CN106651734A - Binary two-dimensional code image encryption and decryption method and device - Google Patents

Binary two-dimensional code image encryption and decryption method and device Download PDF

Info

Publication number
CN106651734A
CN106651734A CN201510727690.5A CN201510727690A CN106651734A CN 106651734 A CN106651734 A CN 106651734A CN 201510727690 A CN201510727690 A CN 201510727690A CN 106651734 A CN106651734 A CN 106651734A
Authority
CN
China
Prior art keywords
key
matrix
value
sequence
dimentional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510727690.5A
Other languages
Chinese (zh)
Inventor
刘雨龙
李维雅
蒋溢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Chongqing University of Post and Telecommunications
Original Assignee
Tencent Technology Shenzhen Co Ltd
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd, Chongqing University of Post and Telecommunications filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510727690.5A priority Critical patent/CN106651734A/en
Publication of CN106651734A publication Critical patent/CN106651734A/en
Pending legal-status Critical Current

Links

Landscapes

  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a binary two-dimensional code image encryption method. The method includes obtaining a two-dimensional image, and generating a binary matrix according to the two-dimensional code image; obtaining a secret key which includes an initial value Z and a starting parameter, wherein the initial value Z is larger than 1, and the starting parameter is between 0 and 1; adopting a Z mapping algorithm to generate a two-dimensional secret key matrix according to the secret key; and performing XOR on elements of the binary matrix and elements of the two-dimensional secret key matrix in one-to-one correspondence to obtain an encrypted two-dimensional code image, decryption difficulty is increased, and security of two-dimensional code information is improved. In addition, a binary two-dimensional code image encryption device and binary two-dimensional code image decryption method and device are also provided.

Description

The encryption of two-value image in 2 D code, the method and apparatus of decryption
Technical field
The present invention relates to field of computer technology, more particularly to a kind of two-value image in 2 D code encryption, decryption Method and apparatus.
Background technology
With the development of computer technology, Quick Response Code is generally accorded with using chequered with black and white two-value figure record data Number information, due to its can easily carrying information get a lot of applications in every field, such as pass through Quick Response Code Carry out data storage, log-on webpage, mobile-phone payment etc..In order to avoid the important information quilt that Quick Response Code is included Steal and change, before its transmission and storing, need to be encrypted it, to guarantee that Quick Response Code is carried The security and validity of information.
The method AES complexity of existing two-dimentional code encryption is low and known degree is high, it is easy to be cracked, Security is low.
The content of the invention
Based on this, it is necessary to for above-mentioned technical problem, there is provided a kind of two-value image in 2 D code encryption, decryption Method and apparatus, improve 2 D code information security.
A kind of method of two-value image in 2 D code encryption, methods described includes:
Image in 2 D code is obtained, two values matrix is generated according to the image in 2 D code;
Key is obtained, the key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, starting Parameter is between zero and one;
The two-dimentional cipher key matrix matched with the two values matrix is generated using Z mapping algorithms according to the key;
The element one-to-one corresponding of the element of the two values matrix and two-dimentional cipher key matrix is carried out into XOR to be encrypted Image in 2 D code afterwards.
A kind of device of two-value image in 2 D code encryption, described device includes:
Processing module, for obtaining image in 2 D code, according to the image in 2 D code two values matrix is generated, and is obtained Key is taken, the key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, and initial parameters exist Between 0 and 1;
Two-dimentional cipher key matrix generation module, for being generated and described two using Z mapping algorithms according to the key The two-dimentional cipher key matrix of value matrix matching;
Encrypting module, for by the element of the element of the two values matrix and two-dimentional cipher key matrix correspond into Row XOR encrypted after image in 2 D code.
The method and apparatus of above-mentioned two-value image in 2 D code encryption, by obtaining image in 2 D code, according to two dimension Code image generates two values matrix, obtains key, including initial value Z and initial parameters, and wherein initial value Z is more than 1, initial parameters between zero and one, two matched with two values matrix are generated according to key using Z mapping algorithms Dimension cipher key matrix, carries out the element one-to-one corresponding of the element of two values matrix and two-dimentional cipher key matrix XOR and obtains Image in 2 D code after encryption, the computation complexity of Z mapping algorithms is high, and has with initial parameters to initial value Very high sensitiveness, increases decryption difficulty, improves the security of 2 D code information.
A kind of method of two-value image in 2 D code decryption, methods described includes:
The image in 2 D code of encryption is obtained, encryption two values matrix is generated according to the image in 2 D code of the encryption;
The key of the image in 2 D code matching of the encryption is obtained, the key includes initial value Z and starting ginseng Number, wherein initial value Z is more than 1, and initial parameters are between zero and one;
The two-dimentional key square matched with the encryption two values matrix is generated using Z mapping algorithms according to the key Battle array;
The element one-to-one corresponding of the element of the encryption two values matrix and two-dimentional cipher key matrix is carried out into XOR to obtain Image in 2 D code after decryption.
A kind of device of two-value image in 2 D code decryption, described device includes:
Decryption processing module, for obtaining the image in 2 D code of encryption, according to the image in 2 D code of the encryption Encryption two values matrix is generated, the key of the image in 2 D code matching of the encryption is obtained, the key is included just Initial value Z and initial parameters, wherein initial value Z are more than 1, and initial parameters are between zero and one;
The two-dimentional cipher key matrix generation module of decryption, for adopting Z mapping algorithms to generate and institute according to the key State the two-dimentional cipher key matrix of encryption two values matrix matching;
Deciphering module, for by a pair of the element 1 of the element of the encryption two values matrix and two-dimentional cipher key matrix The image in 2 D code after XOR is decrypted should be carried out.
The method and apparatus of above-mentioned two-value image in 2 D code decryption, by the image in 2 D code for obtaining encryption, root Encryption two values matrix is generated according to the image in 2 D code of encryption, the key of the image in 2 D code matching of encryption is obtained, Key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, initial parameters between zero and one, The two-dimentional cipher key matrix matched with encryption two values matrix is generated using Z mapping algorithms according to key, two will be encrypted The element of the element of value matrix and two-dimentional cipher key matrix is corresponded and carries out the Quick Response Code figure after XOR is decrypted Picture, only obtaining the key matched with the image in 2 D code of encryption just can be decrypted, and when decrypting only There is the concrete formula ability successful decryption that specify that Z mapping algorithms, due to Z mapping algorithms complexity height, and There is very high sensitiveness to the initial value and initial parameters of key, increase decryption difficulty, improve Quick Response Code The security of information.
Description of the drawings
Fig. 1 is the encryption of two-value image in 2 D code, the applied environment figure of the method for decryption in one embodiment;
Fig. 2 is the cut-away view of server in Fig. 1 in one embodiment;
Fig. 3 is the cut-away view of terminal in Fig. 2 in one embodiment;
Fig. 4 is the flow chart of the method for two-value image in 2 D code encryption in one embodiment;
Fig. 5 is the flow chart that two-dimentional cipher key matrix is generated in one embodiment;
Fig. 6 is unencrypted Quick Response Code schematic diagram in one embodiment;
Fig. 7 is the Quick Response Code schematic diagram after encrypting in one embodiment;
Fig. 8 is the flow chart of the method for two-value image in 2 D code decryption in one embodiment;
Fig. 9 is the flow chart that two-dimentional cipher key matrix is generated in one embodiment;
Figure 10 is the Quick Response Code schematic diagram after decrypting in one embodiment;
Figure 11 is using the Quick Response Code schematic diagram after decrypting after the initial value different from encryption in one embodiment;
Figure 12 is to be illustrated using the Quick Response Code after decrypting after another initial value different from encryption in one embodiment Figure;
Figure 13 is to be illustrated using the Quick Response Code after decrypting after another initial value different from encryption in one embodiment Figure;
Figure 14 is the structured flowchart of the device of two-value image in 2 D code encryption in one embodiment;
Figure 15 is the structured flowchart of two-dimentional cipher key matrix generation module in one embodiment;
Figure 16 is the structured flowchart of the device of two-value image in 2 D code decryption in one embodiment;
Figure 17 is the structured flowchart of the two-dimentional cipher key matrix generation module of decryption in one embodiment.
Specific embodiment
Fig. 1 is two-value image in 2 D code encryption in one embodiment, the applied environment figure of the method operation of decryption. As shown in figure 1, the applied environment includes terminal 110, server 120, wherein terminal 110 and server 120 is logical Cross network to be communicated.
Terminal 110 can be for smart mobile phone, panel computer, notebook computer, desktop computer etc., but not It is confined to this.The Quick Response Code of encryption can be sent between terminal 110 and server 120 by network.Two-value two Tie up code image encryption, the device of decryption can be in the terminal, it is also possible in the server.
