CN106600520A - Hiding method and reappearing method for encrypted image and corresponding device - Google Patents

Hiding method and reappearing method for encrypted image and corresponding device Download PDF

Info

Publication number
CN106600520A
CN106600520A CN201611156990.3A CN201611156990A CN106600520A CN 106600520 A CN106600520 A CN 106600520A CN 201611156990 A CN201611156990 A CN 201611156990A CN 106600520 A CN106600520 A CN 106600520A
Authority
CN
China
Prior art keywords
data
picture
encryption
targeted
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611156990.3A
Other languages
Chinese (zh)
Inventor
张小玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Junge Technology Co Ltd
Original Assignee
Shenzhen Junge Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Junge Technology Co Ltd filed Critical Shenzhen Junge Technology Co Ltd
Priority to CN201611156990.3A priority Critical patent/CN106600520A/en
Publication of CN106600520A publication Critical patent/CN106600520A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The embodiments of the invention disclose a hiding method and reappearing method for encrypted image and corresponding device which are used to encrypt and hide an image. The embodiments of the invention comprise the following steps: firstly, zipping a target image to obtain the zipping data wherein the target image is the image that requires to be encrypted; then based on the data of a non-target image, generating an encrypting password wherein the non-target image corresponds to the target image; according to the encrypting password, conducting encryption processing to the zipping data so as to obtain the encrypted data; and placing the encrypted data into the data of the non-target image to obtain the hidden data of the target so that the encrypted data is hidden in the non-target image.

Description

A kind of hidden method and reproducting method and relevant device of encryption picture
Technical field
The present invention relates to data hiding technique field, more particularly to a kind of encryption picture hidden method and reproducting method and Relevant device.
Background technology
In real life, there are many scenes all there are some important picture files or to be not desired to be disclosed, need spy It is different to process, but in current image ciphering mode, the appearance after encryption, picture quilt are all directly presented as image ciphering is latter Encrypted feature after encryption substantially, can directly judge that the picture file is encrypted, not be hidden guarantor to encrypting picture Shield.
The content of the invention
The hidden method and reproducting method and relevant device of a kind of encryption picture are embodiments provided, for figure Piece is encrypted to hide and decrypt and reproduces.
On the one hand the embodiment of the present invention provides a kind of hidden method of encryption picture, specifically includes:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that described Encryption data is hidden in the non-targeted picture.
Embodiment of the present invention second aspect provides a kind of reproducting method of encryption picture, specifically includes:
File header dissection process is carried out to target hiding data, the target hiding data has the encryption number of Target Photo According to the data with non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo is just Often show.
The embodiment of the present invention third aspect provides a kind of concealing device, specifically includes:
Compression unit, for Target Photo to be compressed into process, obtains compressed data, the Target Photo for need by The picture of encryption;
First signal generating unit, for according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and institute State Target Photo corresponding;
Ciphering unit, the Crypted password generated by first signal generating unit for basis is to by the compression unit The compressed data of compression is encrypted, and obtains encryption data;
Unit is inserted, for the encryption data encrypted by the ciphering unit to be inserted the number of the non-targeted picture According in, target hiding data is obtained, so that the encryption data is hidden in the non-targeted picture.
Embodiment of the present invention fourth aspect provides a kind of transcriber, specifically includes:
Resolution unit, for carrying out file header dissection process to target hiding data, the target hiding data has mesh The encryption data of piece of marking on a map and the data of non-targeted picture, the Target Photo is the picture being hidden;
Acquiring unit, for obtaining the encryption data and the non-targeted picture according to the file header dissection process Data;
Second signal generating unit, the data genaration of the non-targeted picture got by the acquiring unit for basis adds Password;
Decryption unit, the Crypted password for being generated according to the signal generating unit is decrypted place to the encryption data Reason, obtains compressed data;
Decompression units, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain The data of the Target Photo so that the Target Photo normally shows.
The aspect of the embodiment of the present invention the 5th provides a kind of concealing device, specifically includes:
Input unit, output device, processor and memory;
The processor by calling the operational order of the memory storage, for performing following steps:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that described Encryption data is hidden in the non-targeted picture.
The aspect of the embodiment of the present invention the 6th provides a kind of transcriber, specifically includes:
File header dissection process is carried out to target hiding data, the target hiding data has the encryption number of Target Photo According to the data with non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo is just Often show.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the embodiment of the present invention, first Target Photo is compressed into process, obtains compressed data, the Target Photo is Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh Piece of marking on a map is corresponding;The compressed data is encrypted according to the Crypted password, obtains encryption data;Add described Ciphertext data is inserted in the data of the non-targeted picture, obtains target hiding data, so that the encryption data is hidden in institute In stating non-targeted picture.
Description of the drawings
Fig. 1 is the hiding schematic diagram of picture in the embodiment of the present invention;
Fig. 2 is one embodiment schematic flow sheet of the hidden method that picture is encrypted in the embodiment of the present invention;
Fig. 3 is another embodiment schematic flow sheet of the hidden method of encryption picture in the embodiment of the present invention;
Fig. 4 is one embodiment schematic flow sheet of the reproducting method that picture is encrypted in the embodiment of the present invention;
Fig. 5 is another embodiment schematic flow sheet of the reproducting method of encryption picture in the embodiment of the present invention;
Fig. 6 is one embodiment structural representation of concealing device in the embodiment of the present invention;
Fig. 7 is another example structure schematic diagram of concealing device in the embodiment of the present invention;
Fig. 8 is one embodiment structural representation of transcriber in the embodiment of the present invention;
Fig. 9 is another example structure schematic diagram of transcriber in the embodiment of the present invention;
Figure 10 is that another enforcement exemplary configuration of concealing device is intended in the embodiment of the present invention;
Figure 11 is another example structure schematic diagram of transcriber in the embodiment of the present invention.
Specific embodiment
