CN105447404B - The method and system of image secret protection in a kind of cloud storage - Google Patents

The method and system of image secret protection in a kind of cloud storage Download PDF

Info

Publication number
CN105447404B
CN105447404B CN201510755825.9A CN201510755825A CN105447404B CN 105447404 B CN105447404 B CN 105447404B CN 201510755825 A CN201510755825 A CN 201510755825A CN 105447404 B CN105447404 B CN 105447404B
Authority
CN
China
Prior art keywords
image
matrix
blind
pixel
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510755825.9A
Other languages
Chinese (zh)
Other versions
CN105447404A (en
Inventor
张明武
付建玮
赵玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Yuanshuzhi Technology Co ltd
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201510755825.9A priority Critical patent/CN105447404B/en
Publication of CN105447404A publication Critical patent/CN105447404A/en
Application granted granted Critical
Publication of CN105447404B publication Critical patent/CN105447404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Processing Or Creating Images (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a kind of method and system of image secret protection in cloud storage; user is when uploading image data first; the preposition plug-in unit in cloud blinds image; then Cloud Server preservation is being uploaded; image is saved with quick response code form simultaneously and removes blind key; user can extract image on any terminal device, as long as by scanning the two-dimensional code, so that it may carry out to the image data downloaded on terminal device blind.The present invention solves the problems, such as that image sensitive information leakage in storing process beyond the clouds, simultaneity factor have small scale, and processing speed is fast, there is the features such as good encryption intensity.

Description

The method and system of image secret protection in a kind of cloud storage
Technical field
The invention belongs to cloud computing security technology areas, are related to a kind of method and system for protecting safety of image and privacy, More particularly to a kind of encryption method blinded based on image array and method for cloud storage and system.
Background technique
Cloud is considered as the frame of Next Generation Internet development, and cloud storage provides large-scale data storage with low cost and answers Most popular one of the technology in internet is become with service.Many well-known Internet companies, as Microsoft, Amazon, apple, Google etc. all starts to provide the cloud storage service of charge.With gradually popularizing for cloud storage service, the privacy of user's data Many threats are also faced with safety.
The iCloud cloud service of in August, 2012, Apple Inc. is hacked, after hacker cracks user password again, User privacy information is stolen, certain customers' data is deleted, leads to user sensitive information leakage and loss of data.In April, 2011, The EC2 cloud computing server of Amazon is rented by hacker, is attacked the website Sony PlayStation, causes to use on a large scale User data leakage.In December, 2011 largest domestic developer community CSDN.NET, domestic well-known community website ends of the earth net is hacked Visitor's attack, 40,000,000 user passwords are compromised, and clear-text way has been stored in server to user password.Cloud service is due to certainly Opening, the resource centrality of body, a large amount of hackers do not stop to excavate the loophole of cloud service provider, it is expected that valuable data are obtained, So that privacy leakage event takes place frequently.Meanwhile the opacity operated inside Cloud Server, cloud may deliberately collect privacy of user Information or other dishonest behaviors, it is as lazy in saved server resource.Secret protection and data safety become cloud service One of the bottleneck urgently to be solved of development.
Image is easiest to one of the user data of leakage as cloud, has content intuitive, and data volume is big, once leakage pair The features such as privacy of user harm is serious.Cloud service provider considers that cloud image data has saved in plain text mostly, and cloud is not from own cost Honest behavior can check image data, and hacker may also steal cloud data, reveal privacy of user.Therefore image is carried out Encryption storage, makes cloud service provider that can not identify image information, has great difficulty to image decryption, and it is main to become protection image privacy Means.In image encryption, major concern is the intensity of image encryption and the expense of encryption, decryption, including time overhead With the size of calculation amount.It the use of more Image Encryption Scheme include at present encryption based on pixel replacement, based on secret division Secret, the encryption based on modern password constitution, the methods of the encryption based on chaos.
Tradition by image encryption upload cloud storage during, user before image data is uploaded to Cloud Server, First the image that store beyond the clouds is being encrypted using image encryption tool manually local, when image from Cloud Server Locally downloading equipment and then operation is decrypted to encrypted image using tool.This scheme brings many to user Additional operation, image encryption, decryption need to manually complete, and the speed of encryption, decryption is also to use cloud service process The middle important link for influencing user experience.
Therefore data-privacy and safety is not only protected not to be leaked, together when cloud server end stores in image data When should also design more convenient, efficiently encryption system cloud service for users to use.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides, speed high to image encryption intensity during a kind of cloud service Degree is fast, user's operation is simple during cloud storage, key facilitates that preservation and transmission are convenient, are able to achieve multiple terminals image zooming-out Image encryption method and system.
Technical solution used by method of the invention is: the method for image secret protection, feature in a kind of cloud storage It is, comprising the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I', Middle M > m, M > n, increased pixel are augmented with multiple random color image;Original image I is used in the relative position of supplement image I' Coordinate (x, y) indicates;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains It arrives:Three new matrixes, wherein X, Y, Z include original image All information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, ZIt recombinesOne blinds image I1(how to synthesize? does is it the prior art? it is preferably bright Really!);Image I after blinding1Any privacy of user will not be intuitively revealed, for Cloud Server and hacker, not Know and blinds matrix p1,p2,...,p6In the case where, attempt to pass through image I1Recover original image matrix MR、MG、MBProbability be Extremely low.
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image sanction Cut the integrality that should not destroy original image I, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after augmenting in step 1, the relative position coordinates of original image and supplement image (x, Y) 6 and in step 3 generated blind matrix p1,p2,...,p6A two dimensional code is stored in together as decruption key In image.
Preferably, generation random permutation number described in step 3, specific implementation includes following sub-step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,..., cn},{d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1, p2,...,p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Preferably, Y, Z recombine one and blind image I by M × Metzler matrix X described in step 51Specific implementation Process is as follows: by matrix X, Y, the pixel value on Z corresponding position is stored in a three-dimensional array (Rx, Ry, Rz), calls function pair Three primary colours on each pixel are synthesized, by the corresponding position of the rgb value deposit Picture Buffer after synthesis, successively Operation as above is carried out until recombining image I to each pixel1
Technical solution used by system of the invention is: the system of image secret protection, feature in a kind of cloud storage It is: blinds encrypting module including image and image removes blind deciphering module;
Described image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc. Pixel rectangular image I', increased pixel are augmented with multiple random color image;
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', respectively obtain supplement image I''s Three picture element matrixs: MR、MG、MB
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,..., p6;Three picture element matrix components of supplement image I' are blinded, are obtained Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image of m' × n' pixel I2, while by image I2Cloud Server is uploaded to save;
Decode key production module: for by image augment module in extend after rectangular image pixel value M, original image with The relative position coordinates (x, y) and image for augmenting image blind 6 generated in module and blind matrix p1,p2,...,p6One Generation decruption key is played to be stored in an image in 2 D code;
Described image goes the blind deciphering module to include:
Image augments module:, will be locally downloading and mobile whole for extracting the rectangular image pixel value M in decoding key End pixel blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3, increased pixel is at random Color image is augmented;
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3's Three picture element matrixs: M'R、M'G、M'B
Image goes blind module: blinding matrix p for 6 in extraction decoding key1,p2,...,p6, to supplement image I3's Three picture element matrix components go blind, obtain Three new matrixes; Blind matrix X' is gone to three M × M, Y', Z' recombine blind image I ";
Image cutting-out module: for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image, Blind image I " is gone to be cut to m × n-pixel original image I by relative position coordinates (x, y) synthesis, while by original image I is saved in local or mobile terminal.
The present invention is existing to the prior art, increases the encryption intensity of image, speed is fast, grasps user during cloud storage Make simply, key facilitates preservation and transmission convenient, realizes the image zooming-out of multiple terminals.
Detailed description of the invention
Fig. 1: the process schematic of Cloud Server is uploaded after blinding in the method for the embodiment of the present invention to image;
Fig. 2: it is extracted in the method for the embodiment of the present invention from Cloud Server and blinds image and in mobile terminal decoding image Process schematic;
Fig. 3: the image of the method for the embodiment of the present invention stores and extracts beyond the clouds flow chart;
Fig. 4: the system construction drawing of the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate and explain the present invention, not For limiting the present invention.
The method of image secret protection in a kind of cloud storage provided by the invention, comprising the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I', Middle M > m, M > n, increased pixel are augmented with multiple random color image;Original image I is used in the relative position of supplement image I' Coordinate (x, y) indicates;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6;, specific implementation includes following son Step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,..., cn},{d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1, p2,...,p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains It arrives:Three new matrixes, wherein X, Y, Z include original image All information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, Z recombine one and blind image I1;Image I after blinding1It will not intuitively reveal Any privacy of user blinds matrix p not knowing for Cloud Server and hacker1,p2,...,p6In the case where, attempt Pass through image I1Recover original image matrix MR、MG、MBProbability be extremely low;
By M × Metzler matrix X, Y, Z recombine one and blind image I1Be implemented as follows: matrix X, Y, Z are corresponded into position The pixel value set is stored in a three-dimensional array (Rx, Ry, Rz), and function is called to carry out the three primary colours on each pixel The corresponding position of rgb value deposit Picture Buffer after synthesis is successively carried out operation as above to each pixel by synthesis Until recombining image I1
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image sanction Cut the integrality that should not destroy original image I, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after augmenting in step 1, the relative position coordinates of original image and supplement image (x, Y) 6 and in step 3 generated blind matrix p1,p2,...,p6A two dimensional code is stored in together as decruption key In image.
See Fig. 1 and Fig. 3, the present invention in specific implementation, uploads the process of Cloud Server such as after blinding to image Under:
(1) user uploads image data to Cloud Server;
(2) image uploads Cloud Server after image plug-in unit blinds, and generates decruption key and be stored in a two dimensional code In image.
See Fig. 2 and Fig. 3, the present invention blinds image and in mobile terminal solution in specific implementation, from Cloud Server extraction The process of code image is as follows:
(1) if downloading image to local from Cloud Server, original image number is obtained after local image plug-in unit processing According to;
(2) if downloading image to mobile terminal from Cloud Server, the dimension code image that decruption key is preserved in scanning is obtained Raw image data.
See Fig. 4, the system of image secret protection in a kind of cloud storage provided by the invention, including image blind encryption mould Block and image remove blind deciphering module;
Image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc. Pixel rectangular image I', wherein M > m, M > n, increased pixel are augmented with multiple random color image;Original image I schemes in supplement As the relative position of I' is indicated with coordinate (x, y);
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', respectively obtain supplement image I''s Three picture element matrixs: MR、MG、MB
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,..., p6;Three picture element matrix components of supplement image I' are blinded, are obtained Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image of m' × n' pixel I2, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Decode key production module: for by image augment module in extend after rectangular image pixel value M, original image with The relative position coordinates (x, y) and image for augmenting image blind 6 generated in module and blind matrix p1,p2,...,p6One Generation decruption key is played to be stored in an image in 2 D code;
Image goes the blind deciphering module to include:
Image augments module:, will be locally downloading and mobile whole for extracting the rectangular image pixel value M in decoding key End pixel blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3Wherein M > m', M > n', it is increased Pixel is augmented with multiple random color image;Blind image I2In supplement image I3In relative position be coordinate (x, y);
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3's Three picture element matrixs: M'R、M'G、M'B
Image goes blind module: blinding matrix p for 6 in extraction decoding key1,p2,...,p6, to supplement image I3's Three picture element matrix components go blind, obtain Three new matrixes; Blind matrix X' is gone to three M × M, Y', Z' recombine blind image I ";
Image cutting-out module: for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image, Blind image I " is gone to be cut to m × n-pixel original image I by relative position coordinates (x, y) synthesis, while by original image I is saved in local or mobile terminal.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair It is bright range is claimed to be determined by the appended claims.

Claims (2)

1. a kind of method of image secret protection in cloud storage, which comprises the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I', wherein M > M, M > n, increased pixel are augmented with multiple random color image;Relative position coordinate of the original image I in supplement image I' (x, y) is indicated;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6
The generation random permutation number, specific implementation include following sub-step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,cn}, {d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,p2,..., p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains:Three new matrixes, wherein X, Y, Z include the institute of original image There is information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, Z recombine one and blind image I1;The specific implementation process is as follows: by matrix X, Y, Z corresponding position On pixel value be stored in a three-dimensional array (Rx, Ry, Rz) in, call function the three primary colours on each pixel are closed At successively straight to each pixel progress operation as above by the corresponding position of the rgb value deposit Picture Buffer after synthesis To recombining image I1
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image cropping answers The integrality of original image I is not destroyed, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after being augmented in step 1, the relative position coordinates (x, y) of original image and supplement image, with And 6 generated in step 3 blind matrix p1,p2,...,p6An image in 2 D code is stored in together as decruption key In.
2. the system of image secret protection in a kind of cloud storage, it is characterised in that: blind encrypting module including image and image is gone Blind deciphering module;
Described image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc. pixels Rectangular image I', wherein M > m, M > n;Increased pixel is augmented with multiple random color image;
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', three of supplement image I' are respectively obtained Picture element matrix: MR、MG、MB
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,...,p6;It is right Three picture element matrix components of supplement image I' blind, and obtain Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1
Wherein, 6 random permutation number π are constructed first1, π2..., π6
πi∈ 1 ..., n }, i=1,2..., 6;
Then, 6 non-zero set of random numbers { a are constructed1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,cn},{d1, d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Then defined function
It ultimately produces 6 and blinds matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,p2,..., p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image I of m' × n' pixel2, Simultaneously by image I2Cloud Server is uploaded to save;
Decode key production module: for image to be augmented to the rectangular image pixel value M after extending in module, original image and supplement The relative position coordinates (x, y) and image of image blind 6 generated in module and blind matrix p1,p2,...,p6It gives birth to together It is stored in an image in 2 D code at decruption key;
Described image goes the blind deciphering module to include:
Image augments module: for extracting the rectangular image pixel value M in decoding key, by locally downloading and mobile terminal picture Element blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3, increased pixel multiple random color Image is augmented;
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3Three Picture element matrix: M'R、M'G、M'B
Image goes blind module: matrix p1, p2 are blinded for 6 in extraction decoding key ..., p6, to supplement image I3Three Picture element matrix component goes blind, obtains Three new matrixes;To three A M × M's removes blind matrix X', and Y', Z' recombine blind image I ";
Image cutting-out module: it for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image, will close At go blind image I " to be cut to m × n-pixel original image I by relative position coordinates (x, y), while original image I being protected It is stored to local or mobile terminal.
CN201510755825.9A 2015-11-06 2015-11-06 The method and system of image secret protection in a kind of cloud storage Active CN105447404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510755825.9A CN105447404B (en) 2015-11-06 2015-11-06 The method and system of image secret protection in a kind of cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510755825.9A CN105447404B (en) 2015-11-06 2015-11-06 The method and system of image secret protection in a kind of cloud storage

Publications (2)

Publication Number Publication Date
CN105447404A CN105447404A (en) 2016-03-30
CN105447404B true CN105447404B (en) 2018-12-14

Family

ID=55557567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510755825.9A Active CN105447404B (en) 2015-11-06 2015-11-06 The method and system of image secret protection in a kind of cloud storage

Country Status (1)

Country Link
CN (1) CN105447404B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108305298B (en) * 2018-01-17 2021-06-04 湖北工业大学 Image recoverable information hiding method based on Sudoku matrix index
CN110348847A (en) * 2018-04-04 2019-10-18 触信(厦门)智能科技有限公司 A kind of information transmitting methods based on panorama VR block chain
CN110730277B (en) * 2018-07-17 2022-04-05 阿里巴巴集团控股有限公司 Information coding and method and device for acquiring coded information
CN109886010B (en) * 2019-01-28 2023-10-17 平安科技(深圳)有限公司 Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal
CN112152806B (en) * 2020-09-25 2023-07-18 青岛大学 Cloud-assisted image identification method, device and equipment supporting privacy protection
CN113595715A (en) * 2021-07-23 2021-11-02 华东交通大学 Logistic-based double-pixel rectangular mapping color image encryption and decryption method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816143A (en) * 2006-03-14 2006-08-09 北京理工大学 Digital image enciphoring/deciphoring method
CN104537604A (en) * 2014-12-25 2015-04-22 中国科学院武汉物理与数学研究所 Image certainty encryption double-blind secrecy matching method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816143A (en) * 2006-03-14 2006-08-09 北京理工大学 Digital image enciphoring/deciphoring method
CN104537604A (en) * 2014-12-25 2015-04-22 中国科学院武汉物理与数学研究所 Image certainty encryption double-blind secrecy matching method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Scrambling matrix generation algorithm for high dimensional image scrambling transformation;Shao Liping etc;《3rd IEEE Conference on Industrial Electronics and Applications》;20080605;第1707-1712页 *
基于混沌数列变换的图像加密算法;任洪娥 等;《计算机工程与设计》;20130531;第34卷(第5期);第1615-1619页 *
基于自生成模m单元矩阵的双置乱图像加密的快速算法;张丽娜;《科学技术与工程》;20130331;第13卷(第9期);第2555-2561页 *

Also Published As

Publication number Publication date
CN105447404A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN105447404B (en) The method and system of image secret protection in a kind of cloud storage
Lee et al. Data security in cloud computing using AES under HEROKU cloud
CN105450899B (en) Multiple image encryption method based on PWLCM chaos
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN110235409A (en) Use the protected RSA signature of homomorphic cryptography or the method for decryption
CN106575334A (en) Accessing a secured software application
Aung et al. A novel secure combination technique of steganography and cryptography
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN112035827B (en) Cipher data processing method, device, equipment and readable storage medium
CN107392970A (en) A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system
CN105046123A (en) System for using picture to realize password security and setting method for using picture to realize password security
CN107770407B (en) The image encryption method and device of joint zero watermarking insertion
Pushpa Hybrid data encryption algorithm for secure medical data transmission in cloud environment
Zhang et al. An efficient image encryption scheme for industrial Internet-of-Things devices
CN112702582B (en) Secure transmission method and device for monitoring video based on SM2
US10432596B2 (en) Systems and methods for cryptography having asymmetric to symmetric key agreement
Sazaki et al. Implementation of affine transform method and advanced hill cipher for securing digital images
US20170085371A1 (en) System and method for an enhanced xor cipher through extensions
Al-Kadei Robust video data security using hybrid cryptography-steganography technique
Abboud Multifactor authentication for software protection
CN106161000A (en) The method and system that data file is encrypted and decrypted
CN115085974A (en) Flow confusion method and device
Gunasekaran et al. Encrypting and decrypting image using computer visualization techniques
Vasilakis et al. Copyright Protection on Electronic Books: Study and Design of a New Approach
Kaushik et al. A Chaotic and Hyperchaotic Map based Image Encryption Protocol for High-End Colour density Images using enhanced S-box pixel permutator

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230804

Address after: Room 604, 6th Floor, Building C2, Phase I, Longshan Innovation Park, Wuhan Future Science and Technology City, No. 999 Gaoxin Avenue, Donghu New Technology Development Zone, Wuhan City, Hubei Province, 430000

Patentee after: Wuhan Yuanshuzhi Technology Co.,Ltd.

Address before: 430068 1, Lijia 1 village, Nanhu, Wuchang District, Wuhan, Hubei

Patentee before: HUBEI University OF TECHNOLOGY