CN107222488A - A kind of image ciphering storage method - Google Patents

A kind of image ciphering storage method Download PDF

Info

Publication number
CN107222488A
CN107222488A CN201710459482.0A CN201710459482A CN107222488A CN 107222488 A CN107222488 A CN 107222488A CN 201710459482 A CN201710459482 A CN 201710459482A CN 107222488 A CN107222488 A CN 107222488A
Authority
CN
China
Prior art keywords
file
stream
array
picture
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710459482.0A
Other languages
Chinese (zh)
Inventor
张婷婷
向寒咏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kangmei Pharmaceutical Co Ltd
Original Assignee
Concord Health Cloud Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Concord Health Cloud Services Ltd filed Critical Concord Health Cloud Services Ltd
Priority to CN201710459482.0A priority Critical patent/CN107222488A/en
Publication of CN107222488A publication Critical patent/CN107222488A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of image ciphering storage method, uploaded onto the server including step picture file stream, picture file stream is read in into internal memory and file fluxion group is saved as, file fluxion set of segmentation, file fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second, generate ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream, ciphertext is stored to the first file, the second array data is stored to the second file, decryption step, the requirement that picture is stored in server for encrypting can effectively be solved, the security of picture storage can effectively be ensured, only encrypt the partial data of picture file, occupancy and time loss to server resource in image ciphering storing process can effectively be reduced, the response time of client server during decryption obtains picture can effectively be reduced.

Description

A kind of image ciphering storage method
Technical field
The present invention relates to processing data information technical field, and in particular to a kind of image ciphering storage method.
Background technology
With society and the process of IT application in enterprises, people become more dependent on the convenience of Netowrk tape and quick.It is personal and big Some Enterprises establish computer network, and office system is gradually popularized, increasing commercial field Development by Depending on Network and develop, net Network turns into the part that people live, the operating of social and enterprise is indispensable, while also bringing new ask to information security Topic.One picture file is divided into multiple files for fragmented storage and stored by a kind of conventional image ciphering storage method, this The shortcoming of kind of method is:When multiple files are all revealed, by simply combining with regard to original picture file, this side can be obtained The security of method is very poor;Conventional another image ciphering storage method is whole picture file is encrypted, this method Shortcoming be:When picture file is very big, many resources of server can be expended by encrypting whole picture file, and the used time is very long.
The content of the invention
It is an object of the invention to overcome the problem above that prior art is present there is provided a kind of image ciphering storage method, The requirement that picture is stored in server for encrypting can be effectively solved, can effectively ensure the security of picture storage, can be with The effective resource occupation and time loss reduced in image ciphering storing process to server, can effectively reduce client The response time of server during decryption obtains picture.
To realize above-mentioned technical purpose and the technique effect, the present invention is achieved through the following technical solutions:
A kind of image ciphering storage method, comprises the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;
S4, storage file, storage ciphertext to the first file store the second array data to the second file.
Further, in addition to decryption step, the decryption step includes:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the The data of two files read in file the second array of stream;
J3, generation in plain text, the first array data of file stream generation are decrypted in plain text with algorithm;
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array of file stream the 3rd Data, the array data of convert file stream the 3rd is picture.
Further, the algorithm is aes algorithm.
Further, the step of use algorithm for encryption file the first array data of stream in step S3 includes:
Expanded keys are generated, with cipher key spreading Program Generating expanded keys;
Encryption data, the first array data is encrypted with AES encryption algorithm and expanded keys.
Further, the expanded keys length is 128 bits.
Further, including the step of decrypting file the first array data of stream with algorithm in step J3:
Obtain expanded keys;
Ciphertext data, the first array data is decrypted with AES decipherment algorithms and expanded keys.
Further, the file fluxion set of segmentation is to determine the array of file stream first and file stream the using random function The length of two arrays.
The beneficial effects of the invention are as follows:The present invention provides a kind of image ciphering storage method, including step picture file stream Upload onto the server, file fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by file fluxion set of segmentation, Ciphertext is generated, ciphertext is generated with the first array data of algorithm for encryption file stream, storage ciphertext to the first file stores the second array Data to the second file, decryption step can effectively solve the requirement that picture is stored in server for encrypting, can effectively protect The security of picture storage is demonstrate,proved, the partial data of picture file is only encrypted, can effectively reduce in image ciphering storing process To the occupancy and time loss of server resource, client server during decryption obtains picture can be effectively reduced Response time.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate accompanying drawing describe in detail as after. The embodiment of the present invention is shown in detail by following examples and its accompanying drawing.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of image ciphering storage method of the present invention;
Fig. 2 is a kind of decryption step flow chart of image ciphering storage method of the present invention;
Fig. 3 is a kind of AES encryption algorithm flow chart of image ciphering storage method of the present invention;
Fig. 4 is a kind of AES decipherment algorithm flow charts of image ciphering storage method of the present invention.
Embodiment
Below with reference to the accompanying drawings and in conjunction with the embodiments, the present invention is described in detail.
Shown in reference picture 1-4, a kind of image ciphering storage method, as shown in figure 1, comprising the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;It is preferred that Ground, in one embodiment, picture file stream is uploaded onto the server, and picture file stream is read in into internal memory and file stream word is saved as Joint number group.
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;It is excellent File stream byte arrays in one embodiment, are split as the first array of file stream byte and file stream byte second are counted by selection of land Group, the length of the first array of file stream byte and file stream the second array of byte is determined using random function random.
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;Preferably;In one embodiment, With aes algorithm encryption file stream byte the first array data generation ciphertext.
In one embodiment, as shown in figure 3, in step S3 with algorithm for encryption file the first array data of stream the step of wrap Include:File the first array data of stream is read, key is read, due to the limited length of key, a key is used in aes algorithm Cipher key spreading into longer Bit String, that is, is generated expanded keys by extender, and expanded keys are used for generating being encrypted with aes algorithm During the encryption key respectively taken turns, it is preferable that expanded keys length is 128 bits, utilizes the round transformation and most of AES encryption algorithm File is encrypted round transformation afterwards, generates ciphertext.
S4, storage file, storage ciphertext to the first file store the second array data to the second file;In an embodiment In, the ciphertext after being encrypted with AES encryption algorithm to the array data of file stream first is stored to the first file, the file stream of unencryption Second array data is stored to the second file;
Preferably, in addition to decryption step, as shown in Fig. 2 decryption step includes:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;Preferably, exist In one embodiment, from server acquisition the first file of AES encryption algorithm and the second file of unencryption;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the The data of two files read in file the second array of stream;
J3, generation in plain text, decrypt the first array data of file stream generation in plain text, preferably with algorithm;In one embodiment, With aes algorithm the first array data of decryption file stream generation in plain text;
In one embodiment, as shown in figure 4, being wrapped the step of decrypting file the first array data of stream with algorithm in step J3 Include:File the first array data of stream is read, expanded keys are obtained, generates what is respectively taken turns in aes algorithm decrypting process with expanded keys Decruption key, it is preferable that expanded keys length is 128 bits, using the round transformation and last round transformation of AES decipherment algorithms to text Part is decrypted, and generation is in plain text.
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array of file stream the 3rd Data, the array data of convert file stream the 3rd is picture;In one embodiment, merge with AES decipherment algorithms to file stream first Plaintext and the array data of file stream second do not decrypted after array data decryption obtain the array data of file stream the 3rd, and conversion is literary The array data of part stream the 3rd is picture.
The present invention provides a kind of image ciphering storage method, including step picture file stream uploads onto the server, file stream Array is segmented, and generates ciphertext, and storage ciphertext stores the second array data to the second file to the first file, decryption step, can be with It is effective to solve the requirement that picture is stored in server for encrypting, it can effectively ensure the security of picture storage, only encryption figure The partial data of piece file, can effectively reduce in image ciphering storing process and the occupancy of server resource and time are disappeared Consumption, can effectively reduce the response time of client server during decryption obtains picture.
More than, only presently preferred embodiments of the present invention not makees any formal limitation to the present invention;All one's own professions The those of ordinary skill of industry can swimmingly implement the present invention shown in by specification accompanying drawing and above;But, it is all that to be familiar with sheet special Without departing from the scope of the present invention, that is made using disclosed above technology contents is a little by the technical staff of industry The equivalent variations of variation, modification and evolution, are the equivalent embodiment of the present invention;Meanwhile, all substantial technologicals according to the present invention Variation, modification and evolution of any equivalent variations made to above example etc., still fall within technical scheme Within protection domain.

Claims (7)

1. a kind of image ciphering storage method, it is characterised in that comprise the following steps:
S1, picture file stream are uploaded onto the server, and picture file stream is read in into internal memory and file fluxion group is saved as;
File fluxion assembling and dismantling are divided into the array of file stream first and the array of file stream second by S2, file fluxion set of segmentation;
S3, generation ciphertext, ciphertext is generated with the first array data of algorithm for encryption file stream;
S4, storage file, storage ciphertext to the first file store the second array data to the second file.
2. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:Also include decryption step, the decryption step Suddenly include:
J1, the first file and the second file obtained on the first file and the second file, acquisition server;
J2, the first file and the second file read in into internal memory, the data of the first file are read in into file the first array of stream, the second text The data of part read in file the second array of stream;
J3, generation in plain text, the first array data of file stream generation are decrypted in plain text with algorithm;
J4, array data is changed into picture, merge in plain text and the array data of file stream second obtains the array data of file stream the 3rd, The array data of convert file stream the 3rd is picture.
3. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:The algorithm is aes algorithm.
4. a kind of image ciphering storage method as claimed in claim 3, it is characterised in that:Use algorithm for encryption file stream in step S3 The step of first array data, includes:
Expanded keys are generated, with cipher key spreading Program Generating expanded keys;
Encryption data, the first array data is encrypted with AES encryption algorithm and expanded keys.
5. a kind of image ciphering storage method as claimed in claim 4, it is characterised in that:The expanded keys length is 128 bits.
6. a kind of image ciphering storage method as claimed in claim 3, it is characterised in that:In step J3 file stream is decrypted with algorithm The step of first array data, includes:
Obtain expanded keys;
Ciphertext data, the first array data is decrypted with AES decipherment algorithms and expanded keys.
7. a kind of image ciphering storage method as claimed in claim 1, it is characterised in that:The file fluxion set of segmentation be using with Machine function determines the length of the array of file stream first and the array of file stream second.
CN201710459482.0A 2017-06-16 2017-06-16 A kind of image ciphering storage method Pending CN107222488A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710459482.0A CN107222488A (en) 2017-06-16 2017-06-16 A kind of image ciphering storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710459482.0A CN107222488A (en) 2017-06-16 2017-06-16 A kind of image ciphering storage method

Publications (1)

Publication Number Publication Date
CN107222488A true CN107222488A (en) 2017-09-29

Family

ID=59949723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710459482.0A Pending CN107222488A (en) 2017-06-16 2017-06-16 A kind of image ciphering storage method

Country Status (1)

Country Link
CN (1) CN107222488A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487449A (en) * 2020-11-30 2021-03-12 珠海格力电器股份有限公司 Drawing display method and device, storage medium and electronic device
CN113129395A (en) * 2021-05-08 2021-07-16 深圳市数存科技有限公司 Data compression encryption system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009835A (en) * 2014-05-16 2014-08-27 南京邮电大学 File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment
CN106685980A (en) * 2017-01-13 2017-05-17 桂林电子科技大学 Cryptographic method of large files

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009835A (en) * 2014-05-16 2014-08-27 南京邮电大学 File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment
CN106685980A (en) * 2017-01-13 2017-05-17 桂林电子科技大学 Cryptographic method of large files

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487449A (en) * 2020-11-30 2021-03-12 珠海格力电器股份有限公司 Drawing display method and device, storage medium and electronic device
CN113129395A (en) * 2021-05-08 2021-07-16 深圳市数存科技有限公司 Data compression encryption system
CN113129395B (en) * 2021-05-08 2021-09-10 深圳市数存科技有限公司 Data compression encryption system

Similar Documents

Publication Publication Date Title
Marwaha et al. Visual cryptographic steganography in images
US10979221B2 (en) Generation of keys of variable length from cryptographic tables
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
US9355271B2 (en) System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
WO2022077793A1 (en) Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping
CN108667595A (en) A kind of compression encryption method of large data files
CN105320896A (en) Cloud storage encryption and ciphertext retrieval methods and systems
US20130177153A1 (en) Using file metadata for data obfuscation
WO2019214027A1 (en) Sequential encryption and decryption method based on two-key stream cipher using singly linked list
US7925009B2 (en) Hybrid data encryption
CN102012993A (en) Methods and devices for selectively encrypting and decrypting data
WO2004010638A1 (en) Cryptographic key distribution using key unfolding
CN107135062A (en) A kind of encryption method of improved big file
CN113518092A (en) Set intersection method for realizing multi-party privacy
Matted et al. Enhanced image security using stenography and cryptography
US20110182419A1 (en) Encryption algorithm with randomized buffer
Patel et al. Information hiding using least significant bit steganography and blowfish algorithm
Sharma et al. Analysis of AES Encryption with ECC
Bandekar et al. LSB based text and image steganography using AES algorithm
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
CN107222488A (en) A kind of image ciphering storage method
Ahmad et al. Distributed text-to-image encryption algorithm
WO2019205407A1 (en) Encryption method and apparatus, and computer device and storage medium
WO2019214025A1 (en) Sequential encryption and decryption method based on two-key stream cipher using doubly linked list
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180525

Address after: 518000 Guangdong Shenzhen Baoan District Xin'an Street 1004 Chuang Road 12 tower

Applicant after: Kangmei hospital Cci Capital Ltd

Applicant after: Kangmei Pharmaceutical Co., Ltd.

Address before: 515300 8, 8 A, Shenzhen International Innovation Centre, 1006 Shennan Road, Futian District, Shenzhen, Guangdong.

Applicant before: Concord Health Cloud Services Ltd

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170929

RJ01 Rejection of invention patent application after publication