The hidden method and reproducting method and relevant device of a kind encryption picture are embodiments provided, for right Picture is encrypted to hide and decrypt and reproduces.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only The embodiment of a part of the invention, rather than the embodiment of whole.Based on the embodiment in the present invention.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, " Four " etc. (if present) is the object for distinguishing similar, without for describing specific order or precedence.Should manage The data that solution is so used can be exchanged in the appropriate case, so that the embodiments described herein can be with except illustrating here Or the order beyond the content of description is implemented.Additionally, term " including " or " having " and its any deformation, it is intended that cover not Exclusive includes, for example, contain series of steps or unit process, method, system, product or equipment be not necessarily limited to it is clear Those steps for listing or unit, but may include clearly not list or for these processes, method, product or set Standby intrinsic other steps or unit.
As shown in figure 1,101 in Fig. 1 are the picture that need not be encrypted, 102 to need encrypted and hiding picture, 102 be compressed after encryption to data insert Figure 101 data in so that 102 enciphering hidings are obtained in 101 As the pattern and 101 shown to picture 103,103 so that others invisible 102, reach good enciphering hiding effect.
In the embodiment of the present invention, first Target Photo is compressed into process, obtains compressed data, the Target Photo is Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh Piece of marking on a map is corresponding;The compressed data is encrypted according to the Crypted password, obtains encryption data;Add described Ciphertext data is inserted in the data of the non-targeted picture, obtains target hiding data, so that the encryption data is hidden in institute In stating non-targeted picture.
Fig. 2 is referred to, hidden method one embodiment of picture is encrypted in the embodiment of the present invention to be included:
201st, Target Photo is compressed into process.
In the present embodiment, when get Target Photo and receive user compression instruction after, Target Photo will be entered Row compression is processed, and obtains compressed data, and compression instruction indicates to be compressed Target Photo processs, Target Photo be need by Encryption and hiding picture.
202nd, according to the data genaration Crypted password of non-targeted picture.
In the present embodiment, terminal receives the password generation instruction from user, and generates instruction and non-mesh according to the password Mark on a map the data genaration Crypted password of piece.
It should be noted that step 202 and step 201 are without determining sequential relationship, step 202 can also step 201 it Front execution, does not specifically limit herein.
203rd, compressed data is encrypted according to Crypted password.
In the present embodiment, process and according to the data genaration Crypted password of non-targeted picture when Target Photo is compressed Afterwards, encryption data will be obtained according to being encrypted to compressed data according to Crypted password.
During the 204th, encryption data to be inserted the data of non-targeted picture.
In the present embodiment, when being encrypted to compressed data according to Crypted password, and obtain after encryption data, then Encryption data is inserted in the data of non-targeted picture, target hiding data is obtained, so that encryption data is hidden in non-targeted In picture.
In the embodiment of the present invention, Target Photo is compressed process by terminal first, obtains compressed data, and Target Photo is Need encrypted picture;Then according to the data genaration Crypted password of non-targeted picture, non-targeted picture and Target Photo phase Correspondence;Compressed data is encrypted according to Crypted password, obtains encryption data;Encryption data is inserted into non-targeted picture Data in, target hiding data is obtained, so that encryption data is hidden in non-targeted picture.
Fig. 3 is referred to, another embodiment of the hidden method of encryption picture includes in the embodiment of the present invention:
301st, Target Photo is compressed into process.
In the present embodiment, when terminal get Target Photo and receive user compression instruction after, will be to target figure Piece is compressed process, obtains compressed data, and the compression instruction indicates to be compressed Target Photo process, and Target Photo is to need Picture to be encrypted and hiding.
302nd, the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture.
In the present embodiment, terminal is received and generated after instruction from the password of user, and instruction is generated to non-according to the password Target Photo carries out hash algorithm, obtains the cryptographic Hash of non-targeted picture.
It should be noted that step 302 and step 301 are without determining sequential relationship, step 302 can also step 301 it Front execution, does not specifically limit herein.
303rd, Crypted password is determined according to cryptographic Hash.
In the present embodiment, when the data of terminal-pair non-targeted picture carry out the cryptographic Hash that hash algorithm obtains non-targeted picture Afterwards, again md5 encryption will be carried out to the cryptographic Hash and will obtain Crypted password.
304th, compressed data is encrypted according to Crypted password.
In the present embodiment, process and carry out hash algorithm according to the data of non-targeted picture when Target Photo is compressed After obtaining Crypted password, compressed data will be encrypted according to Crypted password, obtain encryption data.
The 305th, encryption data is superimposed upon the data trailer of non-targeted picture.
In the present embodiment, when being encrypted to compressed data according to Crypted password, and obtain after encryption data, then Encryption data is superimposed upon into the data trailer of non-targeted picture, target hiding data is obtained so that encryption data be hidden in it is non- In Target Photo.
In the embodiment of the present invention, Target Photo is compressed process by terminal first, obtains compressed data, and Target Photo is Need encrypted picture;Then the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture, and The cryptographic Hash is defined as into Crypted password, then compressed data is encrypted according to Crypted password, obtain encryption data; Encryption data is inserted in the data of non-targeted picture, target hiding data is obtained, so that encryption data is hidden in non-targeted In picture.
Fig. 4 is referred to, one embodiment of the reproducting method of picture is encrypted in the embodiment of the present invention to be included:
401st, file header dissection process is carried out to target hiding data.
In the present embodiment, after the file header analysis instruction of terminal receive user, terminal will be according to this document header parsing Instruction carries out file header dissection process to target hiding data, target hiding data has the encryption data of Target Photo and non- The data of Target Photo, Target Photo is the picture being hidden.
402nd, the data of encryption data and non-targeted picture are obtained according to file header dissection process.
In the present embodiment, after the file header analysis instruction of terminal receive user, terminal will be according to this document header parsing Instruction carries out file header dissection process to target hiding data, and obtains encryption data and non-mesh according to file header dissection process Mark on a map the data of piece.
403rd, according to the data genaration Crypted password of non-targeted picture.
In the present embodiment, the password of receive user is generated instruction by device, and according to the instruction and the number of non-targeted picture According to generation Crypted password.
404th, process is decrypted to encryption data according to Crypted password.
In the present embodiment, after device obtains the encryption data and Crypted password of Target Photo, will be according to Crypted password Process is decrypted to encryption data, compressed data is obtained.
405th, decompression processing is carried out to compressed data.
In the present embodiment, after device obtains the compressed data of Target Photo, the compressed data will be carried out at decompression Reason, obtains the data of Target Photo so that Target Photo normally shows.
In the embodiment of the present invention, device carries out file header dissection process to target hiding data, and target hiding data has The encryption data of Target Photo and the data of non-targeted picture, Target Photo is the picture being hidden, and according to file header parsing Process obtains the data of encryption data and non-targeted picture;According to the data genaration Crypted password of non-targeted picture;According to encryption Password is decrypted process to encryption data, obtains compressed data;Decompression processing is carried out to compressed data, Target Photo is obtained Data so that the Target Photo for being hidden in non-targeted picture normally shows.
Fig. 5 is referred to, another embodiment of the reproducting method of picture is encrypted in the embodiment of the present invention to be included:
501st, file header dissection process is carried out to target hiding data.
502nd, the data of encryption data and non-targeted picture are obtained according to file header dissection process.
It is step 401 in step 501,502 and Fig. 4,402 similar in the present embodiment, specifically do not repeat herein.
503rd, the cryptographic Hash that hash algorithm obtains non-targeted picture is carried out to the data of non-targeted picture.
In the present embodiment, terminal is received and generated after instruction from the password of user, and instruction is generated to this according to the password Non-targeted picture carries out hash value algorithms, obtains the cryptographic Hash of non-targeted picture..
504th, Crypted password is determined according to cryptographic Hash.
In the present embodiment, when the data of terminal-pair non-targeted picture carry out the cryptographic Hash that hash algorithm obtains non-targeted picture Afterwards, again md5 encryption will be carried out to the cryptographic Hash and will obtain Crypted password.
505th, process is decrypted to encryption data according to Crypted password.
506th, decompression processing is carried out to compressed data.
In the present embodiment, step 505,506 with step 404 in Fig. 4,405 similar, specifically do not repeat herein.
In the embodiment of the present invention, device carries out file header dissection process to target hiding data, and target hiding data has The encryption data of Target Photo and the data of non-targeted picture, Target Photo is the picture being hidden, and according to file header parsing Process obtains the data of encryption data and non-targeted picture;Hash algorithm is carried out to the data of non-targeted picture and obtains non-targeted figure The cryptographic Hash of piece, by the cryptographic Hash Crypted password is defined as;Then process is decrypted to encryption data according to Crypted password, is obtained To compressed data;Decompression processing is carried out to compressed data, the data of Target Photo are obtained so that the mesh of non-targeted picture is hidden in Piece of marking on a map normally shows.
For ease of understanding, the present embodiment is described with reference to specific application scenarios:
User A is not in order to want to allow others to see the figure B for depositing on computers, and it is encrypted not want to allow others to discover figure B, then Now user A has carried out enciphering hiding operation to scheming B, and user A first has prepared figure C, and figure C is to be not required to hiding figure to be encrypted Piece, has then carried out compression process by figure B, obtains the compressed data of figure B, then carries out Hash to preprepared picture C The cryptographic Hash of picture C is calculated, then md5 encryption is carried out to the cryptographic Hash and obtain Crypted password, with the Crypted password to picture B Compressed data be encrypted, by the data investigation after encryption figure C data trailer, now can only then see figure C, and Figure B is already encrypted to be hidden among the data of figure C.
