CN112738561A - OTP (one time programmable) image encryption and verification based method and equipment - Google Patents

OTP (one time programmable) image encryption and verification based method and equipment Download PDF

Info

Publication number
CN112738561A
CN112738561A CN202011408703.XA CN202011408703A CN112738561A CN 112738561 A CN112738561 A CN 112738561A CN 202011408703 A CN202011408703 A CN 202011408703A CN 112738561 A CN112738561 A CN 112738561A
Authority
CN
China
Prior art keywords
picture
image
password
bit
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011408703.XA
Other languages
Chinese (zh)
Inventor
李彬杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Huibo Wending Information Technology Co Ltd
Original Assignee
Xi'an Huibo Wending Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Huibo Wending Information Technology Co Ltd filed Critical Xi'an Huibo Wending Information Technology Co Ltd
Priority to CN202011408703.XA priority Critical patent/CN112738561A/en
Publication of CN112738561A publication Critical patent/CN112738561A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

The invention provides a method and equipment for encrypting and verifying an image based on an OTP (one time programmable), which comprises the following steps of: acquiring an original picture A to be encrypted; generating an M x N bit password by using a one-time password generation algorithm to serve as an image intervention password; processing an original picture A to be encrypted into M pixel sizes, and uniformly distributing the M pixel sizes in M pixel pixels; simultaneously establishing a one-to-one mapping relation between the generated M x N bit image intervention password and the M x N bit pixels; and randomly superposing the appointed offset on the values of the two elements set in the pixel in the preset color mode according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode. The invention randomly intervenes and encrypts the pixel points of the image by adopting the one-time encryption algorithm, thereby not only improving the efficiency of image encryption, but also improving the security of image encryption.

Description

OTP (one time programmable) image encryption and verification based method and equipment
Technical Field
The invention relates to the technical field of information security, in particular to a method and equipment for encrypting and verifying images.
Background
Digital images are a common form of multimedia, and image file formats typically include JPG, BMP, GIF, and the like. The image may be classified into a color image and a gray image according to whether color information is included, wherein the color image means that the color of each pixel can be expressed using three primary colors of red, green, and blue.
With the development of communication technology, images are frequently transmitted between different devices, and image security has become a focus, for example, in image sharing, video conferencing. In order to ensure the security of the image content, the image needs to be encrypted by adopting a computer encryption technology. Different from the traditional text encryption mode, the image has the characteristics of large data content, complex structure and the like, so the traditional text encryption method is not suitable for encrypting the image. The existing image encryption methods have low image encryption efficiency, need to spend a large amount of time, have insufficient encryption security and are easy to attack and crack.
Disclosure of Invention
In view of the above, the present invention provides a method and apparatus for encryption and authentication based on OTP images. The invention adopts the one-time password (OTP for short) to carry out random intervening encryption on the pixel points of the image by adopting the one-time encryption algorithm, thereby not only improving the efficiency of image encryption, but also improving the security of image encryption.
In a first aspect, the present invention provides a method for encryption and solidification based on an OTP image, including:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
Preferably, the step 2) of generating the M × N-bit password by using the one-time password generation algorithm specifically includes:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
Preferably, the algorithm key generated in step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
Preferably, step 3) processes the original picture a to be encrypted into a size of 16 × 16 pixels.
Preferably, in step 3), the predetermined color mode is an ARGB mode.
Preferably, the random superposition of the default offset for the values of the two elements set therein in the predetermined color mode of the pixel in step 4), specifically, the random +1 or-1 intervention is performed on the A, R value of each pixel.
In a second aspect, the present invention provides a system authentication method for encrypted images, including:
an original picture a to be encrypted is obtained,
respectively sending the original picture A to a signer and a server;
acquiring an encrypted picture B from a signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
comparing whether the hash values of the picture C and the picture B are equal, and if so, determining that the pictures are consistent; otherwise, the picture is inconsistent.
In a third aspect, the present invention provides an apparatus for encrypting and solidifying an image, including:
a processor;
a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The device, for step 2), generates an M × N bit password using a one-time password generation algorithm, and further includes:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
In a fourth aspect, the present invention further provides a system authentication apparatus for encrypting an image, including:
for obtaining an original picture a to be encrypted,
the system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
In addition, the invention also provides a computer readable storage medium. The computer readable storage medium has computer readable program instructions stored thereon. These computer readable program instructions may be used to perform the methods according to the present invention described above.
In summary, the present invention provides a method and apparatus for encryption and solidification based on OTP images. After the original picture is obtained, the original picture is not immediately encrypted, but a one-time password algorithm is adopted to generate corresponding passwords, and random intervention is carried out on certain specific values in corresponding pixels in the picture, so that the encryption efficiency is improved, and the encryption safety is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of an encryption and authentication architecture provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Digital images are one of the most popular forms of multimedia and have wide application in politics, economy, national defense, education, and the like. Digital images also have high security requirements for certain specialized fields, such as military, commercial, and medical.
The spatial domain image encryption technology performs encryption on an uncompressed image, and is characterized in that the image is regarded as two-dimensional data to be operated. The typical method of the spatial domain image encryption technology is to adopt a discrete chaotic encryption technology.
The invention is based on one-time password (OTP for short), and utilizes the characteristic design of digital images to carry out the airspace image encryption technology of image encryption, thus improving the encryption security and the operational efficiency.
FIG. 1 illustrates an architectural diagram for encryption and authentication of images according to an embodiment of the invention. As shown in fig. 1, a device signer and a device server are included, wherein the signer and the server may be any electronic device with image processing capabilities and communication capabilities, such as mobile devices (such as smart phones, tablets, and portable computers) or stationary devices (such as desktop computers, servers). The present invention is applicable to the architecture shown in fig. 1, but is not limited thereto.
As described above, the present invention provides the following technical solutions, which are described in detail below with a signer as an execution subject:
a method of OTP image based encryption curing, comprising:
step 1), a signer acquires an original picture A to be encrypted;
step 2), the signer generates an M x N password as an image intervention password by using a one-time password generation algorithm;
step 3), the signer processes the original picture A to be encrypted into M pixel size, and the M pixel size is uniformly distributed in M pixel size; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) the signer randomly superposes the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The signer generates an M × N bit password by using a one-time password generation algorithm in step 2), and specifically includes:
2.1) the signer randomly generates an algorithm key and obtains the current time through the server;
2.2) the signer adopts a hash algorithm to calculate and generate M x N bit passwords based on the obtained algorithm key and the current time.
The algorithm key generated by the signer in the step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
The signer processes in step 3) the original picture a to be encrypted into a size of 16 × 16 pixels.
In step 3), the predetermined color mode is an ARGB mode.
The signer randomly superimposes the agreed offset on the values of the two elements set therein in the predetermined color pattern of the pixel, specifically, randomly +1 or-1 intervenes on the A, R value of each bit pixel, as described in step 4).
The method comprises the following specific steps: as shown in fig. 1, the system comprises a server, a client and a signing module, wherein the three modules cooperate with each other to complete the processes of picture encryption, comparison and verification. The device specifically comprises the following three parts:
1. one-time password generation algorithm (password as image intervention)
a random generation of 32-bit algorithm key
b obtaining the current time through the time server
c generating a 256-bit cipher by a counter-trapped (hash algorithm) calculation of the hashed message authentication code (key + time)
2. Image intervention
a, processing the picture to be processed into a size of 16 × 16 pixels, and uniformly distributing the picture in a quadrant with 16 × 16-256 bits; the image intervention code generated in the first step is also distributed and hashed in 256-bit pixels
Each bit of pixel of the b picture is composed of ARGB (a color pattern, namely a storage structure of RGB (Red, Green, Blue) color pattern with Alpha (transparency) channel added thereto, 32-bit map) four-bit pixel, and the value of each bit is 0-255
c random +1 or-1 intervention of A, R value of each bit pixel according to password value
d regenerating a new picture
3. System authentication
a, the client generates a random number and an original picture A which are respectively sent to a signing module and a server
B, the signing module carries out one-time password generation algorithm to carry out intervention processing on the picture A to generate a new picture B
c, the signer sends the key for generating the picture B to the server through the client
d, the server adopts the key in the picture B to perform intervention processing on the picture A to generate a new picture C e to compare the hash values of the pictures B and C to determine whether the pictures are consistent, if so, the pictures are consistent, if not, the pictures are tampered or changed,
the following describes the present invention with a client as an execution subject:
a system authentication method of an encrypted image, comprising:
the client obtains the original picture a to be encrypted,
the client side sends the original picture A to a signer and a server respectively;
the client side obtains the picture B encrypted by the signer, and simultaneously sends a secret key for generating the picture B to a server through the signer, and the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the client compares whether the hash values of the picture C and the picture B are equal, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
The invention also provides an image encryption and solidification device, which comprises:
a processor; a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
The device generates an M × N bit password using a one-time password generation algorithm for step 2), further comprising:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
The invention also provides system verification equipment for the encrypted image, which comprises the interaction among the signer, the client and the server.
The system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
The present invention also provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the method of any of the above-described embodiments when executed by a processor.
The embodiments of the present application also provide a computer program product, which includes computer executable instructions, and the computer executable instructions are executed by a processor to implement the method of any of the above-mentioned embodiments.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. An OTP image encryption curing-based method, comprising:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
2. The OTP image encryption and solidification based method according to claim 1, wherein the step 2) generates an M × N bit password by using a one-time password generation algorithm, and specifically comprises:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
3. The method for encryption and solidification based on the OTP image as claimed in claim 2, wherein the algorithm key generated in step 2.1) is 32 bits, and the step 2.2) adopts a hash algorithm to calculate and generate a 256-bit password.
4. The method for encryption curing based on the OTP image as claimed in claim 3, wherein step 3) processes the original picture A to be encrypted into a size of 16 x 16 pixels.
5. An OTP image encryption and solidification based method according to any one of claims 1 to 4, wherein in step 3), the predetermined color mode is ARGB mode.
6. The method for encryption curing based on the OTP image as claimed in claim 5, wherein the random overlapping of the values of the two elements set therein in the predetermined color mode of the pixel with the agreed offset in step 4) is performed by a random +1 or-1 intervention on A, R values of each pixel.
7. A method for system authentication of encrypted images, comprising:
an original picture a to be encrypted is obtained,
respectively sending the original picture A to a signer and a server;
acquiring an encrypted picture B from a signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
comparing whether the hash values of the picture C and the picture B are equal, and if so, determining that the pictures are consistent; otherwise, the picture is inconsistent.
8. An apparatus for encrypted curing of an image, comprising:
a processor;
a memory coupled to the processor and storing instructions that, when executed by the processor, perform the following:
step 1) obtaining an original picture A to be encrypted;
step 2) generating an M x N password by using a one-time password generation algorithm to serve as an image intervention password;
step 3) processing the original picture A to be encrypted into M × N pixels, and uniformly distributing the M × N pixels; establishing a one-to-one mapping relation between the M x N bit image intervention password generated in the step 2) and the M x N bit pixels; each bit pixel is composed of a plurality of elements of a preset color mode;
and 4) randomly superposing the appointed offset on the values of two elements set in the preset color mode of each pixel according to the value of the image intervention password corresponding to each pixel to generate a new picture B in the preset color mode.
9. The apparatus of claim 8, wherein for step 2) generating an M x N-bit password using a one-time password generation algorithm further comprises:
2.1) randomly generating an algorithm key, and acquiring the current time through a server;
2.2) based on the obtained algorithm key and the current time, calculating and generating the M x N bit password by adopting a hash algorithm.
10. A system authentication apparatus for encrypting an image, comprising:
for obtaining an original picture a to be encrypted,
the system is used for respectively sending the original picture A to a signer and a server;
the signer is used for acquiring an encrypted picture B from the signer, and simultaneously sending a secret key for generating the picture B to a server through the signer, wherein the server generates a picture C by adopting the secret key; the method for encrypting and curing the picture B by the signer and the picture C by the server are the same, and both the method for encrypting and curing the picture B based on the OTP according to claim 1;
the hash value comparison module is used for comparing whether the hash values of the picture C and the picture B are equal or not, and if so, the pictures are consistent; otherwise, the picture is inconsistent.
CN202011408703.XA 2020-12-03 2020-12-03 OTP (one time programmable) image encryption and verification based method and equipment Pending CN112738561A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011408703.XA CN112738561A (en) 2020-12-03 2020-12-03 OTP (one time programmable) image encryption and verification based method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011408703.XA CN112738561A (en) 2020-12-03 2020-12-03 OTP (one time programmable) image encryption and verification based method and equipment

Publications (1)

Publication Number Publication Date
CN112738561A true CN112738561A (en) 2021-04-30

Family

ID=75598908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011408703.XA Pending CN112738561A (en) 2020-12-03 2020-12-03 OTP (one time programmable) image encryption and verification based method and equipment

Country Status (1)

Country Link
CN (1) CN112738561A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008105602A1 (en) * 2007-02-28 2008-09-04 Mininfo Co., Ltd. User authentication method and system using graphic otp
CN102625025A (en) * 2012-03-26 2012-08-01 中山大学 Encryption/decryption method and system based on image transmission
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system
CN105119924A (en) * 2015-09-01 2015-12-02 成都汇合乾元科技有限公司 Information transmission method
US20170034131A1 (en) * 2015-07-28 2017-02-02 Todor Yotkov Yotov System and method for encryption of digital content based on a modified one time pad algorithm
WO2017030210A1 (en) * 2015-08-18 2017-02-23 김민수 User authentication method using graphic otp
EP3361452A1 (en) * 2017-02-11 2018-08-15 Penta Security Systems, Inc. Smart badge and authentication system using the same
CN109803142A (en) * 2019-01-08 2019-05-24 宁波工程学院 A kind of encryption area image reversible data concealing method based on adjacency prediction
CN110460580A (en) * 2019-07-11 2019-11-15 中国银联股份有限公司 Image collecting device, server and Encrypt and Decrypt method
CN110517389A (en) * 2019-08-30 2019-11-29 联永智能科技(上海)有限公司 Generation, verification method, device, equipment and the storage medium of device password
US20200118121A1 (en) * 2018-10-12 2020-04-16 Mastercard International Incorporated Method and system for processing payment transactions with encrypted images

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008105602A1 (en) * 2007-02-28 2008-09-04 Mininfo Co., Ltd. User authentication method and system using graphic otp
CN103095662A (en) * 2011-11-04 2013-05-08 阿里巴巴集团控股有限公司 Online transaction safety certificate method and online transaction safety certificate system
CN102625025A (en) * 2012-03-26 2012-08-01 中山大学 Encryption/decryption method and system based on image transmission
US20170034131A1 (en) * 2015-07-28 2017-02-02 Todor Yotkov Yotov System and method for encryption of digital content based on a modified one time pad algorithm
WO2017030210A1 (en) * 2015-08-18 2017-02-23 김민수 User authentication method using graphic otp
CN105119924A (en) * 2015-09-01 2015-12-02 成都汇合乾元科技有限公司 Information transmission method
EP3361452A1 (en) * 2017-02-11 2018-08-15 Penta Security Systems, Inc. Smart badge and authentication system using the same
US20200118121A1 (en) * 2018-10-12 2020-04-16 Mastercard International Incorporated Method and system for processing payment transactions with encrypted images
CN109803142A (en) * 2019-01-08 2019-05-24 宁波工程学院 A kind of encryption area image reversible data concealing method based on adjacency prediction
CN110460580A (en) * 2019-07-11 2019-11-15 中国银联股份有限公司 Image collecting device, server and Encrypt and Decrypt method
CN110517389A (en) * 2019-08-30 2019-11-29 联永智能科技(上海)有限公司 Generation, verification method, device, equipment and the storage medium of device password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
任奎: "云计算中图像数据处理的隐私保护", 《网络与信息安全学报》 *

Similar Documents

Publication Publication Date Title
Hosam et al. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
CN104468090A (en) Chinese character password encoding method based on image pixel coordinates
Yi et al. Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction
Singh et al. A comprehensive survey on encryption techniques for digital images
Philjon et al. Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption
CN105447404B (en) The method and system of image secret protection in a kind of cloud storage
CN110634096B (en) Self-adaptive multi-mode information hiding method and device
Ahmad et al. Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images
Shrivastava et al. A new hybrid encryption and steganography technique: a survey
US11276138B2 (en) Image data encryption and rendering system
Jin et al. Color image encryption in CIE L* a* b* space
CN116232700A (en) Login authentication method, login authentication device, computer equipment and storage medium
Govinda et al. A generic image cryptography based on Rubik's cube
CN112738561A (en) OTP (one time programmable) image encryption and verification based method and equipment
CN111541652B (en) System for improving security of secret information keeping and transmission
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN109214163B (en) Identity authentication method and device
Saha et al. Secret Image Sharing Schemes: A Comprehensive Survey
Meghana et al. A new method for secret image transmission via mosaic fragments using ecc key
CN113032807B (en) Authenticatable (2,3) secret image sharing method and device based on mixed fractal matrix
Mogale et al. Web Authentication Security Using Image Steganography and AES Encryption
Kashyap et al. An approach for visual cryptography scheme on color images
Bahjat et al. Dynamic Shuffling for Speed Image Encryption
CN113868690B (en) Trusted deposit certificate based privacy calculation method and system
Rao et al. A Novel Image Encryption Algorithm with Image Integrity Check

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination