information of a receiving end and the transmitting end and generates a key for encryption and decryption by virtue of a key generation module; (2) the transmitting end performs hardware encryption on information content by using an encryption and decryption module and invoking the key; (3) the transmitting end invokes a picture embedding module to embed the encrypted information into a specific picture; (4) the transmitting end sends the encrypted information embedded picture to the receiving end over a network; (5) the receiving end receives the picture and obtains the embedded encrypted information; and (6) the receiving end invokes a decryption module and obtains a decryption key to decrypt and display the encrypted information.

Description

A kind of information transferring method
Technical field
The present invention is applied to the field such as mobile communication and information security, particularly relates to a kind of information encrypting transmission method.
Background technology
By inquiry; in the market; also do not have mobile phone be directly encrypted transmission to short message content and store, do not have mobile phone products to use hardware encryption chip to carry out data protection yet, current software market has some software application can be encrypted transmission for some notes or store.The mode that transmission realizes usually is: the machine arranges a security password, this password is told to recipient simultaneously; When sending short messages, this password is encrypted as key note; Be decrypted according to the password known in advance after recipient receives Encrypted short message.The mode that storage realizes usually fixes certain key, specifies certain note to be encrypted, and then ciphertext is replaced and preserve in systems in which, what see when not deciphering is ciphertext.Only just can see expressly after the administration interface deciphering of correspondence.At least there is the deficiency of following several respects in this scheme or technology: (1) availability is not strong.Current application only realizes a part substantially, do not consider from the angle of system comprehensively, such as or be only realize encrypting at hop, be exactly only realize local SMS encryption, more do not consider to encrypt in what situations in use not encrypt in what situations, the safety for note does not accomplish overall consideration yet, from the secret generating of note, to encrypted transmission, then to consider to local this each stage of preservation.Therefore want the note safety system oneself doing complete set, need multiple software to coordinate, and be difficult to cooperate viewed from current application software.(2) ease for use is poor.Go out a key by transmit leg and recipient's as offered, not only use inconvenience, and add extra cost.Be inconvenient to be in, both sides need communication, perhaps phone, perhaps note; If, and when having multiple contact person to use Encrypted short message, multiple password will be produced, be in this case just not easy to remember.Need during deciphering to look for clear crytpographic key temporarily.If each note is consulted once, although can obtain password, communications cost adds, and such as originally sends out a note, but ensures that the situation of safety produces three notes down to I haven't seen you for ages, and communications cost adds 2 times.And every bar note can only be expressly when preserving, otherwise the password of correspondence is lost and just cannot have been untied.For the application of storage encryption note, often it is seen that ciphertext, this is concerning the people wanting to check short message content, and be very painful, can not find out it is which bar note, needing every bar all to decipher could determine at a glance.(3) fail safe is not high.From the application software existed in the market, the safety problem that different application exists also is not quite similar.Main security risk is to apply the incomplete property realized.Not from the secret generating of note, to encrypted transmission, then carried out security consideration to local this each stage of preservation, but only realized a part, existing application is also substantially all very weak to the setting of key in addition, and fail safe is very poor.
Summary of the invention
The object of the present invention is to provide a kind of safe information encrypting transmission method.
For achieving the above object, first the present invention provides a kind of information encrypting transmission method, and described transmitting procedure comprises the following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal;
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
Described picture is PNG form.
Accompanying drawing explanation
Fig. 1 is transmitting terminal enciphered message process schematic of the present invention.
Enciphered message is of the present inventionly embedded picture flow chart by Fig. 2.
Fig. 3 is receiving terminal decryption information process schematic of the present invention.
Embodiment
Technical scheme for a better understanding of the present invention, describes embodiment provided by the invention in detail below in conjunction with accompanying drawing.
As shown in Figure 1, which show the flow process of transmitting terminal to information encryption, concrete following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.Wherein mobile phone logo can be receiving terminal, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms is often reducing in order to the quantity of guarantee information embedding the image pixel number carrying per bit quantity as far as possible, but in SMS environment, consider that the required data volume hidden can not be excessive, the image pixel number of greater number can be selected in Information hiding process, can avoid causing information steganography to be detected attack algorithm because information amendment is too intensive in information insertion process like this and find.The present invention proposes following one and hides incorporation model based on pixel RGB coefficient least significant bit partitioning of matrix parity informa-tion:
Step one: by each for PNG image pixel by length n piecemeal (n>1), take out a blocks of pixels, what obtain each pixel in this piecemeal comprises transparent channel (Alpha), the relevant parameter of color space RGB information, the data segment that this 24 bit parameter of each pixel can be separated into 48 bits represents this pixel transparency respectively, red component, the color parameter information of green component and blue colouring component, single pixel is got respectively to it is red, green, blue component parameters lowest order, the lowest order obtained is pressed R-G-B order and red with these other pixels of block of pixels, green, blue component parameters lowest order together forms the PNG image RGB coefficient least significant bit matrix D of a 3 × n, it meets:
D = d 0 r d 0 g d 0 b d 1 r d 1 g d 1 b . . . . . . . . . d ( n - 1 ) r d ( n - 1 ) g d ( n - 1 ) b
Step 2: calculate this matrix D each element sum S and this matrix odd even specialty flags I, wherein S and I meets following formula:
S = Σ i = 0 n - 1 ( d i r + d i g + d i g )
I=Smod2
Step 3: take out a bit b from data to be embedded, if b=I, then this matrix-block does not revise any one data, otherwise gets random natural number R, C (R<n, C<3) and revise the element d in matrix D according to the following rules rC:
If the piecemeal taken out is the first piecemeal that image takes out, then d rCvalue+1, otherwise perform in operating with-1+1 with on once have revise operate performed by piecemeal in contrary operation.
Repeatedly perform step one to step 3, until all information is embedded into complete.
Information extraction algorithm is then relatively simple, by each for PNG image pixel by length n piecemeal (n>1), from one of them piecemeal of taking-up, the red, green, blue component parameters lowest order getting each pixel in this piecemeal forms the RGB coefficient least significant bit matrix D of a 3 × n, calculates this matrix element sum
S , = &Sigma; i = 0 n - 1 ( d i r + d i g + d i g )
The actual data b ' embedded meets
b’=S’mod2
Lightweight PNG pictorial information based on pixel RGB coefficient least significant bit partitioning of matrix parity is hidden model and is taken in the process of actual execution information insertion and mainly contains 3 steps: embedding data length computation and picture carrier are chosen, embedding data length mark, real data embeds, wherein:
Whether embedding data length computation and picture carrier are chosen can as carrier by calculating the information content detected image embedded, in specific implementation process, consider the disposal ability of mobile phone environment, n=4 is got in information hiding model in this paper, and the picture minimum dimension that can embed information requires that its total pixel value is no less than 64 pixels, and the image-region of embedding data can not be greater than 512 × 512 pixels (if total number of image pixels is greater than 512 × 512, at most only selecting front 512 × 512 pixels to carry out information insertion) in actual realization.
Embedding data length mark is mainly used in the length embedding actual write data in the picture, the information of relevant data length mark is write in the blocks of pixels that front 16 length of this image are 4, concrete mode is to calculate for representing that the 2 system numbers that 10 system numbers of embedding data byte length are converted into 16 represent, be one that each segmentation in the segmentation of 4 embeds this 2 system number in front 16 length of image, embedding grammar is identical with the mode of the information insertion proposed above.
Complete data length mark after will carry out real data telescopiny then, other length directly after image embedding data length be 4 piecemeal embed, until all information insertion are complete.Comprise carrier picture validation checking, data length mark embed and real data embed whole process as shown in Figure 2.
As shown in Figure 3, which show the process of receiving terminal data decryption, specifically comprise the following steps:
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Generally; the hardware encryption transmission of above-mentioned mobile phone privacy note of the present invention and memory technology; not occupying system resources; simple to operate; ease for use is strong; there is high-performance, high security, high reliability, compensate for the deficiency of prior art on secret communication realizes, effectively can meet the encipherment protection demand of people to secret communication or contact.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.

Claims (6)

1. an information transferring method, is characterized in that: described transmitting procedure comprises the following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal;
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
2. information transferring method as claimed in claim 1, is characterized in that:
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
3. information transferring method as claimed in claim 1, is characterized in that:
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, carry out AES encryption using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used.
4. information transferring method as claimed in claim 1, is characterized in that:
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
5. information transferring method as claimed in claim 4, is characterized in that:
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
6. information transferring method as claimed in claim 1, is characterized in that:
Described picture is PNG form.
CN201510551787.5A 2015-09-01 2015-09-01 A kind of information transferring method Expired - Fee Related CN105119924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510551787.5A CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510551787.5A CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Publications (2)

Publication Number Publication Date
CN105119924A true CN105119924A (en) 2015-12-02
CN105119924B CN105119924B (en) 2018-04-10

Family

ID=54667812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510551787.5A Expired - Fee Related CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Country Status (1)

Country Link
CN (1) CN105119924B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429866A (en) * 2016-01-01 2016-03-23 江苏图码信息科技有限公司 Private message code product and application assembly
CN106028063A (en) * 2016-06-14 2016-10-12 广州小百合信息技术有限公司 Method and device for transmitting video displayed by display screen
CN110855362A (en) * 2019-11-18 2020-02-28 南京工程学院 Secret communication method and system based on visible light LED matrix
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN112100639A (en) * 2020-11-03 2020-12-18 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
金易琛: "移动终端短信安全传输系统", 《南京邮电大学硕士学位论文》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429866A (en) * 2016-01-01 2016-03-23 江苏图码信息科技有限公司 Private message code product and application assembly
CN105429866B (en) * 2016-01-01 2018-09-11 江苏图码信息科技有限公司 Personal letter code product
CN106028063A (en) * 2016-06-14 2016-10-12 广州小百合信息技术有限公司 Method and device for transmitting video displayed by display screen
CN110855362A (en) * 2019-11-18 2020-02-28 南京工程学院 Secret communication method and system based on visible light LED matrix
CN110855362B (en) * 2019-11-18 2021-08-03 南京工程学院 Secret communication method and system based on visible light LED matrix
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN112100639A (en) * 2020-11-03 2020-12-18 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment

Also Published As

Publication number Publication date
CN105119924B (en) 2018-04-10

Similar Documents

Publication Publication Date Title
CN105119924A (en) Information transmission method
CN103795533B (en) Encryption based on identifier, the method and its performs device of decryption
Rashmi et al. An improved method for reversible data hiding steganography combined with cryptography
US8259934B2 (en) Methods and devices for a chained encryption mode
US10009170B2 (en) Apparatus and method for providing Feistel-based variable length block cipher
Saini et al. A hybrid approach for image security by combining encryption and steganography
Phad Vitthal et al. A novel security scheme for secret data using cryptography and steganography
CN104243149A (en) Encrypting and decrypting method, device and server
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
CN105119923B (en) A kind of information decoding method and terminal
CN107426172A (en) The matching method for pushing and device of a kind of identity information
CN105263136A (en) Information encryption method and terminal
CN118337498A (en) Data transmission method based on symmetric key pool
EP3131230B1 (en) Encryption method, program, and system
CN111541652B (en) System for improving security of secret information keeping and transmission
CN105049176B (en) Decryption method for view data safe transmission
CN115001758B (en) Quantum encryption-based short byte message security encryption method
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
JP2005114870A (en) Cryptocommunication system
CN102761417A (en) Method for processing data transmission of terminals and terminal
CN112069472A (en) User login authentication method and system
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
Malik et al. Development of medical image encryption system using byte-level base-64 encoding and aes encryption method
CN103746793A (en) Number form text encryption and decryption methods
Ameer et al. Improve Steganography Encrypted Audio Message in Video Frame.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180410

Termination date: 20180901

CF01 Termination of patent right due to non-payment of annual fee