When user A wants to allow the picture B of enciphering hiding to reproduce, because picture B is that to have user A to be encrypted hiding Operation, so user A knows that picture B is encrypted has been hidden in for which pictures, now user A finds out figure C, due to scheming C The information of figure B is concealed, is then carried out after file header dissection process to scheming C, the original pictorial informations of C, and quilt are schemed in having arrived just The encryption data of figure B, now carries out the cryptographic Hash that Hash calculation obtains picture C to the figure C after parsing, then makees this cryptographic Hash For the clear crytpographic key of encryption data, after being decrypted to encryption data, the compressed data of picture B is obtained, then to the compression number According to being decompressed, the partial data of picture B has just been obtained so that picture B completely shows.
The reproducting method of the encryption picture in the embodiment of the present invention is described above, below to the embodiment of the present invention In concealing device be described, refer to Fig. 6, the concealing device in the embodiment of the present invention includes:
Compression unit 601, for Target Photo to be compressed into process, obtains compressed data, Target Photo for need by The picture of encryption;
First signal generating unit 602, for according to the data genaration Crypted password of non-targeted picture, non-targeted picture and target Picture is corresponding;
Ciphering unit 603, the Crypted password generated by the first signal generating unit for basis is to the pressure compressed by compression unit Contracting data are encrypted, and obtain encryption data;
Unit 604 is inserted, in the data that the encryption data encrypted by ciphering unit is inserted non-targeted picture, obtaining Target hiding data, so that encryption data is hidden in non-targeted picture.
In the embodiment of the present invention, Target Photo is compressed process by compression unit 601, obtains compressed data, target figure Piece is to need encrypted picture;First signal generating unit 602 is according to the data genaration Crypted password of non-targeted picture, non-targeted figure Piece is corresponding with Target Photo;Ciphering unit 603 is encrypted according to Crypted password to compressed data, obtains encrypting number According to;Insert unit 604 encryption data to be inserted in the data of non-targeted picture, obtain target hiding data, so that encryption number According to being hidden in non-targeted picture.
Fig. 7 is referred to, another embodiment of the concealing device in the embodiment of the present invention includes:
Compression unit 701, for Target Photo to be compressed into process, obtains compressed data, Target Photo for need by The picture of encryption;
First signal generating unit 702, for according to the data genaration Crypted password of non-targeted picture, non-targeted picture and target Picture is corresponding;
Wherein, the first signal generating unit 702 includes:
Computation subunit 7021, for the data of non-targeted picture to be carried out with the Hash that hash algorithm obtains non-targeted picture Value;
Determination subelement 7022, the cryptographic Hash for being calculated according to computing unit determines Crypted password.
Ciphering unit 703, the Crypted password generated by the first signal generating unit for basis is to the pressure compressed by compression unit Contracting data are encrypted, and obtain encryption data;
Unit 704 is inserted, in the data that the encryption data encrypted by ciphering unit is inserted non-targeted picture, obtaining Target hiding data, so that encryption data is hidden in non-targeted picture.
Wherein inserting unit 704 includes:
Superposition subelement 7041, for encryption data to be superimposed upon the data trailer of non-targeted picture, obtains target and hides Data.
In the embodiment of the present invention, Target Photo is compressed process by compression unit 701, obtains compressed data, target figure Piece is to need encrypted picture;First signal generating unit 702 is according to the data genaration Crypted password of non-targeted picture, non-targeted figure Piece is corresponding with Target Photo;Ciphering unit 703 is encrypted according to Crypted password to compressed data, obtains encrypting number According to;Insert unit 704 encryption data to be inserted in the data of non-targeted picture, obtain target hiding data, so that encryption number According to being hidden in non-targeted picture.
The concealing device in the embodiment of the present invention is described above, the reproduction in the embodiment of the present invention is filled below Put and be described, refer to Fig. 8, the transcriber in the embodiment of the present invention includes:
Resolution unit 801, for carrying out file header dissection process to target hiding data, target hiding data has target The encryption data of picture and the data of non-targeted picture, Target Photo is the picture being hidden;
Acquiring unit 802, for obtaining the data of encryption data and non-targeted picture according to file header dissection process;
Second signal generating unit 803, the data genaration encryption of the non-targeted picture got by acquiring unit for basis is close Code;
Decryption unit 804, the Crypted password for being generated according to signal generating unit is decrypted process to encryption data, obtains Compressed data;
Decompression units 805, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain target figure The data of piece so that Target Photo normally shows.
In the embodiment of the present invention, resolution unit 801 carries out file header dissection process to target hiding data, and target hides number According to the data of the encryption data and non-targeted picture that have Target Photo, Target Photo is the picture being hidden, acquiring unit 802 The data of encryption data and non-targeted picture are obtained according to file header dissection process;Second signal generating unit 803 is according to non-targeted figure The data genaration Crypted password of piece;Decryption unit 804 is decrypted process to encryption data according to Crypted password, obtains compressing number According to;Decompression units 805 carry out decompression processing to compressed data, obtain the data of Target Photo so that be hidden in non-targeted picture Target Photo normally show.
Fig. 9 is referred to, another embodiment of the transcriber in the embodiment of the present invention includes:
Resolution unit 901, for carrying out file header dissection process to target hiding data, target hiding data has target The encryption data of picture and the data of non-targeted picture, Target Photo is the picture being hidden;
Acquiring unit 902, for obtaining the data of encryption data and non-targeted picture according to file header dissection process;
Second signal generating unit 903, the data genaration encryption of the non-targeted picture got by acquiring unit for basis is close Code;
Wherein, the second signal generating unit 903 includes:
Computation subunit 9031, for the data of non-targeted picture to be carried out with the Hash that hash algorithm obtains non-targeted picture Value;
Determination subelement 9032, the cryptographic Hash for being calculated according to computation subunit determines Crypted password.
Decryption unit 904, the Crypted password for being generated according to signal generating unit is decrypted process to encryption data, obtains Compressed data;
Decompression units 905, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain target figure The data of piece so that Target Photo normally shows.
In the embodiment of the present invention, resolution unit 901 carries out file header dissection process to target hiding data, and target hides number According to the data of the encryption data and non-targeted picture that have Target Photo, Target Photo is the picture being hidden, acquiring unit 902 The data of encryption data and non-targeted picture are obtained according to file header dissection process;Second signal generating unit 903 is according to non-targeted figure The data genaration Crypted password of piece;Decryption unit 904 is decrypted process to encryption data according to Crypted password, obtains compressing number According to;Decompression units 905 carry out decompression processing to compressed data, obtain the data of Target Photo so that be hidden in non-targeted picture Target Photo normally show.
Refer to Figure 10, Figure 10 is a kind of concealing device structural representation provided in an embodiment of the present invention, the concealing device 1000 can include one or more central processing units because of configuration or performance is different and the larger difference of producing ratio (central processing units, CPU) 1022 (for example, one or more processors) and memory 1032, one Individual or more than one storage application program 1042 or data 1044 storage medium 1030 (for example deposit by one or more magnanimity Storage equipment).Wherein, memory 1032 and storage medium 1030 can be of short duration storage or persistently storage.It is stored in storage medium 1030 program can include one or more modules (diagram is not marked), and each module can be included in concealing device Series of instructions operation.Further, central processing unit 1022 could be arranged to be communicated with storage medium 1030, hide The series of instructions operation in storage medium 1030 is performed on device 1000.
Concealing device 1000 can also include one or more power supplys 1026, and one or more are wired or wireless Network interface 1050, one or more input/output interfaces 1058, and/or, one or more operating systems 1041, Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in above-described embodiment by performed by concealing device can be based on the concealing device structure shown in the Figure 10.
Refer to Figure 11, Figure 11 is a kind of transcriber structural representation provided in an embodiment of the present invention, the transcriber 1100 can include one or more central processing units because of configuration or performance is different and the larger difference of producing ratio (central processing units, CPU) 1122 (for example, one or more processors) and memory 1132, one Individual or more than one storage application program 1142 or data 1144 storage medium 1130 (for example deposit by one or more magnanimity Storage equipment).Wherein, memory 1132 and storage medium 1130 can be of short duration storage or persistently storage.It is stored in storage medium 1130 program can include one or more modules (diagram is not marked), and each module can be included in transcriber Series of instructions operation.Further, central processing unit 1122 could be arranged to be communicated with storage medium 1130, reproduce The series of instructions operation in storage medium 1130 is performed on device 1100.
Transcriber 1100 can also include one or more power supplys 1126, and one or more are wired or wireless Network interface 1150, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, Such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in above-described embodiment by performed by transcriber can be based on the transcriber structure shown in the Figure 11.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematic, for example, the unit Divide, only a kind of division of logic function can have other dividing mode, such as multiple units or component when actually realizing Can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially The part for contributing to prior art in other words or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, above example only to illustrate technical scheme, rather than a limitation;Although with reference to front State embodiment to be described in detail the present invention, it will be understood by those within the art that:It still can be to front State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these Modification is replaced, and does not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.

Claims (10)

1. it is a kind of encryption picture hidden method, it is characterised in that include:
Target Photo is compressed into process, compressed data is obtained, the Target Photo is to need encrypted picture;
According to the data genaration Crypted password of non-targeted picture, the non-targeted picture is corresponding with the Target Photo;
The compressed data is encrypted according to the Crypted password, obtains encryption data;
The encryption data is inserted in the data of the non-targeted picture, target hiding data is obtained, so that the encryption Image watermarking is in the non-targeted picture.
2. it is according to claim 1 encryption picture hidden method, it is characterised in that it is described according to non-targeted picture generate Crypted password includes:
The cryptographic Hash that hash algorithm obtains the non-targeted picture is carried out to the data of the non-targeted picture;
The Crypted password is determined according to the cryptographic Hash.
3. it is according to claim 1 encryption picture hidden method, it is characterised in that it is described to insert the encryption data In the data of the non-targeted picture, obtaining target hiding data includes:
The encryption data is superimposed upon into the data trailer of the non-targeted picture, target hiding data is obtained.
4. it is a kind of encryption picture reproducting method, it is characterised in that include:
Carry out file header dissection process to target hiding data, the target hiding data have the encryption data of Target Photo and The data of non-targeted picture, the Target Photo is the picture being hidden;
The data of the encryption data and the non-targeted picture are obtained according to the file header dissection process;
According to the data genaration Crypted password of the non-targeted picture;
Process is decrypted to the encryption data according to the Crypted password, compressed data is obtained;
Decompression processing is carried out to the compressed data, the data of the Target Photo are obtained so that the Target Photo normally shows Show.
5. it is according to claim 4 encryption picture reproducting method, it is characterised in that it is described according to the non-targeted picture Data genaration Crypted password include:
The cryptographic Hash that hash algorithm obtains the non-targeted picture is carried out to the data of the non-targeted picture;
The Crypted password is determined according to the cryptographic Hash.
6. it is a kind of encryption picture concealing device, it is characterised in that include:
Compression unit, for Target Photo to be compressed into process, obtains compressed data, and the Target Photo is encrypted to need Picture;
First signal generating unit, for according to the data genaration Crypted password of non-targeted picture, the non-targeted picture and the mesh Piece of marking on a map is corresponding;
Ciphering unit, the Crypted password generated by first signal generating unit for basis by the compression unit to being compressed The compressed data be encrypted, obtain encryption data;
Unit is inserted, for the encryption data encrypted by the ciphering unit to be inserted the data of the non-targeted picture In, target hiding data is obtained, so that the encryption data is hidden in the non-targeted picture.
7. concealing device according to claim 6, it is characterised in that first signal generating unit includes:
Computation subunit, for the data of the non-targeted picture to be carried out with the Hash that hash algorithm obtains the non-targeted picture Value;
Determination subelement, the cryptographic Hash for being calculated according to the computing unit determines the Crypted password.
8. concealing device according to claim 6, it is characterised in that the unit of inserting includes:
Superposition subelement, for the encryption data to be superimposed upon the data trailer of the non-targeted picture, obtains target and hides Data.
9. it is a kind of encryption picture transcriber, it is characterised in that include:
Resolution unit, for carrying out file header dissection process to target hiding data, the target hiding data has target figure The encryption data of piece and the data of non-targeted picture, the Target Photo is the picture being hidden;
Acquiring unit, for obtaining the number of the encryption data and the non-targeted picture according to the file header dissection process According to;
Second signal generating unit, the data genaration encryption of the non-targeted picture got by the acquiring unit for basis is close Code;
Decryption unit, the Crypted password for being generated according to the signal generating unit is decrypted process to the encryption data, obtains To compressed data;
Decompression units, for carrying out decompression processing to the compressed data obtained by decryption unit process, obtain described The data of Target Photo so that the Target Photo normally shows.
10. transcriber according to claim 9, it is characterised in that second signal generating unit includes:
Computation subunit, for the data of the non-targeted picture to be carried out with the Hash that hash algorithm obtains the non-targeted picture Value;
Determination subelement, the cryptographic Hash for being calculated according to the computation subunit determines the Crypted password.
CN201611156990.3A 2016-12-14 2016-12-14 Hiding method and reappearing method for encrypted image and corresponding device Pending CN106600520A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611156990.3A CN106600520A (en) 2016-12-14 2016-12-14 Hiding method and reappearing method for encrypted image and corresponding device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611156990.3A CN106600520A (en) 2016-12-14 2016-12-14 Hiding method and reappearing method for encrypted image and corresponding device

Publications (1)

Publication Number Publication Date
CN106600520A true CN106600520A (en) 2017-04-26

Family

ID=58801426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611156990.3A Pending CN106600520A (en) 2016-12-14 2016-12-14 Hiding method and reappearing method for encrypted image and corresponding device

Country Status (1)

Country Link
CN (1) CN106600520A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833099A (en) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 Key generation method, device, key recovery method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6359986B1 (en) * 1997-08-06 2002-03-19 Matsushita Electric Industrial Co., Ltd. Encryption system capable of specifying a type of an encrytion device that produced a distribution medium
CN103824249A (en) * 2014-03-21 2014-05-28 上海斐讯数据通信技术有限公司 Picture hiding and acquiring method and intelligent terminal
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104615917A (en) * 2015-01-20 2015-05-13 中兴通讯股份有限公司 Picture camouflaging method, picture viewing method, system and terminal
CN104680077A (en) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 Picture encryption method and picture checking method, system and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6359986B1 (en) * 1997-08-06 2002-03-19 Matsushita Electric Industrial Co., Ltd. Encryption system capable of specifying a type of an encrytion device that produced a distribution medium
CN103824249A (en) * 2014-03-21 2014-05-28 上海斐讯数据通信技术有限公司 Picture hiding and acquiring method and intelligent terminal
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104615917A (en) * 2015-01-20 2015-05-13 中兴通讯股份有限公司 Picture camouflaging method, picture viewing method, system and terminal
CN104680077A (en) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 Picture encryption method and picture checking method, system and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
葛锦环 等: "一种基于MD5值的数字图像加密新算法", 《计算机应用与软件》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833099A (en) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 Key generation method, device, key recovery method and device

Similar Documents

Publication Publication Date Title
US11582038B2 (en) Systems and methods to secure searchable data having personally identifiable information
AU2013101034A4 (en) Registration and authentication of computing devices using a digital skeleton key
US9158896B2 (en) Method and system for generating a secure key
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN106878013B (en) File encryption and decryption method and device
CN110061840A (en) Data ciphering method, device, computer equipment and storage medium
CN105468940B (en) Method for protecting software and device
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
CN115730333A (en) Security tree model construction method and device based on secret sharing and homomorphic encryption
CN105279443A (en) Picture encrypting and decrypting methods and devices
CN106600520A (en) Hiding method and reappearing method for encrypted image and corresponding device
CN111339562A (en) Order preserving/de-ordering ciphertext recovery method and device
JP5359650B2 (en) Data file disguise processing device
KR20180059980A (en) Method and system for creating encryption key based on face image
CN112311536B (en) Key hierarchical management method and system
CN115085983A (en) Data processing method and device, computer readable storage medium and electronic equipment
CN111130788B (en) Data processing method and system, data reading method and iSCSI server
CN113839773A (en) LUKS key offline extraction method, terminal equipment and storage medium
CN111475690A (en) Character string matching method and device, data detection method and server
CN115017927B (en) Card simulation method, electronic device, and storage medium
CN114978738B (en) Encryption processing method of interface message, client and server
CN110619883A (en) Music information embedding method, music information extracting method, music information embedding device, music information extracting device, terminal and storage medium
CN115396222B (en) Device instruction execution method, system, electronic device and readable storage medium
CN109166070B (en) Tool generation method and device in government affair system
CN114817970B (en) Data analysis method and system based on data source protection and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426

RJ01 Rejection of invention patent application after publication