CN105447404B - The method and system of image secret protection in a kind of cloud storage - Google Patents
The method and system of image secret protection in a kind of cloud storage Download PDFInfo
- Publication number
- CN105447404B CN105447404B CN201510755825.9A CN201510755825A CN105447404B CN 105447404 B CN105447404 B CN 105447404B CN 201510755825 A CN201510755825 A CN 201510755825A CN 105447404 B CN105447404 B CN 105447404B
- Authority
- CN
- China
- Prior art keywords
- image
- matrix
- blind
- pixel
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Processing Or Creating Images (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a kind of method and system of image secret protection in cloud storage; user is when uploading image data first; the preposition plug-in unit in cloud blinds image; then Cloud Server preservation is being uploaded; image is saved with quick response code form simultaneously and removes blind key; user can extract image on any terminal device, as long as by scanning the two-dimensional code, so that it may carry out to the image data downloaded on terminal device blind.The present invention solves the problems, such as that image sensitive information leakage in storing process beyond the clouds, simultaneity factor have small scale, and processing speed is fast, there is the features such as good encryption intensity.
Description
Technical field
The invention belongs to cloud computing security technology areas, are related to a kind of method and system for protecting safety of image and privacy,
More particularly to a kind of encryption method blinded based on image array and method for cloud storage and system.
Background technique
Cloud is considered as the frame of Next Generation Internet development, and cloud storage provides large-scale data storage with low cost and answers
Most popular one of the technology in internet is become with service.Many well-known Internet companies, as Microsoft, Amazon, apple,
Google etc. all starts to provide the cloud storage service of charge.With gradually popularizing for cloud storage service, the privacy of user's data
Many threats are also faced with safety.
The iCloud cloud service of in August, 2012, Apple Inc. is hacked, after hacker cracks user password again,
User privacy information is stolen, certain customers' data is deleted, leads to user sensitive information leakage and loss of data.In April, 2011,
The EC2 cloud computing server of Amazon is rented by hacker, is attacked the website Sony PlayStation, causes to use on a large scale
User data leakage.In December, 2011 largest domestic developer community CSDN.NET, domestic well-known community website ends of the earth net is hacked
Visitor's attack, 40,000,000 user passwords are compromised, and clear-text way has been stored in server to user password.Cloud service is due to certainly
Opening, the resource centrality of body, a large amount of hackers do not stop to excavate the loophole of cloud service provider, it is expected that valuable data are obtained,
So that privacy leakage event takes place frequently.Meanwhile the opacity operated inside Cloud Server, cloud may deliberately collect privacy of user
Information or other dishonest behaviors, it is as lazy in saved server resource.Secret protection and data safety become cloud service
One of the bottleneck urgently to be solved of development.
Image is easiest to one of the user data of leakage as cloud, has content intuitive, and data volume is big, once leakage pair
The features such as privacy of user harm is serious.Cloud service provider considers that cloud image data has saved in plain text mostly, and cloud is not from own cost
Honest behavior can check image data, and hacker may also steal cloud data, reveal privacy of user.Therefore image is carried out
Encryption storage, makes cloud service provider that can not identify image information, has great difficulty to image decryption, and it is main to become protection image privacy
Means.In image encryption, major concern is the intensity of image encryption and the expense of encryption, decryption, including time overhead
With the size of calculation amount.It the use of more Image Encryption Scheme include at present encryption based on pixel replacement, based on secret division
Secret, the encryption based on modern password constitution, the methods of the encryption based on chaos.
Tradition by image encryption upload cloud storage during, user before image data is uploaded to Cloud Server,
First the image that store beyond the clouds is being encrypted using image encryption tool manually local, when image from Cloud Server
Locally downloading equipment and then operation is decrypted to encrypted image using tool.This scheme brings many to user
Additional operation, image encryption, decryption need to manually complete, and the speed of encryption, decryption is also to use cloud service process
The middle important link for influencing user experience.
Therefore data-privacy and safety is not only protected not to be leaked, together when cloud server end stores in image data
When should also design more convenient, efficiently encryption system cloud service for users to use.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides, speed high to image encryption intensity during a kind of cloud service
Degree is fast, user's operation is simple during cloud storage, key facilitates that preservation and transmission are convenient, are able to achieve multiple terminals image zooming-out
Image encryption method and system.
