CN110855362B - Secret communication method and system based on visible light LED matrix - Google Patents

Secret communication method and system based on visible light LED matrix Download PDF

Info

Publication number
CN110855362B
CN110855362B CN201911125058.8A CN201911125058A CN110855362B CN 110855362 B CN110855362 B CN 110855362B CN 201911125058 A CN201911125058 A CN 201911125058A CN 110855362 B CN110855362 B CN 110855362B
Authority
CN
China
Prior art keywords
key
led matrix
ciphertext
information
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911125058.8A
Other languages
Chinese (zh)
Other versions
CN110855362A (en
Inventor
张健
覃翠
何睿清
余辉龙
赵静
魏峘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Institute of Technology
Original Assignee
Nanjing Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Institute of Technology filed Critical Nanjing Institute of Technology
Priority to CN201911125058.8A priority Critical patent/CN110855362B/en
Publication of CN110855362A publication Critical patent/CN110855362A/en
Application granted granted Critical
Publication of CN110855362B publication Critical patent/CN110855362B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/116Visible light communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/501Structural aspects
    • H04B10/502LED transmitters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32309Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Facsimile Transmission Control (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a secret communication method based on a visible light LED matrix, which comprises the following steps: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens; respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal; the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture. The invention adopts the picture as the transmission carrier of the information, the distortion in the transmission process is small, and the confidentiality effect is good; by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, the difference between an image carrying information and an image not carrying information can not be distinguished by human eyes, and the security of the encrypted image is improved.

Description

Secret communication method and system based on visible light LED matrix
Technical Field
The invention relates to the technical field of picture communication, in particular to a secret communication method and system based on a visible light LED matrix.
Background
The communication stealing is the most convenient, the most safe and the most reliable way in modern stealing means, and various advanced stealing technical means are developed and used for stealing secret information in communication, so the secrecy of communication is more important than that of the prior art at any time.
Because the pixels of the image can reach more than one million, the information transmitted by using one picture is far larger than that of the traditional key system. In the method, after transfer information is loaded on an original image, a regenerated image is reconstructed, so that two reconstructed images carrying the transfer information are obtained, the reconstructed images are sent to a receiving party, and the receiving party obtains the transfer information after restoring the two reconstructed images. According to the specific embodiment, in the invention, the image sent to the receiver comprises a part of the transmitted information and a part of the original image respectively, and human eyes cannot acquire any information from the reconstructed image. The method realizes the confidential transmission of information to a certain extent, but due to the particularity of the generated reconstructed image, the human eyes can recognize the transmitted information in the reconstructed image, so that cracking personnel can be attracted to analyze and crack the reconstructed image or directly destroy the reconstructed image.
The invention patent with patent number CN102916745A, "LED lighting device, wireless optical communication device and system", proposes a wireless optical communication device, which includes a light valve and an information control unit; the light signal emitted by the light source body irradiates the light valve; the information control unit is used for carrying out digital processing on the information to be transmitted and controlling the opening and closing of the light valve according to a processing result; and the optical signal passing through the light valve is received by a receiving device corresponding to the wireless optical communication device and is analyzed to be restored into the information to be transmitted. The opening and closing of the light valve are controlled through the information control unit, so that the information to be transmitted is modulated onto visible light emitted by the light source to be transmitted, the communication function can be realized while illumination is carried out, and communication can be realized without occupying a special communication frequency band. The method converts the transmission information into optical signals to realize effective transmission of the information. However, firstly, this method cannot realize secure transmission, and a person with confidence can analyze the transmitted information by the same method by simply intercepting the content of the optical signal, and secondly, the quality of the optical signal transmission path is too much dependent, and once the optical signal transmission process is interfered by ambient light and the like, information transmission errors are very easily caused.
Disclosure of Invention
The invention aims to provide a secret communication method and a secret communication system based on a visible light LED matrix, wherein a secret key and a ciphertext signal are loaded on an LED matrix driving signal to be converted into an optical signal, and the converted optical signal is superposed on an original picture to realize secret transmission of information; meanwhile, because human eyes cannot distinguish the brightness change of which the brightness change is less than 2 percent, the human eyes cannot distinguish the difference between an image carrying information and an image not carrying information by reasonably setting the period and the duty ratio of a binary information ciphertext generated by conversion, and the safety of an encrypted picture is improved; in addition, the mode of generating the long key by the short key is adopted, the problem that the information sending party and the information receiving party spend a large amount of resources to transmit the long key is solved, and the transmission efficiency and the safety of the key are improved.
To achieve the above object, with reference to fig. 1, the present invention provides a secret communication method based on a visible light LED matrix, the communication method comprising:
s1: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens;
s2: respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal;
wherein, the binary key code generated by conversion does not coincide with the high level position corresponding to the binary ciphertext code;
s3: the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture.
In a further embodiment, the LED matrix comprises N x N LED point light sources;
the secret key and the ciphertext to be transmitted are converted into N binary key codes and N binary ciphertext codes respectively.
In a further embodiment, the binary key code and the binary ciphertext code have a period of 10ms and a duty cycle of 1%.
In a further embodiment, the communication method further includes:
s01: the information receiver issues a public key of a non-heap encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key;
s03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
The communication method further comprises:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
In a further embodiment, the process of decrypting the encrypted picture using the key ciphertext and the agreed original picture to obtain the received ciphertext content includes the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray-scale image carrying key information by using the original image and the key;
s43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
In a further embodiment, the generating a gray-scale map carrying key information by using the original picture and the key includes:
if the original picture is a color picture, one of the three primary colors is used as a gray scale image.
In a further embodiment, the communication method comprises:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and then sends the encrypted key to an information receiver;
the two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is larger than the original key length.
Based on the foregoing secure communication method, the present invention also provides a secure communication system based on a visible light LED matrix, the secure communication system comprising:
(1) the information transmission device is respectively arranged on the information receiving party and the information sending party and used for establishing a communication link between the information receiving party and the information sending party;
(2) the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext;
(3) the encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying an appointed original picture and a shooting unit;
the LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens;
the LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit;
the LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix;
the shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
Compared with the prior art, the technical scheme of the invention has the following remarkable beneficial effects:
(1) the pictures are used as the transmission carriers of the information, so that the distortion in the transmission process is small, and the confidentiality effect is good.
(2) Because human eyes can not distinguish the brightness change of which the brightness change is less than 2%, the human eyes can not distinguish the difference between an image carrying information and an image not carrying information by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, and the safety of the encrypted image is improved.
(3) In addition, the mode of generating the long key by the short key is adopted, the problem that the information sending party and the information receiving party spend a large amount of resources to transmit the long key is solved, and the transmission efficiency and the safety of the key are improved.
It should be understood that all combinations of the foregoing concepts and additional concepts described in greater detail below can be considered as part of the inventive subject matter of this disclosure unless such concepts are mutually inconsistent. In addition, all combinations of claimed subject matter are considered a part of the presently disclosed subject matter.
The foregoing and other aspects, embodiments and features of the present teachings can be more fully understood from the following description taken in conjunction with the accompanying drawings. Additional aspects of the present invention, such as features and/or advantages of exemplary embodiments, will be apparent from the description which follows, or may be learned by practice of specific embodiments in accordance with the teachings of the present invention.
Drawings
The drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures may be represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. Embodiments of various aspects of the present invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a flow chart of the secure communication method based on the visible light LED matrix of the present invention.
Fig. 2 is a schematic structural diagram of the secure communication system based on the visible light LED matrix according to the present invention.
Fig. 3 is a schematic diagram of binary codes of the key (3A), the ciphertext (3B), and the encrypted ciphertext (3C) according to the present invention.
Fig. 4 is a schematic diagram of a grayscale map of a picture carrying key information (4A), a grayscale map of a picture carrying ciphertext (4B), and a grayscale map of a picture carrying key and ciphertext information (4C).
Detailed Description
In order to better understand the technical content of the present invention, specific embodiments are described below with reference to the accompanying drawings.
With reference to fig. 1, the present invention refers to a secret communication method based on a visible light LED matrix, said communication method comprising:
s1: the LED matrix, the lens and the appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and the emitted light beams are imaged on the original picture through the lens.
S2: and respectively converting the secret key and the ciphertext to be transmitted into a binary code format, and adding the binary code format and the ciphertext into an encrypted ciphertext to be loaded on the LED matrix driving signal.
Wherein, the high level positions corresponding to the binary key code and the binary ciphertext code generated by conversion are not coincident.
S3: the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture.
Based on the secret communication method, the invention also provides a secret communication system based on the visible light LED matrix, and the secret communication system comprises an information transmission device, an information processing device and an encryption device.
And the information transmission devices are respectively arranged at the information receiving party and the information sending party and are used for establishing a communication link between the information receiving party and the information sending party.
And the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext.
The encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying appointed original pictures and a shooting unit.
The LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens.
The LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit.
The LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix.
The shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
The secure communication system is composed of an LED matrix, a lens and a picture, and the structure of the secure communication system is shown in figure 2. An LED matrix a, which contains N x N LED point sources, is placed at the object focal plane of the lens B as a source of visible light. The point light source is powered by a direct current power supply to generate a continuous visible light source. The picture is placed at the image focal plane of the lens B, and the LED matrix A is imaged on the picture C through the lens, namely the N × N point light sources are imaged on the picture and are also N × N image points. The information of the point light sources can be obtained by photographing the picture by using a camera, the point light sources of the N-N matrix can be regarded as N-N binary codes, and the information of the binary codes can be obtained by reading the picture photographed by the camera.
A random N x N binary code with a period of 10ms and a duty cycle of 1% is loaded on the LED matrix point light source to form a key, as shown in fig. 3A. The ciphertext to be transmitted is converted into a binary ciphertext code having a period of 10ms and a duty cycle of 1% N x N, which is superimposed on the binary key code as shown in fig. 3B. In order to distinguish the binary cipher code from the binary key code, it is required that a position of a high level in the binary cipher code does not coincide with a position of a high level in the binary key code. The final binary information code is composed of an N x N matrix with a period of 10ms and a duty cycle of 2%, as shown in fig. 3C.
After a picture is shot by a camera, human eyes cannot distinguish the brightness change with the brightness change of less than 2%, so that the human eyes cannot distinguish the difference between an image carrying information and an image not carrying information.
It should be understood that the number of rows and columns of the LED matrix is not fixed, and is determined by the amount of information or key hierarchy to be carried. The parameters of the binary code generated by the conversion of the key and the information to be transmitted match, preferably coincide, with the parameters of the LED matrix, in order to facilitate the loading of the control, as previously described N x N.
In some methods, the communication method further comprises:
s01: the information receiver distributes the public key of the non-heap encryption system through a public channel.
S02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key.
S03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
And then the information sender generates an encrypted picture carrying transmission information by using the binary key and the original picture according to the encryption method, and transmits the encrypted picture to the information receiver.
Preferably, the communication method further includes:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
Specifically, in step S4, the process of decrypting the encrypted picture using the key ciphertext and the agreed original picture to obtain the received ciphertext content includes the following steps:
s41: and receiving the key ciphertext, and decrypting the key ciphertext by adopting the public key to obtain the key.
S42: and generating a gray scale image carrying the key information by using the original picture and the key, wherein if the original picture is a color picture, one of the three primary colors is appointed to be used as the gray scale image.
S43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
The invention also provides a key processing method for the picture transmission information.
The communication method comprises the following steps:
the information sending party generates an original key, and the original key is sent to the information receiving party after being encrypted by a public key in an asymmetric encryption system.
The two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key.
Wherein the length of the key required for the transmission is larger than the original key length.
Because the pixels of the picture are huge, the required key length is too large, and key transmission is not facilitated. Therefore, the problem is solved by adopting a mode of generating a long key by using a short key. The specific process is as follows:
first, the sender generated key (e.g., 160-bit binary).
And secondly, the sender sends the key to the receiver through a public key in an asymmetric encryption system.
And thirdly, the two parties use the key as input to calculate an SHA-1 function to obtain a new 160-bit binary system.
And fourthly, performing SHA-1 function calculation by taking the calculated 160 binary system as an input, and repeating the process until the required number of keys is obtained.
Preferably, security is improved by rekeying. For example, when information transmission is needed next time, the asymmetric key system is reused to transmit the keys, so that the inconsistency of the keys transmitted each time is ensured, and the confidentiality is improved.
In this disclosure, aspects of the present invention are described with reference to the accompanying drawings, in which a number of illustrative embodiments are shown. Embodiments of the present disclosure are not necessarily defined to include all aspects of the invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in greater detail below, may be implemented in any of numerous ways, as the disclosed concepts and embodiments are not limited to any one implementation. In addition, some aspects of the present disclosure may be used alone, or in any suitable combination with other aspects of the present disclosure.
Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the protection scope of the present invention should be determined by the appended claims.

Claims (9)

1. A secret communication method based on a visible light LED matrix is characterized by comprising the following steps:
s1: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens;
s2: respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal;
wherein, the binary key code generated by conversion does not coincide with the high level position corresponding to the binary ciphertext code;
s3: shooting an original picture on which light beams emitted by the LED matrix are superposed to generate an encrypted picture;
and setting the period and duty ratio of the binary information ciphertext generated by conversion to enable the brightness change of the encrypted picture relative to the original picture to be below 2%.
2. The method of claim 1, wherein the LED matrix comprises N x N LED point light sources;
the secret key and the ciphertext to be transmitted are converted into N binary key codes and N binary ciphertext codes respectively.
3. The secret communication method based on the visible light LED matrix as claimed in claim 1, wherein the binary key code and the binary ciphertext code have a period of 10ms and a duty cycle of 1%.
4. The secure communication method based on the visible light LED matrix according to claim 1, wherein the communication method further comprises:
s01: the information receiver issues a public key of a non-heap encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key;
s03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
5. The secure communication method based on the visible light LED matrix according to claim 4, wherein the communication method further comprises:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
6. The secret communication method based on visible light LED matrix as claimed in claim 5, wherein in step S4, said process of decrypting the encrypted picture with the key ciphertext and the appointed original picture to obtain the received ciphertext content comprises the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray-scale image carrying key information by using the original image and the key;
s43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
7. The secret communication method based on visible light LED matrix as claimed in claim 6, wherein in step S42, said generating a gray-scale map carrying key information by using original picture and key comprises:
if the original picture is a color picture, one of the three primary colors is used as a gray scale image.
8. A method of secure communication based on a matrix of visible light LEDs according to claim 1, wherein the method of communication comprises:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and then sends the encrypted key to an information receiver;
the two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is larger than the original key length.
9. A secure communication system based on a visible light LED matrix, the secure communication system comprising:
the information transmission device is respectively arranged on the information receiving party and the information sending party and used for establishing a communication link between the information receiving party and the information sending party;
the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext;
the encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying an appointed original picture and a shooting unit;
the LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens;
the LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit;
the LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix;
the shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
CN201911125058.8A 2019-11-18 2019-11-18 Secret communication method and system based on visible light LED matrix Active CN110855362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911125058.8A CN110855362B (en) 2019-11-18 2019-11-18 Secret communication method and system based on visible light LED matrix

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911125058.8A CN110855362B (en) 2019-11-18 2019-11-18 Secret communication method and system based on visible light LED matrix

Publications (2)

Publication Number Publication Date
CN110855362A CN110855362A (en) 2020-02-28
CN110855362B true CN110855362B (en) 2021-08-03

Family

ID=69600469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911125058.8A Active CN110855362B (en) 2019-11-18 2019-11-18 Secret communication method and system based on visible light LED matrix

Country Status (1)

Country Link
CN (1) CN110855362B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111885404A (en) * 2020-07-16 2020-11-03 RealMe重庆移动通信有限公司 Data transmission method, device and storage medium
CN112118046B (en) * 2020-09-22 2021-08-24 中国科学院半导体研究所 Encrypted electronic voting system and method based on indoor LED visible light communication

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102820922A (en) * 2012-07-31 2012-12-12 深圳光启创新技术有限公司 Asynchronous encryption visible light communication method and system
CN202976274U (en) * 2012-11-28 2013-06-05 成都科达光电技术有限责任公司 Door control restricted identification system based on spatial light modulator
US8792674B2 (en) * 2010-10-11 2014-07-29 Graphic Security Systems Corporation Method for encoding and simultaneously decoding images having multiple color components
CN104715532A (en) * 2015-04-07 2015-06-17 南开大学 Electronic coded lock system based on visible light communication technique and encryption method of system
CN105119924A (en) * 2015-09-01 2015-12-02 成都汇合乾元科技有限公司 Information transmission method
CN205490552U (en) * 2016-04-09 2016-08-17 哈尔滨理工大学 Image transmission based on visible light communication
CN205507797U (en) * 2016-02-03 2016-08-24 广州中国科学院先进技术研究所 Ultra -thin vein image identification system towards mobile payment
CN108564033A (en) * 2018-04-12 2018-09-21 Oppo广东移动通信有限公司 Safe verification method, device based on structure light and terminal device
CN110099261A (en) * 2019-02-22 2019-08-06 南京工程学院 A kind of LED dot matrix backlight, projection arrangement and the projecting method of projection device
CN110113155A (en) * 2019-04-28 2019-08-09 电子科技大学 One kind is efficiently without CertPubKey encryption method
CN110312055A (en) * 2019-07-03 2019-10-08 上海理工大学 A kind of more image encryption methods and decryption method based on light field sub-aperture image

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2007222986B2 (en) * 2006-03-09 2012-01-12 Tessarae Llc Microarray imaging system and associated methodology
CN202257581U (en) * 2011-08-31 2012-05-30 北京航空航天大学 Device for carrying out authority authentication on defined areas based on visible-light communication
KR20150022276A (en) * 2013-08-22 2015-03-04 삼성전자주식회사 Apparatas and method for extravting a encrypted message of image file in an electronic device
CN103986517B (en) * 2014-05-30 2017-01-18 中国人民解放军信息工程大学 Method and system for transmitting information through dynamic two-dimensional image information
CN103986516A (en) * 2014-05-30 2014-08-13 中国人民解放军信息工程大学 Visible light communication system and method
CN104468090B (en) * 2014-11-12 2017-07-28 辽宁大学 Character cipher coding method based on image pixel coordinates
US9985933B2 (en) * 2014-12-29 2018-05-29 Entefy Inc. System and method of sending and receiving secret message content over a network
CN105049176B (en) * 2015-06-11 2017-12-29 湘潭大学 Decryption method for view data safe transmission
CN104868989B (en) * 2015-06-11 2017-11-17 湘潭大学 Encryption method for view data safe transmission
CN106599698B (en) * 2015-10-19 2019-09-20 腾讯科技(深圳)有限公司 A kind of method and apparatus for encrypting picture, decrypting picture
CN107342977A (en) * 2017-05-26 2017-11-10 芯盾网安(北京)科技发展有限公司 Suitable for the information security method of point-to-point instant messaging
CN108040191B (en) * 2017-12-20 2019-07-23 北京邮电大学 Image encryption and decryption method based on hash chain compressed sensing
CN108566500B (en) * 2018-03-02 2021-02-26 西南交通大学 Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism
CN108833733B (en) * 2018-06-04 2019-08-16 河南师范大学 A kind of decryption method of the resume image based on chaos S box

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8792674B2 (en) * 2010-10-11 2014-07-29 Graphic Security Systems Corporation Method for encoding and simultaneously decoding images having multiple color components
CN102820922A (en) * 2012-07-31 2012-12-12 深圳光启创新技术有限公司 Asynchronous encryption visible light communication method and system
CN202976274U (en) * 2012-11-28 2013-06-05 成都科达光电技术有限责任公司 Door control restricted identification system based on spatial light modulator
CN104715532A (en) * 2015-04-07 2015-06-17 南开大学 Electronic coded lock system based on visible light communication technique and encryption method of system
CN105119924A (en) * 2015-09-01 2015-12-02 成都汇合乾元科技有限公司 Information transmission method
CN205507797U (en) * 2016-02-03 2016-08-24 广州中国科学院先进技术研究所 Ultra -thin vein image identification system towards mobile payment
CN205490552U (en) * 2016-04-09 2016-08-17 哈尔滨理工大学 Image transmission based on visible light communication
CN108564033A (en) * 2018-04-12 2018-09-21 Oppo广东移动通信有限公司 Safe verification method, device based on structure light and terminal device
CN110099261A (en) * 2019-02-22 2019-08-06 南京工程学院 A kind of LED dot matrix backlight, projection arrangement and the projecting method of projection device
CN110113155A (en) * 2019-04-28 2019-08-09 电子科技大学 One kind is efficiently without CertPubKey encryption method
CN110312055A (en) * 2019-07-03 2019-10-08 上海理工大学 A kind of more image encryption methods and decryption method based on light field sub-aperture image

Also Published As

Publication number Publication date
CN110855362A (en) 2020-02-28

Similar Documents

Publication Publication Date Title
JP6681081B2 (en) Random number sequence generation device, quantum cryptographic transmitter, and quantum cryptographic communication system
CN110855362B (en) Secret communication method and system based on visible light LED matrix
Xie et al. Exploiting optics chaos for image encryption-then-transmission
CN108566500A (en) The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
Narayana et al. Two new approaches for secured image steganography using cryptographic techniques and type conversions
US9800335B2 (en) Visible light signal transmitting and receiving processing method, transmitting terminal, receiving terminal, and system
Wang et al. Optical encryption for visible light communication based on temporal ghost imaging with a micro-LED
KR20150129459A (en) White-box cryptographic device and method thereof
CN103093411A (en) Encryption-decryption method based on random binary image
CN110636028B (en) Key generation device, encryption device, key generation and distribution system
Zhang et al. Multiple-image encryption mechanism based on ghost imaging and public key cryptography
CN111182171B (en) Image secret sharing information processing method and system for staged decryption
Patel et al. A new technique for color share generation using visual cryptography
JP4889630B2 (en) Optical transmission apparatus and method for ciphertext transmission
Kumari et al. Data security using image steganography and weighing its techniques
Sanguinetti et al. Perfectly secure steganography: hiding information in the quantum noise of a photograph
CN108880804B (en) Network key distribution method, device and system based on cascade computing imaging
CN110855437B (en) Secret communication method and system based on liquid crystal light valve
AU2021104272A4 (en) An authenticable image sharing scheme based on QR code
Menon et al. Triple layer data hiding mechanism using cryptography and Steganography
Dixit et al. Multilevel network security combining cryptography and steganography on ARM platform
Bouridah et al. Image secure transmission using chaotic synchronization
Fathimal et al. New fool proof examination system through color visual cryptography and signature authentication.
CN112187457B (en) Quantum cipher matrix correlation imaging method based on cloud service
JP5845514B2 (en) ENCRYPTED OPTICAL TRANSMITTER AND RECEPTION DEVICE, AND ENCRYPTED COMMUNICATION SYSTEM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant