CN108881664A - Image storage and deployment method, processing equipment, processing system, storage device - Google Patents

Image storage and deployment method, processing equipment, processing system, storage device Download PDF

Info

Publication number
CN108881664A
CN108881664A CN201810752663.7A CN201810752663A CN108881664A CN 108881664 A CN108881664 A CN 108881664A CN 201810752663 A CN201810752663 A CN 201810752663A CN 108881664 A CN108881664 A CN 108881664A
Authority
CN
China
Prior art keywords
image
encrypted
key
encrypted image
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810752663.7A
Other languages
Chinese (zh)
Other versions
CN108881664B (en
Inventor
刘俊
王宇杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongtou Huaxun Terahertz Technology Co ltd
Original Assignee
Shenzhen Huaxun Ark Terahertz Technology Co Ltd
Shenzhen Huaxun Ark Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huaxun Ark Terahertz Technology Co Ltd, Shenzhen Huaxun Ark Technology Co Ltd filed Critical Shenzhen Huaxun Ark Terahertz Technology Co Ltd
Priority to CN201810752663.7A priority Critical patent/CN108881664B/en
Publication of CN108881664A publication Critical patent/CN108881664A/en
Application granted granted Critical
Publication of CN108881664B publication Critical patent/CN108881664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Image Processing (AREA)

Abstract

This application discloses a kind of storage of image and deployment method, processing equipment, processing system, storage device, which includes receiving original image, wherein the original image is scanned by millimeter wave safety check instrument and obtained;The original image is encrypted, to form encrypted encrypted image and generate key corresponding with the encrypted image;The encrypted image and the key are sent to storage system to store.By the above-mentioned means, millimeter wave safety check instrument can be scanned the original image obtained by the application encrypts storage.

Description

Image storage and deployment method, processing equipment, processing system, storage device
Technical field
This application involves safety check technical fields, more particularly to a kind of storage of image and deployment method, processing equipment, processing System, storage device.
Background technique
Millimeter wave safety check instrument is a kind of rays safety detection apparatus more novel at present, using millimeter wave to most of nonpolar material The strong penetrability expected and the strong reflection to metal material, for detecting the dangerous goods such as hiding cutter, gun, ammunition.
Present inventor has found that the safety check precision of millimeter wave safety check instrument is higher and higher in long-term R&D process, Its image for scanning security staff's acquisition is more and more clear, and the privacy concern of security staff is also badly in need of paying attention to.
Summary of the invention
The application is mainly solving the technical problems that provide a kind of storage of image and deployment method, processing equipment, processing system Millimeter wave safety check instrument can be scanned the original image obtained and encrypt storage by system, storage device.
In order to solve the above technical problems, the technical solution that the application uses is:A kind of image storage method, institute are provided The method of stating includes:Receive original image, wherein the original image is scanned by millimeter wave safety check instrument and obtained;To the original graph As encryption, to form encrypted encrypted image and generate key corresponding with the encrypted image;By the encrypted image and The key is sent to storage system and is stored.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of image deployment method is provided, The method includes:Receive the instruction for opening encrypted image, wherein the encrypted image is to be scanned to obtain by millimeter wave safety check instrument Original image encrypt to be formed;The encrypted image is downloaded from storage system and obtains key corresponding with the encrypted image; It is decrypted using encrypted image described in the key pair, to obtain the original image.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of image processing equipment is provided, Described image processing equipment includes:Transmission circuit;Processing circuit couples the transmission circuit, the processing circuit and the receipts Power Generation Road realizes method described in any of the above-described embodiment when working.
In order to solve the above technical problems, another technical solution that the application uses is:A kind of image processing system is provided, Including the first image processing equipment, the second image processing equipment and storage system;Wherein, the first image processing equipment is used for Original image is received, the original image is scanned by millimeter wave safety check instrument and obtained;The original image is encrypted, to form encryption Encrypted image and generation key corresponding with the encrypted image afterwards;The encrypted image and the key are sent to described Storage system is stored;Second image processing equipment is for receiving the instruction for opening the encrypted image;It is from storage System downloads the encrypted image and obtains key corresponding with the encrypted image;Using encrypted image described in the key pair into Row decryption, to obtain the original image.
In order to solve the above technical problems, another technical solution that the application uses is:It provides a kind of with store function Device, be stored thereon with program data, described program data are executed by server to realize described in any of the above-described embodiment Method.
The beneficial effect of the application is:It is in contrast to the prior art, storage method provided herein includes:It connects The original image that the scanning of millimeter wave safety check instrument obtains is received, and the original image is encrypted and is stored, to protect the privacy of security staff, It prevents from being stolen by non-working person.
In addition, only system internal software can just check original image, i.e., in image deployment method provided herein Unauthorized user is set to obtain encrypted encrypted image, as long as key and enciphering and deciphering algorithm do not leak, illegal user can not be looked into See original image.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application image storage method;
Fig. 2 is the flow diagram of mono- embodiment of step S102 in Fig. 1;
Fig. 3 is the flow diagram of one embodiment of the application image deployment method;
Fig. 4 is the flow diagram of mono- embodiment of step S303 in Fig. 3;
Fig. 5 is the structural schematic diagram of one embodiment of the application image processing equipment;
Fig. 6 is the structural schematic diagram of one embodiment of the application image processing system;
Fig. 7 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making creative labor Embodiment shall fall in the protection scope of this application.
Referring to Fig. 1, Fig. 1 is the flow diagram of one embodiment of the application image storage method, this method is to be based on First image processing equipment end, the first image processing equipment can be communication server etc., image storage provided herein Method includes:
S101:Receive original image, wherein original image is scanned by millimeter wave safety check instrument and obtained.
It specifically, in one embodiment, include that display work station is sent out to millimeter wave safety check instrument before step S101 Swept-volume of making a gift to someone instruction;Millimeter wave safety check instrument is scanned human body after receiving body scans instruction to generate body scans figure Picture, i.e. original image;The original image is sent to display work station by millimeter wave safety check instrument, shows work station by the original image It is transmitted to the first image processing equipment by modes such as wireless network or bluetooths, the first image processing equipment is on the one hand by original graph As be transmitted to sentence figure work station progress manually sentence figure, on the other hand by the original image progress subsequent processing.
S102:Original image is encrypted, to form encrypted encrypted image and generate key corresponding with encrypted image.
Specifically, in one embodiment, above-mentioned steps S102 includes:Using logistic Logistic algorithm to original Beginning image encryption, to form encrypted encrypted image.Logistic Logistic algorithm is a kind of chaos encryption algorithm, former For reason for original image is superimposed chaos sequence to realize that original image encrypts, decryption method is the side reappeared using chaos sequence Method realizes decryption.
It is above-mentioned that original image is encrypted using logistic Logistic algorithm in an application scenarios, added with being formed Encrypted image after close specifically includes:
S201:Default branch parameter μ0With initial chaos parameters x0, wherein 3.569945672 < μ0≤ 4,0 < x0< 1.
Specifically, as 3.569945672 < μ0When≤4, logistic Logistic mapping shows chaotic characteristic, raw At sequence of values have the characteristics that aperiodicity, without repeat, μ03.6,3.7,3.8,3.9,4 etc. can be taken, x0Can take 0.1, 0.2,0.5,0.8 etc..Due to the chaotic characteristic of logistic Logistic mapping, as x twice0Difference very hour, iteration The sequence produced after repeatedly is also far from each other.Such as work as μ0When=3.89765, x0Respectively 0.67856431 and 0.67856432 When, the sequence difference of iteration 100 times generations is very big.Therefore the initial value x of every scan image0It can be different or identical. In addition, the corresponding branch parameter μ of difference original image0It can also be same or different.
S202:Utilize default branch parameter μ0, initial chaos parameters x0It is obtained by way of iteration and is joined comprising M chaos Several First ray, wherein the total number of pixel of size and original image of M is identical.
Specifically, in one embodiment, the pixel of original image can be obtained in advance before step S202 Total number is M, then calculates acquisition First ray using using following mapping equation:
xk+10xk(1-xk);
Wherein, μ0To preset branch parameter;K is subscript, and is >=0 integer, for example, k=0,1,2,3 ... M, xkFor The corresponding chaotic parameter of subscript k, xk+1For the corresponding chaotic parameter of subscript k+1, First ray is:x1,x2,…..,xM, certainly, In other embodiments, also can define First ray is:x0,x1,x2,…..,xM
S203:Chaotic parameters all in First ray are converted to the integer between 0-255, to form the second sequence.
Specifically, in one embodiment, step S203 includes:All chaotic parameters in First ray are uniformly put To 256 modulus after big 100000 times, and then obtain the second sequence of the integer form between 0-255.The purpose of the step be for Subsequent step S204 prepares, will be upper by modulo operation because the color component intensity value of each pixel is between 0-255 It states after First ray is converted to the second sequence of the integer between 0-255, subsequent step S204 is facilitated to handle.
S204:By each color component value of each pixel in original image and the integer in corresponding second sequence The chaotic parameter of form does exclusive or processing, to obtain each color component value of treated each pixel, and then is added Encrypted image after close a, wherein pixel uniquely corresponds to the chaotic parameter of an integer form.
Specifically, in one embodiment, realize that the mode of above-mentioned steps S204 can be:It in advance will be in original image All pixels point be successively numbered from left to right or from right to left line by line, number be followed successively by 1,2,3 ..., M;Then right Pixel in original image is handled one by one as follows, until all pixels point is disposed:Obtain current number For in the corresponding color component value of R, G, B of the pixel of L and the second sequence with xLCorresponding integer value PL, respectively by R, G, B Corresponding color component value and PLExclusive or processing, obtain that treated R' value, G' value and B' value will treated R' value, G' value A pixel is recombined with B' value, to form a pixel of encrypted encrypted image.Certainly, in other implementations In example, other modes can also be used and be numbered, for example, number from top to bottom or from bottom to up by column etc..
In another embodiment, realize that the mode of above-mentioned steps S204 can be:Assuming that original image includes A*B Pixel, each pixel have its corresponding coordinate, and coordinate is initiated with (1,1), and terminal is (A, B);By above-mentioned steps Each of the second sequence integer that S203 is formed all generates corresponding coordinate, and coordinate is initiated with (1,1), terminal be (A, B);Pixel in original image is handled one by one as follows, until all pixels point is disposed:It obtains and works as Integer value P in corresponding second sequence of preceding pixel point coordinateL, the corresponding color component value of R, G, B of current pixel point is obtained, Respectively by the corresponding color component value of R, G, B and PLExclusive or processing, obtain that treated R' value, G' value and B' value, after processing R' value, G' value and B' value recombine a pixel, to form a pixel of encrypted encrypted image.
Certainly, in other embodiments, other encryption methods in the prior art can also be used to carry out original image Encryption, the application are not construed as limiting this.
S103:Encrypted image and key are sent to storage system to store.
Specifically, in one embodiment, storage system includes database and storage server, above-mentioned steps S103 tool Body includes:Key is sent to database to store, encrypted image is sent to storage server and is stored.I.e. by key It is stored separately with encrypted image, certainly, in other embodiments, key and encrypted image can also be stored together, this Shen Please this is not construed as limiting.In an application scenarios, preset-key metadata table in database, one key of every acquisition, key Metadata table can be corresponded to and is updated.In another application scenarios, storage server can store simultaneously encrypted image and with this The information such as the corresponding filename of encrypted image, in order to which the later period can be according to the information acquisitions such as such as filename encrypted image.
In another embodiment, further include before above-mentioned steps S103:Obtain the message of encrypted encrypted image The 5th edition MD5 value of digest algorithm, Message Digest 5 MD5 value are equivalent to the digital finger-print of encrypted image, each encrypted image Message Digest 5 MD5 value is different.Above-mentioned key includes:Message Digest Algorithm 5 MD5 value, default branch parameter μ0And First ray.
Referring to Fig. 3, Fig. 3 is the flow diagram of one embodiment of the application image deployment method, this method is to be based on Second image processing equipment end, the second image processing equipment can be network server etc., and this method includes:
S301:Receive the instruction for opening encrypted image, wherein encrypted image is the original obtained by the scanning of millimeter wave safety check instrument Beginning image encryption is formed.
Specifically, in one embodiment, staff logs into system, access scan record from web browser Original list, every record storage of scanning record sheet have the image information for scanning generation each time:File address, filename, Device id, creation time etc.;When one records and when carrying out checking image in staff's selective listing, the second image procossing is set It is standby to receive the instruction for opening encrypted image.
S302:Encrypted image is downloaded from storage system and obtains key corresponding with encrypted image.
Specifically, in one embodiment, storage system includes database and storage server, above-mentioned steps S302 tool Body includes:Encrypted image is downloaded from storage server;Key corresponding with encrypted image is obtained from storage server.
In another embodiment, key corresponding with encrypted image is obtained in above-mentioned steps S302 includes:Added The Message Digest Algorithm 5 MD5 value of close image;The key metadata table being stored in advance within the storage system is called, to obtain Key comprising Message Digest Algorithm 5 MD5 value, wherein key includes:Message Digest Algorithm 5 MD5 value is preset Branch parameter μ0And First ray, First ray include M chaotic parameter, the pixel of the size and original image of M it is total Number is identical.Since the Message Digest 5 MD5 value of each encrypted image is different, according to the Message Digest 5 MD5 value it is available to the unique corresponding key of the encrypted image.
S303:It is decrypted using key pair encryption image, to obtain original image.
Specifically, in one embodiment, referring to Fig. 4, Fig. 4 is the process of mono- embodiment of step S303 in Fig. 3 Schematic diagram, above-mentioned steps S303 include:
S401:Chaotic parameters all in First ray are converted to the integer between 0-255, to form the second sequence;Example Such as, can by after unified 100000 times of the amplification of all chaotic parameters in First ray to 256 modulus, and then obtain 0-255 it Between integer form the second sequence.
S402:By each color component value of each pixel in encrypted image and the integer in corresponding second sequence The chaotic parameter of form does exclusive or processing, to obtain each color component value of treated each pixel, and then is solved Original image after close a, wherein pixel uniquely corresponds to the chaotic parameter of an integer form.Specifically, the step with it is upper State similar in step S204, details are not described herein.
Referring to Fig. 5, Fig. 5 is the structural schematic diagram of one embodiment of the application image processing equipment.It is provided herein Image processing equipment can be the communication server, be also possible to network server etc., image processing equipment includes transmission circuit 101 and processing circuit 102;Wherein, processing circuit 101 couples transmission circuit 102, and processing circuit 101 and transmission circuit 102 work When any of the above-described embodiment in the step in image storage method or the step in image deployment method.Certainly, in other realities It applies in example, image processing equipment may also comprise other, for example, display circuit etc., the application is not construed as limiting this.
Referring to Fig. 6, Fig. 6 is the structural schematic diagram of one embodiment of the application image processing system, the image procossing system System includes the first image processing equipment 201, the second image processing equipment 202 and storage system 203.
In an application scenarios, the first image processing equipment 201 can be the communication server, the first vision facilities 201 For receiving original image, original image is scanned by millimeter wave safety check instrument and is obtained;Original image is encrypted, it is encrypted to be formed Encrypted image simultaneously generates key corresponding with encrypted image;Encrypted image and key are sent to storage system 203 to store.
In another application scenarios, the second image processing equipment 202 can be network server or client screening network Server, the second image processing equipment 202 are used to receive the instruction for opening encrypted image;Encryption figure is downloaded from storage system 203 Picture simultaneously obtains key corresponding with encrypted image;It is decrypted using key pair encryption image, to obtain original image.
In another application scenarios, encrypted image and key are stored separately, storage system provided herein 203 include database 204 and storage server 205, and for key storage in database 204, encrypted image is stored in storage service In device 205.
In another application scenarios, image processing system provided herein may also include other, for example, display work Stand, sentence figure work station, millimeter wave safety check instrument etc., the application is not construed as limiting this.
Referring to Fig. 7, Fig. 7 is the structural schematic diagram for one embodiment of device that the application has store function, this has The device 30 of store function is stored thereon with program data 300, and program data 300 realizes any of the above-described reality when being executed by processor Apply image storage method in example or the step in image deployment method.In an application scenarios, this has store function Device 30 can be USB flash disk, hard disk etc..
To sum up, being in contrast to the prior art, storage method provided herein includes:Receive millimeter wave peace The original image that instrument scanning obtains is examined, and the original image is encrypted and is stored, to protect the privacy of security staff, is prevented by non-work It is stolen as personnel.In addition, only system internal software can just check original graph in image deployment method provided herein Picture, even if unauthorized user obtains encrypted encrypted image, as long as key and enciphering and deciphering algorithm do not leak, illegal user without Method checks original image.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field similarly includes in the scope of patent protection of the application.

Claims (16)

1. a kind of image storage method, which is characterized in that the method includes:
Receive original image, wherein the original image is scanned by millimeter wave safety check instrument and obtained;
The original image is encrypted, to form encrypted encrypted image and generate key corresponding with the encrypted image;
The encrypted image and the key are sent to storage system to store.
2. the method according to claim 1, wherein described encrypt the original image, after forming encryption Encrypted image, including:
The original image is encrypted using logistic Logistic algorithm, to form the encrypted encrypted image.
3. according to the method described in claim 2, it is characterized in that, described utilize logistic Logistic algorithm to the original Beginning image encryption, to form encrypted encrypted image, including:
Default branch parameter μ0With initial chaos parameters x0, wherein 3.569945672 < μ0≤ 4,0 < x0< 1;
Utilize the default branch parameter μ0, initial chaos parameters x0Comprising M chaotic parameter is obtained by way of iteration One sequence, wherein the size of M is identical as the total number of the pixel of the original image;
Chaotic parameters all in the First ray are converted to the integer between 0-255, to form the second sequence;
By each color component value of each pixel in the original image and the integer in corresponding second sequence The chaotic parameter of form does exclusive or processing, to obtain each color component value of treated each pixel, and then is added The encrypted image after close a, wherein pixel uniquely corresponds to the chaotic parameter of an integer form.
4. according to the method described in claim 3, it is characterized in that, described utilize the default branch parameter μ0, original chaotic ginseng Number x0The First ray comprising M chaotic parameter is obtained by way of iteration includes:
It is calculated using following mapping equation and obtains the First ray:
xk+10xk(1-xk);
Wherein, μ0For the default branch parameter;K is subscript, and is >=0 integer, xkFor the corresponding chaotic parameter of subscript k, xk+1For the corresponding chaotic parameter of subscript k+1.
5. according to the method described in claim 3, it is characterized in that, described convert chaotic parameters all in the First ray At the integer between 0-255, to form the second sequence, including:
By after unified 100000 times of the amplification of all chaotic parameters in the First ray to 256 modulus, and then obtain 0-255 it Between integer form second sequence.
6. according to the method described in claim 3, it is characterized in that,
It is described generate corresponding with encrypted image key before, the method also includes:Obtain the encrypted encryption The Message Digest Algorithm 5 MD5 value of image;
The key includes:The Message Digest Algorithm 5 MD5 value, default branch parameter μ0And the First ray.
7. the method according to claim 1, wherein the storage system includes database and storage server, It is described the encrypted image and the key are sent to storage system to store, including:
The key is sent to the database to store, the encrypted image is sent to the storage server and is carried out Storage.
8. a kind of image deployment method, which is characterized in that the method includes:
Receive the instruction for opening encrypted image, wherein the encrypted image is the original graph obtained by the scanning of millimeter wave safety check instrument As encryption is formed;
The encrypted image is downloaded from storage system and obtains key corresponding with the encrypted image;
It is decrypted using encrypted image described in the key pair, to obtain the original image.
9. according to the method described in claim 8, it is characterized in that, described obtain key packet corresponding with the encrypted image It includes:
Obtain the Message Digest Algorithm 5 MD5 value of the encrypted image;
The key metadata table being stored in advance within the storage system is called, includes the Message Digest 5 the 5th to obtain The key of version MD5 value, wherein the key includes:The Message Digest Algorithm 5 MD5 value, default branch parameter μ0, with And First ray, the First ray include M chaotic parameter, the total number of the size of M and the pixel of the original image It is identical.
10. according to the method described in claim 9, it is characterized in that, described carried out using encrypted image described in the key pair Decryption, to obtain the original image, including:
Chaotic parameters all in the First ray are converted to the integer between 0-255, to form the second sequence;
By each color component value of each pixel in the encrypted image and the integer in corresponding second sequence The chaotic parameter of form does exclusive or processing, to obtain each color component value of treated each pixel, and then is solved The original image after close a, wherein pixel uniquely corresponds to the chaotic parameter of an integer form.
11. according to the method described in claim 10, it is characterized in that, described turn chaotic parameters all in the First ray The integer being melted between 0-255, to form the second sequence, including:
By after unified 100000 times of the amplification of all chaotic parameters in the First ray to 256 modulus, and then obtain 0-255 it Between integer form second sequence.
12. according to the method described in claim 8, it is characterized in that, the storage system includes database and storage server, It is described to download the encrypted image from storage system and obtain key corresponding with the encrypted image, including:
The encrypted image is downloaded from the storage server;It is obtained from the storage server corresponding with the encrypted image The key.
13. a kind of image processing equipment, which is characterized in that described image processing equipment includes:
Transmission circuit;
Processing circuit, couples the transmission circuit, and the processing circuit and the transmission circuit realize claim 1-7 when working Or the described in any item methods of 8-12.
14. a kind of image processing system, which is characterized in that including the first image processing equipment, the second image processing equipment and deposit Storage system;
Wherein, the first image processing equipment is scanned for receiving original image, the original image by millimeter wave safety check instrument It obtains;The original image is encrypted, to form encrypted encrypted image and generate key corresponding with the encrypted image; The encrypted image and the key are sent to the storage system to store;
Second image processing equipment is for receiving the instruction for opening the encrypted image;The encryption is downloaded from storage system Image simultaneously obtains key corresponding with the encrypted image;It is decrypted using encrypted image described in the key pair, to obtain The original image.
15. system according to claim 14, which is characterized in that the storage system includes database and storage service Device, in the database, the encrypted image is stored in the storage server key storage.
16. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data bedding and clothing Device execution be engaged in realize the described in any item methods of claim 1-7 or 8-12.
CN201810752663.7A 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device Active CN108881664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810752663.7A CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810752663.7A CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Publications (2)

Publication Number Publication Date
CN108881664A true CN108881664A (en) 2018-11-23
CN108881664B CN108881664B (en) 2021-03-19

Family

ID=64300750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810752663.7A Active CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Country Status (1)

Country Link
CN (1) CN108881664B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995690A (en) * 2019-11-28 2020-04-10 深圳供电局有限公司 Secure storage method and device based on cloud storage
CN114339282A (en) * 2021-12-27 2022-04-12 上海哔哩哔哩科技有限公司 Method and device for transmitting anchor image picture in live broadcast interaction

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610408A (en) * 2008-06-16 2009-12-23 北京智安邦科技有限公司 Video protection disorder method and structure
CN201860384U (en) * 2010-08-02 2011-06-08 华南师范大学 Video encryption camera
CN103916234A (en) * 2014-04-11 2014-07-09 中国人民解放军沈阳军区总医院 Chaos medical image encryption method applied to privacy protection
CN104182926A (en) * 2014-07-25 2014-12-03 南京邮电大学 Color image encryption method based on Hilbert transform and chaos Liu algorithm
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
KR101677110B1 (en) * 2016-03-14 2016-11-17 주식회사우경정보기술 Watermark extracting and insertion apparatus for video forgery detection and prevention based zero-knowledge and the method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610408A (en) * 2008-06-16 2009-12-23 北京智安邦科技有限公司 Video protection disorder method and structure
CN201860384U (en) * 2010-08-02 2011-06-08 华南师范大学 Video encryption camera
CN103916234A (en) * 2014-04-11 2014-07-09 中国人民解放军沈阳军区总医院 Chaos medical image encryption method applied to privacy protection
CN104182926A (en) * 2014-07-25 2014-12-03 南京邮电大学 Color image encryption method based on Hilbert transform and chaos Liu algorithm
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
KR101677110B1 (en) * 2016-03-14 2016-11-17 주식회사우경정보기술 Watermark extracting and insertion apparatus for video forgery detection and prevention based zero-knowledge and the method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何松林: "基于混沌序列的数字彩色图像加密算法", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995690A (en) * 2019-11-28 2020-04-10 深圳供电局有限公司 Secure storage method and device based on cloud storage
CN114339282A (en) * 2021-12-27 2022-04-12 上海哔哩哔哩科技有限公司 Method and device for transmitting anchor image picture in live broadcast interaction

Also Published As

Publication number Publication date
CN108881664B (en) 2021-03-19

Similar Documents

Publication Publication Date Title
CN109858262B (en) Process approval method, device and system based on block chain system and storage medium
CN106304074B (en) Auth method and system towards mobile subscriber
JP5925335B2 (en) Network security protection method, apparatus and system
CN105590040B (en) For the method and system of the Digital Right Management of encrypted digital content
CN113872762B (en) Quantum encryption communication system based on power distribution terminal equipment and use method thereof
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
CN107454558B (en) Method for achieving Bluetooth automatic connection of master device and slave device through shared information
CN105227565A (en) Anti-reversing for Android system cracks the method and apparatus of shared object file
CN105099676A (en) User login method, user terminal and server
CN105787682A (en) Logistics business information processing method, related device, and related system
CN105320535A (en) Checking method of installation package, client side, server and system
CN109379351B (en) Two-dimensional code encryption method, storage medium, equipment and system
CN108667598B (en) Device and method for realizing secure key exchange and secure key exchange method
CN108881664A (en) Image storage and deployment method, processing equipment, processing system, storage device
Shrivastava et al. A new hybrid encryption and steganography technique: a survey
CN108174053B (en) Decryption area limited image encryption method based on oriented area and playing card mapping
CN104462877A (en) Digital resource acquisition method and system under copyright protection
CN106452755B (en) The method, apparatus and system of resetting protection password based on client decryption ciphertext
CN116455572B (en) Data encryption method, device and equipment
Sait et al. Modeling of multiple share creation with optimal signcryption technique for digital image security
Por et al. StegCure: a comprehensive steganographic tool using enhanced LSB scheme
CN115225329A (en) File verification data generation method and device, electronic equipment and readable storage medium
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN112565156B (en) Information registration method, device and system
CN111385083A (en) Key protection method and key protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Applicant after: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.

Address before: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Applicant before: SHENZHEN CCT THZ TECHNOLOGY Co.,Ltd.

Applicant before: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20210630

Granted publication date: 20210319

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20230421

Granted publication date: 20210319

PD01 Discharge of preservation of patent
TR01 Transfer of patent right

Effective date of registration: 20230613

Address after: 518000 Shenzhen, Baoan District, Xixiang, Guangdong Xixiang street, thirty-seventh fields, 430 estate.

Patentee after: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Address before: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Patentee before: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right