Technical solution used by method of the invention is: the method for image secret protection, feature in a kind of cloud storage
It is, comprising the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I',
Middle M > m, M > n, increased pixel are augmented with multiple random color image;Original image I is used in the relative position of supplement image I'
Coordinate (x, y) indicates;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB;
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6;
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains
It arrives:Three new matrixes, wherein X, Y, Z include original image
All information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, ZIt recombinesOne blinds image I1(how to synthesize? does is it the prior art? it is preferably bright
Really!);Image I after blinding1Any privacy of user will not be intuitively revealed, for Cloud Server and hacker, not
Know and blinds matrix p1,p2,...,p6In the case where, attempt to pass through image I1Recover original image matrix MR、MG、MBProbability be
Extremely low.
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image sanction
Cut the integrality that should not destroy original image I, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after augmenting in step 1, the relative position coordinates of original image and supplement image (x,
Y) 6 and in step 3 generated blind matrix p1,p2,...,p6A two dimensional code is stored in together as decruption key
In image.
Preferably, generation random permutation number described in step 3, specific implementation includes following sub-step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,
cn},{d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,
p2,...,p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Preferably, Y, Z recombine one and blind image I by M × Metzler matrix X described in step 51Specific implementation
Process is as follows: by matrix X, Y, the pixel value on Z corresponding position is stored in a three-dimensional array (Rx, Ry, Rz), calls function pair
Three primary colours on each pixel are synthesized, by the corresponding position of the rgb value deposit Picture Buffer after synthesis, successively
Operation as above is carried out until recombining image I to each pixel1。
Technical solution used by system of the invention is: the system of image secret protection, feature in a kind of cloud storage
It is: blinds encrypting module including image and image removes blind deciphering module;
Described image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc.
Pixel rectangular image I', increased pixel are augmented with multiple random color image;
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', respectively obtain supplement image I''s
Three picture element matrixs: MR、MG、MB;
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,...,
p6;Three picture element matrix components of supplement image I' are blinded, are obtained
Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1;
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image of m' × n' pixel
I2, while by image I2Cloud Server is uploaded to save;
Decode key production module: for by image augment module in extend after rectangular image pixel value M, original image with
The relative position coordinates (x, y) and image for augmenting image blind 6 generated in module and blind matrix p1,p2,...,p6One
Generation decruption key is played to be stored in an image in 2 D code;
Described image goes the blind deciphering module to include:
Image augments module:, will be locally downloading and mobile whole for extracting the rectangular image pixel value M in decoding key
End pixel blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3, increased pixel is at random
Color image is augmented;
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3's
Three picture element matrixs: M'R、M'G、M'B;
Image goes blind module: blinding matrix p for 6 in extraction decoding key1,p2,...,p6, to supplement image I3's
Three picture element matrix components go blind, obtain Three new matrixes;
Blind matrix X' is gone to three M × M, Y', Z' recombine blind image I ";
Image cutting-out module: for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image,
Blind image I " is gone to be cut to m × n-pixel original image I by relative position coordinates (x, y) synthesis, while by original image
I is saved in local or mobile terminal.
The present invention is existing to the prior art, increases the encryption intensity of image, speed is fast, grasps user during cloud storage
Make simply, key facilitates preservation and transmission convenient, realizes the image zooming-out of multiple terminals.
Detailed description of the invention
Fig. 1: the process schematic of Cloud Server is uploaded after blinding in the method for the embodiment of the present invention to image;
Fig. 2: it is extracted in the method for the embodiment of the present invention from Cloud Server and blinds image and in mobile terminal decoding image
Process schematic;
Fig. 3: the image of the method for the embodiment of the present invention stores and extracts beyond the clouds flow chart;
Fig. 4: the system construction drawing of the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair
It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate and explain the present invention, not
For limiting the present invention.
The method of image secret protection in a kind of cloud storage provided by the invention, comprising the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I',
Middle M > m, M > n, increased pixel are augmented with multiple random color image;Original image I is used in the relative position of supplement image I'
Coordinate (x, y) indicates;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB;
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6;, specific implementation includes following son
Step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,
cn},{d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,
p2,...,p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains
It arrives:Three new matrixes, wherein X, Y, Z include original image
All information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, Z recombine one and blind image I1;Image I after blinding1It will not intuitively reveal
Any privacy of user blinds matrix p not knowing for Cloud Server and hacker1,p2,...,p6In the case where, attempt
Pass through image I1Recover original image matrix MR、MG、MBProbability be extremely low;
By M × Metzler matrix X, Y, Z recombine one and blind image I1Be implemented as follows: matrix X, Y, Z are corresponded into position
The pixel value set is stored in a three-dimensional array (Rx, Ry, Rz), and function is called to carry out the three primary colours on each pixel
The corresponding position of rgb value deposit Picture Buffer after synthesis is successively carried out operation as above to each pixel by synthesis
Until recombining image I1。
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image sanction
Cut the integrality that should not destroy original image I, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after augmenting in step 1, the relative position coordinates of original image and supplement image (x,
Y) 6 and in step 3 generated blind matrix p1,p2,...,p6A two dimensional code is stored in together as decruption key
In image.
See Fig. 1 and Fig. 3, the present invention in specific implementation, uploads the process of Cloud Server such as after blinding to image
Under:
(1) user uploads image data to Cloud Server;
(2) image uploads Cloud Server after image plug-in unit blinds, and generates decruption key and be stored in a two dimensional code
In image.
See Fig. 2 and Fig. 3, the present invention blinds image and in mobile terminal solution in specific implementation, from Cloud Server extraction
The process of code image is as follows:
(1) if downloading image to local from Cloud Server, original image number is obtained after local image plug-in unit processing
According to;
(2) if downloading image to mobile terminal from Cloud Server, the dimension code image that decruption key is preserved in scanning is obtained
Raw image data.
See Fig. 4, the system of image secret protection in a kind of cloud storage provided by the invention, including image blind encryption mould
Block and image remove blind deciphering module;
Image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc.
Pixel rectangular image I', wherein M > m, M > n, increased pixel are augmented with multiple random color image;Original image I schemes in supplement
As the relative position of I' is indicated with coordinate (x, y);
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', respectively obtain supplement image I''s
Three picture element matrixs: MR、MG、MB;
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,...,
p6;Three picture element matrix components of supplement image I' are blinded, are obtained
Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1。
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image of m' × n' pixel
I2, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Decode key production module: for by image augment module in extend after rectangular image pixel value M, original image with
The relative position coordinates (x, y) and image for augmenting image blind 6 generated in module and blind matrix p1,p2,...,p6One
Generation decruption key is played to be stored in an image in 2 D code;
Image goes the blind deciphering module to include:
Image augments module:, will be locally downloading and mobile whole for extracting the rectangular image pixel value M in decoding key
End pixel blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3Wherein M > m', M > n', it is increased
Pixel is augmented with multiple random color image;Blind image I2In supplement image I3In relative position be coordinate (x, y);
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3's
Three picture element matrixs: M'R、M'G、M'B;
Image goes blind module: blinding matrix p for 6 in extraction decoding key1,p2,...,p6, to supplement image I3's
Three picture element matrix components go blind, obtain Three new matrixes;
Blind matrix X' is gone to three M × M, Y', Z' recombine blind image I ";
Image cutting-out module: for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image,
Blind image I " is gone to be cut to m × n-pixel original image I by relative position coordinates (x, y) synthesis, while by original image
I is saved in local or mobile terminal.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this
The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention
Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair
It is bright range is claimed to be determined by the appended claims.
Claims (2)
1. a kind of method of image secret protection in cloud storage, which comprises the following steps:
Step 1: image supplement;
To m × n-pixel image I of Cloud Server to be uploaded, be extended to M × M etc. pixels rectangular image I', wherein M >
M, M > n, increased pixel are augmented with multiple random color image;Relative position coordinate of the original image I in supplement image I'
(x, y) is indicated;
Step 2: extracting image pixel matrix;
Rgb pixel matrix is extracted to supplement image I', respectively obtains three picture element matrixs of supplement image I': MR、MG、MB;
Step 3: generating random permutation number, generate 6 and blind matrix p1,p2,...,p6;
The generation random permutation number, specific implementation include following sub-step:
Step 3.1: 6 random permutation number π of construction1, π2..., π6, in which:
πi∈ 1 ..., n }, i=1,2..., 6;
Step 3.2: 6 non-zero set of random numbers { a of construction1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,cn},
{d1,d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Step 3.3: defined function
Step 3.4: generating 6 and blind matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,p2,...,
p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Step 4: picture element matrix is blinded;
Three Component Matrices obtained in step 2 are blinded, matrix is blinded multiplied by what is generated in step 3 respectively, obtains:Three new matrixes, wherein X, Y, Z include the institute of original image
There is information;
Step 5: synthesis blinds image;
By M × Metzler matrix X, Y, Z recombine one and blind image I1;The specific implementation process is as follows: by matrix X, Y, Z corresponding position
On pixel value be stored in a three-dimensional array (Rx, Ry, Rz) in, call function the three primary colours on each pixel are closed
At successively straight to each pixel progress operation as above by the corresponding position of the rgb value deposit Picture Buffer after synthesis
To recombining image I1;
Step 6: image cropping, upload;
Image I is blinded to what is synthesized in step 51It is cut, by I1It is cut into the image I of m' × n' pixel2, image cropping answers
The integrality of original image I is not destroyed, while by image I2It uploads Cloud Server to save, wherein m'> m, n'> n;
Step 7: generating decoding key;
By the rectangular image pixel value M after being augmented in step 1, the relative position coordinates (x, y) of original image and supplement image, with
And 6 generated in step 3 blind matrix p1,p2,...,p6An image in 2 D code is stored in together as decruption key
In.
2. the system of image secret protection in a kind of cloud storage, it is characterised in that: blind encrypting module including image and image is gone
Blind deciphering module;
Described image blinds encrypting module
Image augment module: for by the m of Cloud Server to be uploaded × n-pixel original image I be extended to a M × M etc. pixels
Rectangular image I', wherein M > m, M > n;Increased pixel is augmented with multiple random color image;
Image pixel extraction module: for extracting the rgb pixel matrix of supplement image I', three of supplement image I' are respectively obtained
Picture element matrix: MR、MG、MB;
Image blinds module: for producing random permutation number π1, π2..., π6, generate 6 and blind matrix p1,p2,...,p6;It is right
Three picture element matrix components of supplement image I' blind, and obtain
Three new matrixes;Matrix X is blinded to three M × M, Y, Z recombine one and blind image I1;
Wherein, 6 random permutation number π are constructed first1, π2..., π6;
πi∈ 1 ..., n }, i=1,2..., 6;
Then, 6 non-zero set of random numbers { a are constructed1,a2,...,an, { b1,b2,...,bn, { c1,c2,...,cn},{d1,
d2,...,dn, { e1,e2,...,en, { f1,f2,...,fn};
Then defined function
It ultimately produces 6 and blinds matrix p1,p2,...,p6, in which:
...,
Wherein, πn(i) it represents for generating pnI-th of random permutation number used in (i, j), n=1,2 ..., 6;p1,p2,...,
p6To be easy the matrix inverted, inverse matrix is respectively as follows:
...,
Image cropping module: for blinding image I to synthesis1It is cut out, by I1It is cut into the image I of m' × n' pixel2,
Simultaneously by image I2Cloud Server is uploaded to save;
Decode key production module: for image to be augmented to the rectangular image pixel value M after extending in module, original image and supplement
The relative position coordinates (x, y) and image of image blind 6 generated in module and blind matrix p1,p2,...,p6It gives birth to together
It is stored in an image in 2 D code at decruption key;
Described image goes the blind deciphering module to include:
Image augments module: for extracting the rectangular image pixel value M in decoding key, by locally downloading and mobile terminal picture
Element blinds image I for m' × n''s2Be extended to a M × M etc. pixels rectangular image I3, increased pixel multiple random color
Image is augmented;
Image pixel extraction module: for extracting supplement image I3Rgb pixel matrix, respectively obtain supplement image I3Three
Picture element matrix: M'R、M'G、M'B;
Image goes blind module: matrix p1, p2 are blinded for 6 in extraction decoding key ..., p6, to supplement image I3Three
Picture element matrix component goes blind, obtains Three new matrixes;To three
A M × M's removes blind matrix X', and Y', Z' recombine blind image I ";
Image cutting-out module: it for extracting decoding key Central Plains beginning image and augmenting the relative position coordinates (x, y) of image, will close
At go blind image I " to be cut to m × n-pixel original image I by relative position coordinates (x, y), while original image I being protected
It is stored to local or mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510755825.9A CN105447404B (en) | 2015-11-06 | 2015-11-06 | The method and system of image secret protection in a kind of cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510755825.9A CN105447404B (en) | 2015-11-06 | 2015-11-06 | The method and system of image secret protection in a kind of cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105447404A CN105447404A (en) | 2016-03-30 |
CN105447404B true CN105447404B (en) | 2018-12-14 |
Family
ID=55557567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510755825.9A Active CN105447404B (en) | 2015-11-06 | 2015-11-06 | The method and system of image secret protection in a kind of cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105447404B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108305298B (en) * | 2018-01-17 | 2021-06-04 | 湖北工业大学 | Image recoverable information hiding method based on Sudoku matrix index |
CN110348847A (en) * | 2018-04-04 | 2019-10-18 | 触信(厦门)智能科技有限公司 | A kind of information transmitting methods based on panorama VR block chain |
CN110730277B (en) * | 2018-07-17 | 2022-04-05 | 阿里巴巴集团控股有限公司 | Information coding and method and device for acquiring coded information |
CN109886010B (en) * | 2019-01-28 | 2023-10-17 | 平安科技(深圳)有限公司 | Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal |
CN112152806B (en) * | 2020-09-25 | 2023-07-18 | 青岛大学 | Cloud-assisted image identification method, device and equipment supporting privacy protection |
CN113595715A (en) * | 2021-07-23 | 2021-11-02 | 华东交通大学 | Logistic-based double-pixel rectangular mapping color image encryption and decryption method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1816143A (en) * | 2006-03-14 | 2006-08-09 | 北京理工大学 | Digital image enciphoring/deciphoring method |
CN104537604A (en) * | 2014-12-25 | 2015-04-22 | 中国科学院武汉物理与数学研究所 | Image certainty encryption double-blind secrecy matching method |
-
2015
- 2015-11-06 CN CN201510755825.9A patent/CN105447404B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1816143A (en) * | 2006-03-14 | 2006-08-09 | 北京理工大学 | Digital image enciphoring/deciphoring method |
CN104537604A (en) * | 2014-12-25 | 2015-04-22 | 中国科学院武汉物理与数学研究所 | Image certainty encryption double-blind secrecy matching method |
Non-Patent Citations (3)
Title |
---|
Scrambling matrix generation algorithm for high dimensional image scrambling transformation;Shao Liping etc;《3rd IEEE Conference on Industrial Electronics and Applications》;20080605;第1707-1712页 * |
基于混沌数列变换的图像加密算法;任洪娥 等;《计算机工程与设计》;20130531;第34卷(第5期);第1615-1619页 * |
基于自生成模m单元矩阵的双置乱图像加密的快速算法;张丽娜;《科学技术与工程》;20130331;第13卷(第9期);第2555-2561页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105447404A (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
Lee et al. | Data security in cloud computing using AES under HEROKU cloud | |
CN105450899B (en) | Multiple image encryption method based on PWLCM chaos | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
CN110235409A (en) | Use the protected RSA signature of homomorphic cryptography or the method for decryption | |
CN106575334A (en) | Accessing a secured software application | |
Aung et al. | A novel secure combination technique of steganography and cryptography | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN112035827B (en) | Cipher data processing method, device, equipment and readable storage medium | |
CN107392970A (en) | A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system | |
CN105046123A (en) | System for using picture to realize password security and setting method for using picture to realize password security | |
CN107770407B (en) | The image encryption method and device of joint zero watermarking insertion | |
Pushpa | Hybrid data encryption algorithm for secure medical data transmission in cloud environment | |
Zhang et al. | An efficient image encryption scheme for industrial Internet-of-Things devices | |
CN112702582B (en) | Secure transmission method and device for monitoring video based on SM2 | |
US10432596B2 (en) | Systems and methods for cryptography having asymmetric to symmetric key agreement | |
Sazaki et al. | Implementation of affine transform method and advanced hill cipher for securing digital images | |
US20170085371A1 (en) | System and method for an enhanced xor cipher through extensions | |
Al-Kadei | Robust video data security using hybrid cryptography-steganography technique | |
Abboud | Multifactor authentication for software protection | |
CN106161000A (en) | The method and system that data file is encrypted and decrypted | |
CN115085974A (en) | Flow confusion method and device | |
Gunasekaran et al. | Encrypting and decrypting image using computer visualization techniques | |
Vasilakis et al. | Copyright Protection on Electronic Books: Study and Design of a New Approach | |
Kaushik et al. | A Chaotic and Hyperchaotic Map based Image Encryption Protocol for High-End Colour density Images using enhanced S-box pixel permutator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230804 Address after: Room 604, 6th Floor, Building C2, Phase I, Longshan Innovation Park, Wuhan Future Science and Technology City, No. 999 Gaoxin Avenue, Donghu New Technology Development Zone, Wuhan City, Hubei Province, 430000 Patentee after: Wuhan Yuanshuzhi Technology Co.,Ltd. Address before: 430068 1, Lijia 1 village, Nanhu, Wuchang District, Wuhan, Hubei Patentee before: HUBEI University OF TECHNOLOGY |