CN106600520A - Hiding method and reappearing method for encrypted image and corresponding device - Google Patents
Hiding method and reappearing method for encrypted image and corresponding device Download PDFInfo
- Publication number
- CN106600520A CN106600520A CN201611156990.3A CN201611156990A CN106600520A CN 106600520 A CN106600520 A CN 106600520A CN 201611156990 A CN201611156990 A CN 201611156990A CN 106600520 A CN106600520 A CN 106600520A
- Authority
- CN
- China
- Prior art keywords
- data
- picture
- encryption
- targeted
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Abstract
The embodiments of the invention disclose a hiding method and reappearing method for encrypted image and corresponding device which are used to encrypt and hide an image. The embodiments of the invention comprise the following steps: firstly, zipping a target image to obtain the zipping data wherein the target image is the image that requires to be encrypted; then based on the data of a non-target image, generating an encrypting password wherein the non-target image corresponds to the target image; according to the encrypting password, conducting encryption processing to the zipping data so as to obtain the encrypted data; and placing the encrypted data into the data of the non-target image to obtain the hidden data of the target so that the encrypted data is hidden in the non-target image.
Description
Technical field
The present invention relates to data hiding technique field, more particularly to a kind of encryption picture hidden method and reproducting method and
Relevant device.
Background technology
In real life, there are many scenes all there are some important picture files or to be not desired to be disclosed, need spy
It is different to process, but in current image ciphering mode, the appearance after encryption, picture quilt are all directly presented as image ciphering is latter
Encrypted feature after encryption substantially, can directly judge that the picture file is encrypted, not be hidden guarantor to encrypting picture
Shield.
The content of the invention
The hidden method and reproducting method and relevant device of a kind of encryption picture are embodiments provided, for figure
Piece is encrypted to hide and decrypt and reproduces.
On the one hand the embodiment of the present invention provides a kind of hidden method of encryption picture, specifically includes:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that described
Encryption data is hidden in the non-targeted picture.
Embodiment of the present invention second aspect provides a kind of reproducting method of encryption picture, specifically includes:
File header dissection process is carried out to target hiding data, the target hiding data has the encryption number of Target Photo
According to the data with non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo is just
Often show.
The embodiment of the present invention third aspect provides a kind of concealing device, specifically includes:
Compression unit, for Target Photo to be compressed into process, obtains compressed data, the Target Photo for need by
The picture of encryption;
First signal generating unit, for according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and institute
State Target Photo corresponding;
Ciphering unit, the Crypted password generated by first signal generating unit for basis is to by the compression unit
The compressed data of compression is encrypted, and obtains encryption data;
Unit is inserted, for the encryption data encrypted by the ciphering unit to be inserted the number of the non-targeted picture
According in, target hiding data is obtained, so that the encryption data is hidden in the non-targeted picture.
Embodiment of the present invention fourth aspect provides a kind of transcriber, specifically includes:
Resolution unit, for carrying out file header dissection process to target hiding data, the target hiding data has mesh
The encryption data of piece of marking on a map and the data of non-targeted picture, the Target Photo is the picture being hidden;
Acquiring unit, for obtaining the encryption data and the non-targeted picture according to the file header dissection process
Data;
Second signal generating unit, the data genaration of the non-targeted picture got by the acquiring unit for basis adds
Password;
Decryption unit, the Crypted password for being generated according to the signal generating unit is decrypted place to the encryption data
Reason, obtains compressed data;
Decompression units, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain
The data of the Target Photo so that the Target Photo normally shows.
The aspect of the embodiment of the present invention the 5th provides a kind of concealing device, specifically includes:
Input unit, output device, processor and memory;
The processor by calling the operational order of the memory storage, for performing following steps:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that described
Encryption data is hidden in the non-targeted picture.
The aspect of the embodiment of the present invention the 6th provides a kind of transcriber, specifically includes:
File header dissection process is carried out to target hiding data, the target hiding data has the encryption number of Target Photo
According to the data with non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo is just
Often show.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the embodiment of the present invention, first Target Photo is compressed into process, obtains compressed data, the Target Photo is
Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh
Piece of marking on a map is corresponding;The compressed data is encrypted according to the Crypted password, obtains encryption data;Add described
Ciphertext data is inserted in the data of the non-targeted picture, obtains target hiding data, so that the encryption data is hidden in institute
In stating non-targeted picture.
Description of the drawings
Fig. 1 is the hiding schematic diagram of picture in the embodiment of the present invention;
Fig. 2 is one embodiment schematic flow sheet of the hidden method that picture is encrypted in the embodiment of the present invention;
Fig. 3 is another embodiment schematic flow sheet of the hidden method of encryption picture in the embodiment of the present invention;
Fig. 4 is one embodiment schematic flow sheet of the reproducting method that picture is encrypted in the embodiment of the present invention;
Fig. 5 is another embodiment schematic flow sheet of the reproducting method of encryption picture in the embodiment of the present invention;
Fig. 6 is one embodiment structural representation of concealing device in the embodiment of the present invention;
Fig. 7 is another example structure schematic diagram of concealing device in the embodiment of the present invention;
Fig. 8 is one embodiment structural representation of transcriber in the embodiment of the present invention;
Fig. 9 is another example structure schematic diagram of transcriber in the embodiment of the present invention;
Figure 10 is that another enforcement exemplary configuration of concealing device is intended in the embodiment of the present invention;
Figure 11 is another example structure schematic diagram of transcriber in the embodiment of the present invention.
Specific embodiment
The hidden method and reproducting method and relevant device of a kind encryption picture are embodiments provided, for right
Picture is encrypted to hide and decrypt and reproduces.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than the embodiment of whole.Based on the embodiment in the present invention.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, "
Four " etc. (if present) is the object for distinguishing similar, without for describing specific order or precedence.Should manage
The data that solution is so used can be exchanged in the appropriate case, so that the embodiments described herein can be with except illustrating here
Or the order beyond the content of description is implemented.Additionally, term " including " or " having " and its any deformation, it is intended that cover not
Exclusive includes, for example, contain series of steps or unit process, method, system, product or equipment be not necessarily limited to it is clear
Those steps for listing or unit, but may include clearly not list or for these processes, method, product or set
Standby intrinsic other steps or unit.
As shown in figure 1,101 in Fig. 1 are the picture that need not be encrypted, 102 to need encrypted and hiding picture,
102 be compressed after encryption to data insert Figure 101 data in so that 102 enciphering hidings are obtained in 101
As the pattern and 101 shown to picture 103,103 so that others invisible 102, reach good enciphering hiding effect.
In the embodiment of the present invention, first Target Photo is compressed into process, obtains compressed data, the Target Photo is
Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh
Piece of marking on a map is corresponding;The compressed data is encrypted according to the Crypted password, obtains encryption data;Add described
Ciphertext data is inserted in the data of the non-targeted picture, obtains target hiding data, so that the encryption data is hidden in institute
In stating non-targeted picture.
Fig. 2 is referred to, hidden method one embodiment of picture is encrypted in the embodiment of the present invention to be included:
201st, Target Photo is compressed into process.
In the present embodiment, when get Target Photo and receive user compression instruction after, Target Photo will be entered
Row compression is processed, and obtains compressed data, and compression instruction indicates to be compressed Target Photo processs, Target Photo be need by
Encryption and hiding picture.
202nd, according to the data genaration Crypted password of non-targeted picture.
In the present embodiment, terminal receives the password generation instruction from user, and generates instruction and non-mesh according to the password
Mark on a map the data genaration Crypted password of piece.
It should be noted that step 202 and step 201 are without determining sequential relationship, step 202 can also step 201 it
Front execution, does not specifically limit herein.
203rd, compressed data is encrypted according to Crypted password.
In the present embodiment, process and according to the data genaration Crypted password of non-targeted picture when Target Photo is compressed
Afterwards, encryption data will be obtained according to being encrypted to compressed data according to Crypted password.
During the 204th, encryption data to be inserted the data of non-targeted picture.
In the present embodiment, when being encrypted to compressed data according to Crypted password, and obtain after encryption data, then
Encryption data is inserted in the data of non-targeted picture, target hiding data is obtained, so that encryption data is hidden in non-targeted
In picture.
In the embodiment of the present invention, Target Photo is compressed process by terminal first, obtains compressed data, and Target Photo is
Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, non-targeted picture and Target Photo phase
Correspondence;Compressed data is encrypted according to Crypted password, obtains encryption data;Encryption data is inserted into non-targeted picture
Data in, target hiding data is obtained, so that encryption data is hidden in non-targeted picture.
Fig. 3 is referred to, another embodiment of the hidden method of encryption picture includes in the embodiment of the present invention:
301st, Target Photo is compressed into process.
In the present embodiment, when terminal get Target Photo and receive user compression instruction after, will be to target figure
Piece is compressed process, obtains compressed data, and the compression instruction indicates to be compressed Target Photo process, and Target Photo is to need
Picture to be encrypted and hiding.
302nd, the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture.
In the present embodiment, terminal is received and generated after instruction from the password of user, and instruction is generated to non-according to the password
Target Photo carries out hash algorithm, obtains the cryptographic Hash of non-targeted picture.
It should be noted that step 302 and step 301 are without determining sequential relationship, step 302 can also step 301 it
Front execution, does not specifically limit herein.
303rd, Crypted password is determined according to cryptographic Hash.
In the present embodiment, when the data of terminal-pair non-targeted picture carry out the cryptographic Hash that hash algorithm obtains non-targeted picture
Afterwards, again md5 encryption will be carried out to the cryptographic Hash and will obtain Crypted password.
304th, compressed data is encrypted according to Crypted password.
In the present embodiment, process and carry out hash algorithm according to the data of non-targeted picture when Target Photo is compressed
After obtaining Crypted password, compressed data will be encrypted according to Crypted password, obtain encryption data.
The 305th, encryption data is superimposed upon the data trailer of non-targeted picture.
In the present embodiment, when being encrypted to compressed data according to Crypted password, and obtain after encryption data, then
Encryption data is superimposed upon into the data trailer of non-targeted picture, target hiding data is obtained so that encryption data be hidden in it is non-
In Target Photo.
In the embodiment of the present invention, Target Photo is compressed process by terminal first, obtains compressed data, and Target Photo is
Need encrypted picture;Then the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture, and
The cryptographic Hash is defined as into Crypted password, then compressed data is encrypted according to Crypted password, obtain encryption data;
Encryption data is inserted in the data of non-targeted picture, target hiding data is obtained, so that encryption data is hidden in non-targeted
In picture.
Fig. 4 is referred to, one embodiment of the reproducting method of picture is encrypted in the embodiment of the present invention to be included:
401st, file header dissection process is carried out to target hiding data.
In the present embodiment, after the file header analysis instruction of terminal receive user, terminal will be according to this document header parsing
Instruction carries out file header dissection process to target hiding data, target hiding data has the encryption data of Target Photo and non-
The data of Target Photo, Target Photo is the picture being hidden.
402nd, the data of encryption data and non-targeted picture are obtained according to file header dissection process.
In the present embodiment, after the file header analysis instruction of terminal receive user, terminal will be according to this document header parsing
Instruction carries out file header dissection process to target hiding data, and obtains encryption data and non-mesh according to file header dissection process
Mark on a map the data of piece.
403rd, according to the data genaration Crypted password of non-targeted picture.
In the present embodiment, the password of receive user is generated instruction by device, and according to the instruction and the number of non-targeted picture
According to generation Crypted password.
404th, process is decrypted to encryption data according to Crypted password.
In the present embodiment, after device obtains the encryption data and Crypted password of Target Photo, will be according to Crypted password
Process is decrypted to encryption data, compressed data is obtained.
405th, decompression processing is carried out to compressed data.
In the present embodiment, after device obtains the compressed data of Target Photo, the compressed data will be carried out at decompression
Reason, obtains the data of Target Photo so that Target Photo normally shows.
In the embodiment of the present invention, device carries out file header dissection process to target hiding data, and target hiding data has
The encryption data of Target Photo and the data of non-targeted picture, Target Photo is the picture being hidden, and according to file header parsing
Process obtains the data of encryption data and non-targeted picture;According to the data genaration Crypted password of non-targeted picture;According to encryption
Password is decrypted process to encryption data, obtains compressed data;Decompression processing is carried out to compressed data, Target Photo is obtained
Data so that the Target Photo for being hidden in non-targeted picture normally shows.
Fig. 5 is referred to, another embodiment of the reproducting method of picture is encrypted in the embodiment of the present invention to be included:
501st, file header dissection process is carried out to target hiding data.
502nd, the data of encryption data and non-targeted picture are obtained according to file header dissection process.
It is step 401 in step 501,502 and Fig. 4,402 similar in the present embodiment, specifically do not repeat herein.
503rd, the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture.
In the present embodiment, terminal is received and generated after instruction from the password of user, and instruction is generated to this according to the password
Non-targeted picture carries out hash value algorithms, obtains the cryptographic Hash of non-targeted picture..
504th, Crypted password is determined according to cryptographic Hash.
In the present embodiment, when the data of terminal-pair non-targeted picture carry out the cryptographic Hash that hash algorithm obtains non-targeted picture
Afterwards, again md5 encryption will be carried out to the cryptographic Hash and will obtain Crypted password.
505th, process is decrypted to encryption data according to Crypted password.
506th, decompression processing is carried out to compressed data.
In the present embodiment, step 505,506 with step 404 in Fig. 4,405 similar, specifically do not repeat herein.
In the embodiment of the present invention, device carries out file header dissection process to target hiding data, and target hiding data has
The encryption data of Target Photo and the data of non-targeted picture, Target Photo is the picture being hidden, and according to file header parsing
Process obtains the data of encryption data and non-targeted picture;Hash algorithm is carried out to the data of non-targeted picture and obtains non-targeted figure
The cryptographic Hash of piece, by the cryptographic Hash Crypted password is defined as;Then process is decrypted to encryption data according to Crypted password, is obtained
To compressed data;Decompression processing is carried out to compressed data, the data of Target Photo are obtained so that the mesh of non-targeted picture is hidden in
Piece of marking on a map normally shows.
For ease of understanding, the present embodiment is described with reference to specific application scenarios:
User A is not in order to want to allow others to see the figure B for depositing on computers, and it is encrypted not want to allow others to discover figure B, then
Now user A has carried out enciphering hiding operation to scheming B, and user A first has prepared figure C, and figure C is to be not required to hiding figure to be encrypted
Piece, has then carried out compression process by figure B, obtains the compressed data of figure B, then carries out Hash to preprepared picture C
The cryptographic Hash of picture C is calculated, then md5 encryption is carried out to the cryptographic Hash and obtain Crypted password, with the Crypted password to picture B
Compressed data be encrypted, by the data investigation after encryption figure C data trailer, now can only then see figure C, and
Figure B is already encrypted to be hidden among the data of figure C.
When user A wants to allow the picture B of enciphering hiding to reproduce, because picture B is that to have user A to be encrypted hiding
Operation, so user A knows that picture B is encrypted has been hidden in for which pictures, now user A finds out figure C, due to scheming C
The information of figure B is concealed, is then carried out after file header dissection process to scheming C, the original pictorial informations of C, and quilt are schemed in having arrived just
The encryption data of figure B, now carries out the cryptographic Hash that Hash calculation obtains picture C to the figure C after parsing, then makees this cryptographic Hash
For the clear crytpographic key of encryption data, after being decrypted to encryption data, the compressed data of picture B is obtained, then to the compression number
According to being decompressed, the partial data of picture B has just been obtained so that picture B completely shows.
The reproducting method of the encryption picture in the embodiment of the present invention is described above, below to the embodiment of the present invention
In concealing device be described, refer to Fig. 6, the concealing device in the embodiment of the present invention includes:
Compression unit 601, for Target Photo to be compressed into process, obtains compressed data, Target Photo for need by
The picture of encryption;
First signal generating unit 602, for according to the data genaration Crypted password of non-targeted picture, non-targeted picture and target
Picture is corresponding;
Ciphering unit 603, the Crypted password generated by the first signal generating unit for basis is to the pressure compressed by compression unit
Contracting data are encrypted, and obtain encryption data;
Unit 604 is inserted, in the data that the encryption data encrypted by ciphering unit is inserted non-targeted picture, obtaining
Target hiding data, so that encryption data is hidden in non-targeted picture.
In the embodiment of the present invention, Target Photo is compressed process by compression unit 601, obtains compressed data, target figure
Piece is to need encrypted picture;First signal generating unit 602 is according to the data genaration Crypted password of non-targeted picture, non-targeted figure
Piece is corresponding with Target Photo;Ciphering unit 603 is encrypted according to Crypted password to compressed data, obtains encrypting number
According to;Insert unit 604 encryption data to be inserted in the data of non-targeted picture, obtain target hiding data, so that encryption number
According to being hidden in non-targeted picture.
Fig. 7 is referred to, another embodiment of the concealing device in the embodiment of the present invention includes:
Compression unit 701, for Target Photo to be compressed into process, obtains compressed data, Target Photo for need by
The picture of encryption;
First signal generating unit 702, for according to the data genaration Crypted password of non-targeted picture, non-targeted picture and target
Picture is corresponding;
Wherein, the first signal generating unit 702 includes:
Computation subunit 7021, for the data of non-targeted picture to be carried out with the Hash that hash algorithm obtains non-targeted picture
Value;
Determination subelement 7022, the cryptographic Hash for being calculated according to computing unit determines Crypted password.
Ciphering unit 703, the Crypted password generated by the first signal generating unit for basis is to the pressure compressed by compression unit
Contracting data are encrypted, and obtain encryption data;
Unit 704 is inserted, in the data that the encryption data encrypted by ciphering unit is inserted non-targeted picture, obtaining
Target hiding data, so that encryption data is hidden in non-targeted picture.
Wherein inserting unit 704 includes:
Superposition subelement 7041, for encryption data to be superimposed upon the data trailer of non-targeted picture, obtains target and hides
Data.
In the embodiment of the present invention, Target Photo is compressed process by compression unit 701, obtains compressed data, target figure
Piece is to need encrypted picture;First signal generating unit 702 is according to the data genaration Crypted password of non-targeted picture, non-targeted figure
Piece is corresponding with Target Photo;Ciphering unit 703 is encrypted according to Crypted password to compressed data, obtains encrypting number
According to;Insert unit 704 encryption data to be inserted in the data of non-targeted picture, obtain target hiding data, so that encryption number
According to being hidden in non-targeted picture.
The concealing device in the embodiment of the present invention is described above, the reproduction in the embodiment of the present invention is filled below
Put and be described, refer to Fig. 8, the transcriber in the embodiment of the present invention includes:
Resolution unit 801, for carrying out file header dissection process to target hiding data, target hiding data has target
The encryption data of picture and the data of non-targeted picture, Target Photo is the picture being hidden;
Acquiring unit 802, for obtaining the data of encryption data and non-targeted picture according to file header dissection process;
Second signal generating unit 803, the data genaration encryption of the non-targeted picture got by acquiring unit for basis is close
Code;
Decryption unit 804, the Crypted password for being generated according to signal generating unit is decrypted process to encryption data, obtains
Compressed data;
Decompression units 805, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain target figure
The data of piece so that Target Photo normally shows.
In the embodiment of the present invention, resolution unit 801 carries out file header dissection process to target hiding data, and target hides number
According to the data of the encryption data and non-targeted picture that have Target Photo, Target Photo is the picture being hidden, acquiring unit 802
The data of encryption data and non-targeted picture are obtained according to file header dissection process;Second signal generating unit 803 is according to non-targeted figure
The data genaration Crypted password of piece;Decryption unit 804 is decrypted process to encryption data according to Crypted password, obtains compressing number
According to;Decompression units 805 carry out decompression processing to compressed data, obtain the data of Target Photo so that be hidden in non-targeted picture
Target Photo normally show.
Fig. 9 is referred to, another embodiment of the transcriber in the embodiment of the present invention includes:
Resolution unit 901, for carrying out file header dissection process to target hiding data, target hiding data has target
The encryption data of picture and the data of non-targeted picture, Target Photo is the picture being hidden;
Acquiring unit 902, for obtaining the data of encryption data and non-targeted picture according to file header dissection process;
Second signal generating unit 903, the data genaration encryption of the non-targeted picture got by acquiring unit for basis is close
Code;
Wherein, the second signal generating unit 903 includes:
Computation subunit 9031, for the data of non-targeted picture to be carried out with the Hash that hash algorithm obtains non-targeted picture
Value;
Determination subelement 9032, the cryptographic Hash for being calculated according to computation subunit determines Crypted password.
Decryption unit 904, the Crypted password for being generated according to signal generating unit is decrypted process to encryption data, obtains
Compressed data;
Decompression units 905, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain target figure
The data of piece so that Target Photo normally shows.
In the embodiment of the present invention, resolution unit 901 carries out file header dissection process to target hiding data, and target hides number
According to the data of the encryption data and non-targeted picture that have Target Photo, Target Photo is the picture being hidden, acquiring unit 902
The data of encryption data and non-targeted picture are obtained according to file header dissection process;Second signal generating unit 903 is according to non-targeted figure
The data genaration Crypted password of piece;Decryption unit 904 is decrypted process to encryption data according to Crypted password, obtains compressing number
According to;Decompression units 905 carry out decompression processing to compressed data, obtain the data of Target Photo so that be hidden in non-targeted picture
Target Photo normally show.
Refer to Figure 10, Figure 10 is a kind of concealing device structural representation provided in an embodiment of the present invention, the concealing device
1000 can include one or more central processing units because of configuration or performance is different and the larger difference of producing ratio
(central processing units, CPU) 1022 (for example, one or more processors) and memory 1032, one
Individual or more than one storage application program 1042 or data 1044 storage medium 1030 (for example deposit by one or more magnanimity
Storage equipment).Wherein, memory 1032 and storage medium 1030 can be of short duration storage or persistently storage.It is stored in storage medium
1030 program can include one or more modules (diagram is not marked), and each module can be included in concealing device
Series of instructions operation.Further, central processing unit 1022 could be arranged to be communicated with storage medium 1030, hide
The series of instructions operation in storage medium 1030 is performed on device 1000.
Concealing device 1000 can also include one or more power supplys 1026, and one or more are wired or wireless
Network interface 1050, one or more input/output interfaces 1058, and/or, one or more operating systems 1041,
Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in above-described embodiment by performed by concealing device can be based on the concealing device structure shown in the Figure 10.
Refer to Figure 11, Figure 11 is a kind of transcriber structural representation provided in an embodiment of the present invention, the transcriber
1100 can include one or more central processing units because of configuration or performance is different and the larger difference of producing ratio
(central processing units, CPU) 1122 (for example, one or more processors) and memory 1132, one
Individual or more than one storage application program 1142 or data 1144 storage medium 1130 (for example deposit by one or more magnanimity
Storage equipment).Wherein, memory 1132 and storage medium 1130 can be of short duration storage or persistently storage.It is stored in storage medium
1130 program can include one or more modules (diagram is not marked), and each module can be included in transcriber
Series of instructions operation.Further, central processing unit 1122 could be arranged to be communicated with storage medium 1130, reproduce
The series of instructions operation in storage medium 1130 is performed on device 1100.
Transcriber 1100 can also include one or more power supplys 1126, and one or more are wired or wireless
Network interface 1150, one or more input/output interfaces 1158, and/or, one or more operating systems 1141,
Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in above-described embodiment by performed by transcriber can be based on the transcriber structure shown in the Figure 11.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematic, for example, the unit
Divide, only a kind of division of logic function can have other dividing mode, such as multiple units or component when actually realizing
Can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or
The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially
The part for contributing to prior art in other words or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, above example only to illustrate technical scheme, rather than a limitation;Although with reference to front
State embodiment to be described in detail the present invention, it will be understood by those within the art that:It still can be to front
State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these
Modification is replaced, and does not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.
Claims (10)
1. it is a kind of encryption picture hidden method, it is characterised in that include:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that the encryption
Image watermarking is in the non-targeted picture.
2. it is according to claim 1 encryption picture hidden method, it is characterised in that it is described according to non-targeted picture generate
Crypted password includes:
The cryptographic Hash that hash algorithm obtains the non-targeted picture is carried out to the data of the non-targeted picture;
The Crypted password is determined according to the cryptographic Hash.
3. it is according to claim 1 encryption picture hidden method, it is characterised in that it is described to insert the encryption data
In the data of the non-targeted picture, obtaining target hiding data includes:
The encryption data is superimposed upon into the data trailer of the non-targeted picture, target hiding data is obtained.
4. it is a kind of encryption picture reproducting method, it is characterised in that include:
Carry out file header dissection process to target hiding data, the target hiding data have the encryption data of Target Photo and
The data of non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo normally shows
Show.
5. it is according to claim 4 encryption picture reproducting method, it is characterised in that it is described according to the non-targeted picture
Data genaration Crypted password include:
The cryptographic Hash that hash algorithm obtains the non-targeted picture is carried out to the data of the non-targeted picture;
The Crypted password is determined according to the cryptographic Hash.
6. it is a kind of encryption picture concealing device, it is characterised in that include:
Compression unit, for Target Photo to be compressed into process, obtains compressed data, and the Target Photo is encrypted to need
Picture;
First signal generating unit, for according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh
Piece of marking on a map is corresponding;
Ciphering unit, the Crypted password generated by first signal generating unit for basis by the compression unit to being compressed
The compressed data be encrypted, obtain encryption data;
Unit is inserted, for the encryption data encrypted by the ciphering unit to be inserted the data of the non-targeted picture
In, target hiding data is obtained, so that the encryption data is hidden in the non-targeted picture.
7. concealing device according to claim 6, it is characterised in that first signal generating unit includes:
Computation subunit, for the data of the non-targeted picture to be carried out with the Hash that hash algorithm obtains the non-targeted picture
Value;
Determination subelement, the cryptographic Hash for being calculated according to the computing unit determines the Crypted password.
8. concealing device according to claim 6, it is characterised in that the unit of inserting includes:
Superposition subelement, for the encryption data to be superimposed upon the data trailer of the non-targeted picture, obtains target and hides
Data.
9. it is a kind of encryption picture transcriber, it is characterised in that include:
Resolution unit, for carrying out file header dissection process to target hiding data, the target hiding data has target figure
The encryption data of piece and the data of non-targeted picture, the Target Photo is the picture being hidden;
Acquiring unit, for obtaining the number of the encryption data and the non-targeted picture according to the file header dissection process
According to;
Second signal generating unit, the data genaration encryption of the non-targeted picture got by the acquiring unit for basis is close
Code;
Decryption unit, the Crypted password for being generated according to the signal generating unit is decrypted process to the encryption data, obtains
To compressed data;
Decompression units, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain described
The data of Target Photo so that the Target Photo normally shows.
10. transcriber according to claim 9, it is characterised in that second signal generating unit includes:
Computation subunit, for the data of the non-targeted picture to be carried out with the Hash that hash algorithm obtains the non-targeted picture
Value;
Determination subelement, the cryptographic Hash for being calculated according to the computation subunit determines the Crypted password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611156990.3A CN106600520A (en) | 2016-12-14 | 2016-12-14 | Hiding method and reappearing method for encrypted image and corresponding device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611156990.3A CN106600520A (en) | 2016-12-14 | 2016-12-14 | Hiding method and reappearing method for encrypted image and corresponding device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106600520A true CN106600520A (en) | 2017-04-26 |
Family
ID=58801426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611156990.3A Pending CN106600520A (en) | 2016-12-14 | 2016-12-14 | Hiding method and reappearing method for encrypted image and corresponding device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106600520A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833099A (en) * | 2018-07-27 | 2018-11-16 | 深圳市新名泽科技有限公司 | Key generation method, device, key recovery method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6359986B1 (en) * | 1997-08-06 | 2002-03-19 | Matsushita Electric Industrial Co., Ltd. | Encryption system capable of specifying a type of an encrytion device that produced a distribution medium |
CN103824249A (en) * | 2014-03-21 | 2014-05-28 | 上海斐讯数据通信技术有限公司 | Picture hiding and acquiring method and intelligent terminal |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN104615917A (en) * | 2015-01-20 | 2015-05-13 | 中兴通讯股份有限公司 | Picture camouflaging method, picture viewing method, system and terminal |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
-
2016
- 2016-12-14 CN CN201611156990.3A patent/CN106600520A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6359986B1 (en) * | 1997-08-06 | 2002-03-19 | Matsushita Electric Industrial Co., Ltd. | Encryption system capable of specifying a type of an encrytion device that produced a distribution medium |
CN103824249A (en) * | 2014-03-21 | 2014-05-28 | 上海斐讯数据通信技术有限公司 | Picture hiding and acquiring method and intelligent terminal |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN104615917A (en) * | 2015-01-20 | 2015-05-13 | 中兴通讯股份有限公司 | Picture camouflaging method, picture viewing method, system and terminal |
CN104680077A (en) * | 2015-01-20 | 2015-06-03 | 中兴通讯股份有限公司 | Picture encryption method and picture checking method, system and terminal |
Non-Patent Citations (1)
Title |
---|
葛锦环 等: "一种基于MD5值的数字图像加密新算法", 《计算机应用与软件》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833099A (en) * | 2018-07-27 | 2018-11-16 | 深圳市新名泽科技有限公司 | Key generation method, device, key recovery method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11582038B2 (en) | Systems and methods to secure searchable data having personally identifiable information | |
AU2013101034A4 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US9158896B2 (en) | Method and system for generating a secure key | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
CN106878013B (en) | File encryption and decryption method and device | |
CN110061840A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN105468940B (en) | Method for protecting software and device | |
CN105721156A (en) | General Encoding Functions For Modular Exponentiation Encryption Schemes | |
CN115730333A (en) | Security tree model construction method and device based on secret sharing and homomorphic encryption | |
CN105279443A (en) | Picture encrypting and decrypting methods and devices | |
CN106600520A (en) | Hiding method and reappearing method for encrypted image and corresponding device | |
CN111339562A (en) | Order preserving/de-ordering ciphertext recovery method and device | |
JP5359650B2 (en) | Data file disguise processing device | |
KR20180059980A (en) | Method and system for creating encryption key based on face image | |
CN112311536B (en) | Key hierarchical management method and system | |
CN115085983A (en) | Data processing method and device, computer readable storage medium and electronic equipment | |
CN111130788B (en) | Data processing method and system, data reading method and iSCSI server | |
CN113839773A (en) | LUKS key offline extraction method, terminal equipment and storage medium | |
CN111475690A (en) | Character string matching method and device, data detection method and server | |
CN115017927B (en) | Card simulation method, electronic device, and storage medium | |
CN114978738B (en) | Encryption processing method of interface message, client and server | |
CN110619883A (en) | Music information embedding method, music information extracting method, music information embedding device, music information extracting device, terminal and storage medium | |
CN115396222B (en) | Device instruction execution method, system, electronic device and readable storage medium | |
CN109166070B (en) | Tool generation method and device in government affair system | |
CN114817970B (en) | Data analysis method and system based on data source protection and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |
|
RJ01 | Rejection of invention patent application after publication |