CN105763763B - A kind of image encryption method - Google Patents

A kind of image encryption method Download PDF

Info

Publication number
CN105763763B
CN105763763B CN201610082651.9A CN201610082651A CN105763763B CN 105763763 B CN105763763 B CN 105763763B CN 201610082651 A CN201610082651 A CN 201610082651A CN 105763763 B CN105763763 B CN 105763763B
Authority
CN
China
Prior art keywords
values
hexadecimal
image
pixel
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610082651.9A
Other languages
Chinese (zh)
Other versions
CN105763763A (en
Inventor
李红芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Technology and Business Institute
Original Assignee
Chongqing Technology and Business Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Technology and Business Institute filed Critical Chongqing Technology and Business Institute
Priority to CN201610082651.9A priority Critical patent/CN105763763B/en
Publication of CN105763763A publication Critical patent/CN105763763A/en
Application granted granted Critical
Publication of CN105763763B publication Critical patent/CN105763763B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Facsimile Transmission Control (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a kind of image encryption methods, belong to computer field of encryption, and facial image is obtained by image capture device, then carry out password generation according to the position of any pixel of facial image point and its rgb value and image is encrypted.The present invention can be according to adaptive generation password after user's recognition of face, and password formation speed is fast, and image can be encrypted in conjunction with the password generated, to be protected to image.During image encryption of the present invention, need not artificial setting code additionally be carried out to image, but after carrying out recognition of face by face identification device, unique password is automatically generated, the cryptosecurity degree is high and is adapted with the recombination of image, when the later stage decrypts, image decryption can be directly carried out according to password, compared with traditional image decryption mode, the present invention does not have to retrodict according to ciphering process, improves the safety of image encryption.

Description

A kind of image encryption method
Technical field
The invention belongs to computer field of encryption, more particularly to a kind of image encryption method.
Background technology
Network image is the means such as to deduce by multimedia come the work that shows using internet as display platform and communication media Product, since by powerful network media, network image has many advantages, such as quick-speed large-scale propagation, diversity, interactivity, has become For the important component of pop culture.But also due to the convenience of Internet communication, leads to the intellectual property of network image not It is vulnerable to protection, network piracy is encroached right causes huge loss to book-maker and copyright owner, is caused sternly to the development of the Internet culture Ghost image is rung, such as seriously affects the charge of photographic work, so that inhibiting the long-run development of photography industry.Therefore, media list Position is needed to carrying out copyright protection from copyrighted news picture and material picture, to prevent these pictures free by other unit It reprints or uses.
Simultaneously because user gives other people sometimes for by mobile terminal sharing picture, such as, bluetooth direct-connected by WIFI Etc. technologies picture is shared to other people;In shared procedure, if obtaining communication data by third party, third party can also obtain Image content;Even sometimes, user misoperation causes to be connected to third party user, and picture has accidentally been shared to third party (be such as connected to third party user when WIFI is direct-connected, and and unshared user), causes picture to share degree of safety low.
In order to realize that the copyright protection to picture, the prior art show mostly by adding the way of watermark on picture Have in technology while picture adds watermark, also affect the visibility of image, the simple watermark in part even can be by Reparation is cracked, far from safety of image transmission and effective protection is achieved the purpose that, while the prior art is also ineffective Disadvantage.
Invention content
In view of the drawbacks described above of the prior art, technical problem to be solved by the invention is to provide one kind capable of realizing figure As safe transmission and the encryption method of effective protection.
To achieve the above object, the present invention provides a kind of image encryption method, include the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, the i, J is positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two A character G is added on the hexadecimal value left side of position, to form pixel PijTwo R values character strings, two G values character strings and Two B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values When reaching two, step 4 is directly executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right It is arranged in order to form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When i hexadecimal value or j 16 When hex value is less than four, character G is added on the hexadecimal value left side less than four, to form four character strings and j of i Four character strings, then execute step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step is executed Six;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added It is added to the left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoosing Take the pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When including character G in the second number string, by the second series Character G in string replaces with 0, then executes step 9;When there is no character G in the second number string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the inverse of the second series string Second digit is Q2
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Institute State 1≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object area Domain TX, y
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region and fourth line region are carried out It replaces;Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th Row region is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone Domain is replaced with the tenth five-element region;Ariadne region and the 16th row region are replaced.
, can be according to adaptive generation password after user's recognition of face using above technical scheme, and formation speed is fast, and Image can be encrypted in conjunction with the password generated, to be protected to image.
Preferably, choosing the pixel P in the step 7ijThe region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n
Preferably, in step 1, the square facial image for being a*a by image capture device acquisition resolution ratio is by following Step carries out:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is vertical Histogram to pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛ The pixel of 0,0,0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛ The pixel of 0,0,0 ﹜, and the numerical value of b is assigned to a, then execute step 2;
As a=b, step 2 is executed.
The present invention also provides a kind of image decryption methods, include the following steps:
S1, encrypted image is divided into 16*16 square areaThe first row is to Four row regions are the first encrypting module, and fifth line to the 8th row region is the second encrypting module, the 9th row to the 12nd row region For third encrypting module, the 13rd row to the 16th row region is the 4th encrypting module;
S2, password input by user is received;
S3, judge whether the password input by user is 14 digit strings;When password input by user is 14 digit string, Execute step S4;When password input by user is not 14 digit string, S2 is returned to step;
S4, judge input in password whether have character G;When in password including character G, the character G in password is replaced It is 0, then executes step S5;When there is no character G in password, step S5 is executed;
S5, parallel progress region is determining and rgb value is converted;
The region determines and carries out according to the following steps:
A1, the 1st to 4 digit of extraction password forms third series string from left to right, and converts thereof into decimal value U1;The 5th to 8 digit of extraction password forms fourth stage number string from left to right, and converts thereof into decimal value U2
The 14th digit of password is extracted from left to right, and converts thereof into decimal value U3;Password is extracted from left to right The 13rd digit, and convert thereof into decimal value U4
A2, region T to be changed is chosenR, t, r, t are positive integer and 1≤r≤16,1≤t≤16:
It calculatesR is obtained, is calculatedObtain t;Region to be changed is chosen according to the value of r and t TR, t
A3, U is calculated31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41;1≤the U31≤ 16, the 1≤U41≤ 16;
It calculatesObtain the second target area TP, q;1≤p≤16,1≤q≤16;
A4, selection TP, qCorresponding encrypting module, and the encrypting module is decrypted:By the first row of the encrypting module It is replaced with the third line of the encrypting module, the second row of the encrypting module and the fourth line of the encrypting module is replaced It changes;
A5, judgementWhether with TP, qPositioned at the same encrypting module;WhenWith TP, qPositioned at the same encryption When module, step A6 is executed;WhenWith TP, qIt, will not in the same encrypting modulePlace encrypting module carries out Decryption:It willThe first row of place encrypting module is replaced with the third line of the encrypting module, willPlace adds The second row and the fourth line of the encrypting module of close module are replaced, and then execute step A6;
A6, by TR, tWith TP, qIt is replaced;
The rgb value conversion carries out according to the following steps:
The the 9th and the 10th digit of extraction password forms level V number string from left to right, and converts thereof into decimal value U5;The the 11st and the 12nd digit of extraction password forms the 6th series string from left to right, and converts thereof into decimal value U6;From The the 13rd and the 14th digit that left-to-right extracts password forms the 7th series string, and converts thereof into decimal value U7
S6, rgb value matching is carried out:
Selected pixels point1≤i≤a, 1≤j≤a, and i, j, a are positive integer;It willR values, G values and B Value respectively with U5、U6And U7It is compared;JudgeR values whether be equal to U5, whenR values be not equal to U5When, terminate Decryption;WhenR values be equal to U5When, judgeG values whether be equal to U6;WhenG values be not equal to U6When, terminate Decryption;WhenG values be equal to U6When, judgeB values whether be equal to U7;WhenB values be not equal to U7When, terminate Decryption;WhenB values whether be equal to U7When, execute step S7;
S7, judge the first encrypting module to the 4th encrypting module successively, if to be decrypted;By what is be not decrypted Encrypting module is decrypted:
The third line of the first row and the encrypting module of not decrypting encrypting module is replaced, encrypting module will not decrypted The second row and the fourth line of the encrypting module be replaced.
The beneficial effects of the invention are as follows:The present invention can be according to adaptive generation password after user's recognition of face, password life It is fast at speed, and image can be encrypted in conjunction with the password generated, to be protected to image.Image encryption mistake of the present invention Cheng Zhong additionally need not carry out artificial setting code to image, but after carrying out recognition of face by face identification device, automatically Unique password is generated, the cryptosecurity degree is high and is adapted with the recombination of image, can be straight according to password when the later stage decrypts Row image decryption is tapped into, compared with traditional image decryption mode, the present invention does not have to retrodict according to ciphering process, improves The safety of image encryption.
Specific implementation mode
With reference to embodiment, the invention will be further described:
A kind of image encryption method, includes the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, the i, J is positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two A character G is added on the hexadecimal value left side of position, to form pixel PijTwo R values character strings, two G values character strings and Two B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values When reaching two, step 4 is executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right It is arranged in order to form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When i hexadecimal value or j 16 When hex value is less than four, character G is added on the hexadecimal value left side less than four, to form four character strings and j of i Four character strings, then execute step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step is executed Six;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added It is added to the left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoosing Take the pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When including character G in the second number string, by the second series Character G in string replaces with 0, then executes step 9;When there is no character G in the second number string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the inverse of the second series string Second digit is Q2
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Institute State 1≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object area Domain TX, y
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region and fourth line region are carried out It replaces;Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th Row region is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone Domain is replaced with the tenth five-element region;Ariadne region and the 16th row region are replaced.
In the present embodiment, the pixel P is chosen in the step 7ijThe region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n
In the present embodiment, in step 1, the square facial image that resolution ratio is a*a is obtained by image capture device and is pressed Following steps carry out:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is vertical Histogram to pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛ The pixel of 0,0,0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛ The pixel of 0,0,0 ﹜, and the numerical value of b is assigned to a values after a obtains increase pixel, then execute step 2;
As a=b, step 2 is executed.
A kind of image decryption method, includes the following steps:
S1, encrypted image is divided into 16*16 square areaThe first row is to Four row regions are the first encrypting module, and fifth line to the 8th row region is the second encrypting module, the 9th row to the 12nd row region For third encrypting module, the 13rd row to the 16th row region is the 4th encrypting module;
S2, password input by user is received;
S3, judge whether the password input by user is 14 digit strings;When password input by user is 14 digit string, Execute step S4;When password input by user is not 14 digit string, S2 is returned to step;
S4, judge input in password whether have character G;When in password including character G, the character G in password is replaced It is 0, then executes step S5;When there is no character G in password, step S5 is executed;
S5, parallel progress region is determining and rgb value is converted;
The region determines and carries out according to the following steps:
A1, the 1st to 4 digit of extraction password forms third series string from left to right, and converts thereof into decimal value U1;The 5th to 8 digit of extraction password forms fourth stage number string from left to right, and converts thereof into decimal value U2
The 14th digit of password is extracted from left to right, and converts thereof into decimal value U3;Password is extracted from left to right The 13rd digit, and convert thereof into decimal value U4
A2, region T to be changed is chosenR, t, r, t are positive integer and 1≤r≤16,1≤t≤16:
It calculatesR is obtained, is calculatedObtain t;Region to be changed is chosen according to the value of r and t TR, t
A3, U is calculated31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41;1≤the U31≤ 16, the 1≤U41≤ 16;
It calculatesObtain the second target area TP, q;1≤p≤16,1≤q≤16;
A4, selection TP, qCorresponding encrypting module, and the encrypting module is decrypted:By the first row of the encrypting module It is replaced with the third line of the encrypting module, the second row of the encrypting module and the fourth line of the encrypting module is replaced It changes;
A5, judgementWhether with TP, qPositioned at the same encrypting module;WhenWith TP, qPositioned at the same encryption When module, step A6 is executed;WhenWith TP, qIt, will not in the same encrypting modulePlace encrypting module carries out Decryption:It willThe first row of place encrypting module is replaced with the third line of the encrypting module, willPlace adds The second row and the fourth line of the encrypting module of close module are replaced, and then execute step A6;
A6, by TR, tWith TP, qIt is replaced;
The rgb value conversion carries out according to the following steps:
The the 9th and the 10th digit of extraction password forms level V number string from left to right, and converts thereof into decimal value U5;The the 11st and the 12nd digit of extraction password forms the 6th series string from left to right, and converts thereof into decimal value U6;From The the 13rd and the 14th digit that left-to-right extracts password forms the 7th series string, and converts thereof into decimal value U7
S6, rgb value matching is carried out:
Selected pixels point1≤i≤a, 1≤j≤a, and i, j, a are positive integer;It willR values, G values and B Value respectively with U5、U6And U7It is compared;JudgeR values whether be equal to U5, whenR values be not equal to U5When, terminate Decryption;WhenR values be equal to U5When, judgeG values whether be equal to U6;WhenG values be not equal to U6When, terminate Decryption;WhenG values be equal to U6When, judgeB values whether be equal to U7;WhenB values be not equal to U7When, terminate Decryption;WhenB values whether be equal to U7When, execute step S7;
S7, judge the first encrypting module to the 4th encrypting module successively, if to be decrypted;By what is be not decrypted Encrypting module is decrypted:
The third line of the first row and the encrypting module of not decrypting encrypting module is replaced, encrypting module will not decrypted The second row and the fourth line of the encrypting module be replaced.
The preferred embodiment of the present invention has been described in detail above.It should be appreciated that those skilled in the art without It needs creative work according to the present invention can conceive and makes many modifications and variations.Therefore, all technologies in the art Personnel are available by logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea Technical solution, all should be in the protection domain being defined in the patent claims.

Claims (3)

1. a kind of image encryption method, it is characterised in that include the following steps:
Step 1: obtaining the square facial image that resolution ratio is a*a by image capture device, a is positive integer;
Step 2: setting in the facial image any one pixel as Pij, obtain pixel PijRgb value, described i, j are Positive integer, and 1≤i≤a, 1≤j≤a;
Step 3: by pixel PijR values, G values and B values be respectively converted into corresponding hexadecimal values;
Judge pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values whether reach two;
As pixel PijHexadecimal R values, hexadecimal G values or hexadecimal B values less than two when, this less than two A character G is added on the hexadecimal value left side, to form pixel PijTwo R values character strings, two G values character strings and two B value character strings, then execute step 4;As pixel PijHexadecimal R values, hexadecimal G values and hexadecimal B values reach At two, step 4 is executed;
Step 4: by pixel PijTwo R values character strings, two G values character strings and two B values character strings from left to right successively Arrangement form the first series string;
Step 5: i and j are respectively converted into corresponding hexadecimal values;
Whether the hexadecimal value of the hexadecimal value or j that judge i reaches four;When the hexadecimal value of i or the hexadecimal of j When value is less than four, character G is added on the hexadecimal value left side less than four, with formed i four character strings and j four Position character string, then executes step 6;When the hexadecimal value of the hexadecimal value of i and j reaches four, step 6 is executed;
Step 6: four character strings of j to be added to the left side of the first series string, and four character strings of i are added to The left side of four character strings of the j, to form the second series string;
Step 7: the facial image is divided into 16*16 square areaChoose institute State pixel PijThe region T at placeM, n, m, n are positive integer and 1≤m≤16,1≤n≤16;
Step 8: judging whether there is character G in the second series string;When in the second series string including character G, by the second series string In character G replace with 0, then execute step 9;When there is no character G in the second series string, step 9 is executed;
Step 9: setting the digit last of the second series string as Q1, set the penultimate of the second series string Number is Q2
By Q1And Q2It is respectively converted into decimal value;Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21;Described 1 ≤Q11≤ 16, the 1≤Q21≤16;
It calculatesObtain first object region TX, y
By TM, nWith TX, yIt is replaced;
Step 10: the first row region and the third line region are replaced;Second row region is replaced with fourth line region; Fifth line region and the 7th row region are replaced;6th row region is replaced with the 8th row region;By the 9th row area Domain is replaced with the tenth a line region;Tenth row region is replaced with the 12nd row region;By the tenth zone domain with Tenth five-element region is replaced;Ariadne region and the 16th row region are replaced.
2. a kind of image encryption method as described in claim 1, it is characterized in that:The pixel P is chosen in the step 7ij The region T at placeM, nIt carries out according to the following steps:
It calculatesM is obtained, is calculatedObtain n;According to the value chosen area T of m and nM, n
3. a kind of image encryption method as described in claim 1, it is characterized in that:In step 1, obtained by image capture device It is that the square facial image of a*a carries out according to the following steps to take resolution ratio:
The facial image that resolution ratio is a*b is obtained by image capture device, a is the pixel quantity of horizontal direction, and b is Vertical Square To pixel quantity;
Judge whether a>b;
Work as a>When b, W is calculated1=a-b obtains number W to be increased1, then vertically add W1A rgb value Wei ﹛ 0,0, The pixel of 0 ﹜, then executes step 2;
Work as a<When b, W is calculated2=b-a obtains number W to be increased2, W is then added in the horizontal direction2A rgb value Wei ﹛ 0,0, The pixel of 0 ﹜, and the numerical value of b is assigned to a, then execute step 2;
As a=b, step 2 is executed.
CN201610082651.9A 2016-02-05 2016-02-05 A kind of image encryption method Expired - Fee Related CN105763763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610082651.9A CN105763763B (en) 2016-02-05 2016-02-05 A kind of image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610082651.9A CN105763763B (en) 2016-02-05 2016-02-05 A kind of image encryption method

Publications (2)

Publication Number Publication Date
CN105763763A CN105763763A (en) 2016-07-13
CN105763763B true CN105763763B (en) 2018-08-31

Family

ID=56329665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610082651.9A Expired - Fee Related CN105763763B (en) 2016-02-05 2016-02-05 A kind of image encryption method

Country Status (1)

Country Link
CN (1) CN105763763B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657487B (en) * 2018-12-24 2021-07-06 北京百度网讯科技有限公司 Image processing method, image verification method and device
CN110634173A (en) * 2019-09-05 2019-12-31 北京无限光场科技有限公司 Picture mark information adding method and device, electronic equipment and readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1583322A2 (en) * 2004-04-02 2005-10-05 Microsoft Corporation A method and system for recovering password protected private data via a communication network without exposing the private data
CN101976321A (en) * 2010-09-21 2011-02-16 北京工业大学 Generated encrypting method based on face feature key
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
WO2015180237A1 (en) * 2014-05-28 2015-12-03 东莞盛世科技电子实业有限公司 Method for checking password in fuzzy mode and password checking device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8997177B2 (en) * 2006-05-24 2015-03-31 Confident Technologies, Inc. Graphical encryption and display of codes and text

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1583322A2 (en) * 2004-04-02 2005-10-05 Microsoft Corporation A method and system for recovering password protected private data via a communication network without exposing the private data
CN101976321A (en) * 2010-09-21 2011-02-16 北京工业大学 Generated encrypting method based on face feature key
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
WO2015180237A1 (en) * 2014-05-28 2015-12-03 东莞盛世科技电子实业有限公司 Method for checking password in fuzzy mode and password checking device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于高级加密标准的图像置乱方法研究及其硬件设计;张浩亮;《硕士论文库》;20110928;全文 *

Also Published As

Publication number Publication date
CN105763763A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
Han An image encryption algorithm based on modified logistic chaotic map
Ye Image scrambling encryption algorithm of pixel bit based on chaos map
Lee et al. Digital image sharing by diverse image media
Yang et al. Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space
CN105447404B (en) The method and system of image secret protection in a kind of cloud storage
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN106709854B (en) Image information fusion encryption method based on cat face transformation and chaos
CN107070636B (en) White box software implementation method of quotient cipher SM4 algorithm in standard cipher text output format
CN107833174B (en) Image encryption method based on Logistic chaotic system algorithm
CN107392970B (en) Digital image encryption method based on bit plane and high-dimensional chaotic system
CN107220923A (en) Digital picture feedback encryption method based on image network
CN105763763B (en) A kind of image encryption method
CN102014266A (en) Digital watermarking-based high-definition video encrypted transmitting method and system
CN105046123A (en) System for using picture to realize password security and setting method for using picture to realize password security
CN107770407B (en) The image encryption method and device of joint zero watermarking insertion
Basahel et al. Enhancing security of transmitted data by improved steganography method
Xue et al. An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps
CN104038828A (en) RSA hash signature content protection optimizing method based on AES encryption
CN104463767A (en) Visible encryption and decryption method with image disguising function and tampering identification function
CN113868690B (en) Trusted deposit certificate based privacy calculation method and system
WO2020114308A1 (en) Image encryption and correction method and device, and image decryption method and device
CN111400731B (en) Quantum image encryption method based on DNACNot
CN109918927B (en) Image encryption method and device
Wu A color image encryption algorithm using the fractional-order hyperchaotic systems
Hu et al. Reversible secret image sharing with steganography and dynamic embedding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180831

Termination date: 20190205

CF01 Termination of patent right due to non-payment of annual fee