CN111935077B - Batch data encryption and decryption method and device and readable storage medium - Google Patents

Batch data encryption and decryption method and device and readable storage medium Download PDF

Info

Publication number
CN111935077B
CN111935077B CN202010582119.XA CN202010582119A CN111935077B CN 111935077 B CN111935077 B CN 111935077B CN 202010582119 A CN202010582119 A CN 202010582119A CN 111935077 B CN111935077 B CN 111935077B
Authority
CN
China
Prior art keywords
data
information
data information
singular values
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010582119.XA
Other languages
Chinese (zh)
Other versions
CN111935077A (en
Inventor
张伟
武春杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LCFC Hefei Electronics Technology Co Ltd
Original Assignee
LCFC Hefei Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LCFC Hefei Electronics Technology Co Ltd filed Critical LCFC Hefei Electronics Technology Co Ltd
Priority to CN202010582119.XA priority Critical patent/CN111935077B/en
Publication of CN111935077A publication Critical patent/CN111935077A/en
Application granted granted Critical
Publication of CN111935077B publication Critical patent/CN111935077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a method, a device and a readable storage medium for encrypting and decrypting batch data, which comprises the steps of extracting first data information and second data information in each data to be encrypted, wherein the first data information and the second data information are different data information; generating key information for encryption according to the extracted first data information; encrypting the second data information by using the generated key information to obtain third data information; and generating encrypted data according to the first data information and the third data information. Therefore, a key is generated by using one part of the data to be encrypted, and the other part of the data to be encrypted is encrypted and then used for generating so as to generate the encrypted data. Therefore, the secret key of each data does not need to be stored after the batch data are encrypted, the problem of secret key loss or stealing does not exist, and the safety is improved.

Description

Batch data encryption and decryption method and device and readable storage medium
Technical Field
The present invention relates to the field of data encryption, and in particular, to a method and an apparatus for encrypting and decrypting batch data, and a readable storage medium.
Background
For huge data encryption, the traditional encryption algorithm is to encrypt all data independently, so that key storage of a large amount of encrypted data is a problem, and the data is easy to lose or steal, resulting in low security.
Disclosure of Invention
The embodiment of the invention provides a batch data encryption and decryption method, a device and a readable storage medium, which have the advantages that after the batch data are encrypted, the secret key of each data does not need to be stored, so that the problem of secret key loss or stealing does not exist, and the safety is improved.
One aspect of the present invention provides a batch data encryption method, including: extracting first data information and second data information in each data to be encrypted, wherein the first data information and the second data information are different data information; generating key information for encryption according to the extracted first data information; encrypting the second data information by using the generated key information to obtain third data information; and generating encrypted data according to the first data information and the third data information.
In an embodiment, the generating key information for encryption according to the extracted first data information includes: converting the first data information into a first data vector represented in vector form; extracting a plurality of singular values from the first data vector using singular value decomposition principles; generating the key information for encryption according to the extracted plurality of singular values.
In an embodiment, the generating key information for encryption according to the extracted key data information includes: selecting a part of singular values from the plurality of singular values from large to small so that the ratio of the sum of the singular values of the part of the number to the sum of all the singular values exceeds a specified threshold; and carrying out binary conversion on the selected singular value to obtain key information for encryption.
In an embodiment, after selecting a partial number of singular values from large to small of the plurality of singular values, the method further comprises: judging whether the number of the selected parts exceeds a preset number or not; and if the part number is judged to exceed the preset number, selecting the singular values of the preset number from the singular values of the part number according to the descending order.
In one embodiment, the second data information and the key information are both binary data; correspondingly, the encrypting the second data information by using the generated key information to obtain third data information includes: and carrying out exclusive OR operation on the key information and the second data information in order according to bits so as to convert the second data information into third data information.
In an embodiment, before bitwise xoring the key information with the second data information, the method further includes: acquiring the binary data length of the key information and the binary data length of the second data information; if the binary data length of the key information is judged to be larger than the binary data length of the second data information, intercepting partial data from the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information; and if the binary data length of the key information is judged to be smaller than the binary data length of the second data information, performing head-to-tail cyclic splicing on the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information.
In one implementation, the data to be encrypted is PNG image data; correspondingly, the first data information is an image data block, and the second data information is a format data block.
Another aspect of the present invention provides a batch data encryption apparatus, including: the data information extraction module is used for extracting first data information and second data information in each piece of data to be encrypted, wherein the first data information and the second data information are different data information; the key information generating module is used for generating key information for encryption according to the extracted first data information; the key information encryption module is used for encrypting the second data information by using the generated key information to obtain third data information; and the encrypted data generation module is used for combining the first data information and the third data information to generate encrypted data.
In another aspect, the present invention provides a batch data decryption method, including: extracting first data information and third data information in each encrypted data; generating key information for decryption according to the extracted first data information; decrypting the third data information by using the generated key information to obtain second data information; and generating data to be encrypted according to the first data information and the second data information.
In another aspect, the present invention provides a computer-readable storage medium, which includes a set of computer-executable instructions, when executed, for performing any one of the above batch data encryption methods.
In the embodiment of the invention, a key is generated by using one part of data of the data to be encrypted, and the other part of data of the data to be encrypted is encrypted and then used for generating so as to generate the encrypted data. Correspondingly, when in decryption, all encrypted data must be acquired, the acquired key is extracted according to the same steps, and the encrypted data is subjected to batch decryption processing, so that the key of each data does not need to be stored after the batch data is encrypted, the problem of key loss or stealing does not exist, and the safety is improved.
In addition, compared with the traditional algorithm (such as Data Encryption Standard, Advanced Encryption Standard in cryptography, and the like), the scheme also has the characteristics of simple calculation process, easy popularization and high calculation efficiency.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Fig. 1 is a schematic flow chart illustrating an implementation of a batch data encryption method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a flow chart of a PNG image encryption method according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a batch data encryption apparatus according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of an implementation of a batch data decryption method according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart illustrating an implementation of a batch data encryption method according to an embodiment of the present invention.
As shown in fig. 1, an aspect of the present invention provides a batch data encryption method, including:
step 101, extracting first data information and second data information in each data to be encrypted, wherein the first data information and the second data information are different data information;
102, generating key information for encryption according to the extracted first data information;
103, encrypting the second data information by using the generated key information to obtain third data information;
and 104, generating encrypted data according to the first data information and the third data information.
In this embodiment, the data to be encrypted may specifically be data stream information, including images, videos, sounds, documents, and the like. The first data information and the second data information are part of data in the data to be encrypted, and generally have different contents or lengths according to different data to be encrypted, and the extraction mode can be extraction from the data to be encrypted according to a specified index position or range, or extraction according to some specific identifiers in different data to be encrypted.
Therefore, the key is generated by using one part of the data to be encrypted, the other part of the data to be encrypted is encrypted, and the encrypted data is generated by using the other part of the data to be encrypted. Correspondingly, when in decryption, all encrypted data must be acquired, the acquired key is extracted according to the same steps, and the encrypted data is subjected to batch decryption processing, so that the key of each data does not need to be stored after the batch data is encrypted, the problem of key loss or stealing does not exist, and the safety is improved.
In addition, compared with the traditional algorithm (such as Data Encryption Standard, Advanced Encryption Standard in cryptography, and the like), the scheme also has the characteristics of simple calculation process, easy popularization and high calculation efficiency.
Further, in step 104, the first data information and the third data information may be simply combined, or may be subjected to further arithmetic processing therebetween to generate key information for encryption.
In an embodiment, generating key information for encryption according to the extracted first data information includes:
converting the first data information into a first data vector represented in a vector form;
extracting a plurality of singular values from the first data vector by using a singular value decomposition principle;
key information for encryption is generated from the plurality of extracted singular values.
In this embodiment, the first data information generally includes a plurality of pieces of information, and is represented by a designated binary system, for example, a picture data, which is generally represented by a hexadecimal system. The specific process of step 102 is: each first data information is expressed in a vector form, and the formula is as follows:
vi=[data(1)data(2)data(3)…data(m)]T
wherein v isiThe column vector of the ith first data information in the n first data information is shown, data represents each data in the first data information, and m represents the number of the data in the first data information.
Thus, n vectors v of first data informationiSequentially synthesizing matrix Vm×nThe formula is expressed as:
Figure BDA0002552712430000051
calculating a matrix V according to the singular value decomposition principlem×nThe singular value of (a). Since only singular values need to be obtained, only m-order square matrix VV needs to be calculated according to linear algebra knowledgeTThe evolution of the eigenvalue is a singular value, and the formula is as follows:
Figure BDA0002552712430000061
where U is an orthogonal matrix, A is an orthogonal matrix, Σ is a diagonal matrix, i.e., a singular value matrix, σijI.e. singular values.
And then as key information based on singular values representing the matrix vectors.
In one embodiment, generating key information for encryption based on the extracted key data information includes:
selecting a part of singular values from the plurality of singular values from large to small so that the ratio of the sum of the part of singular values to the sum of all singular values exceeds a specified threshold;
and carrying out binary conversion on the selected singular value to obtain key information for encryption.
In this embodiment, since the first 10% or even 1% singular values in the singular value decomposition occupy more than 99% of the sum of all singular values, only a part of the singular values are selected from the plurality of singular values from large to small, and the ratio of the sum of the selected singular values to the sum of all singular values exceeds a specified threshold, where the specified threshold may be freely set according to the actual situation, and in this embodiment, the specified threshold is preferably 99%.
Then, the selected singular values are subjected to binary conversion, wherein the binary conversion may be various, including binary, octal, decimal, hexadecimal, and the like, and the binary conversion is preferred in this embodiment.
And taking the data after the binary conversion as a key.
In an embodiment, after selecting a partial number of singular values from the plurality of singular values from large to small, the method further comprises:
judging whether the number of the selected parts exceeds a preset number or not;
when the judgment part number exceeds the preset number, the preset number of singular values are selected from the singular values of the part number according to the descending order.
In this embodiment, in the process of selecting a part of singular values from large to small of the plurality of singular values, it is further determined whether the selected number exceeds a preset number, where the preset number may be freely set according to an actual situation, and the preset number is one fourth of the number of all the singular values in this embodiment.
When the number of parts of the judgment part exceeds the preset number, the preset number of singular values are selected from the singular values of the part number from large to small, and the purpose is to simplify the calculation amount.
In one embodiment, the second data information and the key information are both binary data;
correspondingly, the encrypting the second data information by using the generated key information to obtain third data information comprises:
and carrying out exclusive OR operation on the key information and the second data information in a bit-by-bit sequence so as to convert the second data information into third data information.
In this embodiment, the second data information and the key information may be originally binary data, or may be binary data obtained after binary conversion.
Therefore, the specific process of step 103 is: and carrying out exclusive OR operation on the key information and the second data information in a bit-by-bit sequence so as to convert the second data information into third data information. Of course, in addition to the exclusive or calculation, other operation methods may be used, including addition, subtraction, multiplication, division or other formulas.
In an embodiment, before bitwise xoring the key information and the second data information, the method further includes:
acquiring the binary data length of the key information and the binary data length of the second data information;
if the binary data length of the key information is judged to be larger than the binary data length of the second data information, intercepting partial data from the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information;
and if the binary data length of the key information is judged to be smaller than the binary data length of the second data information, carrying out head-to-tail cyclic splicing on the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information.
In this embodiment, since the lengths of the key information and the second data information may not be consistent, in order to further improve the security of encryption and simplify calculation, before performing the exclusive or operation on the key information and the second data information in order according to bits, the binary lengths of the key information and the second data information need to be further judged, and if the binary data length of the key information is greater than the binary data length of the second data information, the key information is partially intercepted according to the second data information length, so that the binary data length of the key information is consistent with the binary data length of the second data information;
and if the binary data length of the key information is smaller than the binary data length of the second data information, circularly splicing the head and the tail of the same key information until the binary data length of the key information is consistent with the binary data length of the second data information.
In one implementation, the data to be encrypted is PNG image data;
correspondingly, the first data information is an image data block, and the second data information is a format data block.
In this embodiment, the image data block is specifically an idat (image data chunk) in the PNG image data, and the format data block may be a certain data block in the PNG image data or all data except the image data block.
Correspondingly, the extraction manner mentioned in step 101 is specifically an identifier for identifying the image data block: 0x49,0x44,0x41,0x54, image data blocks are obtained by identifying identifiers, and the rest of the data are used as format data blocks.
FIG. 2 is a schematic diagram of a flow chart of a PNG image encryption method according to an embodiment of the present invention;
as shown in fig. 2, taking the PNG image as an example, the overall steps of the method are summarized as follows:
firstly, N PNG images to be encrypted are obtained, and then, the N PNG images are analyzed according to the special identifier IDAT of the PNG to obtain an image data block and a format data block;
and then, expressing the image data in a vector form to form a matrix vector, calculating a plurality of singular values of the matrix vector according to a singular value principle, and generating a key according to the plurality of singular values.
And representing the generated key and the format data in binary, performing exclusive-or operation according to bits to perform encryption processing, and finally combining the encrypted data and the image data to obtain encrypted data.
FIG. 3 is a schematic structural diagram of a batch data encryption apparatus according to an embodiment of the present invention;
as shown in fig. 3, another aspect of the present invention provides a data encryption apparatus, including:
a data information extraction module 201, configured to extract first data information and second data information in each to-be-encrypted data, where the first data information and the second data information are different data information;
a key information generating module 202, configured to generate key information for encryption according to the extracted first data information;
a key information encryption module 203, configured to encrypt the second data information by using the generated key information, so as to obtain third data information;
and an encrypted data generating module 204, configured to combine the first data information and the third data information to generate encrypted data.
In this embodiment, the data to be encrypted may specifically be data stream information, including images, videos, sounds, documents, and the like. The first data information and the second data information are part of data in the data to be encrypted, and generally have different contents or lengths according to different data to be encrypted, and the extraction mode can be extraction from the data to be encrypted according to a specified index position or range, or extraction according to some specific identifiers in different data to be encrypted.
Therefore, the key is generated by using one part of the data to be encrypted, the other part of the data to be encrypted is encrypted, and the encrypted data is generated by using the other part of the data to be encrypted. Correspondingly, when in decryption, all encrypted data must be acquired, the acquired key is extracted according to the same steps, and the encrypted data is subjected to batch decryption processing, so that the key of each data does not need to be stored after the batch data is encrypted, the problem of key loss or stealing does not exist, and the safety is improved.
In addition, compared with the traditional algorithm (such as Data Encryption Standard, Advanced Encryption Standard in cryptography, and the like), the scheme also has the characteristics of simple calculation process, easy popularization and high calculation efficiency.
Further, in the process of generating the encrypted data, the first data information and the third data information may be simply combined, or may be further subjected to arithmetic processing therebetween to generate key information for encryption.
FIG. 4 is a schematic diagram of a flow chart of an implementation of a batch data decryption method according to an embodiment of the present invention;
as shown in fig. 4, another aspect of the present invention provides a batch data decryption method, including:
step 301, extracting first data information and third data information in each encrypted data;
step 302, generating key information for decryption according to the extracted first data information;
step 303, decrypting the third data information by using the generated key information to obtain second data information;
and 304, generating data to be encrypted according to the first data information and the second data information.
In this embodiment, the decryption method is similar to the encryption method, and first, all encrypted data processed by the encryption method are obtained, and first data information and third data information of each encrypted data are extracted from all encrypted data, where the extraction manner corresponds to step 104 during encryption, and if the first data information and the third data are simply combined during encryption, the extraction in step 301 is also correspondingly performed for separation and extraction; if the first data information and the third data information are processed according to some kind of operation in encryption, step 301 also extracts the first data information and the third data information by using a reverse operation.
The manner in which the key information for decryption is generated in step 302 is consistent with the manner in which the key information for encryption is generated in step 102 and will not be elaborated upon herein;
the manner of acquiring the second data information in step 303 is also the same as the manner of acquiring the third data information in step 103, and is not described in detail here;
the generation mode of step 304 is opposite to the extraction mode mentioned in step 101, how to extract in step 101, the reverse operation is correspondingly performed in step 304, if the data to be encrypted is divided and extracted in step 101, the splicing operation is correspondingly performed in step 304; if the extraction is based on the identifier in step 101, the data is combined at the identifier location in step 304.
In another aspect, the present invention provides a computer-readable storage medium comprising a set of computer-executable instructions, which when executed, perform any one of the above mentioned bulk data encryption methods.
In an embodiment of the present invention, a computer-readable storage medium includes a set of computer-executable instructions, which when executed, are configured to extract first data information and second data information in each data to be encrypted, where the first data information and the second data information are different data information; generating key information for encryption according to the extracted first data information; encrypting the second data information by using the generated key information to obtain third data information; and generating the encrypted data according to the first data information and the third data information.
Therefore, the key is generated by using one part of the data to be encrypted, the other part of the data to be encrypted is encrypted, and the encrypted data is generated by using the other part of the data to be encrypted. Correspondingly, when in decryption, all encrypted data must be acquired, the acquired key is extracted according to the same steps, and the encrypted data is subjected to batch decryption processing, so that the key of each data does not need to be stored after the batch data is encrypted, the problem of key loss or stealing does not exist, and the safety is improved.
In addition, compared with the traditional algorithm (such as Data Encryption Standard, Advanced Encryption Standard in cryptography, and the like), the scheme also has the characteristics of simple calculation process, easy popularization and high calculation efficiency.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A method for encrypting batch data, the method comprising:
extracting first data information and second data information in each data to be encrypted, wherein the first data information and the second data information are different data information;
generating key information for encryption according to the extracted first data information;
encrypting the second data information by using the generated key information to obtain third data information;
generating encrypted data according to the first data information and the third data information;
wherein the generating of key information for encryption based on the extracted first data information comprises:
converting the first data information into a first data vector represented in vector form;
extracting a plurality of singular values from the first data vector using singular value decomposition principles;
selecting a part of singular values from the plurality of singular values from large to small so that the ratio of the sum of the singular values of the part of the number to the sum of all the singular values exceeds a specified threshold;
and carrying out binary conversion on the selected singular value to obtain key information for encryption.
2. The method of claim 1, wherein after selecting a fractional number of singular values from large to small for the plurality of singular values, the method further comprises:
judging whether the number of the selected parts exceeds a preset number or not;
and if the part number is judged to exceed the preset number, selecting the singular values of the preset number from the singular values of the part number according to the descending order.
3. The method of claim 1, wherein the second data information and the key information are both binary data;
correspondingly, the encrypting the second data information by using the generated key information to obtain third data information includes:
and carrying out exclusive OR operation on the key information and the second data information in order according to bits so as to convert the second data information into third data information.
4. The method of claim 3, wherein prior to bitwise XOR' ing the key information with the second data information, the method further comprises:
acquiring the binary data length of the key information and the binary data length of the second data information;
if the binary data length of the key information is judged to be larger than the binary data length of the second data information, intercepting partial data from the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information;
and if the binary data length of the key information is judged to be smaller than the binary data length of the second data information, performing head-to-tail cyclic splicing on the binary data of the key information so as to enable the binary data length of the key information to be consistent with the binary data length of the second data information.
5. The method according to claim 1, wherein the data to be encrypted is PNG image data;
correspondingly, the first data information is an image data block, and the second data information is a format data block.
6. An apparatus for encrypting batch data, the apparatus comprising:
the data information extraction module is used for extracting first data information and second data information in each piece of data to be encrypted, wherein the first data information and the second data information are different data information;
the key information generating module is used for generating key information for encryption according to the extracted first data information;
the key information encryption module is used for encrypting the second data information by using the generated key information to obtain third data information;
the encrypted data generation module is used for combining the first data information and the third data information to generate encrypted data;
wherein the key information generation module includes:
the data information conversion module is used for converting the first data information into a first data vector expressed in a vector form;
a vector information extraction module for extracting a plurality of singular values from the first data vector using a singular value decomposition principle;
the screening module is used for selecting a part of singular values from large singular values to small singular values so that the ratio of the sum of the singular values of the part of the singular values to the sum of all the singular values exceeds a specified threshold value;
and the conversion module is used for carrying out binary conversion on the selected singular value to obtain the key information for encryption.
7. A method for batch data decryption, the method comprising:
extracting first data information and third data information in each encrypted data;
generating key information for decryption according to the extracted first data information;
decrypting the third data information by using the generated key information to obtain second data information;
generating data to be encrypted according to the first data information and the second data information;
wherein the generating key information for decryption according to the extracted first data information comprises:
converting the first data information into a first data vector represented in vector form;
extracting a plurality of singular values from the first data vector using singular value decomposition principles;
selecting a part of singular values from the plurality of singular values from large to small so that the ratio of the sum of the singular values of the part of the number to the sum of all the singular values exceeds a specified threshold;
and carrying out binary conversion on the selected singular value to obtain key information for decryption.
8. A computer-readable storage medium comprising a set of computer-executable instructions that, when executed, perform the bulk data encryption method of any of claims 1-5.
CN202010582119.XA 2020-06-23 2020-06-23 Batch data encryption and decryption method and device and readable storage medium Active CN111935077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010582119.XA CN111935077B (en) 2020-06-23 2020-06-23 Batch data encryption and decryption method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010582119.XA CN111935077B (en) 2020-06-23 2020-06-23 Batch data encryption and decryption method and device and readable storage medium

Publications (2)

Publication Number Publication Date
CN111935077A CN111935077A (en) 2020-11-13
CN111935077B true CN111935077B (en) 2022-04-15

Family

ID=73317711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010582119.XA Active CN111935077B (en) 2020-06-23 2020-06-23 Batch data encryption and decryption method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN111935077B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787862A (en) * 2016-02-29 2016-07-20 首都师范大学 Image encryption method based on multi-resolution singular value decomposition and chaotic sequence
CN110312054A (en) * 2019-06-28 2019-10-08 浙江大华技术股份有限公司 Encipher-decipher method and relevant apparatus, the storage medium of image

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8451905B1 (en) * 2011-02-25 2013-05-28 Adobe Systems Incorporated Efficient encoding of video frames in a distributed video coding environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787862A (en) * 2016-02-29 2016-07-20 首都师范大学 Image encryption method based on multi-resolution singular value decomposition and chaotic sequence
CN110312054A (en) * 2019-06-28 2019-10-08 浙江大华技术股份有限公司 Encipher-decipher method and relevant apparatus, the storage medium of image

Also Published As

Publication number Publication date
CN111935077A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
Yi et al. Separable and reversible data hiding in encrypted images using parametric binary tree labeling
Patel et al. Image encryption using different techniques: A review
Ahmed et al. A noisy channel tolerant image encryption scheme
EP2290872B1 (en) Device for generating a message authentication code for authenticating a message
CN109840425B (en) File encryption method and device
CN106203128B (en) Webpage data encryption and decryption method, device and system
Seyedzade et al. A novel image encryption algorithm based on hash function
CN102932650B (en) Video data integrity protection and verification method, equipment and system
KR20070042511A (en) Systems and methods for digital content security
CN103268588A (en) Encrypted domain lossless reversible information concealing method based on carrier image check code
Ganeshkumar et al. Generating a digital signature based on new cryptographic scheme for user authentication and security
CN107104788B (en) Terminal and non-repudiation encryption signature method and device thereof
Zhou et al. Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU
Altigani et al. A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol
Ahmad et al. A secure network communication protocol based on text to barcode encryption algorithm
Sultana et al. A new approach to hide data in color image using LSB steganography technique
Zhang et al. Vector-based efficient data hiding in encrypted images via multi-MSB replacement
CN111935077B (en) Batch data encryption and decryption method and device and readable storage medium
CN110830261A (en) Encryption method, device, computer equipment and storage medium
CN111475690B (en) Character string matching method and device, data detection method and server
Chinniyan et al. Image Steganography Using Deep Neural Networks.
Kayani et al. Efficient Region of Interest Encryption Based on a New Chaotic Map
Quist-Aphetsi et al. Validating of digital forensic images using SHA-256
Saraireh et al. Integration of hash-crypto-steganography for efficient security technique
WO2022239163A1 (en) Authenticated encryption device, authenticated decryption device, authenticated cryptograph system, method and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant