CN105763763B - A kind of image encryption method - Google Patents
A kind of image encryption method Download PDFInfo
- Publication number
- CN105763763B CN105763763B CN201610082651.9A CN201610082651A CN105763763B CN 105763763 B CN105763763 B CN 105763763B CN 201610082651 A CN201610082651 A CN 201610082651A CN 105763763 B CN105763763 B CN 105763763B
- Authority
- CN
- China
- Prior art keywords
- values
- hexadecimal
- image
- pixel
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Facsimile Transmission Control (AREA)
- Image Analysis (AREA)
Abstract
The invention discloses a kind of image encryption methods, belong to computer field of encryption, and facial image is obtained by image capture device, then carry out password generation according to the position of any pixel of facial image point and its rgb value and image is encrypted.The present invention can be according to adaptive generation password after user's recognition of face, and password formation speed is fast, and image can be encrypted in conjunction with the password generated, to be protected to image.During image encryption of the present invention, need not artificial setting code additionally be carried out to image, but after carrying out recognition of face by face identification device, unique password is automatically generated, the cryptosecurity degree is high and is adapted with the recombination of image, when the later stage decrypts, image decryption can be directly carried out according to password, compared with traditional image decryption mode, the present invention does not have to retrodict according to ciphering process, improves the safety of image encryption.
Description
Technical field
The invention belongs to computer field of encryption, more particularly to a kind of image encryption method.
Background technology
Network image is the means such as to deduce by multimedia come the work that shows using internet as display platform and communication media
Product, since by powerful network media, network image has many advantages, such as quick-speed large-scale propagation, diversity, interactivity, has become
For the important component of pop culture.But also due to the convenience of Internet communication, leads to the intellectual property of network image not
It is vulnerable to protection, network piracy is encroached right causes huge loss to book-maker and copyright owner, is caused sternly to the development of the Internet culture
Ghost image is rung, such as seriously affects the charge of photographic work, so that inhibiting the long-run development of photography industry.Therefore, media list
Position is needed to carrying out copyright protection from copyrighted news picture and material picture, to prevent these pictures free by other unit
It reprints or uses.
Simultaneously because user gives other people sometimes for by mobile terminal sharing picture, such as, bluetooth direct-connected by WIFI
Etc. technologies picture is shared to other people;In shared procedure, if obtaining communication data by third party, third party can also obtain
Image content;Even sometimes, user misoperation causes to be connected to third party user, and picture has accidentally been shared to third party
(be such as connected to third party user when WIFI is direct-connected, and and unshared user), causes picture to share degree of safety low.
In order to realize that the copyright protection to picture, the prior art show mostly by adding the way of watermark on picture
Have in technology while picture adds watermark, also affect the visibility of image, the simple watermark in part even can be by
Reparation is cracked, far from safety of image transmission and effective protection is achieved the purpose that, while the prior art is also ineffective
Disadvantage.
Invention content
In view of the drawbacks described above of the prior art, technical problem to be solved by the invention is to provide one kind capable of realizing figure
As safe transmission and the encryption method of effective protection.
To achieve the above object, the present invention provides a kind of image encryption method, include the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, the i,
J is positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two
A character G is added on the hexadecimal value left side of position, to form pixel PijTwo R values character strings, two G values character strings and
Two B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values
When reaching two, step 4 is directly executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right
It is arranged in order to form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When i hexadecimal value or j 16
When hex value is less than four, character G is added on the hexadecimal value left side less than four, to form four character strings and j of i
Four character strings, then execute step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step is executed
Six;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added
It is added to the left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoosing
Take the pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When including character G in the second number string, by the second series
Character G in string replaces with 0, then executes step 9;When there is no character G in the second number string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the inverse of the second series string
Second digit is Q2;
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Institute
State 1≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object area
Domain TX, y;
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region and fourth line region are carried out
It replaces;Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th
Row region is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone
Domain is replaced with the tenth five-element region;Ariadne region and the 16th row region are replaced.
, can be according to adaptive generation password after user's recognition of face using above technical scheme, and formation speed is fast, and
Image can be encrypted in conjunction with the password generated, to be protected to image.
Preferably, choosing the pixel P in the step 7ijThe region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n。
Preferably, in step 1, the square facial image for being a*a by image capture device acquisition resolution ratio is by following
Step carries out:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is vertical
Histogram to pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛
The pixel of 0,0,0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛
The pixel of 0,0,0 ﹜, and the numerical value of b is assigned to a, then execute step 2;
As a=b, step 2 is executed.
The present invention also provides a kind of image decryption methods, include the following steps:
S1, encrypted image is divided into 16*16 square areaThe first row is to
Four row regions are the first encrypting module, and fifth line to the 8th row region is the second encrypting module, the 9th row to the 12nd row region
For third encrypting module, the 13rd row to the 16th row region is the 4th encrypting module;
S2, password input by user is received;
S3, judge whether the password input by user is 14 digit strings;When password input by user is 14 digit string,
Execute step S4;When password input by user is not 14 digit string, S2 is returned to step;
S4, judge input in password whether have character G;When in password including character G, the character G in password is replaced
It is 0, then executes step S5;When there is no character G in password, step S5 is executed;
S5, parallel progress region is determining and rgb value is converted;
The region determines and carries out according to the following steps:
A1, the 1st to 4 digit of extraction password forms third series string from left to right, and converts thereof into decimal value
U1;The 5th to 8 digit of extraction password forms fourth stage number string from left to right, and converts thereof into decimal value U2;
The 14th digit of password is extracted from left to right, and converts thereof into decimal value U3;Password is extracted from left to right
The 13rd digit, and convert thereof into decimal value U4;
A2, region T to be changed is chosenR, t, r, t are positive integer and 1≤r≤16,1≤t≤16:
It calculatesR is obtained, is calculatedObtain t;Region to be changed is chosen according to the value of r and t
TR, t;
A3, U is calculated31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41;1≤the U31≤ 16, the 1≤U41≤
16;
It calculatesObtain the second target area
TP, q;1≤p≤16,1≤q≤16;
A4, selection TP, qCorresponding encrypting module, and the encrypting module is decrypted:By the first row of the encrypting module
It is replaced with the third line of the encrypting module, the second row of the encrypting module and the fourth line of the encrypting module is replaced
It changes;
A5, judgementWhether with TP, qPositioned at the same encrypting module;WhenWith TP, qPositioned at the same encryption
When module, step A6 is executed;WhenWith TP, qIt, will not in the same encrypting modulePlace encrypting module carries out
Decryption:It willThe first row of place encrypting module is replaced with the third line of the encrypting module, willPlace adds
The second row and the fourth line of the encrypting module of close module are replaced, and then execute step A6;
A6, by TR, tWith TP, qIt is replaced;
The rgb value conversion carries out according to the following steps:
The the 9th and the 10th digit of extraction password forms level V number string from left to right, and converts thereof into decimal value
U5;The the 11st and the 12nd digit of extraction password forms the 6th series string from left to right, and converts thereof into decimal value U6;From
The the 13rd and the 14th digit that left-to-right extracts password forms the 7th series string, and converts thereof into decimal value U7;
S6, rgb value matching is carried out:
Selected pixels point1≤i≤a, 1≤j≤a, and i, j, a are positive integer;It willR values, G values and B
Value respectively with U5、U6And U7It is compared;JudgeR values whether be equal to U5, whenR values be not equal to U5When, terminate
Decryption;WhenR values be equal to U5When, judgeG values whether be equal to U6;WhenG values be not equal to U6When, terminate
Decryption;WhenG values be equal to U6When, judgeB values whether be equal to U7;WhenB values be not equal to U7When, terminate
Decryption;WhenB values whether be equal to U7When, execute step S7;
S7, judge the first encrypting module to the 4th encrypting module successively, if to be decrypted;By what is be not decrypted
Encrypting module is decrypted:
The third line of the first row and the encrypting module of not decrypting encrypting module is replaced, encrypting module will not decrypted
The second row and the fourth line of the encrypting module be replaced.
The beneficial effects of the invention are as follows:The present invention can be according to adaptive generation password after user's recognition of face, password life
It is fast at speed, and image can be encrypted in conjunction with the password generated, to be protected to image.Image encryption mistake of the present invention
Cheng Zhong additionally need not carry out artificial setting code to image, but after carrying out recognition of face by face identification device, automatically
Unique password is generated, the cryptosecurity degree is high and is adapted with the recombination of image, can be straight according to password when the later stage decrypts
Row image decryption is tapped into, compared with traditional image decryption mode, the present invention does not have to retrodict according to ciphering process, improves
The safety of image encryption.
Specific implementation mode
With reference to embodiment, the invention will be further described:
A kind of image encryption method, includes the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, the i,
J is positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two
A character G is added on the hexadecimal value left side of position, to form pixel PijTwo R values character strings, two G values character strings and
Two B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values
When reaching two, step 4 is executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right
It is arranged in order to form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When i hexadecimal value or j 16
When hex value is less than four, character G is added on the hexadecimal value left side less than four, to form four character strings and j of i
Four character strings, then execute step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step is executed
Six;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added
It is added to the left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoosing
Take the pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When including character G in the second number string, by the second series
Character G in string replaces with 0, then executes step 9;When there is no character G in the second number string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the inverse of the second series string
Second digit is Q2;
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Institute
State 1≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object area
Domain TX, y;
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region and fourth line region are carried out
It replaces;Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th
Row region is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone
Domain is replaced with the tenth five-element region;Ariadne region and the 16th row region are replaced.
In the present embodiment, the pixel P is chosen in the step 7ijThe region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n。
In the present embodiment, in step 1, the square facial image that resolution ratio is a*a is obtained by image capture device and is pressed
Following steps carry out:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is vertical
Histogram to pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛
The pixel of 0,0,0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛
The pixel of 0,0,0 ﹜, and the numerical value of b is assigned to a values after a obtains increase pixel, then execute step 2;
As a=b, step 2 is executed.
A kind of image decryption method, includes the following steps:
S1, encrypted image is divided into 16*16 square areaThe first row is to
Four row regions are the first encrypting module, and fifth line to the 8th row region is the second encrypting module, the 9th row to the 12nd row region
For third encrypting module, the 13rd row to the 16th row region is the 4th encrypting module;
S2, password input by user is received;
S3, judge whether the password input by user is 14 digit strings;When password input by user is 14 digit string,
Execute step S4;When password input by user is not 14 digit string, S2 is returned to step;
S4, judge input in password whether have character G;When in password including character G, the character G in password is replaced
It is 0, then executes step S5;When there is no character G in password, step S5 is executed;
S5, parallel progress region is determining and rgb value is converted;
The region determines and carries out according to the following steps:
A1, the 1st to 4 digit of extraction password forms third series string from left to right, and converts thereof into decimal value
U1;The 5th to 8 digit of extraction password forms fourth stage number string from left to right, and converts thereof into decimal value U2;
The 14th digit of password is extracted from left to right, and converts thereof into decimal value U3;Password is extracted from left to right
The 13rd digit, and convert thereof into decimal value U4;
A2, region T to be changed is chosenR, t, r, t are positive integer and 1≤r≤16,1≤t≤16:
It calculatesR is obtained, is calculatedObtain t;Region to be changed is chosen according to the value of r and t
TR, t;
A3, U is calculated31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41;1≤the U31≤ 16, the 1≤U41≤
16;
It calculatesObtain the second target area
TP, q;1≤p≤16,1≤q≤16;
A4, selection TP, qCorresponding encrypting module, and the encrypting module is decrypted:By the first row of the encrypting module
It is replaced with the third line of the encrypting module, the second row of the encrypting module and the fourth line of the encrypting module is replaced
It changes;
A5, judgementWhether with TP, qPositioned at the same encrypting module;WhenWith TP, qPositioned at the same encryption
When module, step A6 is executed;WhenWith TP, qIt, will not in the same encrypting modulePlace encrypting module carries out
Decryption:It willThe first row of place encrypting module is replaced with the third line of the encrypting module, willPlace adds
The second row and the fourth line of the encrypting module of close module are replaced, and then execute step A6;
A6, by TR, tWith TP, qIt is replaced;
The rgb value conversion carries out according to the following steps:
The the 9th and the 10th digit of extraction password forms level V number string from left to right, and converts thereof into decimal value
U5;The the 11st and the 12nd digit of extraction password forms the 6th series string from left to right, and converts thereof into decimal value U6;From
The the 13rd and the 14th digit that left-to-right extracts password forms the 7th series string, and converts thereof into decimal value U7;
S6, rgb value matching is carried out:
Selected pixels point1≤i≤a, 1≤j≤a, and i, j, a are positive integer;It willR values, G values and B
Value respectively with U5、U6And U7It is compared;JudgeR values whether be equal to U5, whenR values be not equal to U5When, terminate
Decryption;WhenR values be equal to U5When, judgeG values whether be equal to U6;WhenG values be not equal to U6When, terminate
Decryption;WhenG values be equal to U6When, judgeB values whether be equal to U7;WhenB values be not equal to U7When, terminate
Decryption;WhenB values whether be equal to U7When, execute step S7;
S7, judge the first encrypting module to the 4th encrypting module successively, if to be decrypted;By what is be not decrypted
Encrypting module is decrypted:
The third line of the first row and the encrypting module of not decrypting encrypting module is replaced, encrypting module will not decrypted
The second row and the fourth line of the encrypting module be replaced.
The preferred embodiment of the present invention has been described in detail above.It should be appreciated that those skilled in the art without
It needs creative work according to the present invention can conceive and makes many modifications and variations.Therefore, all technologies in the art
Personnel are available by logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea
Technical solution, all should be in the protection domain being defined in the patent claims.
Claims (3)
1. a kind of image encryption method, it is characterised in that include the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, described i, j are
Positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two
A character G is added on the hexadecimal value left side, to form pixel PijTwo R values character strings, two G values character strings and two
B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values reach
At two, step 4 is executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right successively
Arrangement form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When the hexadecimal value of i or the hexadecimal of j
When value is less than four, character G is added on the hexadecimal value left side less than four, with formed i four character strings and j four
Position character string, then executes step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step 6 is executed;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added to
The left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoose institute
State pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When in the second series string including character G, by the second series string
In character G replace with 0, then execute step 9;When there is no character G in the second series string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the penultimate of the second series string
Number is Q2;
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Described 1
≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object region
TX, y;
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region is replaced with fourth line region;
Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th row area
Domain is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone domain with
Tenth five-element region is replaced;Ariadne region and the 16th row region are replaced.
2. a kind of image encryption method as described in claim 1, it is characterized in that:The pixel P is chosen in the step 7ij
The region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n。
3. a kind of image encryption method as described in claim 1, it is characterized in that:In step 1, obtained by image capture device
It is that the square facial image of a*a carries out according to the following steps to take resolution ratio:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is Vertical Square
To pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛ 0,0,
The pixel of 0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛ 0,0,
The pixel of 0 ﹜, and the numerical value of b is assigned to a, then execute step 2;
As a=b, step 2 is executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610082651.9A CN105763763B (en) | 2016-02-05 | 2016-02-05 | A kind of image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610082651.9A CN105763763B (en) | 2016-02-05 | 2016-02-05 | A kind of image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105763763A CN105763763A (en) | 2016-07-13 |
CN105763763B true CN105763763B (en) | 2018-08-31 |
Family
ID=56329665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610082651.9A Expired - Fee Related CN105763763B (en) | 2016-02-05 | 2016-02-05 | A kind of image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105763763B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109657487B (en) * | 2018-12-24 | 2021-07-06 | 北京百度网讯科技有限公司 | Image processing method, image verification method and device |
CN110634173A (en) * | 2019-09-05 | 2019-12-31 | 北京无限光场科技有限公司 | Picture mark information adding method and device, electronic equipment and readable medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1583322A2 (en) * | 2004-04-02 | 2005-10-05 | Microsoft Corporation | A method and system for recovering password protected private data via a communication network without exposing the private data |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
WO2015180237A1 (en) * | 2014-05-28 | 2015-12-03 | 东莞盛世科技电子实业有限公司 | Method for checking password in fuzzy mode and password checking device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8997177B2 (en) * | 2006-05-24 | 2015-03-31 | Confident Technologies, Inc. | Graphical encryption and display of codes and text |
-
2016
- 2016-02-05 CN CN201610082651.9A patent/CN105763763B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1583322A2 (en) * | 2004-04-02 | 2005-10-05 | Microsoft Corporation | A method and system for recovering password protected private data via a communication network without exposing the private data |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
WO2015180237A1 (en) * | 2014-05-28 | 2015-12-03 | 东莞盛世科技电子实业有限公司 | Method for checking password in fuzzy mode and password checking device |
Non-Patent Citations (1)
Title |
---|
基于高级加密标准的图像置乱方法研究及其硬件设计;张浩亮;《硕士论文库》;20110928;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105763763A (en) | 2016-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Han | An image encryption algorithm based on modified logistic chaotic map | |
Ye | Image scrambling encryption algorithm of pixel bit based on chaos map | |
Lee et al. | Digital image sharing by diverse image media | |
Yang et al. | Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space | |
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
CN101604439A (en) | A kind of color image encrypting method based on multi-chaos system | |
CN106709854B (en) | Image information fusion encryption method based on cat face transformation and chaos | |
CN107070636B (en) | White box software implementation method of quotient cipher SM4 algorithm in standard cipher text output format | |
CN107833174B (en) | Image encryption method based on Logistic chaotic system algorithm | |
CN107392970B (en) | Digital image encryption method based on bit plane and high-dimensional chaotic system | |
CN107220923A (en) | Digital picture feedback encryption method based on image network | |
CN105763763B (en) | A kind of image encryption method | |
CN102014266A (en) | Digital watermarking-based high-definition video encrypted transmitting method and system | |
CN105046123A (en) | System for using picture to realize password security and setting method for using picture to realize password security | |
CN107770407B (en) | The image encryption method and device of joint zero watermarking insertion | |
Basahel et al. | Enhancing security of transmitted data by improved steganography method | |
Xue et al. | An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps | |
CN104038828A (en) | RSA hash signature content protection optimizing method based on AES encryption | |
CN104463767A (en) | Visible encryption and decryption method with image disguising function and tampering identification function | |
CN113868690B (en) | Trusted deposit certificate based privacy calculation method and system | |
WO2020114308A1 (en) | Image encryption and correction method and device, and image decryption method and device | |
CN111400731B (en) | Quantum image encryption method based on DNACNot | |
CN109918927B (en) | Image encryption method and device | |
Wu | A color image encryption algorithm using the fractional-order hyperchaotic systems | |
Hu et al. | Reversible secret image sharing with steganography and dynamic embedding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180831 Termination date: 20190205 |
|
CF01 | Termination of patent right due to non-payment of annual fee |