CN112738561A - OTP (one time programmable) image encryption and verification based method and equipment - Google Patents
OTP (one time programmable) image encryption and verification based method and equipment Download PDFInfo
- Publication number
- CN112738561A CN112738561A CN202011408703.XA CN202011408703A CN112738561A CN 112738561 A CN112738561 A CN 112738561A CN 202011408703 A CN202011408703 A CN 202011408703A CN 112738561 A CN112738561 A CN 112738561A
- Authority
- CN
- China
- Prior art keywords
- picture
- image
- password
- bit
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Abstract
The invention provides a method and equipment for encrypting and verifying an image based on an OTP (one time programmable), which comprises the following steps of: acquiring an original picture A to be encrypted; generating an M x N bit password by using a one-time password generation algorithm to serve as an image intervention password; processing an original picture A to be encrypted into M pixel sizes, and uniformly distributing the M pixel sizes in M pixel pixels; simultaneously establishing a one-to-one mapping relation between the generated M x N bit image intervention password and the M x N bit pixels; and randomly superposing the appointed offset on the values of the two elements set in the pixel in the preset color mode according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode. The invention randomly intervenes and encrypts the pixel points of the image by adopting the one-time encryption algorithm, thereby not only improving the efficiency of image encryption, but also improving the security of image encryption.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a method and equipment for encrypting and verifying images.
Background
Digital images are a common form of multimedia, and image file formats typically include JPG, BMP, GIF, and the like. The image may be classified into a color image and a gray image according to whether color information is included, wherein the color image means that the color of each pixel can be expressed using three primary colors of red, green, and blue.
With the development of communication technology, images are frequently transmitted between different devices, and image security has become a focus, for example, in image sharing, video conferencing. In order to ensure the security of the image content, the image needs to be encrypted by adopting a computer encryption technology. Different from the traditional text encryption mode, the image has the characteristics of large data content, complex structure and the like, so the traditional text encryption method is not suitable for encrypting the image. The existing image encryption methods have low image encryption efficiency, need to spend a large amount of time, have insufficient encryption security and are easy to attack and crack.
Disclosure of Invention
In view of the above, the present invention provides a method and apparatus for encryption and authentication based on OTP images. The invention adopts the one-time password (OTP for short) to carry out random intervening encryption on the pixel points of the image by adopting the one-time encryption algorithm, thereby not only improving the efficiency of image encryption, but also improving the security of image encryption.
In a first aspect, the present invention provides a method for encryption and solidification based on an OTP image, including:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
Preferably, the step 2) of generating the M × N-bit password by using the one-time password generation algorithm specifically includes:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
Preferably, the algorithm key generated in step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
Preferably, step 3) processes the original picture a to be encrypted into a size of 16 × 16 pixels.
Preferably, in step 3), the predetermined color mode is an ARGB mode.
Preferably, the random superposition of the default offset for the values of the two elements set therein in the predetermined color mode of the pixel in step 4), specifically, the random +1 or-1 intervention is performed on the A, R value of each pixel.
In a second aspect, the present invention provides a system authentication method for encrypted images, including:
an original picture a to be encrypted is obtained,
respectively sending the original picture A to a signer and a server;
acquiring an encrypted picture B from a signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
comparing whether the hash values of the picture C and the picture B are equal, and if so, determining that the pictures are consistent; otherwise, the picture is inconsistent.
In a third aspect, the present invention provides an apparatus for encrypting and solidifying an image, including:
a processor;
a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The device, for step 2), generates an M × N bit password using a one-time password generation algorithm, and further includes:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
In a fourth aspect, the present invention further provides a system authentication apparatus for encrypting an image, including:
for obtaining an original picture a to be encrypted,
the system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
In addition, the invention also provides a computer readable storage medium. The computer readable storage medium has computer readable program instructions stored thereon. These computer readable program instructions may be used to perform the methods according to the present invention described above.
In summary, the present invention provides a method and apparatus for encryption and solidification based on OTP images. After the original picture is obtained, the original picture is not immediately encrypted, but a one-time password algorithm is adopted to generate corresponding passwords, and random intervention is carried out on certain specific values in corresponding pixels in the picture, so that the encryption efficiency is improved, and the encryption safety is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of an encryption and authentication architecture provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Digital images are one of the most popular forms of multimedia and have wide application in politics, economy, national defense, education, and the like. Digital images also have high security requirements for certain specialized fields, such as military, commercial, and medical.
The spatial domain image encryption technology performs encryption on an uncompressed image, and is characterized in that the image is regarded as two-dimensional data to be operated. The typical method of the spatial domain image encryption technology is to adopt a discrete chaotic encryption technology.
The invention is based on one-time password (OTP for short), and utilizes the characteristic design of digital images to carry out the airspace image encryption technology of image encryption, thus improving the encryption security and the operational efficiency.
FIG. 1 illustrates an architectural diagram for encryption and authentication of images according to an embodiment of the invention. As shown in fig. 1, a device signer and a device server are included, wherein the signer and the server may be any electronic device with image processing capabilities and communication capabilities, such as mobile devices (such as smart phones, tablets, and portable computers) or stationary devices (such as desktop computers, servers). The present invention is applicable to the architecture shown in fig. 1, but is not limited thereto.
As described above, the present invention provides the following technical solutions, which are described in detail below with a signer as an execution subject:
a method of OTP image based encryption curing, comprising:
step 1), a signer acquires an original picture A to be encrypted;
step 2), the signer generates an M x N password as an image intervention password by using a one-time password generation algorithm;
step 3), the signer processes the original picture A to be encrypted into M pixel size, and the M pixel size is uniformly distributed in M pixel size; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) the signer randomly superposes the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The signer generates an M × N bit password by using a one-time password generation algorithm in step 2), and specifically includes:
2.1) the signer randomly generates an algorithm key and obtains the current time through the server;
2.2) the signer adopts a hash algorithm to calculate and generate M x N bit passwords based on the obtained algorithm key and the current time.
The algorithm key generated by the signer in the step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
The signer processes in step 3) the original picture a to be encrypted into a size of 16 × 16 pixels.
In step 3), the predetermined color mode is an ARGB mode.
The signer randomly superimposes the agreed offset on the values of the two elements set therein in the predetermined color pattern of the pixel, specifically, randomly +1 or-1 intervenes on the A, R value of each bit pixel, as described in step 4).
The method comprises the following specific steps: as shown in fig. 1, the system comprises a server, a client and a signing module, wherein the three modules cooperate with each other to complete the processes of picture encryption, comparison and verification. The device specifically comprises the following three parts:
1. one-time password generation algorithm (password as image intervention)
a random generation of 32-bit algorithm key
b obtaining the current time through the time server
c generating a 256-bit cipher by a counter-trapped (hash algorithm) calculation of the hashed message authentication code (key + time)
2. Image intervention
a, processing the picture to be processed into a size of 16 × 16 pixels, and uniformly distributing the picture in a quadrant with 16 × 16-256 bits; the image intervention code generated in the first step is also distributed and hashed in 256-bit pixels
Each bit of pixel of the b picture is composed of ARGB (a color pattern, namely a storage structure of RGB (Red, Green, Blue) color pattern with Alpha (transparency) channel added thereto, 32-bit map) four-bit pixel, and the value of each bit is 0-255
c random +1 or-1 intervention of A, R value of each bit pixel according to password value
d regenerating a new picture
3. System authentication
a, the client generates a random number and an original picture A which are respectively sent to a signing module and a server
B, the signing module carries out one-time password generation algorithm to carry out intervention processing on the picture A to generate a new picture B
c, the signer sends the key for generating the picture B to the server through the client
d, the server adopts the key in the picture B to perform intervention processing on the picture A to generate a new picture C e to compare the hash values of the pictures B and C to determine whether the pictures are consistent, if so, the pictures are consistent, if not, the pictures are tampered or changed,
the following describes the present invention with a client as an execution subject:
a system authentication method of an encrypted image, comprising:
the client obtains the original picture a to be encrypted,
the client side sends the original picture A to a signer and a server respectively;
the client side obtains the picture B encrypted by the signer, and simultaneously sends a secret key for generating the picture B to a server through the signer, and the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the client compares whether the hash values of the picture C and the picture B are equal, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
The invention also provides an image encryption and solidification device, which comprises:
a processor; a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The device generates an M × N bit password using a one-time password generation algorithm for step 2), further comprising:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
The invention also provides system verification equipment for the encrypted image, which comprises the interaction among the signer, the client and the server.
The system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
The present invention also provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the method of any of the above-described embodiments when executed by a processor.
The embodiments of the present application also provide a computer program product, which includes computer executable instructions, and the computer executable instructions are executed by a processor to implement the method of any of the above-mentioned embodiments.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
Claims (10)
1. An OTP image encryption curing-based method, comprising:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
2. The OTP image encryption and solidification based method according to claim 1, wherein the step 2) generates an M × N bit password by using a one-time password generation algorithm, and specifically comprises:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
3. The method for encryption and solidification based on the OTP image as claimed in claim 2, wherein the algorithm key generated in step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
4. The method for encryption curing based on the OTP image as claimed in claim 3, wherein step 3) processes the original picture A to be encrypted into a size of 16 x 16 pixels.
5. An OTP image encryption and solidification based method according to any one of claims 1 to 4, wherein in step 3), the predetermined color mode is ARGB mode.
6. The method for encryption curing based on the OTP image as claimed in claim 5, wherein the random overlapping of the values of the two elements set therein in the predetermined color mode of the pixel with the agreed offset in step 4) is performed by a random +1 or-1 intervention on A, R values of each pixel.
7. A method for system authentication of encrypted images, comprising:
an original picture a to be encrypted is obtained,
respectively sending the original picture A to a signer and a server;
acquiring an encrypted picture B from a signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
comparing whether the hash values of the picture C and the picture B are equal, and if so, determining that the pictures are consistent; otherwise, the picture is inconsistent.
8. An apparatus for encrypted curing of an image, comprising:
a processor;
a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
9. The apparatus of claim 8, wherein for step 2) generating an M x N-bit password using a one-time password generation algorithm further comprises:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
10. A system authentication apparatus for encrypting an image, comprising:
for obtaining an original picture a to be encrypted,
the system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011408703.XA CN112738561A (en) | 2020-12-03 | 2020-12-03 | OTP (one time programmable) image encryption and verification based method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011408703.XA CN112738561A (en) | 2020-12-03 | 2020-12-03 | OTP (one time programmable) image encryption and verification based method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112738561A true CN112738561A (en) | 2021-04-30 |
Family
ID=75598908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011408703.XA Pending CN112738561A (en) | 2020-12-03 | 2020-12-03 | OTP (one time programmable) image encryption and verification based method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112738561A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008105602A1 (en) * | 2007-02-28 | 2008-09-04 | Mininfo Co., Ltd. | User authentication method and system using graphic otp |
CN102625025A (en) * | 2012-03-26 | 2012-08-01 | 中山大学 | Encryption/decryption method and system based on image transmission |
CN103095662A (en) * | 2011-11-04 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Online transaction safety certificate method and online transaction safety certificate system |
CN105119924A (en) * | 2015-09-01 | 2015-12-02 | 成都汇合乾元科技有限公司 | Information transmission method |
US20170034131A1 (en) * | 2015-07-28 | 2017-02-02 | Todor Yotkov Yotov | System and method for encryption of digital content based on a modified one time pad algorithm |
WO2017030210A1 (en) * | 2015-08-18 | 2017-02-23 | 김민수 | User authentication method using graphic otp |
EP3361452A1 (en) * | 2017-02-11 | 2018-08-15 | Penta Security Systems, Inc. | Smart badge and authentication system using the same |
CN109803142A (en) * | 2019-01-08 | 2019-05-24 | 宁波工程学院 | A kind of encryption area image reversible data concealing method based on adjacency prediction |
CN110460580A (en) * | 2019-07-11 | 2019-11-15 | 中国银联股份有限公司 | Image collecting device, server and Encrypt and Decrypt method |
CN110517389A (en) * | 2019-08-30 | 2019-11-29 | 联永智能科技(上海)有限公司 | Generation, verification method, device, equipment and the storage medium of device password |
US20200118121A1 (en) * | 2018-10-12 | 2020-04-16 | Mastercard International Incorporated | Method and system for processing payment transactions with encrypted images |
-
2020
- 2020-12-03 CN CN202011408703.XA patent/CN112738561A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008105602A1 (en) * | 2007-02-28 | 2008-09-04 | Mininfo Co., Ltd. | User authentication method and system using graphic otp |
CN103095662A (en) * | 2011-11-04 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Online transaction safety certificate method and online transaction safety certificate system |
CN102625025A (en) * | 2012-03-26 | 2012-08-01 | 中山大学 | Encryption/decryption method and system based on image transmission |
US20170034131A1 (en) * | 2015-07-28 | 2017-02-02 | Todor Yotkov Yotov | System and method for encryption of digital content based on a modified one time pad algorithm |
WO2017030210A1 (en) * | 2015-08-18 | 2017-02-23 | 김민수 | User authentication method using graphic otp |
CN105119924A (en) * | 2015-09-01 | 2015-12-02 | 成都汇合乾元科技有限公司 | Information transmission method |
EP3361452A1 (en) * | 2017-02-11 | 2018-08-15 | Penta Security Systems, Inc. | Smart badge and authentication system using the same |
US20200118121A1 (en) * | 2018-10-12 | 2020-04-16 | Mastercard International Incorporated | Method and system for processing payment transactions with encrypted images |
CN109803142A (en) * | 2019-01-08 | 2019-05-24 | 宁波工程学院 | A kind of encryption area image reversible data concealing method based on adjacency prediction |
CN110460580A (en) * | 2019-07-11 | 2019-11-15 | 中国银联股份有限公司 | Image collecting device, server and Encrypt and Decrypt method |
CN110517389A (en) * | 2019-08-30 | 2019-11-29 | 联永智能科技(上海)有限公司 | Generation, verification method, device, equipment and the storage medium of device password |
Non-Patent Citations (1)
Title |
---|
任奎: "云计算中图像数据处理的隐私保护", 《网络与信息安全学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hosam et al. | Hybrid design for cloud data security using combination of AES, ECC and LSB steganography | |
CN104468090A (en) | Chinese character password encoding method based on image pixel coordinates | |
Yi et al. | Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction | |
Singh et al. | A comprehensive survey on encryption techniques for digital images | |
Philjon et al. | Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption | |
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
CN110634096B (en) | Self-adaptive multi-mode information hiding method and device | |
Ahmad et al. | Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images | |
Shrivastava et al. | A new hybrid encryption and steganography technique: a survey | |
US11276138B2 (en) | Image data encryption and rendering system | |
Jin et al. | Color image encryption in CIE L* a* b* space | |
CN116232700A (en) | Login authentication method, login authentication device, computer equipment and storage medium | |
Govinda et al. | A generic image cryptography based on Rubik's cube | |
CN112738561A (en) | OTP (one time programmable) image encryption and verification based method and equipment | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN114286131A (en) | Transmission method and device for anchor image model file in live broadcast wheat | |
CN109214163B (en) | Identity authentication method and device | |
Saha et al. | Secret Image Sharing Schemes: A Comprehensive Survey | |
Meghana et al. | A new method for secret image transmission via mosaic fragments using ecc key | |
CN113032807B (en) | Authenticatable (2,3) secret image sharing method and device based on mixed fractal matrix | |
Mogale et al. | Web Authentication Security Using Image Steganography and AES Encryption | |
Kashyap et al. | An approach for visual cryptography scheme on color images | |
Bahjat et al. | Dynamic Shuffling for Speed Image Encryption | |
CN113868690B (en) | Trusted deposit certificate based privacy calculation method and system | |
Rao et al. | A Novel Image Encryption Algorithm with Image Integrity Check |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |