CN105119924A - Information transmission method - Google Patents
Information transmission method Download PDFInfo
- Publication number
- CN105119924A CN105119924A CN201510551787.5A CN201510551787A CN105119924A CN 105119924 A CN105119924 A CN 105119924A CN 201510551787 A CN201510551787 A CN 201510551787A CN 105119924 A CN105119924 A CN 105119924A
- Authority
- CN
- China
- Prior art keywords
- information
- key
- picture
- lable
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an information encrypted-transmission method and aims at realizing the encrypted communication of information using an encryption technology. The information encrypted-transmission method comprises the following steps: (1) a transmitting end obtains the identification information of a receiving end and the transmitting end and generates a key for encryption and decryption by virtue of a key generation module; (2) the transmitting end performs hardware encryption on information content by using an encryption and decryption module and invoking the key; (3) the transmitting end invokes a picture embedding module to embed the encrypted information into a specific picture; (4) the transmitting end sends the encrypted information embedded picture to the receiving end over a network; (5) the receiving end receives the picture and obtains the embedded encrypted information; and (6) the receiving end invokes a decryption module and obtains a decryption key to decrypt and display the encrypted information.
Description
Technical field
The present invention is applied to the field such as mobile communication and information security, particularly relates to a kind of information encrypting transmission method.
Background technology
By inquiry; in the market; also do not have mobile phone be directly encrypted transmission to short message content and store, do not have mobile phone products to use hardware encryption chip to carry out data protection yet, current software market has some software application can be encrypted transmission for some notes or store.The mode that transmission realizes usually is: the machine arranges a security password, this password is told to recipient simultaneously; When sending short messages, this password is encrypted as key note; Be decrypted according to the password known in advance after recipient receives Encrypted short message.The mode that storage realizes usually fixes certain key, specifies certain note to be encrypted, and then ciphertext is replaced and preserve in systems in which, what see when not deciphering is ciphertext.Only just can see expressly after the administration interface deciphering of correspondence.At least there is the deficiency of following several respects in this scheme or technology: (1) availability is not strong.Current application only realizes a part substantially, do not consider from the angle of system comprehensively, such as or be only realize encrypting at hop, be exactly only realize local SMS encryption, more do not consider to encrypt in what situations in use not encrypt in what situations, the safety for note does not accomplish overall consideration yet, from the secret generating of note, to encrypted transmission, then to consider to local this each stage of preservation.Therefore want the note safety system oneself doing complete set, need multiple software to coordinate, and be difficult to cooperate viewed from current application software.(2) ease for use is poor.Go out a key by transmit leg and recipient's as offered, not only use inconvenience, and add extra cost.Be inconvenient to be in, both sides need communication, perhaps phone, perhaps note; If, and when having multiple contact person to use Encrypted short message, multiple password will be produced, be in this case just not easy to remember.Need during deciphering to look for clear crytpographic key temporarily.If each note is consulted once, although can obtain password, communications cost adds, and such as originally sends out a note, but ensures that the situation of safety produces three notes down to I haven't seen you for ages, and communications cost adds 2 times.And every bar note can only be expressly when preserving, otherwise the password of correspondence is lost and just cannot have been untied.For the application of storage encryption note, often it is seen that ciphertext, this is concerning the people wanting to check short message content, and be very painful, can not find out it is which bar note, needing every bar all to decipher could determine at a glance.(3) fail safe is not high.From the application software existed in the market, the safety problem that different application exists also is not quite similar.Main security risk is to apply the incomplete property realized.Not from the secret generating of note, to encrypted transmission, then carried out security consideration to local this each stage of preservation, but only realized a part, existing application is also substantially all very weak to the setting of key in addition, and fail safe is very poor.
Summary of the invention
The object of the present invention is to provide a kind of safe information encrypting transmission method.
For achieving the above object, first the present invention provides a kind of information encrypting transmission method, and described transmitting procedure comprises the following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal;
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
Described picture is PNG form.
Accompanying drawing explanation
Fig. 1 is transmitting terminal enciphered message process schematic of the present invention.
Enciphered message is of the present inventionly embedded picture flow chart by Fig. 2.
Fig. 3 is receiving terminal decryption information process schematic of the present invention.
Embodiment
Technical scheme for a better understanding of the present invention, describes embodiment provided by the invention in detail below in conjunction with accompanying drawing.
As shown in Figure 1, which show the flow process of transmitting terminal to information encryption, concrete following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used, multi-enciphering process improves the fail safe of key.Wherein mobile phone logo can be receiving terminal, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms is often reducing in order to the quantity of guarantee information embedding the image pixel number carrying per bit quantity as far as possible, but in SMS environment, consider that the required data volume hidden can not be excessive, the image pixel number of greater number can be selected in Information hiding process, can avoid causing information steganography to be detected attack algorithm because information amendment is too intensive in information insertion process like this and find.The present invention proposes following one and hides incorporation model based on pixel RGB coefficient least significant bit partitioning of matrix parity informa-tion:
Step one: by each for PNG image pixel by length n piecemeal (n>1), take out a blocks of pixels, what obtain each pixel in this piecemeal comprises transparent channel (Alpha), the relevant parameter of color space RGB information, the data segment that this 24 bit parameter of each pixel can be separated into 48 bits represents this pixel transparency respectively, red component, the color parameter information of green component and blue colouring component, single pixel is got respectively to it is red, green, blue component parameters lowest order, the lowest order obtained is pressed R-G-B order and red with these other pixels of block of pixels, green, blue component parameters lowest order together forms the PNG image RGB coefficient least significant bit matrix D of a 3 × n, it meets:
Step 2: calculate this matrix D each element sum S and this matrix odd even specialty flags I, wherein S and I meets following formula:
I=Smod2
Step 3: take out a bit b from data to be embedded, if b=I, then this matrix-block does not revise any one data, otherwise gets random natural number R, C (R<n, C<3) and revise the element d in matrix D according to the following rules
rC:
If the piecemeal taken out is the first piecemeal that image takes out, then d
rCvalue+1, otherwise perform in operating with-1+1 with on once have revise operate performed by piecemeal in contrary operation.
Repeatedly perform step one to step 3, until all information is embedded into complete.
Information extraction algorithm is then relatively simple, by each for PNG image pixel by length n piecemeal (n>1), from one of them piecemeal of taking-up, the red, green, blue component parameters lowest order getting each pixel in this piecemeal forms the RGB coefficient least significant bit matrix D of a 3 × n, calculates this matrix element sum
The actual data b ' embedded meets
b’=S’mod2
Lightweight PNG pictorial information based on pixel RGB coefficient least significant bit partitioning of matrix parity is hidden model and is taken in the process of actual execution information insertion and mainly contains 3 steps: embedding data length computation and picture carrier are chosen, embedding data length mark, real data embeds, wherein:
Whether embedding data length computation and picture carrier are chosen can as carrier by calculating the information content detected image embedded, in specific implementation process, consider the disposal ability of mobile phone environment, n=4 is got in information hiding model in this paper, and the picture minimum dimension that can embed information requires that its total pixel value is no less than 64 pixels, and the image-region of embedding data can not be greater than 512 × 512 pixels (if total number of image pixels is greater than 512 × 512, at most only selecting front 512 × 512 pixels to carry out information insertion) in actual realization.
Embedding data length mark is mainly used in the length embedding actual write data in the picture, the information of relevant data length mark is write in the blocks of pixels that front 16 length of this image are 4, concrete mode is to calculate for representing that the 2 system numbers that 10 system numbers of embedding data byte length are converted into 16 represent, be one that each segmentation in the segmentation of 4 embeds this 2 system number in front 16 length of image, embedding grammar is identical with the mode of the information insertion proposed above.
Complete data length mark after will carry out real data telescopiny then, other length directly after image embedding data length be 4 piecemeal embed, until all information insertion are complete.Comprise carrier picture validation checking, data length mark embed and real data embed whole process as shown in Figure 2.
As shown in Figure 3, which show the process of receiving terminal data decryption, specifically comprise the following steps:
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
Generally; the hardware encryption transmission of above-mentioned mobile phone privacy note of the present invention and memory technology; not occupying system resources; simple to operate; ease for use is strong; there is high-performance, high security, high reliability, compensate for the deficiency of prior art on secret communication realizes, effectively can meet the encipherment protection demand of people to secret communication or contact.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.
Claims (6)
1. an information transferring method, is characterized in that: described transmitting procedure comprises the following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, generates encryption and decryption key used by key production module;
(2) transmitting terminal uses encryption/decryption module, calls described key, carries out hardware encipher to the information content;
(3) transmitting terminal calls picture merge module by the information insertion after encryption in particular picture;
(4) picture embedding enciphered message is sent to receiving terminal by network by transmitting terminal;
(5) receiving terminal receives described picture, obtains the enciphered message embedded;
(6) receiving terminal calls deciphering module, and obtains decruption key and be decrypted enciphered message and show.
2. information transferring method as claimed in claim 1, is characterized in that:
Described receiving terminal and transmitting terminal mark can be telephone number or other account number of only one.
3. information transferring method as claimed in claim 1, is characterized in that:
The method that described key production module generates key is: the mobile phone logo lable_s obtaining transmit leg and recipient, lable_r and transmitting time time, use lable_s, lable_r and time is as change ginseng, take lable_s as Key, be that metadata is encrypted with lable_r, using AES encryption algorithm to obtain encrypted data is Key1=E1 (lable_s, lable_r), afterwards again using Key1 as Key, carry out AES encryption using time as source data, obtain Key2=E1 (Key1, time), using Key2 as encryption and decryption key used.
4. information transferring method as claimed in claim 1, is characterized in that:
Step enciphered message being embedded into picture comprises:
Encrypted data length calculates, can as carrier when image selected by judging;
Embedding encrypted data length identifies, in the blocks of pixels that front 16 length of image are 4, write encrypted data length identification information;
Embed enciphered data, the length after embedded length identification information piecemeal be 4 piecemeal carry out information insertion, until all information insertion are complete.
5. information transferring method as claimed in claim 4, is characterized in that:
The step extracting enciphered message from picture comprises:
Obtain enciphered message data length; Described information is extracted according to described length sequence.
6. information transferring method as claimed in claim 1, is characterized in that:
Described picture is PNG form.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551787.5A CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551787.5A CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105119924A true CN105119924A (en) | 2015-12-02 |
CN105119924B CN105119924B (en) | 2018-04-10 |
Family
ID=54667812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510551787.5A Expired - Fee Related CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105119924B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429866A (en) * | 2016-01-01 | 2016-03-23 | 江苏图码信息科技有限公司 | Private message code product and application assembly |
CN106028063A (en) * | 2016-06-14 | 2016-10-12 | 广州小百合信息技术有限公司 | Method and device for transmitting video displayed by display screen |
CN110855362A (en) * | 2019-11-18 | 2020-02-28 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN111010491A (en) * | 2019-12-26 | 2020-04-14 | 合肥道正企智大数据有限公司 | Image data transmission method, device and system based on hiding technology |
CN112100639A (en) * | 2020-11-03 | 2020-12-18 | 广州市玄武无线科技股份有限公司 | Data encryption transmission method and system based on metadata service information |
CN112738561A (en) * | 2020-12-03 | 2021-04-30 | 西安慧博文定信息技术有限公司 | OTP (one time programmable) image encryption and verification based method and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
-
2015
- 2015-09-01 CN CN201510551787.5A patent/CN105119924B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
Non-Patent Citations (1)
Title |
---|
金易琛: "移动终端短信安全传输系统", 《南京邮电大学硕士学位论文》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429866A (en) * | 2016-01-01 | 2016-03-23 | 江苏图码信息科技有限公司 | Private message code product and application assembly |
CN105429866B (en) * | 2016-01-01 | 2018-09-11 | 江苏图码信息科技有限公司 | Personal letter code product |
CN106028063A (en) * | 2016-06-14 | 2016-10-12 | 广州小百合信息技术有限公司 | Method and device for transmitting video displayed by display screen |
CN110855362A (en) * | 2019-11-18 | 2020-02-28 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN110855362B (en) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN111010491A (en) * | 2019-12-26 | 2020-04-14 | 合肥道正企智大数据有限公司 | Image data transmission method, device and system based on hiding technology |
CN112100639A (en) * | 2020-11-03 | 2020-12-18 | 广州市玄武无线科技股份有限公司 | Data encryption transmission method and system based on metadata service information |
CN112738561A (en) * | 2020-12-03 | 2021-04-30 | 西安慧博文定信息技术有限公司 | OTP (one time programmable) image encryption and verification based method and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105119924B (en) | 2018-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105119924A (en) | Information transmission method | |
CN103795533B (en) | Encryption based on identifier, the method and its performs device of decryption | |
Rashmi et al. | An improved method for reversible data hiding steganography combined with cryptography | |
US8259934B2 (en) | Methods and devices for a chained encryption mode | |
US10009170B2 (en) | Apparatus and method for providing Feistel-based variable length block cipher | |
Saini et al. | A hybrid approach for image security by combining encryption and steganography | |
Phad Vitthal et al. | A novel security scheme for secret data using cryptography and steganography | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN104993923A (en) | Radar data protection method based on combination of information hiding and encryption techniques | |
CN105119923B (en) | A kind of information decoding method and terminal | |
CN107426172A (en) | The matching method for pushing and device of a kind of identity information | |
CN105263136A (en) | Information encryption method and terminal | |
CN118337498A (en) | Data transmission method based on symmetric key pool | |
EP3131230B1 (en) | Encryption method, program, and system | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN105049176B (en) | Decryption method for view data safe transmission | |
CN115001758B (en) | Quantum encryption-based short byte message security encryption method | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
JP2005114870A (en) | Cryptocommunication system | |
CN102761417A (en) | Method for processing data transmission of terminals and terminal | |
CN112069472A (en) | User login authentication method and system | |
CN102647428A (en) | Encrypting and decrypting system and method adopting trusteeship control based on communication network | |
Malik et al. | Development of medical image encryption system using byte-level base-64 encoding and aes encryption method | |
CN103746793A (en) | Number form text encryption and decryption methods | |
Ameer et al. | Improve Steganography Encrypted Audio Message in Video Frame. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180410 Termination date: 20180901 |
|
CF01 | Termination of patent right due to non-payment of annual fee |