CN110855362B - Secret communication method and system based on visible light LED matrix - Google Patents
Secret communication method and system based on visible light LED matrix Download PDFInfo
- Publication number
- CN110855362B CN110855362B CN201911125058.8A CN201911125058A CN110855362B CN 110855362 B CN110855362 B CN 110855362B CN 201911125058 A CN201911125058 A CN 201911125058A CN 110855362 B CN110855362 B CN 110855362B
- Authority
- CN
- China
- Prior art keywords
- key
- led matrix
- ciphertext
- information
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/11—Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
- H04B10/114—Indoor or close-range type systems
- H04B10/116—Visible light communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/50—Transmitters
- H04B10/501—Structural aspects
- H04B10/502—LED transmitters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32309—Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Facsimile Transmission Control (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a secret communication method based on a visible light LED matrix, which comprises the following steps: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens; respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal; the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture. The invention adopts the picture as the transmission carrier of the information, the distortion in the transmission process is small, and the confidentiality effect is good; by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, the difference between an image carrying information and an image not carrying information can not be distinguished by human eyes, and the security of the encrypted image is improved.
Description
Technical Field
The invention relates to the technical field of picture communication, in particular to a secret communication method and system based on a visible light LED matrix.
Background
The communication stealing is the most convenient, the most safe and the most reliable way in modern stealing means, and various advanced stealing technical means are developed and used for stealing secret information in communication, so the secrecy of communication is more important than that of the prior art at any time.
Because the pixels of the image can reach more than one million, the information transmitted by using one picture is far larger than that of the traditional key system. In the method, after transfer information is loaded on an original image, a regenerated image is reconstructed, so that two reconstructed images carrying the transfer information are obtained, the reconstructed images are sent to a receiving party, and the receiving party obtains the transfer information after restoring the two reconstructed images. According to the specific embodiment, in the invention, the image sent to the receiver comprises a part of the transmitted information and a part of the original image respectively, and human eyes cannot acquire any information from the reconstructed image. The method realizes the confidential transmission of information to a certain extent, but due to the particularity of the generated reconstructed image, the human eyes can recognize the transmitted information in the reconstructed image, so that cracking personnel can be attracted to analyze and crack the reconstructed image or directly destroy the reconstructed image.
The invention patent with patent number CN102916745A, "LED lighting device, wireless optical communication device and system", proposes a wireless optical communication device, which includes a light valve and an information control unit; the light signal emitted by the light source body irradiates the light valve; the information control unit is used for carrying out digital processing on the information to be transmitted and controlling the opening and closing of the light valve according to a processing result; and the optical signal passing through the light valve is received by a receiving device corresponding to the wireless optical communication device and is analyzed to be restored into the information to be transmitted. The opening and closing of the light valve are controlled through the information control unit, so that the information to be transmitted is modulated onto visible light emitted by the light source to be transmitted, the communication function can be realized while illumination is carried out, and communication can be realized without occupying a special communication frequency band. The method converts the transmission information into optical signals to realize effective transmission of the information. However, firstly, this method cannot realize secure transmission, and a person with confidence can analyze the transmitted information by the same method by simply intercepting the content of the optical signal, and secondly, the quality of the optical signal transmission path is too much dependent, and once the optical signal transmission process is interfered by ambient light and the like, information transmission errors are very easily caused.
Disclosure of Invention
The invention aims to provide a secret communication method and a secret communication system based on a visible light LED matrix, wherein a secret key and a ciphertext signal are loaded on an LED matrix driving signal to be converted into an optical signal, and the converted optical signal is superposed on an original picture to realize secret transmission of information; meanwhile, because human eyes cannot distinguish the brightness change of which the brightness change is less than 2 percent, the human eyes cannot distinguish the difference between an image carrying information and an image not carrying information by reasonably setting the period and the duty ratio of a binary information ciphertext generated by conversion, and the safety of an encrypted picture is improved; in addition, the mode of generating the long key by the short key is adopted, the problem that the information sending party and the information receiving party spend a large amount of resources to transmit the long key is solved, and the transmission efficiency and the safety of the key are improved.
To achieve the above object, with reference to fig. 1, the present invention provides a secret communication method based on a visible light LED matrix, the communication method comprising:
s1: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens;
s2: respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal;
wherein, the binary key code generated by conversion does not coincide with the high level position corresponding to the binary ciphertext code;
s3: the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture.
In a further embodiment, the LED matrix comprises N x N LED point light sources;
the secret key and the ciphertext to be transmitted are converted into N binary key codes and N binary ciphertext codes respectively.
In a further embodiment, the binary key code and the binary ciphertext code have a period of 10ms and a duty cycle of 1%.
In a further embodiment, the communication method further includes:
s01: the information receiver issues a public key of a non-heap encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key;
s03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
The communication method further comprises:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
In a further embodiment, the process of decrypting the encrypted picture using the key ciphertext and the agreed original picture to obtain the received ciphertext content includes the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray-scale image carrying key information by using the original image and the key;
s43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
In a further embodiment, the generating a gray-scale map carrying key information by using the original picture and the key includes:
if the original picture is a color picture, one of the three primary colors is used as a gray scale image.
In a further embodiment, the communication method comprises:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and then sends the encrypted key to an information receiver;
the two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is larger than the original key length.
Based on the foregoing secure communication method, the present invention also provides a secure communication system based on a visible light LED matrix, the secure communication system comprising:
(1) the information transmission device is respectively arranged on the information receiving party and the information sending party and used for establishing a communication link between the information receiving party and the information sending party;
(2) the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext;
(3) the encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying an appointed original picture and a shooting unit;
the LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens;
the LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit;
the LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix;
the shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
Compared with the prior art, the technical scheme of the invention has the following remarkable beneficial effects:
(1) the pictures are used as the transmission carriers of the information, so that the distortion in the transmission process is small, and the confidentiality effect is good.
(2) Because human eyes can not distinguish the brightness change of which the brightness change is less than 2%, the human eyes can not distinguish the difference between an image carrying information and an image not carrying information by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, and the safety of the encrypted image is improved.
(3) In addition, the mode of generating the long key by the short key is adopted, the problem that the information sending party and the information receiving party spend a large amount of resources to transmit the long key is solved, and the transmission efficiency and the safety of the key are improved.
It should be understood that all combinations of the foregoing concepts and additional concepts described in greater detail below can be considered as part of the inventive subject matter of this disclosure unless such concepts are mutually inconsistent. In addition, all combinations of claimed subject matter are considered a part of the presently disclosed subject matter.
The foregoing and other aspects, embodiments and features of the present teachings can be more fully understood from the following description taken in conjunction with the accompanying drawings. Additional aspects of the present invention, such as features and/or advantages of exemplary embodiments, will be apparent from the description which follows, or may be learned by practice of specific embodiments in accordance with the teachings of the present invention.
Drawings
The drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures may be represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. Embodiments of various aspects of the present invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a flow chart of the secure communication method based on the visible light LED matrix of the present invention.
Fig. 2 is a schematic structural diagram of the secure communication system based on the visible light LED matrix according to the present invention.
Fig. 3 is a schematic diagram of binary codes of the key (3A), the ciphertext (3B), and the encrypted ciphertext (3C) according to the present invention.
Fig. 4 is a schematic diagram of a grayscale map of a picture carrying key information (4A), a grayscale map of a picture carrying ciphertext (4B), and a grayscale map of a picture carrying key and ciphertext information (4C).
Detailed Description
In order to better understand the technical content of the present invention, specific embodiments are described below with reference to the accompanying drawings.
With reference to fig. 1, the present invention refers to a secret communication method based on a visible light LED matrix, said communication method comprising:
s1: the LED matrix, the lens and the appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and the emitted light beams are imaged on the original picture through the lens.
S2: and respectively converting the secret key and the ciphertext to be transmitted into a binary code format, and adding the binary code format and the ciphertext into an encrypted ciphertext to be loaded on the LED matrix driving signal.
Wherein, the high level positions corresponding to the binary key code and the binary ciphertext code generated by conversion are not coincident.
S3: the original picture on which the light beams emitted by the LED matrix are superimposed is photographed to generate an encrypted picture.
Based on the secret communication method, the invention also provides a secret communication system based on the visible light LED matrix, and the secret communication system comprises an information transmission device, an information processing device and an encryption device.
And the information transmission devices are respectively arranged at the information receiving party and the information sending party and are used for establishing a communication link between the information receiving party and the information sending party.
And the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext.
The encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying appointed original pictures and a shooting unit.
The LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens.
The LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit.
The LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix.
The shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
The secure communication system is composed of an LED matrix, a lens and a picture, and the structure of the secure communication system is shown in figure 2. An LED matrix a, which contains N x N LED point sources, is placed at the object focal plane of the lens B as a source of visible light. The point light source is powered by a direct current power supply to generate a continuous visible light source. The picture is placed at the image focal plane of the lens B, and the LED matrix A is imaged on the picture C through the lens, namely the N × N point light sources are imaged on the picture and are also N × N image points. The information of the point light sources can be obtained by photographing the picture by using a camera, the point light sources of the N-N matrix can be regarded as N-N binary codes, and the information of the binary codes can be obtained by reading the picture photographed by the camera.
A random N x N binary code with a period of 10ms and a duty cycle of 1% is loaded on the LED matrix point light source to form a key, as shown in fig. 3A. The ciphertext to be transmitted is converted into a binary ciphertext code having a period of 10ms and a duty cycle of 1% N x N, which is superimposed on the binary key code as shown in fig. 3B. In order to distinguish the binary cipher code from the binary key code, it is required that a position of a high level in the binary cipher code does not coincide with a position of a high level in the binary key code. The final binary information code is composed of an N x N matrix with a period of 10ms and a duty cycle of 2%, as shown in fig. 3C.
After a picture is shot by a camera, human eyes cannot distinguish the brightness change with the brightness change of less than 2%, so that the human eyes cannot distinguish the difference between an image carrying information and an image not carrying information.
It should be understood that the number of rows and columns of the LED matrix is not fixed, and is determined by the amount of information or key hierarchy to be carried. The parameters of the binary code generated by the conversion of the key and the information to be transmitted match, preferably coincide, with the parameters of the LED matrix, in order to facilitate the loading of the control, as previously described N x N.
In some methods, the communication method further comprises:
s01: the information receiver distributes the public key of the non-heap encryption system through a public channel.
S02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key.
S03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
And then the information sender generates an encrypted picture carrying transmission information by using the binary key and the original picture according to the encryption method, and transmits the encrypted picture to the information receiver.
Preferably, the communication method further includes:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
Specifically, in step S4, the process of decrypting the encrypted picture using the key ciphertext and the agreed original picture to obtain the received ciphertext content includes the following steps:
s41: and receiving the key ciphertext, and decrypting the key ciphertext by adopting the public key to obtain the key.
S42: and generating a gray scale image carrying the key information by using the original picture and the key, wherein if the original picture is a color picture, one of the three primary colors is appointed to be used as the gray scale image.
S43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
The invention also provides a key processing method for the picture transmission information.
The communication method comprises the following steps:
the information sending party generates an original key, and the original key is sent to the information receiving party after being encrypted by a public key in an asymmetric encryption system.
The two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key.
Wherein the length of the key required for the transmission is larger than the original key length.
Because the pixels of the picture are huge, the required key length is too large, and key transmission is not facilitated. Therefore, the problem is solved by adopting a mode of generating a long key by using a short key. The specific process is as follows:
first, the sender generated key (e.g., 160-bit binary).
And secondly, the sender sends the key to the receiver through a public key in an asymmetric encryption system.
And thirdly, the two parties use the key as input to calculate an SHA-1 function to obtain a new 160-bit binary system.
And fourthly, performing SHA-1 function calculation by taking the calculated 160 binary system as an input, and repeating the process until the required number of keys is obtained.
Preferably, security is improved by rekeying. For example, when information transmission is needed next time, the asymmetric key system is reused to transmit the keys, so that the inconsistency of the keys transmitted each time is ensured, and the confidentiality is improved.
In this disclosure, aspects of the present invention are described with reference to the accompanying drawings, in which a number of illustrative embodiments are shown. Embodiments of the present disclosure are not necessarily defined to include all aspects of the invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in greater detail below, may be implemented in any of numerous ways, as the disclosed concepts and embodiments are not limited to any one implementation. In addition, some aspects of the present disclosure may be used alone, or in any suitable combination with other aspects of the present disclosure.
Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the protection scope of the present invention should be determined by the appended claims.
Claims (9)
1. A secret communication method based on a visible light LED matrix is characterized by comprising the following steps:
s1: an LED matrix, a lens and an appointed original picture are sequentially in a parallel mode, the LED matrix is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED matrix is used as a visible light source, and a light beam emitted is imaged on the original picture through the lens;
s2: respectively converting the secret key and the ciphertext to be transmitted into binary code formats, and adding the binary code formats to the encrypted ciphertext to load on the LED matrix driving signal;
wherein, the binary key code generated by conversion does not coincide with the high level position corresponding to the binary ciphertext code;
s3: shooting an original picture on which light beams emitted by the LED matrix are superposed to generate an encrypted picture;
and setting the period and duty ratio of the binary information ciphertext generated by conversion to enable the brightness change of the encrypted picture relative to the original picture to be below 2%.
2. The method of claim 1, wherein the LED matrix comprises N x N LED point light sources;
the secret key and the ciphertext to be transmitted are converted into N binary key codes and N binary ciphertext codes respectively.
3. The secret communication method based on the visible light LED matrix as claimed in claim 1, wherein the binary key code and the binary ciphertext code have a period of 10ms and a duty cycle of 1%.
4. The secure communication method based on the visible light LED matrix according to claim 1, wherein the communication method further comprises:
s01: the information receiver issues a public key of a non-heap encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key;
s03: and the information sender sends the generated key ciphertext to the information receiver and appoints the original picture.
5. The secure communication method based on the visible light LED matrix according to claim 4, wherein the communication method further comprises:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the appointed original picture to obtain the received ciphertext content.
6. The secret communication method based on visible light LED matrix as claimed in claim 5, wherein in step S4, said process of decrypting the encrypted picture with the key ciphertext and the appointed original picture to obtain the received ciphertext content comprises the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray-scale image carrying key information by using the original image and the key;
s43: and subtracting the generated gray scale image from the received encrypted image to obtain corresponding binary information.
7. The secret communication method based on visible light LED matrix as claimed in claim 6, wherein in step S42, said generating a gray-scale map carrying key information by using original picture and key comprises:
if the original picture is a color picture, one of the three primary colors is used as a gray scale image.
8. A method of secure communication based on a matrix of visible light LEDs according to claim 1, wherein the method of communication comprises:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and then sends the encrypted key to an information receiver;
the two parties take the output value of the previous calculation process as the input value of the current calculation process, and repeatedly carry out the calculation of the cryptographic hash function to obtain the key required by transmission, wherein the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is larger than the original key length.
9. A secure communication system based on a visible light LED matrix, the secure communication system comprising:
the information transmission device is respectively arranged on the information receiving party and the information sending party and used for establishing a communication link between the information receiving party and the information sending party;
the information processing device is used for receiving an externally input secret key and a ciphertext to be transmitted, respectively converting the secret key and the ciphertext to be transmitted into a binary code format and superposing the secret key and the ciphertext to be transmitted into an encrypted ciphertext;
the encryption device comprises an LED matrix, an LED matrix control unit, a lens, a display unit capable of displaying an appointed original picture and a shooting unit;
the LED array, the lens and the appointed original picture are sequentially in a parallel mode, the LED array is located at an object space focal plane of the lens, the appointed original picture is located at an image space focal plane of the lens, the LED array serves as a visible light source, and emitted light beams are imaged on the original picture through the lens;
the LED matrix is connected with the LED matrix control unit, and the LED matrix switches the light intensity parameters of each matrix according to the control instruction of the LED matrix control unit;
the LED matrix control unit is connected with the information processing device, receives the encrypted ciphertext sent by the information processing device, and loads the encrypted ciphertext on the LED matrix driving signal so as to change the light intensity parameter of the LED matrix;
the shooting unit is arranged in front of the display unit and used for shooting an original picture superposed with light beams emitted by the LED matrix to generate an encrypted picture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911125058.8A CN110855362B (en) | 2019-11-18 | 2019-11-18 | Secret communication method and system based on visible light LED matrix |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911125058.8A CN110855362B (en) | 2019-11-18 | 2019-11-18 | Secret communication method and system based on visible light LED matrix |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110855362A CN110855362A (en) | 2020-02-28 |
CN110855362B true CN110855362B (en) | 2021-08-03 |
Family
ID=69600469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911125058.8A Active CN110855362B (en) | 2019-11-18 | 2019-11-18 | Secret communication method and system based on visible light LED matrix |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110855362B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111885404A (en) * | 2020-07-16 | 2020-11-03 | RealMe重庆移动通信有限公司 | Data transmission method, device and storage medium |
CN112118046B (en) * | 2020-09-22 | 2021-08-24 | 中国科学院半导体研究所 | Encrypted electronic voting system and method based on indoor LED visible light communication |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102820922A (en) * | 2012-07-31 | 2012-12-12 | 深圳光启创新技术有限公司 | Asynchronous encryption visible light communication method and system |
CN202976274U (en) * | 2012-11-28 | 2013-06-05 | 成都科达光电技术有限责任公司 | Door control restricted identification system based on spatial light modulator |
US8792674B2 (en) * | 2010-10-11 | 2014-07-29 | Graphic Security Systems Corporation | Method for encoding and simultaneously decoding images having multiple color components |
CN104715532A (en) * | 2015-04-07 | 2015-06-17 | 南开大学 | Electronic coded lock system based on visible light communication technique and encryption method of system |
CN105119924A (en) * | 2015-09-01 | 2015-12-02 | 成都汇合乾元科技有限公司 | Information transmission method |
CN205490552U (en) * | 2016-04-09 | 2016-08-17 | 哈尔滨理工大学 | Image transmission based on visible light communication |
CN205507797U (en) * | 2016-02-03 | 2016-08-24 | 广州中国科学院先进技术研究所 | Ultra -thin vein image identification system towards mobile payment |
CN108564033A (en) * | 2018-04-12 | 2018-09-21 | Oppo广东移动通信有限公司 | Safe verification method, device based on structure light and terminal device |
CN110099261A (en) * | 2019-02-22 | 2019-08-06 | 南京工程学院 | A kind of LED dot matrix backlight, projection arrangement and the projecting method of projection device |
CN110113155A (en) * | 2019-04-28 | 2019-08-09 | 电子科技大学 | One kind is efficiently without CertPubKey encryption method |
CN110312055A (en) * | 2019-07-03 | 2019-10-08 | 上海理工大学 | A kind of more image encryption methods and decryption method based on light field sub-aperture image |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2007222986B2 (en) * | 2006-03-09 | 2012-01-12 | Tessarae Llc | Microarray imaging system and associated methodology |
CN202257581U (en) * | 2011-08-31 | 2012-05-30 | 北京航空航天大学 | Device for carrying out authority authentication on defined areas based on visible-light communication |
KR20150022276A (en) * | 2013-08-22 | 2015-03-04 | 삼성전자주식회사 | Apparatas and method for extravting a encrypted message of image file in an electronic device |
CN103986517B (en) * | 2014-05-30 | 2017-01-18 | 中国人民解放军信息工程大学 | Method and system for transmitting information through dynamic two-dimensional image information |
CN103986516A (en) * | 2014-05-30 | 2014-08-13 | 中国人民解放军信息工程大学 | Visible light communication system and method |
CN104468090B (en) * | 2014-11-12 | 2017-07-28 | 辽宁大学 | Character cipher coding method based on image pixel coordinates |
US9985933B2 (en) * | 2014-12-29 | 2018-05-29 | Entefy Inc. | System and method of sending and receiving secret message content over a network |
CN105049176B (en) * | 2015-06-11 | 2017-12-29 | 湘潭大学 | Decryption method for view data safe transmission |
CN104868989B (en) * | 2015-06-11 | 2017-11-17 | 湘潭大学 | Encryption method for view data safe transmission |
CN106599698B (en) * | 2015-10-19 | 2019-09-20 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus for encrypting picture, decrypting picture |
CN107342977A (en) * | 2017-05-26 | 2017-11-10 | 芯盾网安(北京)科技发展有限公司 | Suitable for the information security method of point-to-point instant messaging |
CN108040191B (en) * | 2017-12-20 | 2019-07-23 | 北京邮电大学 | Image encryption and decryption method based on hash chain compressed sensing |
CN108566500B (en) * | 2018-03-02 | 2021-02-26 | 西南交通大学 | Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism |
CN108833733B (en) * | 2018-06-04 | 2019-08-16 | 河南师范大学 | A kind of decryption method of the resume image based on chaos S box |
-
2019
- 2019-11-18 CN CN201911125058.8A patent/CN110855362B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8792674B2 (en) * | 2010-10-11 | 2014-07-29 | Graphic Security Systems Corporation | Method for encoding and simultaneously decoding images having multiple color components |
CN102820922A (en) * | 2012-07-31 | 2012-12-12 | 深圳光启创新技术有限公司 | Asynchronous encryption visible light communication method and system |
CN202976274U (en) * | 2012-11-28 | 2013-06-05 | 成都科达光电技术有限责任公司 | Door control restricted identification system based on spatial light modulator |
CN104715532A (en) * | 2015-04-07 | 2015-06-17 | 南开大学 | Electronic coded lock system based on visible light communication technique and encryption method of system |
CN105119924A (en) * | 2015-09-01 | 2015-12-02 | 成都汇合乾元科技有限公司 | Information transmission method |
CN205507797U (en) * | 2016-02-03 | 2016-08-24 | 广州中国科学院先进技术研究所 | Ultra -thin vein image identification system towards mobile payment |
CN205490552U (en) * | 2016-04-09 | 2016-08-17 | 哈尔滨理工大学 | Image transmission based on visible light communication |
CN108564033A (en) * | 2018-04-12 | 2018-09-21 | Oppo广东移动通信有限公司 | Safe verification method, device based on structure light and terminal device |
CN110099261A (en) * | 2019-02-22 | 2019-08-06 | 南京工程学院 | A kind of LED dot matrix backlight, projection arrangement and the projecting method of projection device |
CN110113155A (en) * | 2019-04-28 | 2019-08-09 | 电子科技大学 | One kind is efficiently without CertPubKey encryption method |
CN110312055A (en) * | 2019-07-03 | 2019-10-08 | 上海理工大学 | A kind of more image encryption methods and decryption method based on light field sub-aperture image |
Also Published As
Publication number | Publication date |
---|---|
CN110855362A (en) | 2020-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6681081B2 (en) | Random number sequence generation device, quantum cryptographic transmitter, and quantum cryptographic communication system | |
CN110855362B (en) | Secret communication method and system based on visible light LED matrix | |
Xie et al. | Exploiting optics chaos for image encryption-then-transmission | |
CN108566500A (en) | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism | |
Narayana et al. | Two new approaches for secured image steganography using cryptographic techniques and type conversions | |
US9800335B2 (en) | Visible light signal transmitting and receiving processing method, transmitting terminal, receiving terminal, and system | |
Wang et al. | Optical encryption for visible light communication based on temporal ghost imaging with a micro-LED | |
KR20150129459A (en) | White-box cryptographic device and method thereof | |
CN103093411A (en) | Encryption-decryption method based on random binary image | |
CN110636028B (en) | Key generation device, encryption device, key generation and distribution system | |
Zhang et al. | Multiple-image encryption mechanism based on ghost imaging and public key cryptography | |
CN111182171B (en) | Image secret sharing information processing method and system for staged decryption | |
Patel et al. | A new technique for color share generation using visual cryptography | |
JP4889630B2 (en) | Optical transmission apparatus and method for ciphertext transmission | |
Kumari et al. | Data security using image steganography and weighing its techniques | |
Sanguinetti et al. | Perfectly secure steganography: hiding information in the quantum noise of a photograph | |
CN108880804B (en) | Network key distribution method, device and system based on cascade computing imaging | |
CN110855437B (en) | Secret communication method and system based on liquid crystal light valve | |
AU2021104272A4 (en) | An authenticable image sharing scheme based on QR code | |
Menon et al. | Triple layer data hiding mechanism using cryptography and Steganography | |
Dixit et al. | Multilevel network security combining cryptography and steganography on ARM platform | |
Bouridah et al. | Image secure transmission using chaotic synchronization | |
Fathimal et al. | New fool proof examination system through color visual cryptography and signature authentication. | |
CN112187457B (en) | Quantum cipher matrix correlation imaging method based on cloud service | |
JP5845514B2 (en) | ENCRYPTED OPTICAL TRANSMITTER AND RECEPTION DEVICE, AND ENCRYPTED COMMUNICATION SYSTEM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |