CN107222488A - A kind of image ciphering storage method - Google Patents
A kind of image ciphering storage method Download PDFInfo
- Publication number
- CN107222488A CN107222488A CN201710459482.0A CN201710459482A CN107222488A CN 107222488 A CN107222488 A CN 107222488A CN 201710459482 A CN201710459482 A CN 201710459482A CN 107222488 A CN107222488 A CN 107222488A
- Authority
- CN
- China
- Prior art keywords
- file
- stream
- array
- picture
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of image ciphering storage method, uploaded onto the server including step picture file stream, picture file stream is read in into internal memory and file fluxion group is saved as, file fluxion set of segmentation, file fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second, generate ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream, ciphertext is stored to the first file, the second array data is stored to the second file, decryption step, the requirement that picture is stored in server for encrypting can effectively be solved, the security of picture storage can effectively be ensured, only encrypt the partial data of picture file, occupancy and time loss to server resource in image ciphering storing process can effectively be reduced, the response time of client server during decryption obtains picture can effectively be reduced.
Description
Technical field
The present invention relates to processing data information technical field, and in particular to a kind of image ciphering storage method.
Background technology
With society and the process of IT application in enterprises, people become more dependent on the convenience of Netowrk tape and quick.It is personal and big
Some Enterprises establish computer network, and office system is gradually popularized, increasing commercial field Development by Depending on Network and develop, net
Network turns into the part that people live, the operating of social and enterprise is indispensable, while also bringing new ask to information security
Topic.One picture file is divided into multiple files for fragmented storage and stored by a kind of conventional image ciphering storage method, this
The shortcoming of kind of method is:When multiple files are all revealed, by simply combining with regard to original picture file, this side can be obtained
The security of method is very poor;Conventional another image ciphering storage method is whole picture file is encrypted, this method
Shortcoming be:When picture file is very big, many resources of server can be expended by encrypting whole picture file, and the used time is very long.
The content of the invention
It is an object of the invention to overcome the problem above that prior art is present there is provided a kind of image ciphering storage method,
The requirement that picture is stored in server for encrypting can be effectively solved, can effectively ensure the security of picture storage, can be with
The effective resource occupation and time loss reduced in image ciphering storing process to server, can effectively reduce client
The response time of server during decryption obtains picture.
To realize above-mentioned technical purpose and the technique effect, the present invention is achieved through the following technical solutions:
A kind of image ciphering storage method, comprises the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;
S4, storage file, storage ciphertext to the first file store the second array data to the second file.
Further, in addition to decryption step, the decryption step includes:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the
The data of two files read in file the second array of stream;
J3, generation in plain text, the first array data of file stream generation are decrypted in plain text with algorithm;
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array of file stream the 3rd
Data, the array data of convert file stream the 3rd is picture.
Further, the algorithm is aes algorithm.
Further, the step of use algorithm for encryption file the first array data of stream in step S3 includes:
Expanded keys are generated, with cipher key spreading Program Generating expanded keys;
Encryption data, the first array data is encrypted with AES encryption algorithm and expanded keys.
Further, the expanded keys length is 128 bits.
Further, including the step of decrypting file the first array data of stream with algorithm in step J3:
Obtain expanded keys;
Ciphertext data, the first array data is decrypted with AES decipherment algorithms and expanded keys.
Further, the file fluxion set of segmentation is to determine the array of file stream first and file stream the using random function
The length of two arrays.
The beneficial effects of the invention are as follows:The present invention provides a kind of image ciphering storage method, including step picture file stream
Upload onto the server, file fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by file fluxion set of segmentation,
Ciphertext is generated, ciphertext is generated with the first array data of algorithm for encryption file stream, storage ciphertext to the first file stores the second array
Data to the second file, decryption step can effectively solve the requirement that picture is stored in server for encrypting, can effectively protect
The security of picture storage is demonstrate,proved, the partial data of picture file is only encrypted, can effectively reduce in image ciphering storing process
To the occupancy and time loss of server resource, client server during decryption obtains picture can be effectively reduced
Response time.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate accompanying drawing describe in detail as after.
The embodiment of the present invention is shown in detail by following examples and its accompanying drawing.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this hair
Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of image ciphering storage method of the present invention;
Fig. 2 is a kind of decryption step flow chart of image ciphering storage method of the present invention;
Fig. 3 is a kind of AES encryption algorithm flow chart of image ciphering storage method of the present invention;
Fig. 4 is a kind of AES decipherment algorithm flow charts of image ciphering storage method of the present invention.
Embodiment
Below with reference to the accompanying drawings and in conjunction with the embodiments, the present invention is described in detail.
