CN107563949A - Image guard method and device, image restoring method and device - Google Patents

Image guard method and device, image restoring method and device Download PDF

Info

Publication number
CN107563949A
CN107563949A CN201710772312.8A CN201710772312A CN107563949A CN 107563949 A CN107563949 A CN 107563949A CN 201710772312 A CN201710772312 A CN 201710772312A CN 107563949 A CN107563949 A CN 107563949A
Authority
CN
China
Prior art keywords
image
protected
vector
encrypted
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710772312.8A
Other languages
Chinese (zh)
Inventor
叶从欢
熊曾刚
王光伟
张学敏
徐方
刘振
卢佳杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Engineering University
Original Assignee
Hubei Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Engineering University filed Critical Hubei Engineering University
Priority to CN201710772312.8A priority Critical patent/CN107563949A/en
Publication of CN107563949A publication Critical patent/CN107563949A/en
Pending legal-status Critical Current

Links

Abstract

The present invention, which provides a kind of image guard method and device, image restoring method and device, image guard method, to be included:Obtain image and host image to be protected;Image to be protected is converted into encrypted image;Encrypted image is hidden in host image.The present invention is to image block scrambling encryption to be protected; the location of pixels for upsetting image to be protected obtains scramble image; automatic cell conversion is carried out to the pixel of scramble image; further change the randomness of image pixel positions; then it is diffused encryption; gray value statistical chart shows that each Distribution value is uniform in encrypted image, and image does not have obvious characteristic information, eliminates obvious grey value characteristics in image.Then it is hidden in after being compressed to encrypted image in host image, greatly increases the difficulty for cracking image to be protected, improve the security of image to be protected.And image encryption to be protected is compressed, then it is deposited with host image, directly transmits the host image of plaintext, concern of the attacker to protection image can be reduced.

Description

Image guard method and device, image restoring method and device
Technical field
The present invention relates to image procossing and encryption technology field, in particular to a kind of image guard method and device, Image restoring method and device.
Background technology
At present, user is frequently by network transmission image, and image is critically important for user sometimes, in order to prevent in image Appearance leaks, and needs first image to be encrypted protection before image is transmitted.
Currently, a password is generally set by user oneself in correlation technique, image is encrypted by the password To ciphertext data corresponding to the image, ciphertext data are then transferred to by receiving terminal by network, and user passes through IMU Above-mentioned password is sent to receiving terminal by the mode such as news or mobile network.Receiving terminal is by the password to the ciphertext data solution that receives It is close to obtain the image.
Image is protected by way of above-mentioned password encryption, encrypted image is easily intercepted and captured or broken through by malice one's share of expenses for a joint undertaking, enters And cause picture material to leak, bring loss to user, security is very low.Moreover, directly transmitted in a network with encrypted image, Easily cause the attention of attacker.
The content of the invention
In view of this, the purpose of the embodiment of the present invention is to provide a kind of image guard method and device, image restoring side Method and device, to solve problems with existing for prior art:Prior art protects image by way of password encryption, adds Close image is easily intercepted and captured or broken through by malice one's share of expenses for a joint undertaking, and then causes picture material to leak, and brings loss to user, security is very It is low.
In a first aspect, the embodiments of the invention provide a kind of image guard method, methods described includes:
Obtain image and host image to be protected;
The image to be protected is converted into encrypted image;
The encrypted image is hidden in the host image.
With reference in a first aspect, the embodiments of the invention provide the possible implementation of the first of above-mentioned first aspect, its In, it is described that the image to be protected is converted into encrypted image, including:
Line shuffle is entered to the image to be protected, obtains scramble image;
Encryption is diffused to the scramble image, obtains diffusion image;
Compress the diffusion image and obtain encrypted image.
With reference to the first possible implementation of first aspect, the embodiments of the invention provide the of above-mentioned first aspect Two kinds of possible implementations, wherein, it is described that line shuffle is entered to the image to be protected, scramble image is obtained, including:
The image to be protected is divided into multiple sizes are identical and the image block of non-overlapping copies;
Putting in order for the multiple image block is upset according to default upset sequence, obtains resetting image;
Automatic cell conversion is carried out to the rearrangement image, obtains scramble image.
With reference to the first possible implementation of first aspect, the embodiments of the invention provide the of above-mentioned first aspect Three kinds of possible implementations, wherein, it is described that encryption is diffused to the scramble image, diffusion image is obtained, including:
The scramble image is converted into primary vector;
Step-by-step XOR is carried out to the gray value of adjacent pixel in the primary vector, by the result of step-by-step XOR Step-by-step XOR is carried out with default diffusion sequence, obtains secondary vector;
The secondary vector is reverted into image, obtains diffusion image.
With reference to the first possible implementation of first aspect, the embodiments of the invention provide the of above-mentioned first aspect Four kinds of possible implementations, wherein, the compression diffusion image obtains encrypted image, including:
The gray value of each column pixel in the diffusion image is compressed respectively according to Chinese remainder theorem, compressed Matrix;
The condensation matrix is saved as into encrypted image with picture format.
With reference in a first aspect, the embodiments of the invention provide the possible implementation of the 5th of above-mentioned first aspect kind, its In, it is described that the encrypted image is hidden in the host image, including:
Horizontal component vector sum diagonal components vector is decomposited from the host image;
The encrypted image is split as parasitic horizontal vector and parasitic diagoned vector;
In the host image, the horizontal component vector is replaced with into the parasitic horizontal vector, and will be described right Angle component vector replaces with the parasitic diagoned vector;
Image Reconstruction is carried out to the host image after replacement operation, obtains implicitly scheming corresponding to the image to be protected Picture.
Second aspect, the embodiments of the invention provide figure corresponding to the image guard method described in a kind of above-mentioned first aspect As restoring method, methods described includes:
Obtain implicit image corresponding to image to be protected;
Horizontal component vector sum diagonal components vector is decomposited from the implicit image;
According to diagonal components vector described in the horizontal component vector sum, the image to be protected is reduced.
With reference to second aspect, the embodiments of the invention provide the possible implementation of the first of above-mentioned second aspect, its In, the vector of the diagonal components according to the horizontal component vector sum, the image to be protected is reduced, including:
Diagonal components vector described in the horizontal component vector sum is merged into encrypted image;
The encrypted image is decompressed according to Chinese remainder theorem, obtains diffusion image;
Decryption is diffused to the diffusion image, obtains scramble image;
Order restoring is carried out to the scramble image and obtains the image to be protected.
The third aspect, the embodiments of the invention provide a kind of image protection device, described device includes:
Acquisition module, for obtaining image and host image to be protected;
Modular converter, for the image to be protected to be converted into encrypted image;
Hidden module, for the encrypted image to be hidden in the host image.
Fourth aspect, the embodiments of the invention provide a kind of image restoring device, described device includes:
Acquisition module, for obtaining implicit image corresponding to image to be protected;
Decomposing module, for decompositing horizontal component vector sum diagonal components vector from the implicit image;
Recovery module, for the diagonal components vector according to the horizontal component vector sum, reduce the figure to be protected Picture.
In embodiments of the present invention, image guard method includes:Obtain image and host image to be protected;By figure to be protected As being converted to encrypted image;Encrypted image is hidden in host image.Above-mentioned image protection is carried out when carrying out image restoring The inverse process of process restores image to be protected.The present invention carries out piecemeal scrambling encryption to image to be protected, upsets to be protected Location of pixels in image obtains scramble image, then carries out automatic cell conversion to the pixel of scramble image, further changes Become the randomness of image pixel positions, be then diffused encryption, gray value statistical chart shows each Distribution value in encrypted image Uniformly, image does not have obvious characteristic information, eliminates obvious grey value characteristics in image.Then encrypted image is pressed It is hidden in after contracting in host image, considerably increases the difficulty for cracking image to be protected, improves the security of image to be protected.
Not only image can be encrypted for the guard method, and can carry out Lossless Compression to encrypted image, reduce The data volume of protection, then compression image concealing in common host image, host image existing for plaintext version, avoid Cause the concern of malicious attacker.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 shows a kind of flow chart for image guard method that the embodiment of the present invention 1 is provided;
Fig. 2 shows the schematic flow sheet for entering line shuffle to image to be protected that the embodiment of the present invention 1 is provided;
Fig. 3 shows the schematic flow sheet that encryption is diffused to scramble image that the embodiment of the present invention 1 is provided;
Fig. 4 shows the schematic diagram being compressed to encrypted image that the embodiment of the present invention 1 is provided;
Fig. 5 shows that the embodiment of the present invention 1 provides the signal being hidden in the encrypted image after compression in host image Figure;
Fig. 6 shows a kind of flow chart for image restoring method that the embodiment of the present invention 2 is provided;
Fig. 7 shows a kind of structural representation for image protection device that the embodiment of the present invention 3 is provided;
Fig. 8 shows a kind of structural representation for image restoring device that the embodiment of the present invention 4 is provided.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention Middle accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only It is part of the embodiment of the present invention, rather than whole embodiments.The present invention being generally described and illustrated herein in the accompanying drawings is real Applying the component of example can be configured to arrange and design with a variety of.Therefore, it is of the invention to what is provided in the accompanying drawings below The detailed description of embodiment is not intended to limit the scope of claimed invention, but is merely representative of the selected reality of the present invention Apply example.Based on embodiments of the invention, institute that those skilled in the art are obtained on the premise of creative work is not made There is other embodiment, belong to the scope of protection of the invention.
In view of protecting image by way of chaos encryption in the prior art, encrypted image easily cuts by malice one's share of expenses for a joint undertaking Obtain or break through, and then cause picture material to leak, bring loss to user, security is not high enough.Based on this, the embodiment of the present invention A kind of image guard method and device, image restoring method and device are provided, is described below by embodiment.
Embodiment 1
Referring to Fig. 1, the embodiments of the invention provide a kind of image guard method, this method specifically includes following steps:
Step 101:Obtain image and host image to be protected.
Image to be protected is critically important, it is necessary to be protected the image to prevent from leaking for user.Host image with Image to be protected it is in the same size, host image is inessential for user, without encipherment protection in transmitting procedure.The present invention The executive agent of embodiment is the terminal for image protection, and the terminal receives the image to be protected and host's figure that user submits Picture, then by step 102 and 103 operation by image concealing to be protected in host image, with realize to image to be protected Protection.
Step 102:Image to be protected is converted into encrypted image.
Image to be protected is converted to encrypted image by A1-A3 as follows of embodiment of the present invention operation, specific bag Include:
A1:Line shuffle is entered to image to be protected, obtains scramble image.
(1), image to be protected is divided into multiple sizes are identical and the image block of non-overlapping copies.
In embodiments of the present invention, the size for multiple images block image to be protected being divided into is identical and multiple Image block non-overlapping copies, the shape of image block can be rectangle, square or triangle etc..When the shape of the image block marked off When shape is rectangle or is square, it is assumed that the size of image to be protected is inM × inN, and image to be protected is divided into R image Block, the size of each image block is blockM × blockN, then size inM × inN=blockM of image to be protected × blockN×R。
After image to be protected is divided into multiple images block, each image is taken out from image to be protected according to preset order Block, the image block taken out at first are placed on matrix blocks first position, and second of image block taken out is placed on matrix The image block of taking-up, is so stored in image block matrix blocks by blocks second position successively, obtain a R × BlockM × blockN matrix.Matrix blocks saves each image block marked off in image to be protected.For example, it is assumed that Image to be protected is 256 × 256 image, then inM=inN=256.If the size of the image block marked off is 4 × 4, BlockM=blockN=4, the total number R of the image block marked off are
Above-mentioned preset order can be since the upper left corner of image to be protected from left to right from top to bottom, or, preset Order be since the upper right corner of image to be protected from right to left from top to bottom, or, preset order is from image to be protected The lower left corner starts from left to right from the bottom up, or, preset order be since the lower right corner of image to be protected from the right side turn left from Under up.Terminal also records above-mentioned preset order and the size of image block, so as to default according to this when reducing image to be protected Order is reduced.
(2) putting in order for multiple images block, is upset according to the default sequence that upsets, obtains resetting image.
The above-mentioned default sequence that upsets can be the upset sequence that (Henon map) generation is mapped using agriculture in distress.Specific generation Process is, sets variable a and b, works as a=1.4, and during b=0.3, agriculture mapping in distress shows chaotic behavior.Then agriculture mapping in distress is specified Initial value x0And y0, by variable a and b and initial value x0And y0Substitute into agriculture mapping equation x in distressn+1=1-axn 2+ynAnd yn+1=bxn, Iteration R times, obtain 1 × R matrix MH.Matrix MH is a pseudo-random sequence, although matrix MH seems mixed and disorderly unordered, milli It is irregular, but as long as initializaing variable x when not changing computing0And y0Value, it is possible to wrong go back original matrix MH without any. Originally orderly numerical value can be entered into row order using matrix MH this property to upset.In embodiments of the present invention, terminal can To record initializaing variable x0And y0, so as to when reducing image to be protected according to initializaing variable x0And y0Restore matrix MH.
After obtaining matrix MH through the above way, the value in matrix MH is also subjected to appropriate scaling and handles and take the remainder fortune Calculate, scope of all values all without departing from 1-R in the matrix MH finally given.It the Formula X such as can usei=mod (xi, R)+1 obtain Obtain matrix MH finally.Wherein, i=1,2,3 ..., R, i be matrix MH intermediate values sequence number, xiFor matrix after agriculture in distress mapping iteration Serial number i value, X in MHiFor scaling processing and take the remainder the value of serial number i in matrix MH after budget.The matrix finally given MH is above-mentioned default upset sequence.
In addition to default upset sequence is generated by way of being mapped agriculture in distress, it can also be divided according to image to be protected The number of image block carrys out random generate and presets upset sequence.Specifically, it is assumed that image to be protected is divided into R image block, then Generate positive integer sequence 1,2 ..., R, upset putting in order for the positive integer sequence at random, the positive integer sequence after order will be upset Row are defined as above-mentioned default upset sequence.Or it can also directly receive the default upset sequence of User Defined setting.Terminal Above-mentioned default upset sequence can be recorded, to be reduced when reducing image to be protected according to the default sequence that upsets.
When being reordered to the multiple images block marked off, according to image block in default upset sequence pair matrix blocks Order resequenced.If the default sequence that upsets is to map to generate by agriculture in distress, according to above-mentioned matrix MH intermediate values Order is resequenced to the image block in matrix blocks.It is successively read since first value in default upset sequence default The value in sequence is upset, for each value of reading, sequence number of the value in default upset sequence is determined, exchanges matrix blocks The position of two image blocks of sequence number and arrangement the serial number value corresponding to middle arrangement serial number value.So upset according to default A new matrix newBlocks is obtained after image block rearrangement in sequence pair matrix blocks, in matrix newBlocks The sequence of image block and the sequence of image block in matrix blocks are entirely different.For example, it is assumed that default upset comes the in sequence The value of one is 3, then exchanges two tile locations that the 1st and the 3rd is come in matrix blocks.For another example, when default When upset order is above-mentioned matrix MH, if MH [12]=25, the image block of the 12nd will be come in matrix blocks with coming The figure of the 25th thinks about it block location swap.
Upset through the above way image block in matrix blocks order obtain new matrix newBlocks after, according to The image block that is preserved in matrix newBlocks and image block put in order, by the splicing of this multiple images block revert to inM × InN image, the image now obtained are the images for being disturbed location of pixels.For the ease of describing, in the embodiment of the present invention The image for being disturbed location of pixels is referred to as resetting image.
(3) automatic cell conversion, is carried out to resetting image, obtains scramble image.
Automatic cell is the system of dynamic a complex space and time discrete, and automatic cell is finite state machine A kind of special shape.Automatic cell can just produce a kind of chaotic behavior using shirtsleeve operation, and it calculates complexity Degree is the effective means that content of multimedia is encrypted than relatively low.
In this step, image will be reset and is divided into preset number image block, the pixel of each image block will be carried out carefully Born of the same parents automate conversion, have often handled an image block, by the image block Random Maps in addition to the image block other are any The opening position of one image block.Above-mentioned preset number can be 4 or 6 etc..For example, cell is carried out to the pixel of first image block After automation conversion, the image block is placed on to the opening position of the 3rd image block.
Automatic cell conversion is carried out to the pixel of any one image block in the preset number image block that marks off When, if the size for resetting image is inM × inN, above-mentioned preset number is S, then produces inM × inN/S using logical mappings Series of values xi, x0Be used as key with u, if by reset image be divided into 4 image blocks, then using logical mappings produce inM × InN/4 series of values xi, x0It is used as key with u.Two-dimentional automatic cell is also referred to as life game, and the series of values of generation is formed One two-dimensional matrix G0, by two-dimensional matrix G0As the seed of cellular matrices in life game, two-dimensional matrix G0In each member It is called usually as cell, each cell is only raw and dead two states, can represent raw and dead with 1 and 0 respectively.Each cell it is initial State is as follows:Work as xiValue when being more than the serial average, corresponding cell is living, is otherwise dead, utilizes initial life Order the cellular matrices G of game0To replace the grey scale pixel value of corresponding position in each image block.When the life using life game Dead rule produces kth for Gk, the grey scale pixel value replaced corresponding to the image block is mapped to its random corresponding figure one by one As block scrambled matrix in.After being operated by R wheels, the grey scale pixel value after remaining displacement is once put into the encryption square Battle array, the scrambled matrix are that the result after automatic cell conversion is carried out to the pixel of the image block.
Pixel for resetting other arbitrary image blocks in image in addition to the image block, it is automatic also by above-mentioned cell The mode for changing conversion is encrypted, and the scrambled matrix after encryption corresponding to image block is mapped to the position where other image blocks Put preservation.Obtained after automatic cell conversion and Random Maps preservation are carried out to the pixel for resetting each image block in image Scramble image.So further change the randomness of image pixel positions.And terminal also records each image before Random Maps The position of block, to be reduced when reducing image to be protected according to the position of image block.
For the ease of understanding aforesaid operations, it is specifically described below in conjunction with the accompanying drawings.As shown in Fig. 2 image to be protected is first Nonoverlapping 9 image blocks are first divided into, then since the upper left corner of image to be protected, from left to right, from top to bottom, are taken Go out each image block.The image block of stacking shown in Fig. 2 is above-mentioned matrix blocks.Pass through the pre- of agriculture in distress mapping generation If the order for upsetting sequence pair image block enters line disturbance, then all image blocks splicing after upset order is reverted to be protected The size of image, that is, obtain resetting image.Then image will be reset and be divided into four pieces, it is automatic using only cell to every piece of pixel Change principle and carry out automatic cell transposition encryption, and Random Maps obtain scramble image to the position of other blocks.
A2:Encryption is diffused to scramble image, obtains diffusion image.
(1) scramble image, is converted into primary vector.Primary vector is one-dimensional vector.
(2) step-by-step XOR, is carried out to the gray value of adjacent pixel in primary vector.
The gray value of each pixel in primary vector is traveled through from back to front in primary vector, by the pixel ash of current location Angle value and the grey scale pixel value of adjacent the latter position carry out step-by-step XOR, and the result of step-by-step XOR is saved as into one Interim data vt.If current location is the pixel of last position in primary vector, by the pixel ash of current location Angle value carries out step-by-step XOR with 128.
(3) result of above-mentioned step-by-step XOR and default diffusion sequence, are subjected to step-by-step XOR, obtain second to Amount.
Above-mentioned default diffusion sequence is obtained by solving lorentz equation.Long-range navigation shown in equation below (1)-(3) Hereby (Lorenz) equation is one group of differential equation with Chaotic Behavior, is presented for the parameter of some primary condition and system Chaos attribute.If to increase step-length as additional key parameter, lorentz equation or a continuous time system, it reflects The state operational mode for illustrating dynamical system is penetrated, three variable σ, ρ, β do not have rule, and do not repeat.
In above-mentioned formula (1)-(3), x, y, z are system mode, and t is the time, and σ, ρ, β is systematic parameter, as σ=10, ρ Chaotic behavior is shown during=28, β=8/3.
Above-mentioned default diffusion sequence generates in the following way, specifically includes:
Give lorentz equation setting initial value x0,y0,z0With systematic parameter σ, ρ, β.Step-length is set, uses quadravalence Long Ge-storehouse Tower method solves lorentz equation.When the size of image to be protected is inM × inN, will solve Equation Iterative ceil [(inM × InN it is)/3] secondary, obtain the sequence that three length are ceil [(inM × inN)/3].By obtain three sequences according to a graded It is spliced into inM × inN sequence T.Pass through equation Ti=mod (ti, 256) sequence T is amplified and remainder processing, Obtain default diffusion sequence.In embodiments of the present invention, terminal also records the default diffusion sequence, to reduce figure to be protected As when reduced according to the default diffusion sequence.
After obtaining default diffusion sequence through the above way, the result of step-by-step XOR in above-mentioned (2) is expanded with default The numerical value dissipated in sequence carries out step-by-step XOR, and result is stored in an one-dimensional vector, and the one-dimensional vector is second Vector.
(4) secondary vector, is reverted into image, obtains diffusion image.
Secondary vector is reduced to the matrix of inM × inN size, that is, obtains diffusion image.Now diffusion image Gray value statistical chart shows that each Distribution value is uniform, does not have obvious characteristic information in diffusion image, substantially increases to be protected The security of image.
For the ease of understanding the operation of above-mentioned acquisition diffusion image, it is specifically described below in conjunction with the accompanying drawings.Such as Fig. 3 institutes Show, the rearrangement image after automatic cell is converted is converted to primary vector, gives the initial value and system ginseng of lorentz equation Number, set step-length.Solution lorentz equation is iterated using fourth-order Runge-Kutta method, each value in iteration is interim Preserve, then these values are spliced into a sequence, and sequence is handled, make decimal is not present in this sequence, obtain To default diffusion sequence.Adjacent pixel gray value in primary vector is subjected to step-by-step XOR, and by the result after computing Step-by-step XOR is carried out again obtain secondary vector, with default diffusion sequence before most secondary vector reverts to one-dimensional at last Size, obtain diffusion image.
A3:Compression diffusion image obtains encrypted image.
As shown in figure 4, in the embodiment of the present invention, the congruence principle in Chinese remainder theorem, to by scramble and expansion Dissipate the diffusion image obtained after encryption to be compressed, can so there is good compression effectiveness to diffusion image.Specifically, according to Chinese remainder theorem is compressed to the gray value of each column pixel in diffusion image respectively, obtains condensation matrix;By condensation matrix Encrypted image is saved as with picture format.
Before compression of images is carried out, compression ratio is set first as Cr, chooses Cr positive integer n1,n2,n3,…,nCr, this Cr Number prime number and all numbers are both greater than 255 each other two-by-two.The specific selection mode of this Cr positive integer is:From n1,n2, n3,…,nCrChoose a minimum number, it is assumed that be n1, then n1=256, then positive integer of the traversal more than 256, will be traversed Positive integer and n1Judged, judge the positive integer be n1It is no relatively prime, if it is, the positive integer is defined as into n2.Afterwards Continue to travel through follow-up positive integer, and whether the positive integer for judging to traverse and any one number in the number that above has confirmed that are mutual Matter, if the positive integer traversed and any one number above having confirmed that be not relatively prime, skip the positive integer, continue backward time Go through.So until finding out Cr two-by-two positive integers of prime number each other.Judge two numbers whether prime number each other when, Ke Yiyong Division algorithm is judged.The specific deterministic process of division algorithm is, if two numbers are respectively p, q (p>Q), represented with r The maximum common factor of the two numbers.The first step, first check for whether q is 0, if being not 0, seek p divided by q remainder, then by more than Number is assigned to r.Second step, q value is assigned to p, r value is assigned to q.Then performed again since the first step, until q value etc. Untill 0, now p value is the greatest common divisor of two numbers.In embodiments of the present invention, two are judged by division algorithm Number whether each other prime number, according to Cr positive integer n1,n2,n3,…,nCrWhether the greatest common divisor of middle any two number is 1 Judge, if 1, then two numbers prime number each other, if not 1, then two numbers at least two common divisors.
In embodiments of the present invention, terminal also records the Cr positive integer n1,n2,n3,…,nCr, so as to be protected in reduction According to Cr positive integer n during image1,n2,n3,…,nCrReduced.
After selecting compression ratio Cr through the above way, in diffusion image, based on row, from left to right, take out every time When data all in forefront, by when Cr gray value being divided into all data in forefront per Cr data in one group, every group Cr two-by-two relatively prime numbers are corresponded respectively to, is then handled using Chinese remainder theorem, the gray value in every group is compressed For a data.
When being compressed to one group of gray value, Cr positive integer n1,n2,n3,…,nCrPrime number, i.e. gcd each other two-by-two (ni,nj)=1, wherein i ≠ j.If zriFor ziMould niInverse element, ziWith zriMeet following equalities zkizri≡l(mod ni)。 Wherein, i=1,2,3 ..., Cr, zi=n1n2…nCr/ni。a1,a2,…,aCrThe Cr gray value included for the group, solution such as lower section Journey group:
And pass through formula x ≡ z1zr1a1+z2zr2a2+…+zCrzrCraCrThe x unique solutions that (mod n) is obtained.Wherein, n= n1,n2,n3,…,nCr.The x unique solutions obtained are what Cr gray value for being included the group by Chinese remainder theorem was compressed into One numerical value.
After being compressed to the data of each row in diffusion image through the above way, an inM/Cr × inN is obtained Matrix.Matrix after compression is handled again, the matrix is preserved with the form of an image.After compression Matrix divided by 256, obtained business is preserved as key data, and obtained remainder is smaller than 256 number, and these numbers are protected A picture format is saved as, the data for obtaining image are above-mentioned encrypted image.
Step 103:Encrypted image is hidden in host image.
Added after entering line shuffle, diffusion encryption and compression to image to be protected by the operation of above-mentioned steps 101 and 102 Close image, then as shown in figure 5, encrypted image is hidden in host image by the operation of this step, pass through host image To shelter encrypted image, the security of image to be protected is further improved.Operation especially by following (1)-(4) adds to hide Close image, including:
(1) horizontal component vector sum diagonal components vector, is decomposited from host image.
Host image is decomposed using 2-d discrete wavelet decomposition method, host image is extracted from host image Horizontal component vector sum diagonal components vector.It is ch by horizontal component vector representation for the ease of description, by diagonal components vector It is expressed as cd.Horizontal component vector ch and diagonal components vector cd are respectively converted into one-dimensional vector vch and vcd.
(2) encrypted image, is split as parasitic horizontal vector and parasitic diagoned vector.
The matrix data of encrypted image is transformed into double (double precision data type) type, the data after transition are claimed For img.Data img is split by equation u=floor (img/10) and l=mod (img/10), by each data in img Divided by 10, obtained business is stored in parasitic horizontal vector u, obtained remainder is stored in parasitic diagoned vector l.
Obtained parasitic horizontal vector u and parasitic diagoned vector l are respectively converted into one-dimensional vector vu and vl, then to vu and Vl carries out appropriate scaling processing, avoids causing host image to lose excessively thin during the concealed encrypted image in host image Section.Specifically, because vu scope is 0-25, appropriate scaling can be carried out to vu, is allowed to have identical with original data Feature, after parasitic horizontal vector u is subtracted into 12 by equation vu=(u-12)/10 again divided by 10, the data after so handling have Just having negative, the fluctuating range of numerical value there has also been limitation.Similarly, by equation vl=(l-5)/5 pairs of vl processing, by contracting Putting obtained data after processing and having just has negative, and fluctuation range is small, close with original component fluctuating range, can so reduce figure The loss of detail of picture.
(3), in host image, horizontal component vector is replaced with into parasitic horizontal vector, and diagonal components vector is replaced It is changed to parasitic diagoned vector.
In host image, one-dimensional vector vch corresponding to horizontal component vector ch is replaced with into above-mentioned parasitic horizontal vector u Corresponding one-dimensional vector vu, and one-dimensional vector vcd corresponding to diagonal components vector cd is replaced with into above-mentioned parasitic diagoned vector l Corresponding one-dimensional vector vl.
(4) Image Reconstruction, is carried out to the host image after replacement operation, obtains implicit image corresponding to image to be protected.
Will be big before the data of horizontal component and the data recovery of vertical component to one-dimensional after being replaced in above-mentioned (3) It is small, recycle host image other not change component and changed component progress Image Reconstruction, obtained final image Implicit image corresponding to image as to be protected.
The embodiment of the present invention carries out Lossless Compression to encrypted image, reduces the data volume of protection, then passes through above-mentioned side Formula, which is hidden in compressed images in common host image, obtains implicit image, and user is only capable of finding out place from the implicit image The picture of master image, the content of image to be protected is not seen.But the number of image to be protected is hidden in the substantial implicit image According to.When needing image to be protected by network transmission, implicit image corresponding to image to be protected is transmitted in a network, that is, is transmitted Host image existing for plaintext version, the concern for causing malicious attacker is avoided, greatly reduce what image to be protected leaked Risk, improve the security of image to be protected.
In embodiments of the present invention, image and host image to be protected are obtained;Image to be protected is converted into encrypted image; Encrypted image is hidden in host image.The present invention carries out piecemeal scrambling encryption to image to be protected, upsets image to be protected In location of pixels obtain scramble image, automatic cell conversion is then carried out to the pixel of scramble image, further changes figure As the randomness of location of pixels, encryption is then diffused, gray value statistical chart shows that each Distribution value is uniform in encrypted image, Image does not have obvious characteristic information, eliminates obvious grey value characteristics in image.Then after being compressed to encrypted image It is hidden in host image, considerably increases the difficulty for cracking image to be protected, improves the security of image to be protected.
Embodiment 2
Referring to Fig. 6, the embodiments of the invention provide a kind of image restoring method, this method is used to carry from above-described embodiment 1 Image to be protected is restored in the implicit image of the image guard method generation of confession, the reduction process is provided by embodiment 1 Image protects the inverse process of process.This method specifically includes following steps:
Step 201:Obtain implicit image corresponding to image to be protected.
Implicit image corresponding to the image to be protected that user submits is received, or receives the figure to be protected that other-end is sent The implicit image as corresponding to.
Step 202:Horizontal component vector sum diagonal components vector is decomposited from the implicit image.
The implicit image is decomposed using 2-d discrete wavelet decomposition method, it is implicit to extract this from the implicit image The horizontal component vector sum diagonal components vector of image.Horizontal component vector is parasitic horizontal vector u corresponding to encrypted image Corresponding one-dimensional vector vu, diagonal components vector is one-dimensional vector vl corresponding to parasitic diagoned vector l corresponding to encrypted image. Above-mentioned encrypted image is the image that image to be protected obtains after scramble, diffusion encryption and squeeze operation.
Step 203:According to horizontal component vector sum diagonal components vector, image to be protected is reduced.
In embodiments of the present invention, image to be protected is reduced especially by following steps B1-B4 operation, specific bag Include:
B1:Horizontal component vector sum diagonal components vector is merged into encrypted image.
Before horizontal component vector sum diagonal components vector is merged, level is divided by equation u=10*vu+12 first Amount vector v u is reduced to parasitic horizontal vector u, and by equation l=5*vl+5 diagonal components vector v l is reduced to it is parasitic right Angular amount l.Then parasitic horizontal vector u and parasitic diagoned vector l is substituted into equation u=floor (img/10) and l=mod (img/10) in, the data img that data type is double types is calculated, then by data type conversion by data Img is converted to encrypted image.
B2:Encrypted image is decompressed according to Chinese remainder theorem, obtains diffusion image.
Obtain to enter diffusion image corresponding to image to be protected from the terminal for generating implicit image corresponding to image to be protected The Cr positive integer n used during row compression1,n2,n3,…,nCrAnd the key data preserved during compression.Wherein, figure to be protected is generated Terminal in the terminal and the embodiment of the present invention of implicit image as corresponding to for image restoring can be a terminal, can also It is different terminals.
Encrypted image is converted into matrix form, using matrix corresponding to the encrypted image as remainder, by the above-mentioned of acquisition Key data is as business, according to remainder, business and multiplier factor 256, restores inM/Cr × inN matrix.According to China Remainder theorem, pass through above-mentioned Cr positive integer n1,n2,n3,…,nCrRespectively by each numerical solution in inM/Cr × inN matrix Cr gray value of boil down to, diffusion image corresponding to image to be protected is obtained by decompression.
B3:Decryption is diffused to diffusion image, obtains scramble image.
Diffusion image is converted to one-dimensional secondary vector.Obtained from the terminal for generating implicit image corresponding to image to be protected Default diffusion sequence is taken, secondary vector and default diffusion sequence are subjected to step-by-step XOR, the result after computing is to wait to protect Protect the result that primary vector corresponding to scramble image corresponding to image carries out adjacent pixel gray value step-by-step XOR.To the fortune Result after calculation carries out backstepping and obtains primary vector, and primary vector then is converted into scramble image.
B4:Order restoring is carried out to scramble image and obtains image to be protected.
It is every before Random Maps when obtaining automatic cell conversion from the terminal for generating implicit image corresponding to image to be protected The position of individual image block.Scramble image is divided into preset number image block, the preset number in embodiment 1 with carrying out cell The number of image block during automation conversion to resetting image division is equal.It is opposed according to the position of each image block of acquisition The preset number image block of random image division is resequenced.Then automatic cell conversion is carried out to each image block Inverse process, decryption is diffused to each image block, obtains resetting image.
Then obtain to divide in generation rearrangement image process from the terminal for generating implicit image corresponding to image to be protected and treat The size of image block and the default upset sequence of use when protecting image, according to the size of above-mentioned image block, image will be reset and drawn It is divided into that multiple sizes are identical and mutual unduplicated image block, the row that multiple images block in image is reset according to default upset sequence pair Row order is resequenced.The default value upset in sequence is successively read since first value in default upset sequence, For each value of reading, sequence number of the value in default upset sequence is determined, exchanges and resets arrangement serial number value in image The position of two image blocks of corresponding sequence number and arrangement the serial number value.For example, it is assumed that default upset in sequence comes first The value of position is 3, then will reset two tile locations exchange that the 1st and the 3rd is come in image.Through the above way will weight Image block in row's image is resequenced, that is, has restored initial image to be protected.
The whole reduction process of image to be protected is the whole mistake protected to image to be protected described in embodiment 1 The inverse process of journey.Due to being hidden in after entering line shuffle, diffusion encryption and compression to image to be protected in host image, to be protected The protection process of image is complicated, therefore more complicated to the reduction process of image to be protected, if malice one's share of expenses for a joint undertaking intercept it is to be protected Implicit image corresponding to image, possible malice one's share of expenses for a joint undertaking are unaware of the data that image to be protected is implied with implicit image at all, Even if malice one's share of expenses for a joint undertaking knows the data that image to be protected is implied with implicit image, it is also difficult to is successfully restored from implicit image Image to be protected, therefore the security of image to be protected is very high.
In embodiments of the present invention, implicit image corresponding to image to be protected is obtained;Level is decomposited from implicit image Component vector and diagonal components vector;According to horizontal component vector sum diagonal components vector, image to be protected is reduced.The present invention exists During being protected to image to be protected, piecemeal scrambling encryption is carried out to image to be protected, upset in image to be protected Location of pixels obtains scramble image, then carries out automatic cell conversion to the pixel of scramble image, further changes image slices The randomness of plain position, encryption is then diffused, gray value statistical chart shows that each Distribution value is uniform in encrypted image, image There is no obvious characteristic information, eliminate obvious grey value characteristics in image.Then hidden after being compressed to encrypted image In host image.Image restoring process is the inverse process that image protects process, considerably increases the difficulty for cracking image to be protected Degree, improve the security of image to be protected.
Embodiment 3
Referring to Fig. 7, the embodiments of the invention provide a kind of image protection device, the device is used to perform above-described embodiment 1 The image guard method provided, the device include:
Acquisition module 30, for obtaining image and host image to be protected;
Modular converter 31, for image to be protected to be converted into encrypted image;
Hidden module 32, for encrypted image to be hidden in host image.
Above-mentioned modular converter 31 includes:
Scramble unit, for entering line shuffle to image to be protected, obtain scramble image;
Ciphering unit is spread, for being diffused encryption to scramble image, obtains diffusion image;
Compression unit, encrypted image is obtained for compressing diffusion image.
Above-mentioned scramble unit, for image to be protected to be divided into, multiple sizes are identical and the image block of non-overlapping copies;Root Upset putting in order for multiple images block according to default upset sequence, obtain resetting image;Automatic cell is carried out to resetting image Conversion, obtains scramble image.
Above-mentioned diffusion ciphering unit, for scramble image to be converted into primary vector;To adjacent pixel in primary vector Gray value carries out step-by-step XOR, and the result of step-by-step XOR and default diffusion sequence are carried out into step-by-step XOR, obtained To secondary vector;Secondary vector is reverted into image, obtains diffusion image.
Above-mentioned compression unit, for being carried out respectively to the gray value of each column pixel in diffusion image according to Chinese remainder theorem Compression, obtains condensation matrix;Condensation matrix is saved as into encrypted image with picture format.
Above-mentioned hidden module 32, for decompositing horizontal component vector sum diagonal components vector from host image;It will add Close image is split as parasitic horizontal vector and parasitic diagoned vector;In host image, horizontal component vector is replaced with into parasitism Horizontal vector, and diagonal components vector is replaced with into parasitic diagoned vector;Image weight is carried out to the host image after replacement operation Structure, obtain implicit image corresponding to image to be protected.
In embodiments of the present invention, image and host image to be protected are obtained;Image to be protected is converted into encrypted image; Encrypted image is hidden in host image.The present invention carries out piecemeal scrambling encryption to image to be protected, upsets image to be protected In location of pixels obtain scramble image, automatic cell conversion is then carried out to the pixel of scramble image, further changes figure As the randomness of location of pixels, encryption is then diffused, gray value statistical chart shows that each Distribution value is uniform in encrypted image, Image does not have obvious characteristic information, eliminates obvious grey value characteristics in image.Then after being compressed to encrypted image It is hidden in host image, considerably increases the difficulty for cracking image to be protected, improves the security of image to be protected.
Embodiment 4
Referring to Fig. 8, the embodiments of the invention provide a kind of image restoring device, the device is used to perform above-described embodiment 2 The image restoring method provided, the device are used for the implicit figure of the image protection device generation provided from above-described embodiment 3 Image to be protected is restored as in, the device includes:
Acquisition module 40, for obtaining implicit image corresponding to image to be protected;
Decomposing module 41, for decompositing horizontal component vector sum diagonal components vector from implicit image;
Recovery module 42, for according to horizontal component vector sum diagonal components vector, reducing image to be protected.
Above-mentioned recovery module 42, for horizontal component vector sum diagonal components vector to be merged into encrypted image;In State's remainder theorem decompresses to encrypted image, obtains diffusion image;Decryption is diffused to diffusion image, obtains scramble image; Order restoring is carried out to scramble image and obtains image to be protected.
In embodiments of the present invention, implicit image corresponding to image to be protected is obtained;Level is decomposited from implicit image Component vector and diagonal components vector;According to horizontal component vector sum diagonal components vector, image to be protected is reduced.The present invention exists During being protected to image to be protected, piecemeal scrambling encryption is carried out to image to be protected, upset in image to be protected Location of pixels obtains scramble image, then carries out automatic cell conversion to the pixel of scramble image, further changes image slices The randomness of plain position, encryption is then diffused, gray value statistical chart shows that each Distribution value is uniform in encrypted image, image There is no obvious characteristic information, eliminate obvious grey value characteristics in image.Then hidden after being compressed to encrypted image In host image.Image restoring process is the inverse process that image protects process, considerably increases the difficulty for cracking image to be protected Degree, improve the security of image to be protected.
The image protection device and image restoring device that the embodiment of the present invention is provided can be the specific hardware in equipment Or it is installed on software or firmware in equipment etc..The device that the embodiment of the present invention is provided, its realization principle and caused skill Art effect is identical with preceding method embodiment, and to briefly describe, device embodiment part does not refer to part, refers to preceding method Corresponding contents in embodiment.It is apparent to those skilled in the art that for convenience and simplicity of description, it is foregoing to retouch The specific work process of system, device and the unit stated, may be referred to the corresponding process in above method embodiment, herein not Repeat again.
In embodiment provided by the present invention, it should be understood that disclosed apparatus and method, can be by others side Formula is realized.Device embodiment described above is only schematical, for example, the division of the unit, only one kind are patrolled Function division is collected, there can be other dividing mode when actually realizing, in another example, multiple units or component can combine or can To be integrated into another system, or some features can be ignored, or not perform.Another, shown or discussed is mutual Coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some communication interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in embodiment provided by the invention can be integrated in a processing unit, also may be used To be that unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent accompanying drawing in individual accompanying drawing, in addition, term " the One ", " second ", " the 3rd " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
Finally it should be noted that:Embodiment described above, it is only the embodiment of the present invention, to illustrate the present invention Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention.The protection in the present invention should all be covered Within the scope of.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of image guard method, it is characterised in that methods described includes:
Obtain image and host image to be protected;
The image to be protected is converted into encrypted image;
The encrypted image is hidden in the host image.
2. according to the method for claim 1, it is characterised in that it is described that the image to be protected is converted into encrypted image, Including:
Line shuffle is entered to the image to be protected, obtains scramble image;
Encryption is diffused to the scramble image, obtains diffusion image;
Compress the diffusion image and obtain encrypted image.
3. according to the method for claim 2, it is characterised in that it is described that line shuffle is entered to the image to be protected, put Random image, including:
The image to be protected is divided into multiple sizes are identical and the image block of non-overlapping copies;
Putting in order for the multiple image block is upset according to default upset sequence, obtains resetting image;
Automatic cell conversion is carried out to the rearrangement image, obtains scramble image.
4. according to the method for claim 2, it is characterised in that it is described that encryption is diffused to the scramble image, obtain Diffusion image, including:
The scramble image is converted into primary vector;
Step-by-step XOR is carried out to the gray value of adjacent pixel in the primary vector, by the result of step-by-step XOR and in advance If spreading sequence carries out step-by-step XOR, secondary vector is obtained;
The secondary vector is reverted into image, obtains diffusion image.
5. according to the method for claim 2, it is characterised in that the compression diffusion image obtains encrypted image, wraps Include:
The gray value of each column pixel in the diffusion image is compressed respectively according to Chinese remainder theorem, obtains compressing square Battle array;
The condensation matrix is saved as into encrypted image with picture format.
6. according to the method for claim 1, it is characterised in that described that the encrypted image is hidden in the host image It is interior, including:
Horizontal component vector sum diagonal components vector is decomposited from the host image;
The encrypted image is split as parasitic horizontal vector and parasitic diagoned vector;
In the host image, the horizontal component vector is replaced with into the parasitic horizontal vector, and by described diagonal point Amount vector replaces with the parasitic diagoned vector;
Image Reconstruction is carried out to the host image after replacement operation, obtains implicit image corresponding to the image to be protected.
7. image restoring method corresponding to the image guard method described in a kind of any one of claim 1-6, it is characterised in that institute The method of stating includes:
Obtain implicit image corresponding to image to be protected;
Horizontal component vector sum diagonal components vector is decomposited from the implicit image;
According to diagonal components vector described in the horizontal component vector sum, the image to be protected is reduced.
8. according to the method for claim 7, it is characterised in that described diagonally to divide according to the horizontal component vector sum Amount vector, the image to be protected is reduced, including:
Diagonal components vector described in the horizontal component vector sum is merged into encrypted image;
The encrypted image is decompressed according to Chinese remainder theorem, obtains diffusion image;
Decryption is diffused to the diffusion image, obtains scramble image;
Order restoring is carried out to the scramble image and obtains the image to be protected.
9. a kind of image protection device, it is characterised in that described device includes:
Acquisition module, for obtaining image and host image to be protected;
Modular converter, for the image to be protected to be converted into encrypted image;
Hidden module, for the encrypted image to be hidden in the host image.
10. a kind of image restoring device, it is characterised in that described device includes:
Acquisition module, for obtaining implicit image corresponding to image to be protected;
Decomposing module, for decompositing horizontal component vector sum diagonal components vector from the implicit image;
Recovery module, for the diagonal components vector according to the horizontal component vector sum, reduce the image to be protected.
CN201710772312.8A 2017-08-31 2017-08-31 Image guard method and device, image restoring method and device Pending CN107563949A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710772312.8A CN107563949A (en) 2017-08-31 2017-08-31 Image guard method and device, image restoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710772312.8A CN107563949A (en) 2017-08-31 2017-08-31 Image guard method and device, image restoring method and device

Publications (1)

Publication Number Publication Date
CN107563949A true CN107563949A (en) 2018-01-09

Family

ID=60977664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710772312.8A Pending CN107563949A (en) 2017-08-31 2017-08-31 Image guard method and device, image restoring method and device

Country Status (1)

Country Link
CN (1) CN107563949A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108961140A (en) * 2018-06-14 2018-12-07 湖北工程学院 Image guard method and device, image restoring method and device
CN109286819A (en) * 2018-10-23 2019-01-29 湖北工程学院 Combine explicit image encryption, decryption method and the device of compression
CN109377442A (en) * 2018-09-12 2019-02-22 湖北工程学院 Image encryption parasitism guard method based on lifting wavelet transform
CN110136046A (en) * 2019-05-20 2019-08-16 李小平 Two image scramblings with thresholding hide and the method for reconstruct
CN110414250A (en) * 2019-07-29 2019-11-05 广东工业大学 Image encryption method and device based on discrete dispersion transformation and chaotic function
CN111222144A (en) * 2018-11-27 2020-06-02 上海耕岩智能科技有限公司 Fingerprint encryption method and device, storage medium and terminal
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN112217957A (en) * 2020-08-28 2021-01-12 深圳市修远文化创意有限公司 Image encryption and decryption method and related device
CN114979404A (en) * 2022-07-27 2022-08-30 荣耀终端有限公司 Image encryption method and related device
CN115314602A (en) * 2022-08-02 2022-11-08 上海理工大学 Multi-image encryption system based on image scaling and associated imaging
US11704418B2 (en) 2018-11-27 2023-07-18 Shanghai Harvest Intelligence Technology Co., Ltd. Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ATEF MASMOUDI 等: "Lossless chaos-based crypto-compression scheme for image protection", 《IET IMAGE PROCESSING》 *
M. BRINDHA等: "A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem", 《APPLIED SOFT COMPUTING》 *
牛永洁等: "基于混沌扩散加密的图像置乱隐藏算法", 《计算机与现代化》 *
陈关荣 等著: "《动力系统的混沌化理论》", 30 April 2006 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108961140A (en) * 2018-06-14 2018-12-07 湖北工程学院 Image guard method and device, image restoring method and device
CN109377442A (en) * 2018-09-12 2019-02-22 湖北工程学院 Image encryption parasitism guard method based on lifting wavelet transform
CN109286819B (en) * 2018-10-23 2021-07-23 湖北工程学院 Joint compression explicit image encryption and decryption method and device
CN109286819A (en) * 2018-10-23 2019-01-29 湖北工程学院 Combine explicit image encryption, decryption method and the device of compression
US11704418B2 (en) 2018-11-27 2023-07-18 Shanghai Harvest Intelligence Technology Co., Ltd. Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal
CN111222144A (en) * 2018-11-27 2020-06-02 上海耕岩智能科技有限公司 Fingerprint encryption method and device, storage medium and terminal
CN110136046A (en) * 2019-05-20 2019-08-16 李小平 Two image scramblings with thresholding hide and the method for reconstruct
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN112035847B (en) * 2019-06-03 2023-10-27 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, electronic equipment and storage medium
CN110414250B (en) * 2019-07-29 2021-05-11 广东工业大学 Image encryption method and device based on discrete fractional transformation and chaotic function
CN110414250A (en) * 2019-07-29 2019-11-05 广东工业大学 Image encryption method and device based on discrete dispersion transformation and chaotic function
CN112217957A (en) * 2020-08-28 2021-01-12 深圳市修远文化创意有限公司 Image encryption and decryption method and related device
CN114979404A (en) * 2022-07-27 2022-08-30 荣耀终端有限公司 Image encryption method and related device
CN115314602A (en) * 2022-08-02 2022-11-08 上海理工大学 Multi-image encryption system based on image scaling and associated imaging
CN115314602B (en) * 2022-08-02 2023-05-09 上海理工大学 Multi-image encryption method based on image scaling and associated imaging

Similar Documents

Publication Publication Date Title
CN107563949A (en) Image guard method and device, image restoring method and device
Brindha et al. A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
CN108199828B (en) Method and device for encrypting color picture
Hanis et al. Double image compression and encryption scheme using logistic mapped convolution and cellular automata
CN107481180B (en) The image encryption method perceived based on cellular automata and splits' positions
CN108961141A (en) Dual Zero watermarking method, system, storage medium and the server of map vector
CN109286819A (en) Combine explicit image encryption, decryption method and the device of compression
CN104951680A (en) Biological characteristic information processing method, storage method and device
US20110210960A1 (en) Hierarchical blurring of texture maps
CN105320613A (en) Systems and methods for dynamic data storage
CN111832035A (en) Image encryption storage method and device
CN104166821B (en) A kind of method and apparatus of data processing
CN110232284B (en) Image encryption method and device
CN112788195A (en) Image processing method, device and equipment
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
US20070040848A1 (en) Fractal image data and image generator
Huang et al. Image encryption algorithm based on chaotic maps
CN116305211A (en) Image encryption processing method and device
Gondim et al. Steerable Fourier number transform with application to image encryption
CN114978466A (en) Fractal-like model and Hilbert synchronous scrambling diffusion encryption method
CN115834257A (en) Cloud electric power data safety protection method and protection system
CN113327217B (en) Convolution processing method and device, computer equipment and storage medium
CN104361550B (en) A kind of digital disorder method based on the labyrinth 2D BacterialGrowth
CN111400731A (en) DNACNott-based quantum image encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109

RJ01 Rejection of invention patent application after publication