CN105119924B - A kind of information transferring method - Google Patents

A kind of information transferring method Download PDF

Info

Publication number
CN105119924B
CN105119924B CN201510551787.5A CN201510551787A CN105119924B CN 105119924 B CN105119924 B CN 105119924B CN 201510551787 A CN201510551787 A CN 201510551787A CN 105119924 B CN105119924 B CN 105119924B
Authority
CN
China
Prior art keywords
information
encryption
key
embedded
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510551787.5A
Other languages
Chinese (zh)
Other versions
CN105119924A (en
Inventor
刘金明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU HARMONY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU HARMONY TECHNOLOGY Co Ltd filed Critical CHENGDU HARMONY TECHNOLOGY Co Ltd
Priority to CN201510551787.5A priority Critical patent/CN105119924B/en
Publication of CN105119924A publication Critical patent/CN105119924A/en
Application granted granted Critical
Publication of CN105119924B publication Critical patent/CN105119924B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a kind of information encrypting transmission method, it is intended to the encryption communication of information, including step are realized using encryption technology:(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, and key used in encryption and decryption is generated by key production module;(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;(5) receiving terminal receives the picture, obtains embedded encryption information;(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.

Description

A kind of information transferring method
Technical field
The present invention is applied to the fields such as mobile communication and information security, more particularly to a kind of information encrypting transmission method.
Background technology
By inquiry, in the market, also no mobile phone directly short message content is encrypted transmission and storage, does not also have Mobile phone productses carry out data protection using hardware encryption chip, have some software applications to be directed to one in software market at present Transmission or storage is encrypted in a little short messages.The mode generally realized in transmission is:The machine sets a security password, while handle This password is told to recipient;Short message is encrypted using this password as key when sending short messages;It is short that recipient receives encryption It is decrypted after letter according to the password known in advance.The mode generally realized in storage is to fix some key, is specified certain short Letter is encrypted, and then ciphertext is replaced and preserved in systems, what is seen when not decrypting is ciphertext.Only corresponding It can just see in plain text after administration interface decryption.The deficiency of following several respects at least be present in this scheme or technology:(1) availability is not By force.A part is substantially only realized in current application, is not considered comprehensively from the angle of system, otherwise for example it is only to realize passing Defeated Partial encryption, otherwise it is exactly only to realize to local SMS encryption do not account for more that what is encrypting in what situations using upper In the case of do not encrypt, do not accomplish overall consideration for the safety of short message yet, generated from the key of short message, to encrypted transmission, Arrive again and local preserve this each stage and will consider.Therefore the short message security system of complete set oneself is done, it is necessary to multiple soft Part coordinates, and is difficult to mate in terms of current application software.(2) ease for use is poor.Pass through sender and recipient's thing A key is first negotiated, not only in-convenience in use, and adds extra cost.Be inconvenient to be in both sides need logical Believe, perhaps phone, perhaps short message;, and if multiple contact persons use Encrypted short message when, multiple passwords will be produced, this Just it is not easy to remember in the case of kind.Need to look for clear crytpographic key temporarily during decryption.If each short message is consulted once, although can To obtain password, but communications cost adds, such as one short message of hair originally, but ensures at least produce three in the case of safety Bar short message, communications cost add 2 times.And every short message can only be that otherwise corresponding password is lost with regard to nothing in plain text when preserving Method is untied.For the application for storing Encrypted short message, often it is seen that ciphertext, this is to wanting to check that the people of short message content comes Say, be very painful, it is impossible to be seen to be any bar short message at a glance, it is necessary to which every all decryption just can determine that.(3) security is not high. From the point of view of the application software that currently there are, safety problem existing for different applications is also not quite similar.Main safety It is a risk that using the incomplete property realized.Do not generated from the key of short message, it is each to encrypted transmission, then to locally this is preserved Stage has all carried out security consideration, but only realizes a part, and setting of the existing application to key in addition is also substantially all very Weak, security is very poor.
The content of the invention
It is an object of the invention to provide a kind of safe information encrypting transmission method.
To reach above-mentioned purpose, present invention firstly provides a kind of information encrypting transmission method, the transmitting procedure include with Lower step:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;
(5) receiving terminal receives the picture, obtains embedded encryption information;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Receiving terminal and the transmitting terminal mark can be telephone number or other only one account numbers.
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.
The step of encryption information is embedded into picture includes:
Encrypted data length calculates, and can be used as carrier selected by judgement when image;
Embedded encrypted data length mark, it is write-in encryption data length in 4 blocks of pixels in preceding 16 length of image Spend identification information;
Embedded encryption data, the piecemeal that the length after embedded length identification information piecemeal is 4 enter row information insertion, until All information insertions finish.
The step of encryption information is extracted from picture includes:
Obtain encryption information data length;Described information is extracted according to the length sequence.
The picture is PNG format.
Brief description of the drawings
Fig. 1 is transmitting terminal encryption information process schematic of the present invention.
Encryption information is embedded in picture flow chart by Fig. 2 to be of the present invention.
Fig. 3 is that receiving terminal of the present invention decrypts information process schematic diagram.
Embodiment
In order to be better understood from technical scheme, implementation provided by the invention is described in detail below in conjunction with the accompanying drawings Example.
As shown in figure 1, which show the flow that transmitting terminal is encrypted to information, specific following steps:
(1) transmitting terminal obtains receiving terminal and transmitting terminal identification information, is generated by key production module close used in encryption and decryption Key;
(2) transmitting terminal uses encryption/decryption module, calls the key, and hardware encryption is carried out to the information content;
(3) transmitting terminal calls picture insertion module that the information after encryption is embedded into particular picture;
The method of key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Key1=E1 (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Key1 as Key, AES encryption is carried out using time as source data, obtains Key2=E1 (Key1, time), will Key2 improves the security of key as the key used in encryption and decryption, multi-enciphering processing.Wherein mobile phone logo can be to connect Receiving end, the phone number of transmitting terminal or other unique marks.
Existing Information Hiding Algorithms are often reducing carrying per bit as far as possible in order to ensure the quantity of information insertion The image pixel number of quantity, but consider that required hiding data volume will not be excessive in SMS environment, Information hiding During can select greater number of image pixel number, can so avoid in information telescopiny because information was changed In it is intensive and cause information steganography be detected attack algorithm find.The present invention proposes following one kind based on pixel RGB coefficients most Low order partitioning of matrix parity informa-tion hides incorporation model:
Step 1:Each pixel of PNG images is pressed into length n piecemeals (n>1) blocks of pixels, is taken out, obtains this piecemeal In each pixel include transparent channel (Alpha), the relevant parameter of color space RGB information, each pixel this 24 ratio Special parameter can be separated into 48 bits data segment represent respectively the pixel transparency, red component, green component and The color parameter information of blue component, its red, green, blue component parameters lowest order is taken respectively to single pixel, by the minimum of acquisition Position together forms a 3 × n by R-G-B order and with the red, green, blue component parameters lowest order of the block of pixels other pixels PNG image RGB coefficient least significant bit matrix Ds, its meet:
Step 2:Calculate each element sum S of the matrix D and the matrix odd even specialty flags I, wherein S and I meet such as Lower formula:
I=S mod 2
Step 3:A bit b is taken out from data to be embedded, if b=I, the matrix-block does not change any one Data, otherwise take random natural number R, C (R<n,C<3) the element d in matrix D and is changed according to the following rulesRC
If the piecemeal taken out is the first piecemeal that image is taken out, dRCValue+1, otherwise+1 with being held in -1 operation Row has operation opposite in the performed operation of modification piecemeal with the last time.
Step 1 is performed repeatedly to step 3, is finished until all information are embedded into.
Information extraction algorithm is then relatively easy, and each pixel of PNG images is pressed into length n piecemeals (n>1), from take out one of them Piecemeal, take one 3 × n of red, green, blue component parameters lowest order composition of each pixel in this piecemeal RGB coefficients minimum Significance bit matrix D, calculate the matrix element sum
The data b ' being actually embedded in meets
B '=S ' mod 2
Lightweight PNG pictorial informations based on pixel RGB coefficient least significant bit partitioning of matrix parities hide model Take mainly has 3 steps during actual execution information is embedded in:Embedding data length computation is chosen with picture carrier, embedded Data length identifies, real data insertion, wherein:
Whether embedding data length computation and picture carrier are chosen by calculating embedded information content detection image can be with As carrier, in specific implementation process, it is contemplated that the disposal ability of mobile phone environment, set forth herein information hiding model in take n =4, and can the picture minimum dimension of embedding information require that its total pixel value is no less than 64 pixels, and it is actual realize in embedded number According to image-region be not more than 512 × 512 pixels (if total number of image pixels be more than 512 × 512, at most only select before 512 × 512 pixels enter row information insertion).
Embedding data length mark is mainly used in being embedded in the length for being actually written into data in the picture, 16 before the image The information of the relevant data length mark of write-in in the blocks of pixels that length is 4, concrete mode is that will calculate for representing embedded The 2 system numbers that 10 system numbers of data byte length are converted into 16 represent that 16 length are every in 4 segmentation before image One of the embedded 2 system number of one segmentation, the mode of information insertion of the embedding grammar with proposing above are identical.
Complete that real data telescopiny will be carried out then after data length mark, directly after image embedding data length Other length be 4 piecemeal be embedded in, until all information insertion finish.Including carrier picture validation checking, data The whole process of length mark insertion and real data insertion is as shown in Figure 2.
As shown in figure 3, which show the process of receiving terminal ciphertext data, following steps are specifically included:
(5) receiving terminal receives the picture, obtains embedded encryption information;
(6) receiving terminal calls deciphering module, and obtains decruption key and encryption information is decrypted and shown.
Generally, the hardware encryption transmission and memory technology of above-mentioned mobile phone privacy short message of the present invention, is not take up System resource, it is simple to operate, it is easily used, there is high-performance, high security, high reliability, compensate for prior art in secret The deficiency that communication is realized, can effectively meet people to secret communication or the encipherment protection demand of contact.
Above content is only presently preferred embodiments of the present invention, for one of ordinary skill in the art, according to the present invention's Thought, there will be changes, this specification content should not be construed as to the present invention in specific embodiments and applications Limitation.

Claims (5)

  1. A kind of 1. information transferring method, it is characterised in that:The transmitting procedure comprises the following steps:(1) transmitting terminal, which obtains, receives End and transmitting terminal identification information, key used in encryption and decryption is generated by key production module;(2) transmitting terminal uses encryption and decryption mould Block, the key is called, hardware encryption is carried out to the information content;(3) transmitting terminal calls picture insertion module by the letter after encryption Breath is embedded into particular picture;(4) picture of embedded encryption information is sent to receiving terminal by transmitting terminal by network;(5) receive End receives the picture, obtains embedded encryption information;(6) receiving terminal calls deciphering module, and obtains decruption key to encryption Information is decrypted and shown;
    The method of wherein key production module generation key is:The mobile phone logo lable_s of sender and recipient are obtained, Lable_r and transmission time time, using lable_s, lable_r and time as ginseng is become, using lable_s as Key, with Lable_r encrypts for metadata, and it is Keyl=El (lable_s, lable_r) to obtain encrypted data using AES encryption algorithm, Afterwards again using Keyl as Key, AES encryption is carried out using time as source data, obtains Key2=El (Key1, time), will Key2 is as the key used in encryption and decryption.
  2. 2. information transferring method as claimed in claim 1, it is characterised in that:Receiving terminal and the transmitting terminal mark can be phone Number or other only one account numbers.
  3. 3. information transferring method as claimed in claim 1, it is characterised in that:The step of encryption information is embedded into picture wraps Include:Encrypted data length calculates, and whether image selected by judgement can be used as carrier;Embedded encrypted data length mark, in image Preceding 16 length be 4 blocks of pixels in write-in encrypted data length identification information;Embedded encryption data, in embedded length mark Know the piecemeal that the length after block sort is 4 and enter row information insertion, until the insertion of all information finishes.
  4. 4. information transferring method as claimed in claim 3, it is characterised in that:The step of encryption information is extracted from picture is wrapped Include:Obtain encryption information data length;Described information is extracted according to the length sequence.
  5. 5. information transferring method as claimed in claim 1, it is characterised in that:The picture is PNG format.
CN201510551787.5A 2015-09-01 2015-09-01 A kind of information transferring method Expired - Fee Related CN105119924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510551787.5A CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510551787.5A CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Publications (2)

Publication Number Publication Date
CN105119924A CN105119924A (en) 2015-12-02
CN105119924B true CN105119924B (en) 2018-04-10

Family

ID=54667812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510551787.5A Expired - Fee Related CN105119924B (en) 2015-09-01 2015-09-01 A kind of information transferring method

Country Status (1)

Country Link
CN (1) CN105119924B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429866B (en) * 2016-01-01 2018-09-11 江苏图码信息科技有限公司 Personal letter code product
CN106028063A (en) * 2016-06-14 2016-10-12 广州小百合信息技术有限公司 Method and device for transmitting video displayed by display screen
CN110855362B (en) * 2019-11-18 2021-08-03 南京工程学院 Secret communication method and system based on visible light LED matrix
CN111010491A (en) * 2019-12-26 2020-04-14 合肥道正企智大数据有限公司 Image data transmission method, device and system based on hiding technology
CN112100639B (en) * 2020-11-03 2021-02-19 广州市玄武无线科技股份有限公司 Data encryption transmission method and system based on metadata service information
CN112738561A (en) * 2020-12-03 2021-04-30 西安慧博文定信息技术有限公司 OTP (one time programmable) image encryption and verification based method and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795533A (en) * 2012-10-31 2014-05-14 三星Sds株式会社 Id-based encryption and decryption method, and apparatus for executing same
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动终端短信安全传输系统;金易琛;《南京邮电大学硕士学位论文》;20130630;1、6-7 *

Also Published As

Publication number Publication date
CN105119924A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
CN105119924B (en) A kind of information transferring method
Rashmi et al. An improved method for reversible data hiding steganography combined with cryptography
CN105007155B (en) Quick Response Code mask encryption and decryption approaches and system
US9276745B2 (en) Preserving image privacy when manipulated by cloud services
CN104052658B (en) A kind of intimacy protection system and method based on social networks
CN107809644B (en) A kind of encryption area image reversible data concealing method of double-encryption
CN112040086B (en) Image encryption and decryption methods and devices, equipment and readable storage medium
WO2003021861A1 (en) A system and method for protecting the content of digital cinema products
CN105119923B (en) A kind of information decoding method and terminal
US20190363876A1 (en) Methods and Apparatus for Cryptography
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN104243149A (en) Encrypting and decrypting method, device and server
CN104796534A (en) Method and device for processing information contents
CN107426172A (en) The matching method for pushing and device of a kind of identity information
CN111541652B (en) System for improving security of secret information keeping and transmission
CN105263136A (en) Information encryption method and terminal
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
US20170041133A1 (en) Encryption method, program, and system
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN115883744A (en) Watermark method, device and storage medium based on fractional order chaotic mapping
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
CN102761417A (en) Method for processing data transmission of terminals and terminal
Dixit et al. Multilevel network security combining cryptography and steganography on ARM platform
CN112069472A (en) User login authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180410

Termination date: 20180901

CF01 Termination of patent right due to non-payment of annual fee