Shown in reference picture 1-4, a kind of image ciphering storage method, as shown in figure 1, comprising the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;It is preferred that
Ground, in one embodiment, picture file stream is uploaded onto the server, and picture file stream is read in into internal memory and file stream word is saved as
Joint number group.
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;It is excellent
File stream byte arrays in one embodiment, are split as the first array of file stream byte and file stream byte second are counted by selection of land
Group, the length of the first array of file stream byte and file stream the second array of byte is determined using random function random.
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;Preferably;In one embodiment,
With aes algorithm encryption file stream byte the first array data generation ciphertext.
In one embodiment, as shown in figure 3, in step S3 with algorithm for encryption file the first array data of stream the step of wrap
Include:File the first array data of stream is read, key is read, due to the limited length of key, a key is used in aes algorithm
Cipher key spreading into longer Bit String, that is, is generated expanded keys by extender, and expanded keys are used for generating being encrypted with aes algorithm
During the encryption key respectively taken turns, it is preferable that expanded keys length is 128 bits, utilizes the round transformation and most of AES encryption algorithm
File is encrypted round transformation afterwards, generates ciphertext.
S4, storage file, storage ciphertext to the first file store the second array data to the second file;In an embodiment
In, the ciphertext after being encrypted with AES encryption algorithm to the array data of file stream first is stored to the first file, the file stream of unencryption
Second array data is stored to the second file;
Preferably, in addition to decryption step, as shown in Fig. 2 decryption step includes:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;Preferably, exist
In one embodiment, from server acquisition the first file of AES encryption algorithm and the second file of unencryption;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the
The data of two files read in file the second array of stream;
J3, generation in plain text, decrypt the first array data of file stream generation in plain text, preferably with algorithm;In one embodiment,
With aes algorithm the first array data of decryption file stream generation in plain text;
In one embodiment, as shown in figure 4, being wrapped the step of decrypting file the first array data of stream with algorithm in step J3
Include:File the first array data of stream is read, expanded keys are obtained, generates what is respectively taken turns in aes algorithm decrypting process with expanded keys
Decruption key, it is preferable that expanded keys length is 128 bits, using the round transformation and last round transformation of AES decipherment algorithms to text
Part is decrypted, and generation is in plain text.
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array of file stream the 3rd
Data, the array data of convert file stream the 3rd is picture;In one embodiment, merge with AES decipherment algorithms to file stream first
Plaintext and the array data of file stream second do not decrypted after array data decryption obtain the array data of file stream the 3rd, and conversion is literary
The array data of part stream the 3rd is picture.
The present invention provides a kind of image ciphering storage method, including step picture file stream uploads onto the server, file stream
Array is segmented, and generates ciphertext, and storage ciphertext stores the second array data to the second file to the first file, decryption step, can be with
It is effective to solve the requirement that picture is stored in server for encrypting, it can effectively ensure the security of picture storage, only encryption figure
The partial data of piece file, can effectively reduce in image ciphering storing process and the occupancy of server resource and time are disappeared
Consumption, can effectively reduce the response time of client server during decryption obtains picture.
More than, only presently preferred embodiments of the present invention not makees any formal limitation to the present invention;All one's own professions
The those of ordinary skill of industry can swimmingly implement the present invention shown in by specification accompanying drawing and above;But, it is all that to be familiar with sheet special
Without departing from the scope of the present invention, that is made using disclosed above technology contents is a little by the technical staff of industry
The equivalent variations of variation, modification and evolution, are the equivalent embodiment of the present invention;Meanwhile, all substantial technologicals according to the present invention
Variation, modification and evolution of any equivalent variations made to above example etc., still fall within technical scheme
Within protection domain.
Claims (7)
1. a kind of image ciphering storage method, it is characterised in that comprise the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;
S4, storage file, storage ciphertext to the first file store the second array data to the second file.
2. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:Also include decryption step, the decryption step
Suddenly include:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the second text
The data of part read in file the second array of stream;
J3, generation in plain text, the first array data of file stream generation are decrypted in plain text with algorithm;
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array data of file stream the 3rd,
The array data of convert file stream the 3rd is picture.
3. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:The algorithm is aes algorithm.
4. a kind of image ciphering storage method as claimed in claim 3, it is characterised in that:Use algorithm for encryption file stream in step S3
The step of first array data, includes:
Expanded keys are generated, with cipher key spreading Program Generating expanded keys;
Encryption data, the first array data is encrypted with AES encryption algorithm and expanded keys.
5. a kind of image ciphering storage method as claimed in claim 4, it is characterised in that:The expanded keys length is 128 bits.
6. a kind of image ciphering storage method as claimed in claim 3, it is characterised in that:In step J3 file stream is decrypted with algorithm
The step of first array data, includes:
Obtain expanded keys;
Ciphertext data, the first array data is decrypted with AES decipherment algorithms and expanded keys.
7. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:The file fluxion set of segmentation be using with
Machine function determines the length of the array of file stream first and the array of file stream second.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710459482.0A CN107222488A (en) | 2017-06-16 | 2017-06-16 | A kind of image ciphering storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710459482.0A CN107222488A (en) | 2017-06-16 | 2017-06-16 | A kind of image ciphering storage method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107222488A true CN107222488A (en) | 2017-09-29 |
Family
ID=59949723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710459482.0A Pending CN107222488A (en) | 2017-06-16 | 2017-06-16 | A kind of image ciphering storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107222488A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112487449A (en) * | 2020-11-30 | 2021-03-12 | 珠海格力电器股份有限公司 | Drawing display method and device, storage medium and electronic device |
CN113129395A (en) * | 2021-05-08 | 2021-07-16 | 深圳市数存科技有限公司 | Data compression encryption system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104009835A (en) * | 2014-05-16 | 2014-08-27 | 南京邮电大学 | File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN105893857A (en) * | 2016-03-31 | 2016-08-24 | 北京金山安全软件有限公司 | File encryption method, device and equipment |
CN106685980A (en) * | 2017-01-13 | 2017-05-17 | 桂林电子科技大学 | Cryptographic method of large files |
-
2017
- 2017-06-16 CN CN201710459482.0A patent/CN107222488A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104009835A (en) * | 2014-05-16 | 2014-08-27 | 南京邮电大学 | File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN105893857A (en) * | 2016-03-31 | 2016-08-24 | 北京金山安全软件有限公司 | File encryption method, device and equipment |
CN106685980A (en) * | 2017-01-13 | 2017-05-17 | 桂林电子科技大学 | Cryptographic method of large files |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112487449A (en) * | 2020-11-30 | 2021-03-12 | 珠海格力电器股份有限公司 | Drawing display method and device, storage medium and electronic device |
CN113129395A (en) * | 2021-05-08 | 2021-07-16 | 深圳市数存科技有限公司 | Data compression encryption system |
CN113129395B (en) * | 2021-05-08 | 2021-09-10 | 深圳市数存科技有限公司 | Data compression encryption system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Marwaha et al. | Visual cryptographic steganography in images | |
US10979221B2 (en) | Generation of keys of variable length from cryptographic tables | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
US9355271B2 (en) | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption | |
WO2022077793A1 (en) | Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping | |
CN108667595A (en) | A kind of compression encryption method of large data files | |
CN105320896A (en) | Cloud storage encryption and ciphertext retrieval methods and systems | |
US20130177153A1 (en) | Using file metadata for data obfuscation | |
WO2019214027A1 (en) | Sequential encryption and decryption method based on two-key stream cipher using singly linked list | |
US7925009B2 (en) | Hybrid data encryption | |
CN102012993A (en) | Methods and devices for selectively encrypting and decrypting data | |
WO2004010638A1 (en) | Cryptographic key distribution using key unfolding | |
CN107135062A (en) | A kind of encryption method of improved big file | |
CN113518092A (en) | Set intersection method for realizing multi-party privacy | |
Matted et al. | Enhanced image security using stenography and cryptography | |
US20110182419A1 (en) | Encryption algorithm with randomized buffer | |
Patel et al. | Information hiding using least significant bit steganography and blowfish algorithm | |
Sharma et al. | Analysis of AES Encryption with ECC | |
Bandekar et al. | LSB based text and image steganography using AES algorithm | |
Yahaya et al. | Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography | |
CN107222488A (en) | A kind of image ciphering storage method | |
Ahmad et al. | Distributed text-to-image encryption algorithm | |
WO2019205407A1 (en) | Encryption method and apparatus, and computer device and storage medium | |
WO2019214025A1 (en) | Sequential encryption and decryption method based on two-key stream cipher using doubly linked list | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180525 Address after: 518000 Guangdong Shenzhen Baoan District Xin'an Street 1004 Chuang Road 12 tower Applicant after: Kangmei hospital Cci Capital Ltd Applicant after: Kangmei Pharmaceutical Co., Ltd. Address before: 515300 8, 8 A, Shenzhen International Innovation Centre, 1006 Shennan Road, Futian District, Shenzhen, Guangdong. Applicant before: Concord Health Cloud Services Ltd |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |
|
RJ01 | Rejection of invention patent application after publication |