CN105119924B - A kind of information transferring method - Google Patents
A kind of information transferring method Download PDFInfo
- Publication number
- CN105119924B CN105119924B CN201510551787.5A CN201510551787A CN105119924B CN 105119924 B CN105119924 B CN 105119924B CN 201510551787 A CN201510551787 A CN 201510551787A CN 105119924 B CN105119924 B CN 105119924B
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- key
- embedded
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a kind of information encrypting transmission method, it is intended to the encryption communication of information, including step are realized using encryption technology:(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, and key used in encryption and decryption is generated by key production module;(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;(5) receiving terminal receives the picture, obtains embedded encryption information;(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Description
Technical field
The present invention is applied to the fields such as mobile communication and information security, more particularly to a kind of information encrypting transmission method.
Background technology
By inquiry, in the market, also no mobile phone directly short message content is encrypted transmission and storage, does not also have
Mobile phone productses carry out data protection using hardware encryption chip, have some software applications to be directed to one in software market at present
Transmission or storage is encrypted in a little short messages.The mode generally realized in transmission is:The machine sets a security password, while handle
This password is told to recipient;Short message is encrypted using this password as key when sending short messages;It is short that recipient receives encryption
It is decrypted after letter according to the password known in advance.The mode generally realized in storage is to fix some key, is specified certain short
Letter is encrypted, and then ciphertext is replaced and preserved in systems, what is seen when not decrypting is ciphertext.Only corresponding
It can just see in plain text after administration interface decryption.The deficiency of following several respects at least be present in this scheme or technology:(1) availability is not
By force.A part is substantially only realized in current application, is not considered comprehensively from the angle of system, otherwise for example it is only to realize passing
Defeated Partial encryption, otherwise it is exactly only to realize to local SMS encryption do not account for more that what is encrypting in what situations using upper
In the case of do not encrypt, do not accomplish overall consideration for the safety of short message yet, generated from the key of short message, to encrypted transmission,
Arrive again and local preserve this each stage and will consider.Therefore the short message security system of complete set oneself is done, it is necessary to multiple soft
Part coordinates, and is difficult to mate in terms of current application software.(2) ease for use is poor.Pass through sender and recipient's thing
A key is first negotiated, not only in-convenience in use, and adds extra cost.Be inconvenient to be in both sides need logical
Believe, perhaps phone, perhaps short message;, and if multiple contact persons use Encrypted short message when, multiple passwords will be produced, this
Just it is not easy to remember in the case of kind.Need to look for clear crytpographic key temporarily during decryption.If each short message is consulted once, although can
To obtain password, but communications cost adds, such as one short message of hair originally, but ensures at least produce three in the case of safety
Bar short message, communications cost add 2 times.And every short message can only be that otherwise corresponding password is lost with regard to nothing in plain text when preserving
Method is untied.For the application for storing Encrypted short message, often it is seen that ciphertext, this is to wanting to check that the people of short message content comes
Say, be very painful, it is impossible to be seen to be any bar short message at a glance, it is necessary to which every all decryption just can determine that.(3) security is not high.
From the point of view of the application software that currently there are, safety problem existing for different applications is also not quite similar.Main safety
It is a risk that using the incomplete property realized.Do not generated from the key of short message, it is each to encrypted transmission, then to locally this is preserved
Stage has all carried out security consideration, but only realizes a part, and setting of the existing application to key in addition is also substantially all very
Weak, security is very poor.
The content of the invention
It is an object of the invention to provide a kind of safe information encrypting transmission method.
To reach above-mentioned purpose, present invention firstly provides a kind of information encrypting transmission method, the transmitting procedure include with
Lower step:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption
Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;
(5) receiving terminal receives the picture, obtains embedded encryption information;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Receiving terminal and the transmitting terminal mark can be telephone number or other only one account numbers.
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained,
Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with
Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm,
Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will
Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.
The step of encryption information is embedded into picture includes:
Encrypted data length calculates, and can be used as carrier selected by judgement when image;
Embedded encrypted data length mark, it is write-in encryption data length in 4 blocks of pixels in preceding 16 length of image
Spend identification information;
Embedded encryption data, the piecemeal that the length after embedded length identification information piecemeal is 4 enter row information insertion, until
All information insertions finish.
The step of encryption information is extracted from picture includes:
Obtain encryption information data length;Described information is extracted according to the length sequence.
The picture is PNG format.
Brief description of the drawings
Fig. 1 is transmitting terminal encryption information process schematic of the present invention.
Encryption information is embedded in picture flow chart by Fig. 2 to be of the present invention.
Fig. 3 is that receiving terminal of the present invention decrypts information process schematic diagram.
Embodiment
In order to be better understood from technical scheme, implementation provided by the invention is described in detail below in conjunction with the accompanying drawings
Example.
As shown in figure 1, which show the flow that transmitting terminal is encrypted to information, specific following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption
Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained,
Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with
Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm,
Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will
Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.Wherein mobile phone logo can be to connect
Receiving end, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms are often reducing carrying per bit as far as possible in order to ensure the quantity of information insertion
The image pixel number of quantity, but consider that required hiding data volume will not be excessive in SMS environment, Information hiding
During can select greater number of image pixel number, can so avoid in information telescopiny because information was changed
In it is intensive and cause information steganography be detected attack algorithm find.The present invention proposes following one kind based on pixel RGB coefficients most
Low order partitioning of matrix parity informa-tion hides incorporation model:
Step 1:Each pixel of PNG images is pressed into length n piecemeals (n>1) blocks of pixels, is taken out, obtains this piecemeal
In each pixel include transparent channel (Alpha), the relevant parameter of color space RGB information, each pixel this 24 ratio
Special parameter can be separated into 48 bits data segment represent respectively the pixel transparency, red component, green component and
The color parameter information of blue component, its red, green, blue component parameters lowest order is taken respectively to single pixel, by the minimum of acquisition
Position together forms a 3 × n by R-G-B order and with the red, green, blue component parameters lowest order of the block of pixels other pixels
PNG image RGB coefficient least significant bit matrix Ds, its meet:
Step 2:Calculate each element sum S of the matrix D and the matrix odd even specialty flags I, wherein S and I meet such as
Lower formula:
I=S mod 2
Step 3:A bit b is taken out from data to be embedded, if b=I, the matrix-block does not change any one
Data, otherwise take random natural number R, C (R<n,C<3) the element d in matrix D and is changed according to the following rulesRC:
If the piecemeal taken out is the first piecemeal that image is taken out, dRCValue+1, otherwise+1 with being held in -1 operation
Row has operation opposite in the performed operation of modification piecemeal with the last time.
Step 1 is performed repeatedly to step 3, is finished until all information are embedded into.
Information extraction algorithm is then relatively easy, and each pixel of PNG images is pressed into length n piecemeals (n>1), from take out one of them
Piecemeal, take one 3 × n of red, green, blue component parameters lowest order composition of each pixel in this piecemeal RGB coefficients minimum
Significance bit matrix D, calculate the matrix element sum
The data b ' being actually embedded in meets
B '=S ' mod 2
Lightweight PNG pictorial informations based on pixel RGB coefficient least significant bit partitioning of matrix parities hide model
Take mainly has 3 steps during actual execution information is embedded in:Embedding data length computation is chosen with picture carrier, embedded
Data length identifies, real data insertion, wherein:
Whether embedding data length computation and picture carrier are chosen by calculating embedded information content detection image can be with
As carrier, in specific implementation process, it is contemplated that the disposal ability of mobile phone environment, set forth herein information hiding model in take n
=4, and can the picture minimum dimension of embedding information require that its total pixel value is no less than 64 pixels, and it is actual realize in embedded number
According to image-region be not more than 512 × 512 pixels (if total number of image pixels be more than 512 × 512, at most only select before 512
× 512 pixels enter row information insertion).
Embedding data length mark is mainly used in being embedded in the length for being actually written into data in the picture, 16 before the image
The information of the relevant data length mark of write-in in the blocks of pixels that length is 4, concrete mode is that will calculate for representing embedded
The 2 system numbers that 10 system numbers of data byte length are converted into 16 represent that 16 length are every in 4 segmentation before image
One of the embedded 2 system number of one segmentation, the mode of information insertion of the embedding grammar with proposing above are identical.
Complete that real data telescopiny will be carried out then after data length mark, directly after image embedding data length
Other length be 4 piecemeal be embedded in, until all information insertion finish.Including carrier picture validation checking, data
The whole process of length mark insertion and real data insertion is as shown in Figure 2.
As shown in figure 3, which show the process of receiving terminal ciphertext data, following steps are specifically included:
(5) receiving terminal receives the picture, obtains embedded encryption information;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Generally, the hardware encryption transmission and memory technology of above-mentioned mobile phone privacy short message of the present invention, is not take up
System resource, it is simple to operate, it is easily used, there is high-performance, high security, high reliability, compensate for prior art in secret
The deficiency that communication is realized, can effectively meet people to secret communication or the encipherment protection demand of contact.
Above content is only presently preferred embodiments of the present invention, for one of ordinary skill in the art, according to the present invention's
Thought, there will be changes, this specification content should not be construed as to the present invention in specific embodiments and applications
Limitation.
Claims (5)
- A kind of 1. information transferring method, it is characterised in that:The transmitting procedure comprises the following steps:(1) transmitting terminal, which obtains, receives End and transmitting terminal identification information, key used in encryption and decryption is generated by key production module;(2) transmitting terminal uses encryption and decryption mould Block, the key is called, hardware encryption is carried out to the information content;(3) transmitting terminal calls picture insertion module by the letter after encryption Breath is embedded into particular picture;(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;(5) receive End receives the picture, obtains embedded encryption information;(6) receiving terminal calls deciphering module, and obtains decruption key to encryption Information is decrypted and shown;The method of wherein key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Keyl=El (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Keyl as Key, AES encryption is carried out using time as source data, obtains Key2=El (Key1, time), will Key2 is as the key used in encryption and decryption.
- 2. information transferring method as claimed in claim 1, it is characterised in that:Receiving terminal and the transmitting terminal mark can be phone Number or other only one account numbers.
- 3. information transferring method as claimed in claim 1, it is characterised in that:The step of encryption information is embedded into picture wraps Include:Encrypted data length calculates, and whether image selected by judgement can be used as carrier;Embedded encrypted data length mark, in image Preceding 16 length be 4 blocks of pixels in write-in encrypted data length identification information;Embedded encryption data, in embedded length mark Know the piecemeal that the length after block sort is 4 and enter row information insertion, until the insertion of all information finishes.
- 4. information transferring method as claimed in claim 3, it is characterised in that:The step of encryption information is extracted from picture is wrapped Include:Obtain encryption information data length;Described information is extracted according to the length sequence.
- 5. information transferring method as claimed in claim 1, it is characterised in that:The picture is PNG format.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551787.5A CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510551787.5A CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105119924A CN105119924A (en) | 2015-12-02 |
CN105119924B true CN105119924B (en) | 2018-04-10 |
Family
ID=54667812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510551787.5A Expired - Fee Related CN105119924B (en) | 2015-09-01 | 2015-09-01 | A kind of information transferring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105119924B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429866B (en) * | 2016-01-01 | 2018-09-11 | 江苏图码信息科技有限公司 | Personal letter code product |
CN106028063A (en) * | 2016-06-14 | 2016-10-12 | 广州小百合信息技术有限公司 | Method and device for transmitting video displayed by display screen |
CN110855362B (en) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN111010491A (en) * | 2019-12-26 | 2020-04-14 | 合肥道正企智大数据有限公司 | Image data transmission method, device and system based on hiding technology |
CN112100639B (en) * | 2020-11-03 | 2021-02-19 | 广州市玄武无线科技股份有限公司 | Data encryption transmission method and system based on metadata service information |
CN112738561A (en) * | 2020-12-03 | 2021-04-30 | 西安慧博文定信息技术有限公司 | OTP (one time programmable) image encryption and verification based method and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
-
2015
- 2015-09-01 CN CN201510551787.5A patent/CN105119924B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795533A (en) * | 2012-10-31 | 2014-05-14 | 三星Sds株式会社 | Id-based encryption and decryption method, and apparatus for executing same |
US9071424B1 (en) * | 2013-03-29 | 2015-06-30 | Emc Corporation | Token-based key generation |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
Non-Patent Citations (1)
Title |
---|
移动终端短信安全传输系统;金易琛;《南京邮电大学硕士学位论文》;20130630;1、6-7 * |
Also Published As
Publication number | Publication date |
---|---|
CN105119924A (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105119924B (en) | A kind of information transferring method | |
Rashmi et al. | An improved method for reversible data hiding steganography combined with cryptography | |
CN105007155B (en) | Quick Response Code mask encryption and decryption approaches and system | |
US9276745B2 (en) | Preserving image privacy when manipulated by cloud services | |
CN104052658B (en) | A kind of intimacy protection system and method based on social networks | |
CN107809644B (en) | A kind of encryption area image reversible data concealing method of double-encryption | |
CN112040086B (en) | Image encryption and decryption methods and devices, equipment and readable storage medium | |
WO2003021861A1 (en) | A system and method for protecting the content of digital cinema products | |
CN105119923B (en) | A kind of information decoding method and terminal | |
US20190363876A1 (en) | Methods and Apparatus for Cryptography | |
CN109274644A (en) | A kind of data processing method, terminal and watermark server | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN104796534A (en) | Method and device for processing information contents | |
CN107426172A (en) | The matching method for pushing and device of a kind of identity information | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN105263136A (en) | Information encryption method and terminal | |
CN111988639B (en) | Video encryption and decryption method based on cryptographic algorithm and reversible steganography | |
US20170041133A1 (en) | Encryption method, program, and system | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN115883744A (en) | Watermark method, device and storage medium based on fractional order chaotic mapping | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
CN102761417A (en) | Method for processing data transmission of terminals and terminal | |
Dixit et al. | Multilevel network security combining cryptography and steganography on ARM platform | |
CN112069472A (en) | User login authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180410 Termination date: 20180901 |
|
CF01 | Termination of patent right due to non-payment of annual fee |