CN106817216A - A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm - Google Patents
A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm Download PDFInfo
- Publication number
- CN106817216A CN106817216A CN201611071964.0A CN201611071964A CN106817216A CN 106817216 A CN106817216 A CN 106817216A CN 201611071964 A CN201611071964 A CN 201611071964A CN 106817216 A CN106817216 A CN 106817216A
- Authority
- CN
- China
- Prior art keywords
- zip
- row
- zlib
- aes
- byte
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
Abstract
The present invention relates to a kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm.The method includes:1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is encrypted using aes algorithm;2) for the ZIP bag datas being encrypted using aes algorithm, aes algorithm is added on the basis of Zlib storehouses ZIP bags are decrypted and decompressed.Further, step 2) aes algorithm is encapsulated in libaes.a static state library files, Zlib storehouses are encapsulated in libz.so dynamic library files.In the present invention, to increasing income, compression Zlib projects are improved and optimize, and add AES decipherment algorithms so that YCL accurately and can be processed quickly for the data that website operator reports, and have the advantages that higher than 7 zip efficiency of algorithm, to occupy CPU few.
Description
Technical field
It is that a kind of being increased income based on Zlib is compressed and decompression project the present invention relates to computer information safety technique field,
It is optimized, AES decipherment algorithms are added.ZIP bags to AES encryption are come by the dynamic link library of application call Zlib
It is decrypted the method for decompression.
Background technology
The development of science and technology makes computer be deep into the every aspect of our lives, and compresses as a kind of very typical skill
Art, is applied to all kinds of occasions such as many occasions, such as file system, database, message transmission.Compression can be divided into Lossless Compression
And lossy compression method;Damage, refer to intactly reducing raw information after being compressed, but compression ratio is high;Lossless Compression is then
For the occasion of the necessary full backup information such as file, the ZIP file being mentioned herein is exactly a kind of Lossless Compression.
In actual applications, it is often necessary to realize that the Internet data of each website is read out and analyzed, extract sense
The information of interest.But the Internet data file content of each website is very huge, it is necessary to be compressed to data;In order to prevent letter
Data have also been carried out encryption by breath leakage.
AES (The Advanced Encrypion Standard) is that American National Standard is used with technical research to be added
The specification of cipher telegram subdata.It is widely applied to the fields such as finance, telecommunications and government's digital information.AES is an iteration,
Symmetric key packet password, it can use 128,192,256 keys, and with 128 (16 byte) block encryptions with
Ciphertext data.
Zlib be one it is free, general, do not hindered by any law, lossless data compression development library, but also be
Cross-platform open source projects.Can change this means anyone, be employed without paying any expense, this is also to each
When the Internet data of website is read out and analyzes, the main cause developed usually using Zlib storehouses, and ZIP forms category
One of compressed format in several main flows.
When the Internet data of each website is read out and is analyzed using Zlib storehouses, generally carried using Linux
Zlib built-in functions are compressed and decompress to data, and the data that number of site is reported are compressed into ZIP using 7-zip software cryptographies
Bag, and 7-zip softwares are encrypted using aes algorithm to data.But Zlib only supports simple AES, does not support
AES encryption decipherment algorithm;So the problem brought therewith is Zlib storehouses being unable to the use AES encryption that normal process website reports
Data.
The content of the invention
Increased income storehouse based on Zlib it is an object of the invention to provide one kind, with reference to AES decipherment algorithms, can be automatically and accurately right
The file of 7-zip software cryptographies compression is decrypted decompression, static by only adding libz.so dynamic link libraries and libaes.a
Chained library can process the ZIP bags that website reports encryption.
The technical solution adopted by the present invention is as follows:
A kind of method for decompressing ZIP bags based on Zlib storehouses and aes algorithm, comprises the following steps:
1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is added using aes algorithm
It is close;
2) for the ZIP bag datas being encrypted using aes algorithm, addition aes algorithm comes to ZIP on the basis of Zlib storehouses
Bag is decrypted and decompresses.
Further, step 2) aes algorithm is encapsulated in static library file, Zlib storehouses are encapsulated in libz.so dynamics
In library file.
Further, the AES encryption decipherment algorithm includes:
A.AES ciphering process:SubBytes (byte replacement), ShiftRows (row displacement), (row are mixed for MixColumns
Confuse),
AddRoundKey (InvAddRoundKey);
B.AES decrypting processes:InvSubBytes (inverse byte is substituted), InvShiftRows (Retrograde transposition),
InvMixColumns
(inverse row are obscured) AddRoundKey (InvAddRoundKey).
Advantages and positive effects of the present invention are as follows:
In due to the present invention, compression Zlib projects of increasing income are improved and optimized, add AES decipherment algorithms;This is exactly
The AES of 7-zip, can accurately and quickly be processed hence for the data that website operator reports.In addition, Zlib is decompressed
Algorithm is by the way of libz.so dynamic bases, and aes algorithm is processing the number that website reports using static library mode is packaged into
According to when can install automatically, it is not necessary to the Zlib storehouses of upgrade-system, asked in addition this avoid too low the bringing of operating system version
Topic;The Zlib decompression algorithms that the last present invention is used have the advantages that higher than 7-zip efficiency of algorithm, to occupy CPU few.
Brief description of the drawings
Fig. 1 is the flow chart for processing website reported data;
Fig. 2 is to call Zlib to decompress ZIP file flow chart;
Fig. 3 is AES encryption decryption flow chart;
Fig. 4 is SubBytes (byte replacement) matrix schematic diagram;
Fig. 5 is ShiftRows (row displacement) schematic diagram;
Fig. 6 is 7zip and Zlib decompression time comparison diagrams.
Specific embodiment
Below by specific embodiments and the drawings, the present invention will be further described.
Fig. 1 is to illustrate the whole flow process for processing website reported data in the prior art.As shown in the drawing, first from scene
Carrying program receive ZIP bag datas, scan corresponding catalogue, then decompress ZIP APMB packages, then to scan decompression ZIP bags literary
Bcp files are finally entered row format conversion by bcp files and entity file after part, that is, obtain invalid data and to effective number
According to being verified, then from these effective specific information of extracting data;Entity file enters full-text database.Inventing herein is
On the basis of original Zlib storehouses, the method for adding aes algorithm to decompress ZIP bags, positioned at the 3rd link of Fig. 1.
One, decompression modules are designed
Although the compression ratio of 7zip is very high, and supports AES encryption and decryption, cpu is very high for 7zip occupancy, and this can very great Cheng
Its real-time when website reported data is processed is influenceed on degree, so decompressing ZIP file using Zlib storehouses in this method.
Zlib storehouses belong to storehouse of increasing income, and using DEFLATE compression algorithms, only support simple encryption decryption function;But do not support
AES enciphering and deciphering algorithms, so wanting to decompress the ZIP bags of aes algorithm encryption, must just change the storehouse Zlib code additions AES that increases income
Enciphering and deciphering algorithm.In order to not influence the interface for calling before, aes algorithm is encapsulated in libaes.a static state library files
(libaes.a is the static library name of the present invention oneself definition);Zlib storehouses are encapsulated in libz.so dynamic library files.Do so
Benefit be no matter how to change code, only need to update the two library files and need not change other programs.
Modification unzip.c files, increase
Modification unzOpenCurrentFilePassword functions, this function major function obtains ZIP file information;Judge
If then ZIP bags use AES encryption to HEADID 0x9901;Read version number;Two bytes are read to determine whether ' A ' and ' E ';Read
ZIP packet encryption patterns are taken, here should be AES;Read ZIP packet compression patterns.
Modification unzReadCurrentFile functions, this function major function reads the file content in ZIP bags, judges it
The ZIP encryption modes of preceding reading;If AES then calls libaes.a static libraries to be decrypted, it is decrypted with known key
Obtain in plain text.
Decompression flow:As shown in Fig. 2 including:ZIP streams are opened, the information of ZIP file is obtained, the text when prelocalization is opened
File (if AES encryption then carries out AES decryption to reading data) is read in part, circulation, closes current file, closes ZIP streams.Tool
Body step is as follows:
1. ZIP bags are opened in the way of file stream;
2. first file in compressed file is navigated to;
3. the related fileinfos of ZIP are obtained, if catalogue then continues recurrence, if file then establishment file;
4. open and currently navigate to file, obtain ZIP information, judge whether it is AES encryption, if then initialization AES letters
The structure is referred to as aes_cox by breath structure, the present invention;
5. file is read from current ZIP bags, circulation is read, and judges whether it is AES encryption, if content is decrypted reading
Go out, and the content that will be read is written in the file for creating before;
6. document time stamp is set;
7. the current file for reading, the internal memory of the AES message structures of dynamically distributes before release are closed;
8., if also there is alternative document in ZIP bags, next file is navigated to;
9. the stream opened is closed.
Two .AES algorithms for encryption and decryption are constituted
As shown in figure 3, the core of AES encryption algorithm includes:(row is moved for SubBytes (byte replacement), ShiftRows
Position), MixColumns (row are obscured), AddRoundKey (InvAddRoundKey).AES decipherment algorithms are the inverse process of encryption, so removing
AddRoundKey (InvAddRoundKey) is constant outer, and remaining is required for carrying out inverse transformation, InvSubBytes (inverse byte is substituted),
InvShiftRows (Retrograde transposition), InvMixColumns (inverse row are obscured).
1. byte replaces
The major function that byte replaces is to complete a byte to the mapping of another byte by S boxes.It is one
Nonlinear transformation on byte, each byte in state is non-linearly transformed to another byte by it, instead of table S boxes
It is reversible;As shown in Figure 4.
Byte replaces being divided into:Forward byte replaces and reverse byte replaces.
2. row displacement
The function of row displacement is to realize the displacement between a 4*4 internal matrix byte.
Row displacement is divided into:Positive row displacement and the displacement of reverse row.
The operation of positive row displacement is:The first row continues to have, the second byte of row ring shift left 1, the third line circulation
Move to left 2 bytes, 3 bytes of fourth line ring shift left, as shown in Figure 5.
Reverse row displacement is opposite operation.
3. row are obscured
Row are obscured:It is to enter line translation by column to a state, i.e., mixes four bytes of each column using linear transformation.
Arrange to obscure and be divided into:Positive nematic obscures and inversely row are obscured.
4. InvAddRoundKey
During InvAddRoundKey, using simple step-by-step xor operation, key is expanded by key schedule process
Open up and obtain round key, then plaintext and corresponding sub-key XOR, i.e., the input often taken turns is with round key XOR once;Cause
This, the key of the wheel can recover input on XOR again during decryption.
5. key schedule
Key schedule includes two parts:Cipher key spreading and round key are chosen.The effect of cipher key spreading is in data encryption/solution
The round key used in round transformation is obtained before close.
In sum, can also learn that AES encryption and decryption are all a mistakes for iteration from AES encryption decryption flow chart
Journey;Data are carried out in an iterative process repeat displacement, until obtaining last plaintext or cipher text.
The API of three, Callings
API1:Decompressing files
void unzip_extract(char*pZipFile,char*pExtractDir)
|input paramete:
1) decompressing files title, 2) decompression directory name;
Return value:Nothing.
API2:Open file stream
void*unzOpen(char*pZipFile)
|input paramete:
1) decompressing files title;
Return value:
1) it is converted into the file flow index of void* forms.
API3:Navigate to first file
int unzGoToFirstFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API4:Open current file
int unzOpenCurrentFilePassword(void*uf,char*pwd)
|input paramete:
1) file flow index, 2) key (key during ciphered compressed ZIP of website),
Return value:
1) 0 success, 2) -1 failure.
API5:Read current file content
int unzReadCurrentFile(void*uf,char*buf,size_t size)
|input paramete:
1) file flow index, 2) reading of content, 3) content size;
Return value:
1) 0 success, 2) -1 failure.
API6:Close current file
int unzCloseCurrentFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API7:Navigate to next file
int unzGoToNextFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API8:Close file stream
int unzClose(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API9:Reverse row are obscured
Void contrary_mixColumns (unsigned char*col) |input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after treatment are obscured.
API10:Reverse byte is replaced
void contrary_subBytes(unsigned char*col)
|input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after reverse byte replacement treatment.
API11:Reverse row displacement
void contrary_shiftRows(unsigned char*col)
|input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after reverse row shifting processing.
API12:InvAddRoundKey
void add_roundKey(unsigned char*col,unsigned char*key,int round)
|input paramete:
1) processing data (content of file in ZIP bags), 2) key (key during ciphered compressed ZIP of website), 3) poll
Number of times;
Return value:
1) data after InvAddRoundKey treatment.
The present invention carries out decompression test, the chronomere that test is obtained to website reported data using 7zip and Zlib respectively
It is microsecond, as shown in Table 1 below;And contrast is analyzed to decompression result, as shown in fig. 6, the abscissa of the figure represents different
File, ordinate represents the time used by decompression.
The test result list of table 1.
Filename/decompressing method | 7z ip(us) | Zl ib(us) |
data_1471449694.zip | 617700 | 2922 |
data_1471453015.zip | 256364 | 3209 |
data_1471453608.zip | 183181 | 5564 |
data_1471451806.zip | 193180 | 6083 |
data_1471450007.zip | 169391 | 18622 |
data_1471450907.zip | 250134 | 15472 |
data_1471452105.zip | 180231 | 36974 |
data_1471451507.zip | 184553 | 15633 |
data_1471450307.zip | 206964 | 7315 |
From Fig. 6 it could be assumed that, using the method for the present invention, decompressed using Zlib storehouses, its on time stage much
Decompressed better than using 7zip storehouses.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this area
Personnel can modify or equivalent to technical scheme, without departing from the spirit and scope of the present invention, this
The protection domain of invention should be to be defined described in claims.
Claims (8)
1. a kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm, it is characterised in that comprise the following steps:
1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is encrypted using aes algorithm;
2) for the ZIP bag datas being encrypted using aes algorithm, aes algorithm is added on the basis of Zlib storehouses to enter ZIP bags
Row decryption and decompression.
2. the method for claim 1, it is characterised in that step 2) aes algorithm is encapsulated in static library file, will
Zlib storehouses are encapsulated in libz.so dynamic library files.
3. method as claimed in claim 1 or 2, it is characterised in that the aes algorithm includes:
A) AES encryption process, it includes:Byte is substituted, row is shifted, row are obscured, InvAddRoundKey;
B) AES decrypting processes, it includes:Inverse byte replacement, Retrograde transposition, inverse row are obscured, InvAddRoundKey.
4. method as claimed in claim 3, it is characterised in that the byte is substituted and completes a byte in addition by S boxes
One mapping of byte, the mapping is a nonlinear transformation on byte.
5. method as claimed in claim 3, it is characterised in that the row displacement is realized between a 4*4 internal matrix byte
Displacement, including positive row displacement and reverse row displacement;The operation of positive row displacement is:The first row continues to have, the second row
1 byte of ring shift left, 2 bytes of the third line ring shift left, 3 bytes of fourth line ring shift left.
6. method as claimed in claim 3, it is characterised in that the row are obscured and enter line translation by column to a state, even if
Mix four bytes of each column with linear transformation.
7. method as claimed in claim 3, it is characterised in that the InvAddRoundKey uses step-by-step xor operation, by key
Scheduling process is extended to key and obtains round key, then carries out XOR with corresponding sub-key in plain text, i.e., that often takes turns is defeated
Enter with round key XOR once, in decryption, the key of the wheel can recover input on XOR again.
8. the method for claim 1, it is characterised in that in step 2) after decompression ZIP APMB packages, scan the bcp for obtaining
File and entity file;Bcp files are entered into row format conversion, invalid data is obtained and effective data is verified, then from
The specific information of effective extracting data;Entity file is entered into full-text database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071964.0A CN106817216B (en) | 2016-11-29 | 2016-11-29 | ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071964.0A CN106817216B (en) | 2016-11-29 | 2016-11-29 | ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106817216A true CN106817216A (en) | 2017-06-09 |
CN106817216B CN106817216B (en) | 2022-02-22 |
Family
ID=59106178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611071964.0A Active CN106817216B (en) | 2016-11-29 | 2016-11-29 | ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106817216B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109861398A (en) * | 2019-04-04 | 2019-06-07 | 南京电研电力自动化股份有限公司 | A kind of the electrical power services device and its network system realization of digital transformer substation |
CN109904931A (en) * | 2019-04-04 | 2019-06-18 | 南京电研电力自动化股份有限公司 | The process layer configuration method of intelligent substation electrical power services device and its system |
CN116668007A (en) * | 2023-08-01 | 2023-08-29 | 中电信量子科技有限公司 | Encryption communication method, terminal and system based on white-box SM4 algorithm |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101937356A (en) * | 2010-09-15 | 2011-01-05 | 青岛海信移动通信技术股份有限公司 | Method for compiling WebKit browser and device thereof |
US20110029679A1 (en) * | 2009-07-31 | 2011-02-03 | Canon Kabushiki Kaisha | Communication apparatus, communication method and program |
CN102226906A (en) * | 2011-06-03 | 2011-10-26 | 王秋池 | Information hiding system specified to htm/html |
US20160292446A1 (en) * | 2015-04-06 | 2016-10-06 | Lawlitt Life Solutions, LLC | Data encryption and compression |
CN106055366A (en) * | 2016-06-03 | 2016-10-26 | 用友网络科技股份有限公司 | Extension method for custom control based on Eclipse |
CN106055278A (en) * | 2016-06-03 | 2016-10-26 | 无锡华云数据技术服务有限公司 | Light-weight realization method based on qcow2 format incremental snapshot |
-
2016
- 2016-11-29 CN CN201611071964.0A patent/CN106817216B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110029679A1 (en) * | 2009-07-31 | 2011-02-03 | Canon Kabushiki Kaisha | Communication apparatus, communication method and program |
CN101937356A (en) * | 2010-09-15 | 2011-01-05 | 青岛海信移动通信技术股份有限公司 | Method for compiling WebKit browser and device thereof |
CN102226906A (en) * | 2011-06-03 | 2011-10-26 | 王秋池 | Information hiding system specified to htm/html |
US20160292446A1 (en) * | 2015-04-06 | 2016-10-06 | Lawlitt Life Solutions, LLC | Data encryption and compression |
CN106055366A (en) * | 2016-06-03 | 2016-10-26 | 用友网络科技股份有限公司 | Extension method for custom control based on Eclipse |
CN106055278A (en) * | 2016-06-03 | 2016-10-26 | 无锡华云数据技术服务有限公司 | Light-weight realization method based on qcow2 format incremental snapshot |
Non-Patent Citations (1)
Title |
---|
万园春等: "微信交互协议和加密模式研究", 《微型电脑应用》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109861398A (en) * | 2019-04-04 | 2019-06-07 | 南京电研电力自动化股份有限公司 | A kind of the electrical power services device and its network system realization of digital transformer substation |
CN109904931A (en) * | 2019-04-04 | 2019-06-18 | 南京电研电力自动化股份有限公司 | The process layer configuration method of intelligent substation electrical power services device and its system |
CN116668007A (en) * | 2023-08-01 | 2023-08-29 | 中电信量子科技有限公司 | Encryption communication method, terminal and system based on white-box SM4 algorithm |
CN116668007B (en) * | 2023-08-01 | 2023-10-31 | 中电信量子科技有限公司 | Encryption communication method, terminal and system based on white-box SM4 algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN106817216B (en) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maram et al. | Intelligent security algorithm for UNICODE data privacy and security in IOT | |
US8874932B2 (en) | Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects | |
CN111079162B (en) | Data encryption method, data decryption method and data encryption system based on block chain | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
US20160050069A1 (en) | Method and system for media path security | |
GNDU RC | Dual layer security of data using LSB image steganography method and AES encryption algorithm | |
CN101996298A (en) | Encrypting method and decrypting method corresponding to same | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
KR20170036100A (en) | Encoder, decoder and methods | |
CN106100841A (en) | A kind of data encryption system based on molecule encryption technology and method | |
Dolmatov | GOST R 34.12-2015: Block Cipher" Kuznyechik" | |
Oh et al. | A selective encryption algorithm based on AES for medical information | |
CN106817216A (en) | A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm | |
Fauziah et al. | Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application | |
Wen et al. | Research on base64 encoding algorithm and PHP implementation | |
KR101445339B1 (en) | Integrated cryptographic apparatus for providing confidentiality and integrity | |
Mabruri | Data security system of text messaging based on android mobile devices using advanced encrytion standard dynamic s-box | |
Zhang | Cryptanalyzing an image cryptosystem based on circular inter-intra pixels bit-level permutation | |
Balajee | UNICODE and Colors Integration tool for Encryption and Decryption | |
Manikandasaran et al. | MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage | |
Amma NG et al. | A novel scrambled data hiding approach towards securing sensitive data | |
CN111130755A (en) | Matrix double encryption method based on signature | |
Kolapwar | An improved geo-encryption algorithm in location based services | |
CN108270544A (en) | A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms | |
Upadhyay et al. | Image encryption by using block-based symmetric transformation algorithm (international data encryption algorithm) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |