CN111079573A - Anti-counterfeiting encryption method based on image random scrambling technology - Google Patents

Anti-counterfeiting encryption method based on image random scrambling technology Download PDF

Info

Publication number
CN111079573A
CN111079573A CN201911201345.2A CN201911201345A CN111079573A CN 111079573 A CN111079573 A CN 111079573A CN 201911201345 A CN201911201345 A CN 201911201345A CN 111079573 A CN111079573 A CN 111079573A
Authority
CN
China
Prior art keywords
image
random
scrambling
counterfeiting
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911201345.2A
Other languages
Chinese (zh)
Inventor
童勤业
童文戈
童文戟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201911201345.2A priority Critical patent/CN111079573A/en
Publication of CN111079573A publication Critical patent/CN111079573A/en
Priority to PCT/CN2020/131658 priority patent/WO2021104344A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • G06V40/53Measures to keep reference information secret, e.g. cancellable biometrics

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an anti-counterfeiting encryption method based on an image random scrambling technology, and belongs to the technical field of encryption and anti-counterfeiting. The invention carries out random spatial scrambling without any rule on the information in the image, and can greatly improve the security of encryption because the spatial structure information is difficult to crack; moreover, random spatial scrambling can be coupled with masking, further improving reliability. The existing method can not leave out passwords, character strings and the like, and the encrypted and anti-counterfeiting signals are signals without space-time structures. The anti-counterfeiting encryption method completely breaks away from the existing encryption and anti-counterfeiting framework, utilizes the signal of the image space structure to realize encryption and anti-counterfeiting information, and is an encryption and anti-counterfeiting method in a brand new sense.

Description

Anti-counterfeiting encryption method based on image random scrambling technology
Technical Field
The invention belongs to the field of encryption and anti-counterfeiting, and particularly relates to an anti-counterfeiting encryption method based on an image random scrambling technology.
Background
The greatest advantage of digital technology is the extremely high stability, which allows transmission, copying and storage without loss, which is the greatest advantage, but also entails great difficulties-its security is really too poor. The problems of digital information encryption and anti-counterfeiting become very difficult to solve. At present, network disputes and network crimes occur in large quantity. Along with the technical development, the crime making cost is greatly reduced, people who do not know the network can buy the crime making equipment in the market very cheaply, and the crime making operation is also convenient. The number of the counter persons is increased, and network encryption and network anti-counterfeiting become problems in the network.
The anti-counterfeiting technology of the bitcoin can be calculated as the most secure means. It uses RSA or ECC encryption technique to replace anti-fake actually, because RSA and ECC are not decoded, so it makes the bit coin the safest measure, although RSA and ECC are not decoded, it can use exhaustion method to decode, in order to improve RSA and ECC reliability, it can only increase its reliability by increasing calculated digit, now RSA has increased to one thousand to two thousand, we use 64 digit double precision personal computer, it is inconvenient to use this computer to calculate one thousand digit operation. Although the number of bits of the ECC is only 200-300 bits, the ECC is equivalent to the encryption strength of RSA1000 bits due to high computational complexity. The implementation of public password encryption in a common PC is still cumbersome and time consuming, and is more difficult to implement especially on a mobile phone. The blockchain technology is more popular recently, but the core part of the blockchain has public codes, so it has the same weaknesses of RSA and ECC.
At present, no technology such as bitcoin and blockchain technology are adopted in electronic commerce, namely electronic invoice and electronic payment (indeed, the operation speed problem is still not solved in the current effort).
The existing e-commerce uses security technologies such as: the random sequence is composed of numbers, character codes and the like and used as a password, the longer the sequence is, the higher the safety level is, the longer the sequence is, the higher the safety level is, the sequence is difficult to be memorized, particularly, many people are easy to memorize, the birthday of the people is often used as the password, or the birthdays of several family people or various data related to the people are used as the password, and the people are close to the habits of the people and know the habits of the people, so that the cracking range of the password is greatly reduced, the reliability of the password is greatly deteriorated, therefore, the method is further adopted at present to improve the reliability by adding more measures, such; transmitting the authentication code (such as a telephone short message, a network Email and the like) by multiple channels; a two-dimensional bar code; the mobile phone number is used as a confirmation basis and the like. Careful analysis of these methods is not very reliable, but several methods are used, just to add some sense of security.
The methods listed above are all the bases of numbers and codewords, and are independent of the image signal having a spatial structure. The technology of the prior art, no matter the technology of hardware and software is developed, the technologies of transmission, storage, copying and the like of the image are well developed, so that the technology of fully utilizing the characteristics of the digital image to realize encryption and anti-counterfeiting appears to be easy to realize, and the technology in the aspect is expected to greatly improve the encryption and anti-counterfeiting performance.
Disclosure of Invention
The invention aims to overcome the defects of the anti-counterfeiting encryption method in the prior art in terms of safety and reliability, and provides the anti-counterfeiting encryption method based on the image random scrambling technology.
The invention adopts the following specific technical scheme:
in a first aspect, the present invention provides an anti-counterfeit encryption method based on an image random scrambling technology, which comprises the following steps:
s1: information to be encrypted is superposed on a first image with unique biological characteristic information of a sender to obtain a second image;
s2: carrying out random spatial scrambling on pixels in the second image, wherein the random spatial scrambling is to carry out random position exchange on pixel distribution in space under the condition of keeping pixel values unchanged, so that a third image is obtained after the image is converted into a visual random scatter diagram;
s3: after the receiving party obtains the third image, restoring the third image according to the reverse process of the random spatial scrambling to obtain a second image;
s4: and the receiver acquires the unique biological characteristic information used for verification by the sender, compares the unique biological characteristic information with the unique biological characteristic information recorded in the second image, and reads the encrypted information from the second image if the unique biological characteristic information passes the comparison.
In a preferred implementation manner of the first aspect, in S1, the second image is masked before being randomly spatially scrambled, each pixel value in the second image is calculated with the mask image according to a predetermined rule, and then a fourth image is formed from the calculation result and is used as a new second image to be randomly spatially scrambled in S2, where the fourth image is a visually random scatter diagram.
Preferably, as two implementation manners of the first aspect, the first image with the unique biometric feature information of the sender is a photograph with a face of the sender.
As a preferable mode of the above-mentioned first aspect, the mask processing method includes: acquiring a mask image with the same size as the processed image, performing mathematical operation on the pixel values of corresponding pixels in the processed image and the mask image according to a predetermined rule, and recording the operation result value in a corresponding position of a fourth image.
Further, in the mask processing, if the arithmetic result value after the mathematical operation exceeds the size limit of the image pixel value, the fourth image is divided into a main image and an auxiliary image, the main image is recorded with a threshold value of the pixel value, and the auxiliary image is recorded with a difference value between the arithmetic result value and the threshold value.
As a preferable mode of the two implementation modes of the first aspect, the unique biological feature information used by the sender for verification is obtained by a real-time verification mode, and is preferably a real-time video face authentication mode.
In a preferred embodiment of the first aspect, the image is a monochrome image or a color image.
Preferably, in two implementations of the first aspect, the image pixel value is 8 bits, 24 bits, or other bits.
Compared with the prior art, the invention has the following beneficial effects:
1) the existing method can not leave out passwords, character strings and the like, and the encrypted and anti-counterfeiting signals are signals without space-time structures. The anti-counterfeiting encryption method completely breaks away from the existing encryption and anti-counterfeiting framework, utilizes the signal of the image space structure to realize encryption and anti-counterfeiting information, and is an encryption and anti-counterfeiting method in a brand new sense.
2) The invention carries out random spatial scrambling without any rule on the information in the image, and can greatly improve the security of encryption because the spatial structure information is difficult to crack; moreover, random spatial scrambling can be coupled with masking, further improving reliability. The invention can realize the decryption without using an exhaustion method.
3) In the invention, the original image is provided with the unique biological characteristic information of the sender, and the unique biological characteristic information of the sender can be used for anti-counterfeiting verification to prevent the false use of other people.
3) The digital image has the greatest characteristic that the image can be modified at will, such as changing one person's head portrait, separating characters from the image, or modifying a signature, and the like, and the modification can be realized in a manner of ' seamless ' within a range which can be recognized by naked eyes. However, because the invention adopts the random scrambling method, the pixel points at any local position of the original image can be dispersed at any position of the scrambled image after scrambling, and if the random small area of the scrambled image needs to be changed. Is reflected in the whole image, i.e. any minor modifications can be found quickly, which substantially prevents local modifications of the image.
Drawings
FIG. 1 is a schematic view of a first image in example 1;
FIG. 2 is a second image diagram in example 1;
FIG. 3 is a schematic view of a third image in example 1;
fig. 4 is a diagram illustrating a fourth image in embodiment 2.
Detailed Description
The invention will be further elucidated and described with reference to the drawings and the detailed description.
Example 1:
the invention discloses an anti-counterfeiting encryption method based on an image random scrambling technology, which comprises the following specific steps:
s1: first, a first image with unique biological characteristic information of a sender is obtained, wherein the unique biological characteristic information of the sender can be unique biological identification characteristic information of a face, a fingerprint, an iris and the like of the sender. In the present invention, it is preferable to use a photograph with the face of the sender, as shown in fig. 1, in view of the convenience of acquisition. The information to be encrypted, which is required to be sent by the sender, can be directly written on the first image to obtain a second image. Taking the payment process as an application scenario as an example, the writable encryption information is corresponding payment information, and the second image is shown in fig. 2, although the specific encryption information may be changed according to the application scenario. It should be noted that in this step, the position and size of the written encrypted information should be properly controlled so as not to destroy the reading of the unique biometric feature information.
S2: and randomly spatially scrambling the pixels in the second image, wherein the random spatial scrambling in the present invention refers to randomly disordering spatial positions of the pixels, that is: the pixel distribution is spatially subjected to random position swapping while keeping the pixel values unchanged, and the image is converted into a visually random scatter diagram, thereby obtaining a third image, as shown in fig. 3. The random spatial scrambling may be implemented in a variety of ways, such as performing matrix operations on pixel lattices in the image, where the matrix operations may facilitate subsequent inverse operations to extract information.
The third image may be used as a carrier of encrypted information for delivery to a recipient of the information. Because the third image is a random image, if a person who is not aware of the scrambling process cannot distinguish the image with the information, and even if the person knows the image with the information, the person does not know how to extract the information, so that the reliability of encryption can be fully ensured.
S3: and after the receiving party acquires the third image, restoring the third image according to the reverse process of the random spatial scrambling to obtain a second image. The second image at this time may be directly read with the encrypted information described by the sender. However, the third image may be stolen or tampered during transmission, so that the third image needs to be subjected to the next anti-counterfeiting verification.
S4: the process of anti-counterfeiting verification comprises the following steps: the receiver requests the sender for the actual unique biometric information for verification. And the second image is obtained by writing secret information on the first image, so that the second image also carries the unique biological characteristic information of the sender. After the receiver acquires the unique biological characteristic information used for verification by the sender, the unique biological characteristic information can be compared with the unique biological characteristic information recorded in the second image, if the unique biological characteristic information passes the comparison, the image is shown to be actually sent by the sender, and at the moment, the true encrypted information can be successfully read from the second image.
It should be noted that, in this step, the method for the receiving side to obtain the unique biometric feature information used by the sending side for authentication may be various, and the specific requirement is determined according to the security requirement of the sending side for this operation. Taking a payment scenario as an example, the sender may select multiple authentication methods: 1) reserving the unique biological characteristic information of the receiver, and directly calling the reserved information for comparison after the receiver restores to obtain a second image; 2) after the receiver restores to obtain the second image, the receiver informs the sender to request the sender to send an image with own unique biological characteristic information for verification; 3) and after the receiver restores the second image, the receiver informs the sender to request the sender to start online real-time authentication, the authentication can be further dynamic, and the image with the own unique biological characteristic information is obtained through the real-time authentication. In the three verification modes, the safety factor 3) >2) >1) and the complexity is 3) >2) >1, so that the corresponding authentication mode can be automatically adjusted according to the requirements of encryption and the payment amount.
Example 2:
on the basis of the embodiment 1, the invention can further set a mask processing mode to carry out secondary encryption, thereby preventing exhaustive cracking.
Due to the irregularity of the image random spatial scrambling in the embodiment 1, the regularity cannot be found to crack the image. However, the method can be cracked by an exhaustion method, if one image has n pixel points in total, the method takes a mathematical 'full arrangement method' to obtain n! A possible image, n! One possible image is determined to have an original image, so that the purpose of cracking is achieved. To prevent this, the invention employs "masking" the second image after it has been created to make it a scattergram of all random scatters. Even if a real second image is found, the second image is visually a random scatter diagram, and cannot be distinguished from other images, and real secret information cannot be acquired.
Specifically, after the step S1 is executed, the masking process is performed on the second image before the random spatial scrambling in step S2, where the masking process includes: after each pixel value in the second image is operated with the mask image according to a predetermined rule, a fourth image is formed from the operation result, and the fourth image is a visually random scatter diagram, as shown in fig. 4. This fourth image is randomly spatially scrambled as a new second image at S2, i.e. the scrambled image at S2 is actually the fourth image.
The mathematical operation of the second image with the mask image requires a specific design, since the fourth image needs to be guaranteed to be a visually random scatter diagram. The mathematical operation can be simply added or subtracted, and can also be any functional relation f (y)i,wi) And are not intended to be limiting.
Example 3:
in this embodiment, on the basis of embodiment 2, in order to prevent a possible disclosure from being generated by using the same image multiple times, a plurality of first images may be stored in advance in the mobile device, and one of the first images is selected for encryption each time. Therefore, the problem of false-proof encryption failure caused by the fact that a certain first image is divulged can be prevented.
Digital images have many advantages and ensure that the images are not damaged during transmission, storage and copying. But the image is also easy to be modified, for example, one person head portrait is changed into another person head portrait, writing or signature in the image is also easy to be modified, and the image can be modified to be seamless. However, the invention proposes a method of random spatial scrambling, that is, each pixel of the image is randomly moved in the image space, so that only the image fully covered with the pockmarks is seen on the picture after the original clear image is scrambled. Because all pixel points of any small area in the original image can be dispersed in the whole scrambled image after random spatial scrambling, if we remove any small part of the image after scrambling, when the image is restored to the original image, at least part of the image in the whole area can be changed. Whether tampering occurs can be identified by comparing the two images, which ensures that the images can be found when being segmented or modified randomly. Therefore, the image and the characters can not be separated or replaced at will, and the reliability is improved.
The above embodiments 1 to 3 are all based on the method of random spatial scrambling to perform the anti-counterfeiting encryption transmission on the secret information. The blockchain technology is hot at present, seems to occupy the whole digital currency market and the e-commerce market, but in fact, the core part of the blockchain is also public passwords, so that the blockchain technology also has the same defects as RSA or ECC. Blockchains also require multipoint contacts, greatly increasing network traffic and time. The method of the invention can avoid the defects and is more suitable for application in the fields of frequently used electronic commerce, mobile payment and the like.
In the following, the present invention is described with several examples in combination with application scenarios of payment awareness, so as to facilitate better understanding of the present invention by those skilled in the art.
The use scenario is as follows:
1) using the object:
sender A- -user
Receiver B- -Bank (or other intermediary deposit mechanism, such as a third party payment platform)
2) Specific behaviors: a is to make a check or send a deposit request to bank B, which pays the other party, i.e. payee C
3) Preparing: a goes to B in advance, the photo, signature and the like are given to B, B puts the photo, the signature, the character string and the like together to form a picture T1(T1Which may be black and white or color images, and the pixels may be 8 bits, 24 bits, and other various numbers of bits). Then to T1And performing random spatial scrambling. The image after "scrambling" is T10. This makes A, B collectively aware of the scrambling algorithm.
The "scrambling" is to scramble all the pixel positions in the original image from new arrangement so that the original image becomes a dot-and-dot-pattern.
Suppose a graph T1Becomes T after random spatial scrambling10,T1Any one pixel is xi(ai,bi) Wherein (a)i,bi) Is a pixel xiIs detected by the position of the coordinates of the (c),
suppose again that image T10Any one pixel is yi(ai,bi) It is related to xi(ai,bi) The points correspond.
Now, how to perform the "random spatial scrambling":
first to T1All pixels in the two-dimensional space are queued for line-by-line scanning, making the two-dimensional image a one-dimensional sequence string.
x1,x2,…,xi…,xm(1)
Formula (1) shows scheme T1Consisting of m pixels in total.
Also available is T10Series of graphs
y1,y2,…,yi,…,ym(2)
Equations (2) and (1) indicate that the two image pixels before and after scrambling are identical (both M).
"random spatial scrambling" can be represented by a correlation matrix (as in the correlation matrix in system theory).
Assuming the following holds:
Figure BDA0002295953790000071
in the formula (3), the unit matrix is used to establish the following formulas
x1=y1;x2=y2;......;xi=yi;......;xm=ym
The pixel value and the spatial structure in the image are kept the same and are not changed after the unit array is acted.
The scrambling process is illustrated next:
for convenience of explanation, assume that m is 5
Now we want to refer to x2And x5And (5) changing the position. Can be realized according to the relation of equation (4):
Figure BDA0002295953790000081
according to the formula (4), the following formulae can be obtained,
y1=x1y2=x5y3=x3y4=x4y5=x2
this means that the pixel value x is influenced by equation (4)2And x5The swap is realized.
In the same way, two points can be randomly selected for conversion by using the 'correlation array', so that the aim of image scrambling is fulfilled. Whatever the law and method used to "scramble" it can eventually be expressed by equation (4). Of course, the scrambling method does not need to take two numbers to replace in pairs, and the transposition can be performed by using 3 or more pixels in turn, so long as the 'correlation matrix' is adjusted correspondingly.
When the reverse process reduction needs to be carried out on the random space scrambling, the inverse operation only needs to be carried out according to the matrix operation, and the inverse operation is recorded as the inverse scrambling algorithm.
Application example 1
A is taken from the photo and added with payment information characters (including the amount of money paid to a person or unit, the collection account number, the added payment date and signature, and the specific payment information can be adjusted) to form T1Then T is put1Is turned into T through random scrambling10Sending to B, B using inverse scrambling algorithm to process T10Is restored to T1. B sees T1The face photo can simultaneously acquire the image sent by the A or the real-time video head portrait, verify the authenticity and simultaneously watch the T1Time of write-in (guarantee T)1Received within the effective time), can press T after no error after confirmation1The contents of the above payment information are described to execute payment and pay to C.
Application example 2
A is taken from the photo, and then the characters of payment information (including the amount of money paid to a person or unit, the account number of the collection, the date and the signature of the payment, and the specific payment information can be adjusted) form T1Then handle T1Masking to form T11The graph becomes T through random spatial scrambling110Sending to B, B using inverse scrambling algorithm to process T110Is restored to T11. Handle T11Performing reverse mask treatment to make T11Becomes T1And B sees T1The picture A and the real-time video head portrait are simultaneously obtained, the authenticity is verified, and the T is simultaneously seen1Time of write-in (guarantee T)1Received within the effective time), can press T after no error after confirmation1The contents of the above payment information are described to execute payment and pay to C.
The masking process is to superimpose a layer of noise image on the original image to submerge the image in the noise. This noisy image is called "masking" of the imageFilm ", or mask F. This process is referred to as a "masking" process. Specifically, the pixel and T in the mask image F1The pixel values of the corresponding points are added (or subtracted) to form new pixel values, and the image formed by the pixels is the image T after the mask is added11
The masking process is performed by adding or subtracting point by point (or by performing an arbitrary function operation on f (y)i,wi) Wherein y isiIs T1Point of (5), wiIs the corresponding point in F). When applying a mask, several situations arise, and there are 3 treatment methods:
a) when the sum of the pixel values of the two points is greater than the maximum pixel value (taking a black-and-white image as an example, the gray scale value is maximum), let T be assumed1The middle pixel value is yijThe corresponding pixel in the mask F is wij,wij+yij=M+zijWhere M is the pixel maximum, zijIs the partial value exceeded. Writing M at T11At the corresponding point of (2), z isijWritten in another image F1At the corresponding point of (a). T is11How many points of M are. At F1How many pixels there are, F1The other dots are blank. Handle T11And F1And simultaneously to B.
b) Assuming the mask is subtracted, there is no point of maximum M, but a negative number appears.
yij-wij=0-zijWrite 0 at T11At the corresponding point of (2), z isijWritten in another image F1At a corresponding point of (1), T101In several numbers 0, in F1In which there are several pixels, and finally T11And F1And simultaneously to B.
c) The mask method is modified, when two pixels are added (or subtracted), the pixel value of the corresponding point of the image F can be properly corrected when an over value (or a negative value) occurs (the anti-positive F is noise), so that the pixel value is not over value (or a negative value is not generated). Thus F becomes F'. Mask F is replaced by F'. When transmitting, subtracting F and F 'point by point to obtain graph F' and graph T11To the other party. The other side knows F 'and the original F, and also knows F'.
The above-mentioned method only uses simple addition and subtraction method, and also can use arbitrary functional relation f (y)i,wi) Is represented by f (y)i,wi) Greater than M and less than 0 correspond to the same treatment as greater than M in addition and less than 0 in subtraction.
The above embodiments and application examples may be implemented on a mobile device, and for example, the identification process of biometric information, the masking process, the random spatial scrambling and the corresponding restoration process, etc. may all be implemented by an algorithm. Of course, the method may be assisted by human intervention, and is not limited thereto.
In the above embodiments and application examples, all the images may be color images, black-and-white images, and grayscale images, as long as they are consistent. That is, the method can be used on black-and-white images as well as on color images, except that the gray values are changed to color pixel values. In addition, the pixel values of the image may be 8-bit, 24-bit, or other number of bits color, or other number of bits image.
In the above embodiments and application examples, the encrypted information may be characters, patterns such as two-dimensional codes and bar codes, or other pictographic elements, as long as both can recognize the meaning. In addition, for the writing process of the information on the image, the information can be input by a keyboard, namely, the information can be input by handwriting, or the information can be input from other systems, and other superposition methods can be adopted, as long as the information can be added to the image.
In the above embodiments and application examples, the scrambling process is not limited to matrix operation, and any form capable of realizing pixel position conversion may be adopted. For example, tabular or other forms may also be used.
The above-described embodiments are merely preferred embodiments of the present invention, which should not be construed as limiting the invention. Various changes and modifications may be made by one of ordinary skill in the pertinent art without departing from the spirit and scope of the present invention. Therefore, the technical scheme obtained by adopting the mode of equivalent replacement or equivalent transformation is within the protection scope of the invention.

Claims (8)

1. An anti-counterfeiting encryption method based on an image random scrambling technology is characterized by comprising the following steps:
s1: information to be encrypted is superposed on a first image with unique biological characteristic information of a sender to obtain a second image;
s2: carrying out random spatial scrambling on pixels in the second image, wherein the random spatial scrambling is to carry out random position exchange on pixel distribution in space under the condition of keeping pixel values unchanged, so that a third image is obtained after the image is converted into a visual random scatter diagram;
s3: after the receiving party obtains the third image, restoring the third image according to the reverse process of the random spatial scrambling to obtain a second image;
s4: and the receiver acquires the unique biological characteristic information used for verification by the sender, compares the unique biological characteristic information with the unique biological characteristic information recorded in the second image, and reads the encrypted information from the second image if the unique biological characteristic information passes the comparison.
2. The image stochastic scrambling technique-based anti-counterfeit encryption method of claim 1, wherein in S1, the second image is masked before being randomly spatially scrambled, after each pixel value in the second image is operated with the mask image according to a predetermined rule, a fourth image is formed from the operation result and is used as a new second image to be randomly spatially scrambled in S2, and the fourth image is a visually random scatter diagram.
3. The anti-counterfeiting encryption method based on the image random scrambling technology as claimed in claim 1 or 2, wherein the first image with the unique biological characteristic information of the sender is a photo with the face of the sender.
4. An anti-counterfeiting encryption method based on the image random scrambling technology according to claim 2, wherein the mask processing method comprises the following steps: acquiring a mask image with the same size as the processed image, performing mathematical operation on the pixel values of corresponding pixels in the processed image and the mask image according to a predetermined rule, and recording the operation result value in a corresponding position of a fourth image.
5. The anti-counterfeiting encryption method based on the image random scrambling technology as claimed in claim 1 or 2, wherein the unique biological characteristic information used for verification by the sender is obtained by means of real-time verification.
6. An anti-counterfeiting encryption method based on image random scrambling technology according to claim 5, characterized in that the real-time verification mode is preferably real-time video face authentication.
7. An anti-counterfeiting encryption method based on the image random scrambling technology as claimed in claim 1 or 2, characterized in that the image is a black-and-white image or a color image.
8. An anti-counterfeiting encryption method based on an image random scrambling technology as claimed in claim 1 or 2, characterized in that the image pixel value is 8 bits, 24 bits or other bits.
CN201911201345.2A 2019-11-29 2019-11-29 Anti-counterfeiting encryption method based on image random scrambling technology Pending CN111079573A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911201345.2A CN111079573A (en) 2019-11-29 2019-11-29 Anti-counterfeiting encryption method based on image random scrambling technology
PCT/CN2020/131658 WO2021104344A1 (en) 2019-11-29 2020-11-26 Anti-counterfeiting and encryption method based on random image scrambling technique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911201345.2A CN111079573A (en) 2019-11-29 2019-11-29 Anti-counterfeiting encryption method based on image random scrambling technology

Publications (1)

Publication Number Publication Date
CN111079573A true CN111079573A (en) 2020-04-28

Family

ID=70312065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911201345.2A Pending CN111079573A (en) 2019-11-29 2019-11-29 Anti-counterfeiting encryption method based on image random scrambling technology

Country Status (2)

Country Link
CN (1) CN111079573A (en)
WO (1) WO2021104344A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104344A1 (en) * 2019-11-29 2021-06-03 童勤业 Anti-counterfeiting and encryption method based on random image scrambling technique

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297221B (en) * 2022-09-29 2022-12-23 南通德辰智能科技有限公司 Image encryption method based on pixel ring scrambling
CN116915508B (en) * 2023-09-13 2023-12-12 宜兴启明星物联技术有限公司 Channel dynamic encryption method in communication process
CN117579866B (en) * 2023-11-23 2024-05-10 江苏亿通高科技股份有限公司 Smart city monitoring image safety transmission method based on 5G communication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141466A (en) * 2007-10-26 2008-03-12 北京交通大学 Document authentication method based on interweaving watermark and biological characteristic
CN101303725A (en) * 2008-04-30 2008-11-12 浙江大学 Method for generating and authenticating frailty watermark based on error correction encoding
US20090080649A1 (en) * 2007-09-20 2009-03-26 Andrew Dellow Method and system for protecting data
CN103646264A (en) * 2013-11-06 2014-03-19 杭州电子科技大学 Multiple information encrypted two-dimensional code anti-counterfeiting method
CN103985081A (en) * 2014-05-27 2014-08-13 辽宁大学 Digital image multiple scrambling method based on lifting wavelet transformation
KR20170001926A (en) * 2015-06-26 2017-01-05 주식회사 씽크풀 Method for certification using digital image, application system, and authentication system thereof
CN108961140A (en) * 2018-06-14 2018-12-07 湖北工程学院 Image guard method and device, image restoring method and device
CN109803063A (en) * 2018-12-20 2019-05-24 福建师范大学福清分校 A kind of image encryption method based on five dimension ultra-chaos systems
CN110110539A (en) * 2019-05-10 2019-08-09 四川大学 A kind of integration imaging three-dimensional information encryption method based on two dimensional code

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100018364A (en) * 2008-08-06 2010-02-17 삼성전자주식회사 Scanning apparatus, host apparatus and scan image processing method thereof
CN107332827A (en) * 2017-06-09 2017-11-07 国政通科技股份有限公司 A kind of encrypted transmission device and method of identity information
CN108513038A (en) * 2018-04-18 2018-09-07 佛山市旅行青蛙科技有限公司 A kind of image encryption transmission method
CN111079573A (en) * 2019-11-29 2020-04-28 童勤业 Anti-counterfeiting encryption method based on image random scrambling technology

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090080649A1 (en) * 2007-09-20 2009-03-26 Andrew Dellow Method and system for protecting data
CN101141466A (en) * 2007-10-26 2008-03-12 北京交通大学 Document authentication method based on interweaving watermark and biological characteristic
CN101303725A (en) * 2008-04-30 2008-11-12 浙江大学 Method for generating and authenticating frailty watermark based on error correction encoding
CN103646264A (en) * 2013-11-06 2014-03-19 杭州电子科技大学 Multiple information encrypted two-dimensional code anti-counterfeiting method
CN103985081A (en) * 2014-05-27 2014-08-13 辽宁大学 Digital image multiple scrambling method based on lifting wavelet transformation
KR20170001926A (en) * 2015-06-26 2017-01-05 주식회사 씽크풀 Method for certification using digital image, application system, and authentication system thereof
CN108961140A (en) * 2018-06-14 2018-12-07 湖北工程学院 Image guard method and device, image restoring method and device
CN109803063A (en) * 2018-12-20 2019-05-24 福建师范大学福清分校 A kind of image encryption method based on five dimension ultra-chaos systems
CN110110539A (en) * 2019-05-10 2019-08-09 四川大学 A kind of integration imaging three-dimensional information encryption method based on two dimensional code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104344A1 (en) * 2019-11-29 2021-06-03 童勤业 Anti-counterfeiting and encryption method based on random image scrambling technique

Also Published As

Publication number Publication date
WO2021104344A1 (en) 2021-06-03

Similar Documents

Publication Publication Date Title
CN111079573A (en) Anti-counterfeiting encryption method based on image random scrambling technology
EP0612040B1 (en) Method and apparatus for credit card verification
US5436970A (en) Method and apparatus for transaction card verification
US20050036651A1 (en) Digital anti&minus forging method
CN107918791B (en) Two-dimensional code generating and decoding method and device in two-dimensional code copying process
WO2019114615A1 (en) Original photo identification method and application
CN108629728A (en) A kind of high power capacity bianry image information concealing method
US20220284448A1 (en) Anti-counterfeiting and encryption method based on local random image transformation technique
WO2019114614A1 (en) Original photo identification method and system
Jain Digital watermarking techniques: a case study in fingerprints & faces
Thawre et al. Survey on security of biometric data using cryptography
Yan et al. Improving image quality in visual cryptography
Suruthikeerthana et al. An Extended Visual Cryptography With Dynamically Authenticated Error Avoidance Scheme For Bank Applications
CN116167807A (en) Bill anti-counterfeiting method and device, electronic equipment and storage medium
JP2019102979A (en) Method related to transaction based on personal identification using biological information
Tkachenko Generation and analysis of graphical codes using textured patterns for printed document authentication
EP1116176B1 (en) Information card
KR100407464B1 (en) Multi-step encryption/decryption apparatus and method by pixel unit
CN114422651B (en) Image information hiding method, tracing method, hiding device and tracing device
RU2791834C1 (en) Method for securing an electronic image based on affine transformations
US11954756B1 (en) Anti-leak digital document marking system and method using distributed ledger
RU2779379C1 (en) Method for authentication of an electronic image
Schreyer et al. Leaking sensitive financial accounting data in plain sight using deep autoencoder neural networks
Ibrahim A Method to Encode the Fingerprint Minutiae Using QR Code
Sharma Image watermarking for identity protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200428