In one embodiment, the internal structure of the server 120 in Fig. 1 is as shown in Fig. 2 the server 120 include the processor, storage medium, internal memory and the network interface that connect by system bus.Wherein, the clothes Business device 120 storage medium be stored with operating system, database and two-value image in 2 D code encryption and/or decrypt Device, database is used for data storage, such as subscriber data, the encryption of two-value image in 2 D code and/or decrypts Device be used for the side for realizing a kind of two-value image in 2 D code encryption suitable for server 120 and/or decrypting Method.The processor of the server 120 is used to provide calculating and control ability, supports whole server 120 Operation.The two-value image in 2 D code encryption in storage medium and/or the dress decrypted are saved as in the server 120 The operation put provides environment.The network interface of the server 120 is used to pass through network with outside terminal 110 The two-value image in 2 D code of the encryption that connection communication, such as receiving terminal 110 send and to 110, terminal Send two-value image in 2 D code of encryption etc..
In one embodiment, the internal structure of the terminal 110 in Fig. 1 is as shown in figure 3, the terminal 110 Including the processor, GPU, storage medium, internal memory, network interface connected by system bus, Display screen and input equipment.Wherein, the storage medium of terminal 110 is stored with operating system, also including two The encryption of value image in 2 D code and/or the device decrypted, the device is used to realize a kind of two-value two suitable for terminal Dimension code image encryption and/or the method for decryption.The processor is used to provide calculating and control ability, supports whole The operation of terminal 110.GPU in terminal 110 is used to provide at the drafting energy of display interface Power, the operation for inside saving as the information display device in storage medium provides environment, and network interface is used for and service Device 120 carries out network service, such as sends the two-value image in 2 D code of encryption to server 120.Display screen Curtain such as shows picture, information on application interface for showing application interface etc., and input equipment is used to connect Receive order or data of user input etc..For the terminal 110 with touch-screen, display screen and input equipment can For touch-screen.
As shown in figure 4, in one embodiment, there is provided a kind of method of two-value image in 2 D code encryption, Server or terminal in be applied to above-mentioned applied environment, comprises the steps:
Step S210, obtains image in 2 D code, and according to image in 2 D code two values matrix is generated.
Specifically, the method for two-value image in 2 D code encryption is only applicable to the figure that image in 2 D code has two-value Picture, such as QR codes.The request sent according to the information text or terminal of input generates the two-value two of the information that carries Dimension code image, the logging request for such as being sent according to terminal generates the two-value two with subscriber data for logging in Dimension code image.Two-value image in 2 D code only has two kinds of colourities, such as black and white.Two values matrix is by two kinds The matrix of numerical value composition, the such as matrix of 0 and 1 composition.Two kinds of colourities of image are corresponded into two kinds of numerical value, Corresponding two values matrix is generated according to each pixel of image in 2 D code, such as the pixel of black 0 is corresponded into, The pixel of white corresponds to 1.For the two-value image in 2 D code for having gray scale, dedusting degree regeneration can be first carried out Into two values matrix.
Step S220, obtains key, and key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, Initial parameters are between zero and one.
Specifically, key determines the algorithm complex of encryption, and the algorithm complex of encryption is initial with key The increase of value Z and initial parameters digit and increase.Because Z mapping algorithms belong to chaos system algorithm, it is necessary to Initial value Z is met more than 1, the system just enters chaos state, and has very high to initial value and initial parameters Sensitiveness, i.e. encryption key and decruption key also results in decryption failure if there is JND, this kind of Characteristic determines the reliability and security of Z mapping algorithm encryption and decryption.Conjunction can be randomly selected when being encrypted The initial value Z of right position number and initial parameters, because the selection range of initial value Z and initial parameters is very big, lead Cause the difficulty of decryption very big.Simultaneously initial parameters are between zero and one and Z mapping algorithms codomain is 0 and 1 Between, it is ensured that can quickly and easily divide and generate key sequence.
Step S230, the two-dimentional cipher key matrix matched with two values matrix is generated according to key using Z mapping algorithms.
Specifically, Z mapping algorithms are that Z maps one-dimensional nonlinear dynamical system, and its definition isWherein x0For initial parameters, x is can customizenTurning and two-dimentional cipher key matrix between Change relation, such as using auxiliary array record xnAnd the position relationship between two-dimentional cipher key matrix, pass throughIt is calculated each xnAfter value, target x is chosen according to custom conditionn, further according to Auxiliary array obtains each target xnIn the position of two-dimentional cipher key matrix, further according to custom algorithm each is converted Target xnFor the value in the range of qualified two-value.Choosing target xnWhen, although xnComputation sequence be from From small to large recursive calculation is obtained n values, but is choosing the x for encryptionnWhen can with the selection of intermittent, Algorithm adjustment x is can customize after selectionnOrder.Two-dimentional cipher key matrix is equally the matrix with two-value, Two-value therein is identical with the two-value scope in the two values matrix in step S210, such as two in step S210 Value matrix is the matrix of 0 and 1 composition, then two-dimentional cipher key matrix is equally the matrix of 0 and 1 composition, and Two-dimentional cipher key matrix is identical with the length and width of two values matrix, because the length and width of two values matrix depends on In the size of image in 2 D code, so image in 2 D code is bigger, two-dimentional cipher key matrix is bigger, generates two dimension close The complexity of key matrix is higher, and the time is longer.
Step S240, carries out the element one-to-one corresponding of the element of two values matrix and two-dimentional cipher key matrix XOR and obtains Image in 2 D code to after encryption.
Specifically, each corresponding element of each element of two values matrix and two-dimentional cipher key matrix is carried out Scrambled matrix is obtained after XOR, the bianry image that scrambled matrix is converted into picture format is used to store, transmit. Such as the image of bmp or jpg forms.When stored, half-tone information can be increased and generates the binary map with gray scale Picture.In one embodiment, the key that terminal or server will be used when the image in 2 D code of encryption and encryption Send to server or terminal, the server or terminal of the image in 2 D code for being easy to receive after encryption are according to connecing The key for receiving is decrypted.Before sending, the key used during encryption can be encrypted, or when sending Using safe passage.In one embodiment, terminal and server two ends are given birth to using the key of agreement Into mode, so that key need not be transmitted can also carry out after the image in 2 D code of the encryption for receiving Decryption.In one embodiment, terminal and server two ends using the mapping relations of agreement will map data with Key is corresponding so that only transmit mapping data, and reception is convenient can be according to the mapping relations of agreement according to mapping Data obtain key so as to be decrypted.In one embodiment, method two-value image in 2 D code encrypted Be applied to safety insert, install safety insert by way of, internet service end to image in 2 D code Encryption, is then decrypted, it is ensured that two using mounted plug-in unit in client to the image in 2 D code encrypted The security of dimension code information.
In the present embodiment, by obtaining image in 2 D code, two values matrix is generated according to image in 2 D code, obtained Key, including initial value Z and initial parameters, wherein initial value Z be more than 1, initial parameters between zero and one, The two-dimentional cipher key matrix matched with two values matrix is generated using Z mapping algorithms according to key, by two values matrix The element of element and two-dimentional cipher key matrix is corresponded and carries out the image in 2 D code after XOR is encrypted, Z mappings The computation complexity of algorithm is high, and has very high sensitiveness to initial value and initial parameters, increases decryption Difficulty, improves the security of 2 D code information.
In one embodiment, as shown in figure 5, step S230 includes:
Step S231, chaotic key sequence is generated according to key using Z mapping algorithms.
Specifically, chaotic key sequence is one-dimensional sequence, will be according to initial value Z and x0Given birth to using Z mapping algorithms Into each xnTarget x is chosen in valuenAnd generate chaotic key sequence according to preset order sequence.Now only need to Record each target xnWith the position relationship between one-dimensional chaotic key sequence, than record target xnWith two dimension Position relationship between matrix is more convenient.The number phase of the length of chaotic key sequence and element in two values matrix Together, if the dimension of two values matrix is M × N, then the length of chaotic key sequence is M × N.
Step S232, chaotic key is Sequence Transformed for one-dimensional two-value key sequence.
Specifically, by each target x in chaotic key sequencenIt is transformed to according to custom algorithm eligible Two-value in the range of value, parallel transformation can be carried out according to conversion number during conversion, raising is converted into one-dimensional two The speed of value key sequence.
Step S233, by one-dimensional two-value key sequence two-dimentional cipher key matrix is converted into.
Specifically, first application one preserves two dimension with the two-dimensional array of two values matrix equal length and width The two-dimensional array of cipher key matrix, such as M × N, the element for then sequentially reading one-dimensional two-value key sequence is saved in In two-dimensional array, whenever M element has been preserved, just line feed continues to preserve, until the element of one-dimension array All preserve into the two-dimensional array of M × N, then this two-dimensional array is two-dimentional cipher key matrix.Due in step Target x in S231nIt is to generate chaotic key sequence according to preset order sequence, so now only needing order to read Take, it is not necessary to record the position relationship of element between one-dimensional two-value key sequence and two-dimentional cipher key matrix. It is understood that a position conversion array can also be arranged again, do not press when two-dimentional cipher key matrix is generated Order reads the element in one-dimensional two-value key sequence, but the order for converting array according to position reads.
In the present embodiment, one-dimensional sequence is first generated, then one-dimensional sequence is converted into two-dimensional matrix so that record It is more convenient during position relationship between element and matrix, two-dimentional cipher key matrix can be quickly generated.
In one embodiment, step S231 includes:According to formulaWith key meter Calculation is obtained by xnChaotic key sequence [the x of compositionb,xb+1…xb+M×N-1], wherein x0For the initial parameters, B≤n≤b+M × N-1,0≤b, M are the length of the two values matrix, and N is the width of the two values matrix.
Specifically, according to initial value Z and initial parameters x0Each x for generatingnChoose in value and generated by computation sequence Continuous N × N number of target xnAnd chaotic key sequence is generated according to computation sequence sequence, due to the length of QR codes Degree and width are typically identical, so the length and width of the two values matrix of QR codes is also identical, for QR codes one As M=N.Due to being to arrange each target x according to computation sequencen, it is not necessary to record each target xnWith it is one-dimensional Chaotic key sequence between position relationship, it is only necessary to record start target xnStart sequence number n, more It is convenient.
Step S232 includes:According to formulaWherein 0 < a < 1, by the chaotic key Sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1]。
Specifically, by each target xnAccording to its size according to formula0 or 1 is converted into, So as to generate the two-value key sequence [y being made up of 0 and 1b,yb+1…yb+M×N-1], preferential a values are 0.5.
Step S233 includes:According to default transformation rule by the one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional cipher key matrix of M × N.
Specifically, one-dimensional two-value key sequence [y can be in order successively readb,yb+1…yb+M×N-1] in each yuan Element generates the two-dimentional cipher key matrix of M × N, position conversion array is may also set up, when two-dimentional cipher key matrix is generated The element in one-dimensional two-value key sequence is read out of order, but the order for converting array according to position reads.
In one embodiment, the number of bits of initial value Z be more than the first predetermined threshold value, initial parameters it is little Several digits are more than the second predetermined threshold value.
Specifically, the first predetermined threshold value and the second predetermined threshold value can be self-defined as needed, and the first default threshold Value and/or the second predetermined threshold value can be adjusted according to the disposal ability of image in 2 D code and/or terminal.Preferential, the One predetermined threshold value is 5, and the second predetermined threshold value is 5, and the number of bits that can arrange initial value Z is even Number, initial parameters x0Scale be easy to according to formula for even numberCarry out evolution Computing and Computer Storage.As selection Z=1111111111, x0=0.1111111111 be initial value, chaotic key Sequence [xb,xb+1…xb+M×N-1] in b=0, byWithFormula is produced Chaotic key sequence pair QR codes as shown in Figure 6, the content that wherein QR codes are carried is Test, and pixel is 181 × 181, the ciphering two-dimension code figure generated after being encrypted is as shown in Figure 7.
In one embodiment, as shown in Figure 8, there is provided a kind of method of two-value image in 2 D code decryption, Comprise the steps:
Step S310, obtains the image in 2 D code of encryption, is generated according to the image in 2 D code of the encryption and is encrypted Two values matrix.
Specifically, the image in 2 D code of encryption is the image with two-value, such as QR codes.Two-value Quick Response Code figure As only two kinds colourities, such as black and white.The matrix that two values matrix is made up of two kinds of numerical value, such as 0 and 1 The matrix of composition.Two kinds of colourities of image are corresponded into two kinds of numerical value, according to each pixel of image in 2 D code Corresponding two values matrix is generated, such as the pixel of black 0 is corresponded into, the pixel of white corresponds to 1.It is right In the two-value image in 2 D code of the encryption for having gray scale, dedusting degree regeneration encryption two values matrix can be first carried out.
Step S320, obtains the key of the image in 2 D code matching of the encryption, and the key includes initial value Z And initial parameters, more than 1, initial parameters are between zero and one for wherein initial value Z.
Specifically, the identical key used when the key of matching is referred to and encrypted with image in 2 D code, can by with Encryption side carries out agreement and obtains, and the key that also can be sent by receiving encryption side is obtained, if encryption side is sent out The key sent is the key of encryption, then first carry out decoding and obtain key.Key determines that the algorithm of decryption is answered Miscellaneous degree, the algorithm complex of decryption increases with the increase of key initial value Z and initial parameters digit.Due to Z mapping algorithms belong to chaos system algorithm, have very high sensitiveness to initial value and initial parameters, that is, encrypt close Key and decruption key also result in decryption failure if there is JND, and this kind of characteristic determines that Z mappings are calculated The reliability and security of method encryption and decryption.The initial value Z of suitable digit can be randomly selected when being encrypted and is risen Beginning parameter x0, due to initial value Z and initial parameters x0Selection range it is very big, cause decrypt difficulty very Greatly.For Z mapping algorithms are in Z > 1, the system enters chaos state, while the < x of initial parameters 00< 1, and Z mapping algorithms codomain is between zero and one, it is ensured that can quickly and easily divide and generate key sequence.Due to solution Key is consistent with encryption key, so the Z and initial parameters x of decruption key0Scope and encryption key phase Together, all it is the < x of Z > 1,00< 1.Can be according to Z and x0Scope judge whether decruption key malfunctions.
Step S330, the two-dimentional key matched with encryption two values matrix is generated according to key using Z mapping algorithms Matrix.
Specifically, Z mapping algorithms are that Z maps one-dimensional nonlinear dynamical system, and its definition isWherein x0For initial parameters, x is can customizenTurning and two-dimentional cipher key matrix between Change relation, such as using auxiliary array record xnAnd the position relationship between two-dimentional cipher key matrix, pass throughIt is calculated each xnAfter value, target x is chosen according to custom conditionn, further according to Auxiliary array obtains each target xnIn the position of two-dimentional cipher key matrix, further according to custom algorithm each is converted Target xnFor the value in the range of qualified two-value.Choosing target xnWhen, although xnComputation sequence be from From small to large recursive calculation is obtained n values, but is choosing the x for encryptionnWhen can with the selection of intermittent, Algorithm adjustment x is can customize after selectionnOrder.Two-dimentional cipher key matrix is equally the matrix with two-value, Two-value therein is identical with the two-value scope in encryption two values matrix, and such as encryption two values matrix is 0 and 1 composition Matrix, then two-dimentional cipher key matrix is equally the matrix of 0 and 1 composition, and two-dimentional cipher key matrix and encryption The length and width of two values matrix is identical, because the length and width for encrypting two values matrix depends on the two of encryption The size of dimension code image, so the image in 2 D code of encryption is bigger, two-dimentional cipher key matrix is bigger, generates two dimension The complexity of cipher key matrix is higher, and decryption time is longer.
Step S340, the element one-to-one corresponding of the element of encryption two values matrix and two-dimentional cipher key matrix is carried out different Or the image in 2 D code after being decrypted.
Specifically, by each element of encryption two values matrix and each corresponding element of two-dimentional cipher key matrix Carry out obtaining decrypting matrix after XOR, due to decrypting the two values matrix that matrix is made up of 0 and 1, will solve When close matrix is converted into bianry image, can be carried out turning according to the two-value scope of two values matrix and bianry image itself Change.Decryption matrix is converted into the image in 2 D code after the bianry image of picture format is decrypted, for depositing Storage, such as transmission, the image of bmp or jpg forms.
In the present embodiment, by the image in 2 D code for obtaining encryption, generated according to the image in 2 D code of encryption and added Close two values matrix, obtains the key of the image in 2 D code matching of encryption, and key includes initial value Z and initial parameters, Wherein initial value Z be more than 1, initial parameters between zero and one, according to key using Z mapping algorithms generate with The two-dimentional cipher key matrix of encryption two values matrix matching, by the element of encryption two values matrix and two-dimentional cipher key matrix Element is corresponded and carries out the image in 2 D code after XOR is decrypted, and only obtains the Quick Response Code with encryption The key of images match just can be decrypted, and the concrete formula of Z mapping algorithms is only specify that when decrypting Ability successful decryption, because Z mapping algorithms complexity height, and the initial value and initial parameters to key have very High sensitiveness, increases decryption difficulty, improves the security of 2 D code information.
In one embodiment, as shown in figure 9, step S330 includes:
Step S331, chaotic key sequence is generated according to key using Z mapping algorithms.
Specifically, chaotic key sequence is one-dimensional sequence, will be according to initial value Z and initial parameters x0Using Z Each x that mapping algorithm is generatednTarget x is chosen in valuenAnd generate chaotic key sequence according to preset order sequence. Now only need to record each target xnWith the position relationship between one-dimensional chaotic key sequence, than record mesh Mark xnAnd the position relationship between the matrix of two dimension is more convenient.The length of chaotic key sequence and encryption two-value square The number of element is identical in battle array, and the dimension of such as encryption two values matrix is M × N, then the length of chaotic key sequence For M × N.
Step S332, chaotic key is Sequence Transformed for one-dimensional two-value key sequence.
Specifically, by each target x in chaotic key sequencenIt is transformed to according to custom algorithm eligible Two-value in the range of value, parallel transformation can be carried out according to conversion number during conversion, raising is converted into one-dimensional two The speed of value key sequence.
Step S333, by one-dimensional two-value key sequence two-dimentional cipher key matrix is converted into.
Specifically, first application one is preserved with the two-dimensional array of encryption two values matrix equal length and width The two-dimensional array of two-dimentional cipher key matrix, such as M × N, the element for then sequentially reading one-dimensional two-value key sequence is protected In being stored to two-dimensional array, whenever M element has been preserved, just line feed continues to preserve, until one-dimension array Element is all preserved into the two-dimensional array of M × N, then this two-dimensional array is two-dimentional cipher key matrix.Due in step Target x in rapid S231nIt is to generate chaotic key sequence according to preset order sequence, so now only needing order Read, it is not necessary to record the position relationship of element between one-dimensional two-value key sequence and two-dimentional cipher key matrix. It is understood that a position conversion array can also be arranged again, do not press when two-dimentional cipher key matrix is generated Order reads the element in one-dimensional two-value key sequence, but the order for converting array according to position reads.
In the present embodiment, one-dimensional sequence is first generated, then one-dimensional sequence is converted into two-dimensional matrix so that record It is more convenient during position relationship between element and matrix, two-dimentional cipher key matrix can be quickly generated.
In one embodiment, step S331 includes:According to formulaWith key meter Calculation is obtained by xnChaotic key sequence [the x of compositionb,xb+1…xb+M×N-1], wherein x0For initial parameters, B≤n≤b+M × N-1,0≤b, M are the length of the two values matrix, and N is the width of the two values matrix.
Specifically, according to initial value Z and initial parameters x0Each x for generatingnChoose in value and generated by computation sequence Continuous N × N number of target xnAnd chaotic key sequence is generated according to computation sequence sequence, due to the length of QR codes Degree and width are typically identical, so the length and width of the two values matrix of QR codes is also identical, for QR codes one As M=N..Due to being to arrange each target x according to computation sequencen, it is not necessary to record each target xnWith it is one-dimensional Chaotic key sequence between position relationship, it is only necessary to record start target xnStart sequence number n, more It is convenient.
Step S332 includes:According to formulaWherein 0 < a < 1, by chaotic key sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1]。
Specifically, by each target xnAccording to its size according to formula0 or 1 is converted into, So as to generate the two-value key sequence [y being made up of 0 and 1b,yb+1…yb+M×N-1], preferential a values are 0.5.
Step S333 includes:According to default transformation rule by one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1] turn Turn to the two-dimentional cipher key matrix of M × N.
Specifically, one-dimensional two-value key sequence [y can be in order successively readb,yb+1…yb+M×N-1] in each element The two-dimentional cipher key matrix of M × N is generated, position conversion array is may also set up, when two-dimentional cipher key matrix is generated not The element in one-dimensional two-value key sequence is read in order, but the order for converting array according to position reads.
In one embodiment, the number of bits of initial value Z is more than the first predetermined threshold value, initial parameters Scale is more than the second predetermined threshold value.
Specifically, the first predetermined threshold value and the second predetermined threshold value can be self-defined as needed, and the first default threshold Value and/or the second predetermined threshold value can be adjusted according to the disposal ability of image in 2 D code and/or terminal.Preferential, the One predetermined threshold value is 5, and the second predetermined threshold value is 5, and the number of bits that can arrange initial value Z is even Number, initial parameters x0Scale be easy to according to formula for even numberCarry out evolution Computing and Computer Storage.As illustrated, for selection Z=1111111111, x0=0.1111111111 is first Value, chaotic key sequence [xb,xb+1…xb+M×N-1] in b=0, byWithThe chaotic key sequence pair QR codes as shown in Figure 6 that formula is produced, wherein QR codes The content of carrying is Test, and pixel is 181 × 181, the ciphering two-dimension as shown in Figure 7 generated after being encrypted Code figure obtains the image in 2 D code after decryption as shown in Figure 10 after being decrypted.Understood in initial value by control Correctly, correct decoding image has been obtained in the case of decipherment algorithm is correct, with original unencrypted Quick Response Code Image is identical.
In addition, by choosing different initial values encryption and decryption performance is analyzed with initial parameters, even if The JND of encryption key and decruption key also results in decryption failure, it was demonstrated that two-value image in 2 D code adds The reliability and security of close method.When encryption initial value is Z=1111111111, x0=0.1111111111; Decryption initial value is Z=1111111112, x0=0.1111111111, when decrypt the such as Figure 11 of the design sketch after Fig. 7. When encryption initial value is Z=1111111111, x0=0.1111111111, decryption initial value is Z=1111111111, x0The such as Figure 12 of the design sketch after Fig. 7 is decrypted when=0.1111111112.And as encryption initial value Z=1111111111, x0=0.1111111111, decryption initial value is Z=1111111110, x0Decrypt after Fig. 7 when=0.1111111112 Design sketch such as Figure 13, it is seen that the minute differences of initial value also result in the image in 2 D code and original image for decrypting It is different.
In addition, the time efficiency of encryption and decryption is counted, using Z and x0The key of 10 is, plus Ciphertext is Test, and the average time that the QR codes of selection different editions are carried out after encryption and decryption is as shown in table 1:
Table 1
As can be seen from Table 1, using Z mapping carry out QR code encryption and decryption time it is essentially identical, encryption and decryption when Between with the incremental and elongated of QR code versions.The encryption and decryption time of maximum version, i.e. Version40 is most long, because There are 177 × 177 black and white color lumps for Version40, generating two values matrix can spend bigger cost.Conventional QR codes version is Version7, although only 45 × 45 black and white color lumps, but can meet information Transmission, the average encryption and decryption time only has about 0.3S, so the practicality of the encipher-decipher method is also very strong.For The time complexity for cracking the enciphering and deciphering algorithm is analyzed, and chooses the QR of minimal version Version1 version Code, removes the pixel for localization function module, is also required to attempt about by the way of Brute Force 2220× 0.028 second, about 3.2 × 1059My god, even and if QR codes employ error correcting code, and decryption difficulty is still very big. And key that 2 initial value length is 10 is cracked to being also required to about 1020× 0.004 second, about 4.3 × 1012It when Between, the security that can be seen that the method by breaking cryptographic keys time complexity is very high.
In one embodiment, as shown in figure 14, there is provided a kind of device of two-value image in 2 D code encryption, Including:
Processing module 410, for obtaining image in 2 D code, according to image in 2 D code two values matrix is generated, and is obtained Key, key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, and initial parameters are 0 and 1 Between.
Two-dimentional cipher key matrix generation module 420, for adopting Z mapping algorithms to generate and two values matrix according to key The two-dimentional cipher key matrix of matching.
Encrypting module 430, is carried out for the element of the element of two values matrix and two-dimentional cipher key matrix to be corresponded XOR encrypted after image in 2 D code.
In one embodiment, as shown in figure 15, two-dimentional cipher key matrix generation module 420 includes:
Chaotic key sequence generating unit 421, for generating chaotic key sequence using Z mapping algorithms according to key Row.
One-dimensional two-value key sequence signal generating unit 422, for chaotic key is Sequence Transformed for one-dimensional two-value key Sequence.
Two-dimentional cipher key matrix signal generating unit 423, for one-dimensional two-value key sequence to be converted into two-dimentional key square Battle array.
In one embodiment, chaotic key sequence generating unit 421 is additionally operable to according to formulaObtain by x with cipher key calculationnChaotic key sequence [the x of compositionb,xb+1…xb+M×N-1], Wherein x0For the initial parameters, b≤n≤b+M × N-1,0≤b, M are the length of the two values matrix, N For the width of the two values matrix.
One-dimensional two-value key sequence signal generating unit 422 is additionally operable to according to formulaWherein 0 < a < 1, by chaotic key sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1]。
Two-dimentional cipher key matrix signal generating unit 423 is additionally operable to the default transformation rule of basis by one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional cipher key matrix of M × N.
In one embodiment, the number of bits of initial value Z is more than the first predetermined threshold value, initial parameters Scale is more than the second predetermined threshold value.
In one embodiment, as shown in figure 16, there is provided a kind of device of two-value image in 2 D code decryption, Including:
Decryption processing module 510, for obtaining the image in 2 D code of encryption, according to the Quick Response Code figure of the encryption As generate encryption two values matrix, obtain encryption image in 2 D code matching key, key include initial value Z and Initial parameters, wherein initial value Z are more than 1, and initial parameters are between zero and one.
The two-dimentional cipher key matrix generation module 520 of decryption, for being generated and encryption using Z mapping algorithms according to key The two-dimentional cipher key matrix of two values matrix matching.
Deciphering module 530, for the element of the element of encryption two values matrix and two-dimentional cipher key matrix to be corresponded Carry out the image in 2 D code after XOR is decrypted.
In one embodiment, as shown in figure 17, decrypting two-dimentional cipher key matrix generation module 520 includes:
Decryption chaotic key sequence generating unit 521, it is close for generating chaos using Z mapping algorithms according to key Key sequence.
One-dimensional two-value key sequence signal generating unit 522 is decrypted, for chaotic key is Sequence Transformed for one-dimensional two-value Key sequence.
The two-dimentional cipher key matrix signal generating unit 523 of decryption, for one-dimensional two-value key sequence to be converted into two-dimentional key Matrix.
In one embodiment, decrypt chaotic key sequence generating unit 521 to be additionally operable to according to formulaObtain by x with cipher key calculationnChaotic key sequence [the x of compositionb,xb+1…xb+M×N-1], Wherein x0For initial parameters, b≤n≤b+M × N-1,0≤b, M is the length of two values matrix, and N is two-value The width of matrix.
Decrypt one-dimensional two-value key sequence signal generating unit 522 to be additionally operable to according to formulaWherein 0 < a < 1, by the chaotic key sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1]。
The two-dimentional cipher key matrix signal generating unit 523 of decryption is additionally operable to the default transformation rule of basis by the one-dimensional two-value Key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional cipher key matrix of M × N.
In one embodiment, the number of bits of initial value Z is more than the first predetermined threshold value, initial parameters Scale is more than the second predetermined threshold value.
One of ordinary skill in the art will appreciate that all or part of flow process in above-described embodiment method is realized, Computer program be can be by instruct the hardware of correlation to complete, described program can be stored in a computer In read/write memory medium, such as in the embodiment of the present invention, the program can be stored in the storage of computer system and be situated between In matter, and by least one of computer system computing device, to realize including such as above-mentioned each method Embodiment flow process.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Each technical characteristic of embodiment described above can be combined arbitrarily, not right to make description succinct The all possible combination of each technical characteristic in above-described embodiment is all described, as long as however, these skills There is no contradiction in the combination of art feature, be all considered to be the scope of this specification record.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more concrete and detailed, But can not therefore be construed as limiting the scope of the patent.It should be pointed out that for this area For those of ordinary skill, without departing from the inventive concept of the premise, some deformations can also be made and changed Enter, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended power Profit requires to be defined.

Claims (16)

1. a kind of method that two-value image in 2 D code is encrypted, methods described includes:
Image in 2 D code is obtained, two values matrix is generated according to the image in 2 D code;
Key is obtained, the key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, starting Parameter is between zero and one;
The two-dimentional cipher key matrix matched with the two values matrix is generated using Z mapping algorithms according to the key;
The element one-to-one corresponding of the element of the two values matrix and two-dimentional cipher key matrix is carried out into XOR to be encrypted Image in 2 D code afterwards.
2. method according to claim 1, it is characterised in that described to be reflected using Z according to the key Penetrating the step of algorithm generates the two-dimentional cipher key matrix matched with the two values matrix includes:
Chaotic key sequence is generated using Z mapping algorithms according to the key;
The chaotic key is Sequence Transformed for one-dimensional two-value key sequence;
The one-dimensional two-value key sequence is converted into the two-dimentional cipher key matrix.
3. method according to claim 2, it is characterised in that described to be reflected using Z according to the key Penetrating the step of algorithm generates chaotic key sequence includes:
According to formulaObtain by x with cipher key calculationnThe chaotic key sequence of composition [xb,xb+1…xb+M×N-1], wherein x0For the initial parameters, b≤n≤b+M × N-1,0≤b, M are described The length of two values matrix, N is the width of the two values matrix;
It is described by the chaotic key it is Sequence Transformed for one-dimensional two-value key sequence the step of include:
According to formula y n = 0 , 0 < x n < a 1 , a &le; x n < 1 , Wherein 0 < a < 1, by the chaotic key sequence [xb,xb+1…xb+M×N-1] It is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1];
It is described to be the step of the one-dimensional two-value key sequence is converted into the two-dimentional cipher key matrix:According to pre- If transformation rule is by the one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional key of M × N Matrix.
4. method according to claim 1, it is characterised in that the number of bits of the initial value Z More than the first predetermined threshold value, the scale of the initial parameters is more than the second predetermined threshold value.
5. a kind of method that two-value image in 2 D code is decrypted, methods described includes:
The image in 2 D code of encryption is obtained, encryption two values matrix is generated according to the image in 2 D code of the encryption;
The key of the image in 2 D code matching of the encryption is obtained, the key includes initial value Z and starting ginseng Number, wherein initial value Z is more than 1, and initial parameters are between zero and one;
The two-dimentional key square matched with the encryption two values matrix is generated using Z mapping algorithms according to the key Battle array;
The element one-to-one corresponding of the element of the encryption two values matrix and two-dimentional cipher key matrix is carried out into XOR to obtain Image in 2 D code after decryption.
6. method according to claim 5, it is characterised in that described to be reflected using Z according to the key Penetrating the step of algorithm generates the two-dimentional cipher key matrix matched with the encryption two values matrix includes:
Chaotic key sequence is generated using Z mapping algorithms according to the key;
The chaotic key is Sequence Transformed for one-dimensional two-value key sequence;
The one-dimensional two-value key sequence is converted into the two-dimentional cipher key matrix.
7. method according to claim 6, it is characterised in that described to be reflected using Z according to the key Penetrating the step of algorithm generates chaotic key sequence includes:
According to formulaObtain by x with cipher key calculationnThe chaotic key sequence of composition [xb,xb+1…xb+M×N-1], wherein x0For the initial parameters, b≤n≤b+M × N-1,0≤b, M are described The length of two values matrix, N is the width of the two values matrix;
It is described by the chaotic key it is Sequence Transformed for one-dimensional two-value key sequence the step of include:
According to formula y n = 0 , 0 < x n < a 1 , a &le; x n < 1 , Wherein 0 < a < 1, by the chaotic key sequence [xb,xb+1…xb+M×N-1] It is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1];
It is described to be the step of the one-dimensional two-value key sequence is converted into the two-dimentional cipher key matrix:According to pre- If transformation rule is by the one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional key of M × N Matrix.
8. method according to claim 5, it is characterised in that the number of bits of the initial value Z More than the first predetermined threshold value, the scale of the initial parameters is more than the second predetermined threshold value.
9. the device that a kind of two-value image in 2 D code is encrypted, it is characterised in that described device includes:
Processing module, for obtaining image in 2 D code, according to the image in 2 D code two values matrix is generated, and is obtained Key is taken, the key includes initial value Z and initial parameters, and wherein initial value Z is more than 1, and initial parameters exist Between 0 and 1;
Two-dimentional cipher key matrix generation module, for being generated and described two using Z mapping algorithms according to the key The two-dimentional cipher key matrix of value matrix matching;
Encrypting module, for by the element of the element of the two values matrix and two-dimentional cipher key matrix correspond into Row XOR encrypted after image in 2 D code.
10. device according to claim 9, it is characterised in that the two-dimentional cipher key matrix generates mould Block includes:
Chaotic key sequence generating unit, for generating chaotic key using Z mapping algorithms according to the key Sequence;
One-dimensional two-value key sequence signal generating unit, for by the chaotic key it is Sequence Transformed for one-dimensional two-value it is close Key sequence;
Two-dimentional cipher key matrix signal generating unit, it is close for the one-dimensional two-value key sequence to be converted into the two dimension Key matrix.
11. devices according to claim 10, it is characterised in that the chaotic key sequence generates single Unit is additionally operable to according to formulaObtain by x with cipher key calculationnThe chaotic key sequence of composition Row [xb,xb+1…xb+M×N-1], wherein x0For the initial parameters, b≤n≤b+M × N-1,0≤b, M are institute The length of two values matrix is stated, N is the width of the two values matrix;
The one-dimensional two-value key sequence signal generating unit is additionally operable to according to formula y n = 0 , 0 < x n < a 1 , a &le; x n < 1 , Wherein 0 < a < 1, by the chaotic key sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1];
The two-dimentional cipher key matrix signal generating unit is additionally operable to the default transformation rule of basis by the one-dimensional two-value key Sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional cipher key matrix of M × N.
12. devices according to claim 9, it is characterised in that the number of bits of the initial value Z More than the first predetermined threshold value, the scale of the initial parameters is more than the second predetermined threshold value.
13. a kind of devices of two-value image in 2 D code decryption, it is characterised in that described device includes:
Decryption processing module, for obtaining the image in 2 D code of encryption, according to the image in 2 D code of the encryption Encryption two values matrix is generated, the key of the image in 2 D code matching of the encryption is obtained, the key is included just Initial value Z and initial parameters, wherein initial value Z are more than 1, and initial parameters are between zero and one;
The two-dimentional cipher key matrix generation module of decryption, for adopting Z mapping algorithms to generate and institute according to the key State the two-dimentional cipher key matrix of encryption two values matrix matching;
Deciphering module, for by a pair of the element 1 of the element of the encryption two values matrix and two-dimentional cipher key matrix The image in 2 D code after XOR is decrypted should be carried out.
14. devices according to claim 13, it is characterised in that the decryption two dimension cipher key matrix life Include into module:
Decryption chaotic key sequence generating unit, for generating chaos using Z mapping algorithms according to the key Key sequence;
One-dimensional two-value key sequence signal generating unit is decrypted, for the chaotic key is Sequence Transformed for one-dimensional two Value key sequence;
The two-dimentional cipher key matrix signal generating unit of decryption, for the one-dimensional two-value key sequence to be converted into described two Dimension cipher key matrix.
15. devices according to claim 14, it is characterised in that the decryption chaotic key sequence life It is additionally operable to according to formula into unitObtain by x with cipher key calculationnThe chaos of composition is close Key sequence [xb,xb+1…xb+M×N-1], wherein x0For the initial parameters, b≤n≤b+M × N-1,0≤b, M are The length of the two values matrix, N is the width of the two values matrix;
The one-dimensional two-value key sequence signal generating unit of the decryption is additionally operable to according to formula y n = 0 , 0 < x n < a 1 , a &le; x n < 1 , Wherein 0 < a < 1, by the chaotic key sequence [xb,xb+1…xb+M×N-1] it is converted into one-dimensional two-value key sequence [yb,yb+1…yb+M×N-1];
The decryption two dimension cipher key matrix signal generating unit is additionally operable to the default transformation rule of basis by the one-dimensional two-value Key sequence [yb,yb+1…yb+M×N-1] it is converted into the two-dimentional cipher key matrix of M × N.
16. devices according to claim 13, it is characterised in that the binary digit of the initial value Z Number is more than the first predetermined threshold value, and the scale of the initial parameters is more than the second predetermined threshold value.
CN201510727690.5A 2015-10-30 2015-10-30 Binary two-dimensional code image encryption and decryption method and device Pending CN106651734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510727690.5A CN106651734A (en) 2015-10-30 2015-10-30 Binary two-dimensional code image encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510727690.5A CN106651734A (en) 2015-10-30 2015-10-30 Binary two-dimensional code image encryption and decryption method and device

Publications (1)

Publication Number Publication Date
CN106651734A true CN106651734A (en) 2017-05-10

Family

ID=58809240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510727690.5A Pending CN106651734A (en) 2015-10-30 2015-10-30 Binary two-dimensional code image encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN106651734A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944527A (en) * 2017-11-06 2018-04-20 中国东方电气集团有限公司 A kind of encryption of anti-fake two-dimension code and coding/decoding method
CN109886008A (en) * 2017-12-06 2019-06-14 英业达科技有限公司 Two-dimensional bar code encryption and decryption method
CN109981917A (en) * 2019-01-25 2019-07-05 佛山市顺德区中山大学研究院 A kind of image in 2 D code optical encryption method and its system, device, storage medium
CN110414243A (en) * 2018-04-26 2019-11-05 杭州海康威视数字技术股份有限公司 A kind of two dimensional code encryption method, device and two dimensional code decryption method, device
CN111598197A (en) * 2020-05-18 2020-08-28 燕山大学 QR code encryption and decryption method and system based on wavelet and magic square transformation
CN112884104A (en) * 2021-03-24 2021-06-01 南通大学 Commodity anti-counterfeiting two-dimensional code generation method based on chaotic encryption
CN113377351A (en) * 2021-07-05 2021-09-10 重庆市规划和自然资源信息中心 Model construction work system for large-scale government affair business
US11263416B2 (en) 2018-02-07 2022-03-01 Beijing Sankuai Online Technology Co., Ltd Two-dimensional code generation and identification
CN114139665A (en) * 2021-10-14 2022-03-04 珠海丹德图像技术有限公司 Anti-counterfeiting embedding method and identification method of negotiable securities, anti-counterfeiting device and negotiable securities
CN116776301A (en) * 2023-08-18 2023-09-19 北京点聚信息技术有限公司 Quick traceability management method for electronic seal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177281A (en) * 2013-04-12 2013-06-26 江苏圆坤二维码研究院有限公司 Two-dimensional code compiling method
CN103310407A (en) * 2013-06-25 2013-09-18 兰州交通大学 Vector geographic space data totally blind watermarking method based on QR code
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177281A (en) * 2013-04-12 2013-06-26 江苏圆坤二维码研究院有限公司 Two-dimensional code compiling method
CN103310407A (en) * 2013-06-25 2013-09-18 兰州交通大学 Vector geographic space data totally blind watermarking method based on QR code
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
YU XIAOYANG 等: "Research and achievement of QR code encryption based on cellular automata", 《PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL》 *
周庆 等: "基于Ising模型的QR码加密算法", 《计算机应用》 *
张定会 等: "QR码二值图像混沌加密与解密", 《移动通信》 *
茅耀斌: "基于混沌的图像加密与数字水印技术研究", 《万方数据库-学位论文库》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944527A (en) * 2017-11-06 2018-04-20 中国东方电气集团有限公司 A kind of encryption of anti-fake two-dimension code and coding/decoding method
CN109886008A (en) * 2017-12-06 2019-06-14 英业达科技有限公司 Two-dimensional bar code encryption and decryption method
US11263416B2 (en) 2018-02-07 2022-03-01 Beijing Sankuai Online Technology Co., Ltd Two-dimensional code generation and identification
CN110414243A (en) * 2018-04-26 2019-11-05 杭州海康威视数字技术股份有限公司 A kind of two dimensional code encryption method, device and two dimensional code decryption method, device
CN110414243B (en) * 2018-04-26 2020-12-25 杭州海康威视数字技术股份有限公司 Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN109981917B (en) * 2019-01-25 2021-04-06 佛山市顺德区中山大学研究院 Two-dimensional code image optical encryption method and system, device and storage medium thereof
CN109981917A (en) * 2019-01-25 2019-07-05 佛山市顺德区中山大学研究院 A kind of image in 2 D code optical encryption method and its system, device, storage medium
CN111598197A (en) * 2020-05-18 2020-08-28 燕山大学 QR code encryption and decryption method and system based on wavelet and magic square transformation
CN112884104A (en) * 2021-03-24 2021-06-01 南通大学 Commodity anti-counterfeiting two-dimensional code generation method based on chaotic encryption
CN112884104B (en) * 2021-03-24 2022-07-05 南通大学 Commodity anti-counterfeiting two-dimensional code generation method based on chaotic encryption
CN113377351A (en) * 2021-07-05 2021-09-10 重庆市规划和自然资源信息中心 Model construction work system for large-scale government affair business
CN114139665A (en) * 2021-10-14 2022-03-04 珠海丹德图像技术有限公司 Anti-counterfeiting embedding method and identification method of negotiable securities, anti-counterfeiting device and negotiable securities
CN116776301A (en) * 2023-08-18 2023-09-19 北京点聚信息技术有限公司 Quick traceability management method for electronic seal
CN116776301B (en) * 2023-08-18 2023-10-20 北京点聚信息技术有限公司 Quick traceability management method for electronic seal

Similar Documents

Publication Publication Date Title
CN106651734A (en) Binary two-dimensional code image encryption and decryption method and device
Fu et al. A new chaos‐based color image encryption scheme with an efficient substitution keystream generation strategy
Kang et al. Color image encryption using pixel scrambling operator and reality-preserving MPFRHT
US10650373B2 (en) Method and apparatus for validating a transaction between a plurality of machines
US8180048B2 (en) Method and system for computational transformation
US8533493B1 (en) Method of securing transmission data
CN107425971A (en) Terminal and its data method for encryption/decryption and device without certificate
US20020159588A1 (en) Cryptography with unconditional security for the internet, commercial intranets, and data storage
Zheng et al. An image encryption algorithm based on multichaotic system and DNA coding
Abdul Hussien et al. [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
Mohan et al. Secure visual cryptography scheme with meaningful shares
CN114443718A (en) Data query method and system
Slimane et al. Hash key-based image cryptosystem using chaotic maps and cellular automata
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
Mehta et al. DieRoll: A unique key generation and encryption technique
Ramírez-Torres et al. Fpga implementation of a reconfigurable image encryption system
US11276138B2 (en) Image data encryption and rendering system
Abanda et al. Image encryption with fusion of two maps
CN114257402B (en) Encryption algorithm determining method, device, computer equipment and storage medium
Li et al. A novel image protection cryptosystem with only permutation stage: multi-shuffling process
CN107241185A (en) Data transmitting and receiving method and transmission and reception device
Ahuja et al. Dual layer secured password manager using Blowfish and LSB
JP2003304237A (en) Method for creating common key, encryption method using the common key, method for managing common key, method for authentifying solid by solid number of terminal, program for executing these methods, and application software including the program
Rajput et al. An improved cryptographic technique to encrypt images using extended hill cipher
Hamsanandhini et al. Securing Data in the Image Using SHA & ECC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication