CN110855437B - Secret communication method and system based on liquid crystal light valve - Google Patents

Secret communication method and system based on liquid crystal light valve Download PDF

Info

Publication number
CN110855437B
CN110855437B CN201911125057.3A CN201911125057A CN110855437B CN 110855437 B CN110855437 B CN 110855437B CN 201911125057 A CN201911125057 A CN 201911125057A CN 110855437 B CN110855437 B CN 110855437B
Authority
CN
China
Prior art keywords
information
key
light valve
liquid crystal
crystal light
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911125057.3A
Other languages
Chinese (zh)
Other versions
CN110855437A (en
Inventor
张健
覃翠
何睿清
余辉龙
赵静
魏峘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Institute of Technology
Original Assignee
Nanjing Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Institute of Technology filed Critical Nanjing Institute of Technology
Priority to CN201911125057.3A priority Critical patent/CN110855437B/en
Publication of CN110855437A publication Critical patent/CN110855437A/en
Application granted granted Critical
Publication of CN110855437B publication Critical patent/CN110855437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention discloses a secret communication method based on a liquid crystal light valve, which comprises the following steps: the liquid crystal light valve is placed in front of the agreed original picture in parallel; the key and the information to be transmitted are respectively converted into binary code format, and are superimposed into information ciphertext and then are loaded on a liquid crystal light valve driving signal so as to change the space light distribution parameters at the liquid crystal light valve; wherein, the binary key code generated by conversion is not overlapped with the high level position corresponding to the binary information code; taking the agreed original picture through the liquid crystal light valve to generate an encrypted picture. The invention can realize secret transmission of information, is convenient for operation and has strong universality; the period and the duty ratio of the binary information ciphertext generated by conversion are reasonably set, so that the human eyes can not distinguish the difference between the images carrying the information and the images not carrying the information, and the safety of the encrypted picture is improved.

Description

Secret communication method and system based on liquid crystal light valve
Technical Field
The invention relates to the technical field of liquid crystal light valves, in particular to a secret communication method and system based on a liquid crystal light valve.
Background
Communication secret-stealing is the most convenient, safer and most reliable way in modern secret-stealing means, and various advanced secret-stealing technical means are developed and used for stealing secret information in communication, so that the confidentiality of communication is more important than ever before.
Because the pixels of the image can reach more than one million, the information quantity transmitted by using one picture is far more than that of the traditional key system. The patent CN1647140a discloses a method for encrypting and transmitting a reconstructed message, in which the reconstructed image is reconstructed after the transferred information is loaded on the original image, so as to obtain two reconstructed images carrying the transferred information, and then the reconstructed images are sent to the receiving party, and the receiving party restores the two reconstructed images to obtain the transferred information. In the present invention, the image sent to the receiving party includes a part of the transmission information and a part of the original image, and the human eye cannot learn any information from the reconstructed image. The method can realize secret transmission of information to a certain extent, but due to the specificity of the generated reconstructed image, human eyes can recognize that the reconstructed image is embedded with the transmitted information, thereby attracting a cracking person to analyze and crack or directly damage the reconstructed image.
Disclosure of Invention
The invention aims to provide a secret communication method and a secret communication system based on a liquid crystal light valve, wherein the liquid crystal light valve is placed in front of an image, a secret key and a ciphertext signal are loaded on the liquid crystal light valve to control the space light distribution characteristic of the liquid crystal light valve, and secret signals are extracted by shooting pictures of the image through the liquid crystal light valve, so that secret transmission of information is realized. Because human eyes cannot distinguish the brightness change with the brightness change below 2%, the human eyes cannot distinguish the difference between the images carrying information and the images not carrying information by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, and the safety of the encrypted picture is improved; in addition, the method of generating the long key by the short key solves the problem that the information sender and the information receiver spend a large amount of resources to transmit the long key, and improves the transmission efficiency and the security of the key.
To achieve the above objective, in conjunction with fig. 1, the present invention proposes a secret communication method based on a liquid crystal light valve, the communication method comprising:
s1: the liquid crystal light valve is placed in front of the agreed original picture in parallel;
s2: the key and the information to be transmitted are respectively converted into binary code format, and are superimposed into information ciphertext and then are loaded on a liquid crystal light valve driving signal so as to change the space light distribution parameters at the liquid crystal light valve;
wherein, the binary key code generated by conversion is not overlapped with the high level position corresponding to the binary information code;
s3: taking the agreed original picture through the liquid crystal light valve to generate an encrypted picture.
In a further embodiment, in step S2, the spatial light distribution parameters include an amplitude or intensity, a phase, a polarization state and a wavelength of the spatial light distribution.
In a further embodiment, the liquid crystal light valve includes n×n matrices;
the key and the information to be transmitted are converted into N x N binary key codes and N x N binary information codes, respectively.
In a further embodiment, the communication method further comprises:
s01 the method comprises the following steps: the information receiver issues a public key which is not piled up into an encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using a public key;
s03: the information sender sends the generated key ciphertext to the information receiver and agrees with the original picture.
In a further embodiment, the communication method further comprises:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the agreed original picture to obtain the received information content.
In a further embodiment, in step S4, the process of decrypting the encrypted picture by using the key ciphertext and the agreed original picture to obtain the received information content includes the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray scale image carrying key information by using the original image and the key;
s43: and subtracting the received encrypted picture from the generated gray level picture to obtain corresponding binary information.
In a further embodiment, in step S42, the generating the gray scale map carrying the key information by using the original picture and the key includes:
if the original picture is a color picture, one of three primary colors is appointed to be used as a gray scale picture.
In a further embodiment, the communication method includes:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and sends the encrypted original key to an information receiver;
the two parties repeatedly perform the password hash function calculation by taking the output value of the previous calculation process as the input value of the current calculation process to obtain the key required by transmission, and the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is greater than the original key length.
Based on the foregoing secret communication method, the present invention also refers to a secret communication system based on a liquid crystal light valve, the secret communication system comprising:
the information transmission device is respectively arranged on the information receiver and the information sender and is used for establishing a communication link between the information receiver and the information sender;
the information processing device is used for receiving an externally input secret key and information to be transmitted, respectively converting the secret key and the information to be transmitted into binary code formats and superposing the binary code formats into information ciphertext;
the encryption device comprises a liquid crystal light valve, a light valve control unit, a display unit capable of displaying the agreed original picture and a shooting unit, wherein:
the liquid crystal light valve is arranged in front of the display unit in parallel and comprises N matrixes; the liquid crystal light valve is connected with the light valve control unit, and the liquid crystal light valve switches the display parameters of each matrix according to the control instruction of the light valve control unit;
the light valve control unit is connected with the information processing device, receives the information ciphertext sent by the information processing device, and loads the information ciphertext on the liquid crystal light valve driving signal so as to change the space light distribution parameter at the liquid crystal light valve;
the shooting unit is arranged on one side of the liquid crystal light valve, which is far away from the display unit, and is used for shooting the appointed original picture through the liquid crystal light valve to generate an encrypted picture.
Compared with the prior art, the technical scheme of the invention has the remarkable beneficial effects that:
(1) The method is convenient to operate and has strong universality.
(2) Because human eyes cannot distinguish the brightness change with the brightness change below 2%, the human eyes cannot distinguish the difference between the images carrying information and the images not carrying information by reasonably setting the period and the duty ratio of the binary information ciphertext generated by conversion, and the security of the encrypted picture is improved.
(3) In addition, the method of generating the long key by the short key solves the problem that the information sender and the information receiver spend a large amount of resources to transmit the long key, and improves the transmission efficiency and the security of the key.
It should be understood that all combinations of the foregoing concepts, as well as additional concepts described in more detail below, may be considered a part of the inventive subject matter of the present disclosure as long as such concepts are not mutually inconsistent. In addition, all combinations of claimed subject matter are considered part of the disclosed inventive subject matter.
The foregoing and other aspects, embodiments, and features of the present teachings will be more fully understood from the following description, taken together with the accompanying drawings. Other additional aspects of the invention, such as features and/or advantages of the exemplary embodiments, will be apparent from the description which follows, or may be learned by practice of the embodiments according to the teachings of the invention.
Drawings
The drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures may be represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. Embodiments of various aspects of the invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a flow chart of a secure communication method based on a liquid crystal light valve of the present invention.
Fig. 2 is a schematic diagram of the structure of the liquid crystal light valve and the original image of the present invention.
Fig. 3 is a binary code diagram of the key (a), information (B), and information ciphertext (C) of the present invention.
Fig. 4 is a schematic diagram of a grayscale image (a) carrying a key information picture, a grayscale image (B) carrying a ciphertext picture, and a grayscale image (C) carrying a key and ciphertext information picture.
Detailed Description
For a better understanding of the technical content of the present invention, specific examples are set forth below, along with the accompanying drawings.
Referring to fig. 1, the present invention refers to a secret communication method based on a liquid crystal light valve, the communication method comprising:
s1: the liquid crystal light valve is placed in parallel in front of the agreed original picture.
S2: the secret key and the information to be transmitted are respectively converted into binary code formats, and are superimposed into information ciphertext and then are loaded on a liquid crystal light valve driving signal so as to change the space light distribution parameters at the liquid crystal light valve.
Wherein, the binary key code generated by conversion is not overlapped with the high level position corresponding to the binary information code.
S3: taking the agreed original picture through the liquid crystal light valve to generate an encrypted picture.
Based on the secret communication method, the invention also relates to a secret communication system based on the liquid crystal light valve, and the secret communication system comprises an information transmission device, an information processing device and an encryption device.
The information transmission device is respectively arranged on the information receiver and the information sender and is used for establishing a communication link between the information receiver and the information sender.
The information processing device is used for receiving an externally input secret key and information to be transmitted, converting the secret key and the information to be transmitted into binary code formats respectively, and superposing the binary code formats into information ciphertext.
The encryption device comprises a liquid crystal light valve, a light valve control unit, a display unit capable of displaying the agreed original picture and a shooting unit, wherein:
the liquid crystal light valve is arranged in front of the display unit in parallel and comprises N matrixes; the liquid crystal light valve is connected with the light valve control unit, and the liquid crystal light valve switches the display parameters of each matrix according to the control instruction of the light valve control unit.
The light valve control unit is connected with the information processing device, receives the information ciphertext sent by the information processing device, and loads the information ciphertext on the liquid crystal light valve driving signal to change the space light distribution parameter at the liquid crystal light valve.
The shooting unit is arranged on one side of the liquid crystal light valve, which is far away from the display unit, and is used for shooting the appointed original picture through the liquid crystal light valve to generate an encrypted picture.
The secret communication system consists of a liquid crystal light valve and a picture, and the structure is shown in figure 2. The liquid crystal light valve a is a device capable of loading information on a one-dimensional or two-dimensional optical data field. Such devices may change the amplitude or intensity, phase, polarization state, and wavelength of the spatial light distribution under control of a time-varying drive signal or other signal. The liquid crystal light valve is placed in front of the image B.
The liquid crystal light valve comprises N matrixes, and the voltage on the liquid crystal light valve is controlled by an input signal. The liquid crystal light valve and the picture form a group of N x N image points. The information of image points can be obtained by shooting a picture through a liquid crystal light valve by using a camera, the image points of an N matrix can be regarded as binary codes of N, and the information of the binary codes can be obtained by reading the picture shot by the camera.
A random N x N binary code with a period of 10ms and a duty cycle of 1% is loaded under a liquid crystal light valve driving signal to form a key, and the intensity of the spatial light distribution is controlled, as shown in fig. 3 a. The information to be transmitted is converted into a binary information code of N x N with a period of 10ms and a duty ratio of 1%, as shown in B of fig. 3, which is superimposed on the binary key code, wherein in order to distinguish the binary ciphertext code from the binary key code, it is required that the position of the high level in the binary ciphertext code does not coincide with the position of the high level in the binary key code, and finally the binary information ciphertext code of an N x N matrix with a period of 10ms and a duty ratio of 2% is formed, as shown in C of fig. 3. After taking a picture with a camera, the human eye cannot distinguish between an image carrying information and an image not carrying information because the human eye cannot distinguish the brightness change with a brightness change below 2%.
It should be appreciated that the number of rows and columns of the matrix of liquid crystal light valves is not fixed, and is determined by the amount of information or key level that needs to be carried. The parameters of the key and the binary code generated by the conversion of the information to be transmitted are matched with the matrix parameters of the liquid crystal light valve, and preferably, the two parameters are consistent so as to facilitate the loading control, such as the aforementioned n×n.
In some methods, the communication method further comprises:
s01: the information receiver issues a public key which is not piled up into an encryption system through a public channel.
S02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using the public key.
S03: the information sender sends the generated key ciphertext to the information receiver and agrees with the original picture.
And then the information sender generates an encrypted picture carrying the transmission information by utilizing the binary key and the original picture according to the encryption method, and transmits the encrypted picture to the information receiver.
Preferably, the communication method further includes:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the agreed original picture to obtain the received information content.
Specifically, in step S4, the process of decrypting the encrypted picture by using the key ciphertext and the agreed original picture to obtain the received information content includes the following steps:
s41: and receiving the key ciphertext, and decrypting the key ciphertext by adopting the public key to obtain the key.
S42: and generating a gray scale image carrying key information by using the original image and the key, wherein if the original image is a color image, one of three primary colors is appointed to be used as the gray scale image.
S43: and subtracting the received encrypted picture from the generated gray level picture to obtain corresponding binary information.
The invention also provides a method for processing the secret key aiming at the picture transmission information.
The communication method comprises the following steps:
the information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and sends the encrypted original key to the information receiver.
The two parties repeatedly perform the cryptographic hash function calculation to obtain the key required by transmission by taking the output value of the previous calculation process as the input value of the current calculation process, and the input value of the initial calculation process is the original key.
Wherein the length of the key required for the transmission is greater than the original key length.
Because of the large pixels of the picture, the required key length is too large, which is unfavorable for key transmission. This problem is thus solved by means of a short key to generate a long key. The specific process is as follows:
in a first step, the sender generates a key (e.g., 160-bit binary).
And step two, the sender sends the secret key to the receiver through the public key in the asymmetric encryption system.
Thirdly, the secret key is used as input by both parties to calculate the SHA-1 function to obtain a new 160-bit binary system.
And fourthly, carrying out SHA-1 function calculation by taking the calculated 160 binary system as input, and repeating the process until the required number of keys is obtained.
Preferably, confidentiality is improved by rekeying. For example, when information transmission is needed next time, the keys are transmitted by reusing the asymmetric key system, so that the inconsistency of the keys transmitted each time is ensured, and the confidentiality is improved.
Aspects of the invention are described in this disclosure with reference to the drawings, in which are shown a number of illustrative embodiments. The embodiments of the present disclosure need not be defined to include all aspects of the present invention. It should be understood that the various concepts and embodiments described above, as well as those described in more detail below, may be implemented in any of a number of ways, as the disclosed concepts and embodiments are not limited to any implementation. Additionally, some aspects of the disclosure may be used alone or in any suitable combination with other aspects of the disclosure.
While the invention has been described with reference to preferred embodiments, it is not intended to be limiting. Those skilled in the art will appreciate that various modifications and adaptations can be made without departing from the spirit and scope of the present invention. Accordingly, the scope of the invention is defined by the appended claims.

Claims (9)

1. A method of secure communication based on a liquid crystal light valve, the method comprising:
s1: the liquid crystal light valve is placed in front of the agreed original picture in parallel;
s2: the key and the information to be transmitted are respectively converted into binary code format, and are superimposed into information ciphertext and then are loaded on a liquid crystal light valve driving signal so as to change the space light distribution parameters at the liquid crystal light valve;
wherein, the binary key code generated by conversion is not overlapped with the high level position corresponding to the binary information code;
s3: shooting an agreed original picture through a liquid crystal light valve to generate an encrypted picture;
the method comprises the steps of loading random N-N binary codes with the period of 10ms and the duty ratio of 1% under a liquid crystal light valve driving signal to form a key, controlling the intensity of spatial light distribution, converting information to be transmitted into N-N binary information codes with the period of 10ms and the duty ratio of 1%, and superposing the binary information codes on the binary key codes, wherein in order to distinguish the binary ciphertext codes from the binary key codes, the positions of high levels in the binary ciphertext codes are required to be not overlapped with the positions of high levels in the binary key codes, and finally, the binary information ciphertext codes with the period of 10ms and the duty ratio of 2% are formed.
2. The method according to claim 1, wherein in step S2, the spatial light distribution parameters include the amplitude or intensity, phase, polarization state and wavelength of the spatial light distribution.
3. The method of claim 1, wherein the liquid crystal light valve comprises N matrices;
the key and the information to be transmitted are converted into N x N binary key codes and N x N binary information codes, respectively.
4. The method of claim 1, further comprising:
s01: the information receiver issues a public key which is not piled up into an encryption system through a public channel;
s02: the information sender generates a binary key, and generates a key ciphertext after encrypting by using a public key;
s03: the information sender sends the generated key ciphertext to the information receiver and agrees with the original picture.
5. The method of claim 4, further comprising:
s4: and the information receiver receives the encrypted picture, and decrypts the encrypted picture by using the key ciphertext and the agreed original picture to obtain the received information content.
6. The method for secure communication based on the liquid crystal light valve according to claim 5, wherein in step S4, the process of decrypting the encrypted picture using the key ciphertext and the agreed original picture to obtain the received information content comprises the following steps:
s41: receiving a key ciphertext, and decrypting the key ciphertext by adopting a public key to obtain a key;
s42: generating a gray scale image carrying key information by using the original image and the key;
s43: and subtracting the received encrypted picture from the generated gray level picture to obtain corresponding binary information.
7. The method of claim 6, wherein in step S42, the generating a gray scale map carrying key information using the original picture and the key comprises:
if the original picture is a color picture, one of three primary colors is appointed to be used as a gray scale picture.
8. The secret communication method based on the liquid crystal light valve according to claim 1, wherein the communication method comprises:
an information sender generates an original key, encrypts the original key through a public key in an asymmetric encryption system and sends the encrypted original key to an information receiver;
the two parties repeatedly perform the password hash function calculation by taking the output value of the previous calculation process as the input value of the current calculation process to obtain the key required by transmission, and the input value of the initial calculation process is the original key;
wherein the length of the key required for the transmission is greater than the original key length.
9. A liquid crystal light valve based secure communication system for use in a secure communication method according to claim 1, wherein the secure communication system comprises:
the information transmission device is respectively arranged on the information receiver and the information sender and is used for establishing a communication link between the information receiver and the information sender;
the information processing device is used for receiving an externally input secret key and information to be transmitted, respectively converting the secret key and the information to be transmitted into binary code formats and superposing the binary code formats into information ciphertext;
the encryption device comprises a liquid crystal light valve, a light valve control unit, a display unit capable of displaying the agreed original picture and a shooting unit, wherein:
the liquid crystal light valve is arranged in front of the display unit in parallel and comprises N matrixes; the liquid crystal light valve is connected with the light valve control unit, and the liquid crystal light valve switches the display parameters of each matrix according to the control instruction of the light valve control unit;
the light valve control unit is connected with the information processing device, receives the information ciphertext sent by the information processing device, and loads the information ciphertext on the liquid crystal light valve driving signal so as to change the space light distribution parameter at the liquid crystal light valve;
the shooting unit is arranged on one side of the liquid crystal light valve, which is far away from the display unit, and is used for shooting the appointed original picture through the liquid crystal light valve to generate an encrypted picture.
CN201911125057.3A 2019-11-18 2019-11-18 Secret communication method and system based on liquid crystal light valve Active CN110855437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911125057.3A CN110855437B (en) 2019-11-18 2019-11-18 Secret communication method and system based on liquid crystal light valve

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911125057.3A CN110855437B (en) 2019-11-18 2019-11-18 Secret communication method and system based on liquid crystal light valve

Publications (2)

Publication Number Publication Date
CN110855437A CN110855437A (en) 2020-02-28
CN110855437B true CN110855437B (en) 2023-04-25

Family

ID=69600623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911125057.3A Active CN110855437B (en) 2019-11-18 2019-11-18 Secret communication method and system based on liquid crystal light valve

Country Status (1)

Country Link
CN (1) CN110855437B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968705B (en) * 2017-11-28 2021-02-02 深圳大学 Encryption/decryption method, encryption/decryption end and double-random-phase encryption/decryption system
CN108183799A (en) * 2017-12-21 2018-06-19 上海理工大学 Mixed cipher method based on association in time imaging
CN109088725B (en) * 2018-07-18 2021-04-09 北京理工大学 Network key distribution method, device and system based on cascade disturbance calculation imaging
CN109614808B (en) * 2018-12-12 2022-09-06 苏州科技大学 Gray level image encryption and decryption method based on linear canonical transformation and gamma function

Also Published As

Publication number Publication date
CN110855437A (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN102447557B (en) Quantum encryption communication equipment, quantum encryption communication method and quantum encryption communication system
Wu et al. A new color image cryptosystem via hyperchaos synchronization
Xie et al. Exploiting optics chaos for image encryption-then-transmission
CN108566500A (en) The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN106709963B (en) The method and apparatus of the authentication image true and false
Nofriansyah et al. A new image encryption technique combining hill cipher method, morse code and least significant bit algorithm
KR20150129459A (en) White-box cryptographic device and method thereof
CN104318510A (en) Image encryption and interpretation method based on Matlab
CN104751401A (en) Novel piecewise linear chaotic mapping image encrypting and encoding method
CN103093411A (en) Encryption-decryption method based on random binary image
CN107968705A (en) A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
CN110855362B (en) Secret communication method and system based on visible light LED matrix
CN105991559B (en) A kind of user security login method based on image encryption technology
He et al. The keyed optical Hash function based on cascaded phase-truncated Fourier transforms
CN110855437B (en) Secret communication method and system based on liquid crystal light valve
CN104868989B (en) Encryption method for view data safe transmission
Sharma et al. Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation
US11522618B2 (en) Quantum information transmitter, quantum communication system including the same, and operating method of quantum information transmitter
CN1682477A (en) Image encryption method and visual decryption device
CN107493281A (en) encryption communication method and device
Geethanjali et al. Enhanced data encryption in IOT using ECC cryptography and LSB steganography
Ajmera et al. Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher
CN105049176A (en) Decryption method used for image data secure transmission
CN106302457A (en) A kind of data communications method and system
CN113763493B (en) Encryption and decryption method for image data of power transmission line

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant