CN114650342A - Image encryption method, intelligent terminal and computer readable storage medium - Google Patents

Image encryption method, intelligent terminal and computer readable storage medium Download PDF

Info

Publication number
CN114650342A
CN114650342A CN202011496366.4A CN202011496366A CN114650342A CN 114650342 A CN114650342 A CN 114650342A CN 202011496366 A CN202011496366 A CN 202011496366A CN 114650342 A CN114650342 A CN 114650342A
Authority
CN
China
Prior art keywords
image
split
encrypted
preset
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011496366.4A
Other languages
Chinese (zh)
Inventor
万力超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huasheng Software Technology Co ltd
TCL Commercial Information Technology Huizhou Co Ltd
Original Assignee
Shenzhen Huasheng Software Technology Co ltd
TCL Commercial Information Technology Huizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huasheng Software Technology Co ltd, TCL Commercial Information Technology Huizhou Co Ltd filed Critical Shenzhen Huasheng Software Technology Co ltd
Priority to CN202011496366.4A priority Critical patent/CN114650342A/en
Publication of CN114650342A publication Critical patent/CN114650342A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an image encryption method, an intelligent terminal and a computer readable storage medium, wherein the method comprises the following steps: acquiring an image to be encrypted, splitting the image to be encrypted to generate a plurality of split images; for each split image, encrypting the split image according to a preset first encryption algorithm to generate a first encrypted image corresponding to the split image; integrating the first encrypted images corresponding to the split images respectively to generate second encrypted images; and encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image. The image encryption method is based on the image fusion technology, and the image encryption process is divided into encryption after splitting and encryption after fusion, so that the security of image encryption is improved.

Description

Image encryption method, intelligent terminal and computer readable storage medium
Technical Field
The invention relates to the technical field of computers, in particular to an image encryption method, an intelligent terminal and a computer readable storage medium.
Background
As new technologies gradually appear in people's social life, more and more private and public information is spread over the internet, and information security becomes an important issue in the rapidly growing communication technology. The image information security is also a part of the information security, the image contains rich information, can vividly express information content, is easy to access and transmit in network transmission, and can meet the requirement that two communication parties can timely and efficiently transmit a large amount of information. Therefore, image information relating to confidentiality and privacy needs to be protected by encryption.
At present, the conventional image encryption and decryption process is to encrypt an image by using an encryption method, such as scrambling algorithm, spatial transformation, optical imaging, and the like, then transmit a ciphertext image and a key in a channel, and finally obtain a plaintext image by using the key and a corresponding decryption algorithm at a receiver. With the increasing amount of data, it is difficult to efficiently process massive data by using conventional encryption techniques such as cryptography. In addition, the conventional image encryption algorithm also has many disadvantages, for example, the image scrambling algorithm in the image encryption algorithm has the problems of easy cracking and periodicity, the security level is not high enough, the digital holographic encryption technology in optical imaging is easy to display the outline characteristics of the original object, and the used encryption method is easy to deduce, so that the encryption method is cracked.
Disclosure of Invention
The invention mainly aims to provide an image encryption method, an intelligent terminal and a computer readable storage medium, and aims to solve the problem that the security of image encryption is low in the prior art.
In order to achieve the above object, the present invention provides an image encryption method, including the steps of:
acquiring an image to be encrypted, splitting the image to be encrypted to generate a plurality of split images;
for each split image, encrypting the split image according to a preset first encryption algorithm to generate a first encrypted image corresponding to the split image;
integrating the first encrypted images corresponding to the split images respectively to generate second encrypted images;
and encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image.
Optionally, the image encryption method, wherein the splitting the image to be encrypted to generate a plurality of split images specifically includes:
splitting the image to be encrypted into sub-images with the number equal to a preset splitting number;
and generating split images respectively corresponding to the sub-images according to a preset split image rule, wherein the corresponding coordinate areas of the sub-images in the corresponding split images are mutually independent.
Optionally, the image encryption method, wherein the generating split images corresponding to the sub-images according to a preset split image rule specifically includes:
splitting an image coordinate region in a preset background image into sub-coordinate regions with the number equal to the split number, and enabling the sub-coordinate regions to correspond to the sub-images one by one;
and for each sub-image, pasting the sub-image to the background image according to the sub-coordinate area corresponding to the sub-image, and generating a split image corresponding to the sub-image.
Optionally, the image encryption method, wherein the first encryption algorithm and the second encryption algorithm each independently comprise an optical-based data encryption algorithm.
Optionally, the image encryption method, where the first encryption algorithm is a fresnel digital holographic encryption algorithm, the first encrypted image is a digital holographic image, and the encrypting the split image according to a preset first encryption algorithm for each split image to generate a first encrypted image corresponding to the split image specifically includes:
and for each split image, performing interference imaging on the split image based on a preset Fresnel digital holographic experimental light path to generate a digital holographic image corresponding to the split image.
Optionally, the image encryption method, wherein, for each split image, interference imaging is performed on the split image based on a preset fresnel digital holographic experimental optical path to generate a digital holographic image corresponding to the split image, specifically includes:
and for each split image, based on a preset incident wave wavelength and a preset optical axis distance, interfering the split image with a preset reference wave to generate a digital holographic image corresponding to the split image.
Optionally, the image encryption method, where the second encryption algorithm is a Logistic chaotic sequence algorithm, and the encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image specifically includes:
and performing pixel scrambling on each pixel in the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate a third encrypted image.
Optionally, the image encryption method, wherein the pixel scrambling is performed on each pixel in the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate the third encrypted image, specifically includes:
calculating a first chaotic sequence and a second chaotic sequence corresponding to the second encrypted image according to a preset initial parameter and a preset chaotic function;
generating a symbol matrix corresponding to the first chaotic sequence according to a preset threshold value; and
generating a gray matrix corresponding to the second chaotic sequence according to a preset gray function;
performing bit exclusive or on the second encrypted image and the gray matrix to generate an intermediate image;
and performing dot multiplication on the intermediate image and the symbol matrix to generate the third encrypted image.
In addition, to achieve the above object, the present invention further provides an intelligent terminal, wherein the intelligent terminal includes: a memory, a processor and an image encryption program stored on the memory and executable on the processor, the image encryption program when executed by the processor implementing the steps of the image encryption method as described above.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing an image encryption program that realizes the steps of the image encryption method as described above when executed by a processor.
The invention provides an image encryption method, which comprises the steps of splitting an image to be encrypted into a plurality of split images, encrypting the split images one by one to obtain first encrypted images corresponding to the split images respectively, integrating all the first encrypted images to obtain second encrypted images, and finally encrypting for the second time on the basis of the second encrypted images to obtain third encrypted images. The invention combines the image fusion method, integrates different encryption algorithms by combining the split encryption mode and the fusion encryption mode, improves the decrepitation of a single encryption algorithm, and can effectively improve the effectiveness of image encryption by using the image fusion method as an encryption mode.
Drawings
FIG. 1 is a flow chart of conventional image encryption and decryption;
FIG. 2 is a flow chart of a preferred embodiment of the image encryption method of the present invention;
FIG. 3 is a schematic diagram of an encryption process based on a Fresnel digital holographic experimental light path and a Logistic chaotic sequence in a preferred embodiment provided by the image encryption method of the present invention;
FIG. 4 is a schematic diagram of generating a first encrypted image based on a Fresnel digital holographic experimental light path according to the preferred embodiment of the image encryption method of the present invention;
FIG. 5 is a flowchart of image decryption corresponding to the image decryption method in the preferred embodiment of the present invention;
fig. 6 is a schematic operating environment diagram of an intelligent terminal according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 2, the image encryption method according to the preferred embodiment of the present invention includes the following steps:
step S100, obtaining an image to be encrypted, splitting the image to be encrypted, and generating a plurality of split images.
Specifically, the present embodiment performs description of an execution process with an intelligent terminal installed to execute an image encryption method as an execution subject. Firstly, an intelligent terminal obtains an image to be encrypted in a reading and receiving mode and the like, and then the image to be encrypted is split, so that a plurality of images, namely split images, are obtained.
In the first embodiment of this embodiment, an image with a resolution of 100 × 200 pixels is taken as an example of an image to be encrypted. And splitting the split image into four rectangular split images by using the central line of the image to be encrypted, wherein the four rectangular split images are respectively marked as p1, p2, p3 and p 4. It is worth noting that the shape and size of the split image can be freely set, and the preferred splitting mode is uniform splitting, that is, the split images are equal in size, so that the problem that the encryption effect is influenced when a certain split image is too large is avoided, and the uniform splitting is beneficial to the accuracy of restoring the original image subsequently.
Further, in the second embodiment of this embodiment,
a10, splitting the image to be encrypted into sub-images with the number equal to the preset splitting number.
Specifically, a certain number of splits is preset, for example, the number of splits is 4, and the encrypted image is split into 4 sub-images. As in the first embodiment, the preferred splitting method is equal splitting.
And A20, generating split images respectively corresponding to the sub-images according to a preset split image rule, wherein the coordinate areas of the sub-images in the corresponding split images are independent.
Specifically, a split image rule is preset, where the split image rule is used to generate a split image corresponding to each sub-image. A background image is preset, the resolution size of the background image is larger than or equal to the resolution size of the image to be encrypted, for example, 400 × 400, and for each sub-image, for example, p1, the sub-image is pasted onto the background image, so that a split image corresponding to p1, that is, q1, is generated. The split images q1, q2, q3, and q4 are finally obtained. The coordinate regions of q1, q2, q3 and q4 corresponding to the split images are independent of each other, that is, there is no overlapping and crossing region. For example, the sub-images are all rectangular, in the split image q1, the upper left corner of the coordinate region corresponding to p1 is (0, 0), the lower right corner is (5, 5), in the split image q2, the upper left corner of the coordinate region corresponding to p2 is (6, 0), the lower right corner is (11, 5), in the split image q3, the upper left corner of the coordinate region corresponding to p3 is (0, 6), the lower right corner is (6, 11), in the split image q4, the upper left corner of the coordinate region corresponding to p4 is (6, 6), and the lower right corner is (11, 11). Therefore, when all the split images are superposed together, the sub-images are independent from each other and do not interfere with each other, so that the mutual interference in the fusion process after encryption is avoided.
Further, the present embodiment preferably adopts an image splitting rule that image coordinate regions in a preset background image are split into sub-coordinate regions equal to the split number. Taking the resolution of 400 × 400 as an example, the background image is equally divided into 4 sub-coordinate regions, for example, the 4 sub-coordinate regions are the upper left corner (0, 0) and the lower right corner (200 ); upper left corner (200, 0), lower right corner (400, 200); upper left corner (0, 200), lower right corner (200, 400) and upper left corner (0, 200), lower right corner (200, 400). And the sub-coordinate regions are in one-to-one correspondence with the sub-images, for example, the aforementioned sub-coordinate regions correspond to the sub-images p1, p2, p3, and p4 in this order. And then, for each sub-image, pasting the sub-image to the background image according to the sub-coordinate area corresponding to the sub-image, and generating a split image corresponding to the sub-image. That is, the sub-image p1 is imported into the first sub-coordinate region, and its corresponding split image is generated. Further, the background image is preferably a solid color image, such as solid black or solid white. Compared with a direct splitting mode, the second implementation mode of the embodiment ensures that pixel interference does not occur in the process of generating the second encrypted image by fusing the first encrypted image, and increases the interference degree of decryption by introducing the pixels of the background image as noise.
Step S200, aiming at each split image, encrypting the split image according to a preset first encryption algorithm to generate a first encrypted image corresponding to the split image.
Specifically, each split image is encrypted by using a preset first encryption algorithm, so that a first encrypted image corresponding to the split image is obtained. The first encryption algorithm may be any algorithm for encrypting the image, such as a cat face scrambling method, a row-column pixel scrambling method, and a chaos-based image encryption method.
In a first implementation manner of this embodiment, according to a preset first encryption algorithm, p1, p2, p3 and p4 are respectively subjected to image encryption, so as to obtain a first encrypted image q1 corresponding to p1, a first encrypted image q2 corresponding to p2, a first encrypted image q3 corresponding to p3, and a first encrypted image q4 corresponding to p 4.
In a second implementation manner of this embodiment, the encryption algorithms used by the first encryption algorithm and the second encryption algorithm may be based on optical data encryption algorithm, in addition to the conventional image encryption algorithm. The optical-based data encryption algorithm is a brand-new encryption method, has the advantages of optical speed and transmission characteristics, can process massive data in parallel with high efficiency, is flexible in coding and high in degree of freedom, and can overcome the defects of a traditional encryption method. The optical-based data encryption algorithm is applied to an image, has the capability of processing data in parallel, can process information data simultaneously when processing a large amount of information, and the more complicated the image information is, the more abundant the data amount is proved, and each pixel in the image can be transmitted and stored simultaneously.
Further, as shown in fig. 3, the first encryption algorithm is a fresnel digital holographic encryption algorithm, so that the process of encrypting the split image is as follows: and for each split image, performing interference imaging on the split image based on a preset Fresnel digital holographic experimental light path to generate a digital holographic image corresponding to the split image.
Specifically, based on a preset fresnel digital holographic encryption algorithm, a coordinate system of x, y and z axes is preset. Taking a certain split image m as an example, referring to fig. 4, m is tiled on a plane of an xy axis, then an incident wave with a wavelength λ is projected to the split image m along a z-axis direction, and a fresnel diffraction pattern is generated on a plane with a distance d from the y axis, and simultaneously a reference light wave R (x ', y') is projected in a direction intersecting the z axis, i.e., the xy-axis plane, and interferes with the fresnel diffraction pattern, thereby generating a digital holographic image, i.e., a first encrypted image.
It should be noted that the above-mentioned process is only one process of the most common fresnel digital holographic encryption algorithm, and other optical-based image encryption algorithms can be used as the implementation manner of this embodiment. In addition, optical parameters in the fresnel digital holographic experimental optical path, such as wavelength λ of incident wave, distance d, etc., can be set according to different split images, and these optical parameters can be used as a key in the subsequent decryption process. In fig. 3, the wavelength λ of the incident wave is fixed, but the distances of diffraction of each split image are different, for example, the distance corresponding to p1 is d1, and the distance corresponding to p2 is d 2.
Step S300, integrating the first encrypted images corresponding to the split images, respectively, to generate a second encrypted image.
Specifically, the split encrypted first encrypted images are spliced to generate a second encrypted image. The splicing mode can adopt modes of connecting all the first encrypted images according to a certain sequence, interpolating, splicing and the like.
Since the first implementation manner of this embodiment is to split the image to be detected into four rectangular split images, the integration manner is stitching. The q1, the q2, the q3 and the q4 can be spliced according to the position relations of the p1, the p2, the p3 and the p4 in the image to be detected. For example, if p1 is located at the upper left, p2 is located at the lower left, p3 is located at the upper right, and p4 is located at the lower right, then q1, q2, q3, and q4 are spliced to obtain the second encrypted image Y, in such a relationship that q1 is located at the upper left, q2 is located at the lower left, q3 is located at the upper right, and q4 is located at the lower right, so that q1, q2, q3, and q4 are included in the second encrypted image Y. In addition, when the first embodiment of this embodiment is used for stitching, the relative positional relationship of the split images is not limited, that is, q1 may be located at the upper right, lower left, lower right, and the like in the second encrypted image.
In the second implementation manner of this embodiment, the integration manner is fusion, and all the obtained split images are fused, and since the sub-coordinate regions corresponding to the sub-images in each split image are independent from each other in the second implementation manner, there is no mutual interference in the fusion process, and thus a second encrypted image Y including all the encrypted sub-images can be obtained.
And S400, encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image.
Specifically, the obtained second encrypted image, that is, the holographic image can usually see the image contour information, the information cannot be completely hidden by the encryption method, the encryption effect is poor, and the encryption key is few and is easy to crack. In order to solve the above problem, the second encrypted image needs to be secondarily encrypted. Therefore, according to a preset second encryption algorithm, the second encrypted image Y obtained after splicing is encrypted again, so that a third encrypted image is obtained. The second encryption algorithm may be any algorithm for encrypting the image, such as a cat face scrambling method, a row-column pixel scrambling method, and a chaos-based image encryption method.
In a second implementation manner of this embodiment, the second encryption algorithm is a Logistic chaotic sequence algorithm. The Logistic chaotic system generates a chaotic sequence between 0 and 1, and a sequence stream composed of 0 and 1 is generated after the chaotic sequence passes through the binary generator; and then encrypting the sequence stream, thereby performing pixel scrambling on each pixel in the image to be encrypted to generate a third encrypted image. The process of encrypting the second encrypted image is therefore: and performing pixel scrambling on each pixel of the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate a third encrypted image.
Further, the process of generating the third encrypted image is as follows:
calculating a first chaotic sequence and a second chaotic sequence corresponding to the second encrypted image according to a preset initial parameter and a preset chaotic function;
generating a symbol matrix corresponding to the first chaotic sequence according to a preset threshold value; and
generating a gray matrix corresponding to the second chaotic sequence according to a preset gray function;
performing bit exclusive or on the second encrypted image and the gray matrix to generate an intermediate image;
and performing dot multiplication on the intermediate image and the symbol matrix to generate the third encrypted image.
Specifically, an initial parameter and a chaotic function E (x) are preset, wherein the initial parameter comprises an initial value x (0) of Logistic mapping, a structural parameter p and a transition process parameter. Inputting the second encrypted image into the chaotic function, and generating a corresponding first chaotic sequence x based on the initial parameterskAnd yk. Since the values in the chaotic sequence should be between-1 and 1, the symbol sequence is generated by defining a threshold, e.g. when xkIf the value of (a) is between-1 and 0, the value of the corresponding symbol sequence is-1; when x iskIs between 0 and 1, the value in the corresponding symbol sequence is 1, thereby generating a symbol matrix corresponding to the first chaotic sequence.
At the same time, the second chaotic sequence y is divided into two partskSubstituting into a preset gray function, and calculating a second chaotic sequence y based on the gray functionkA corresponding gray matrix. The gray function is to convert the second chaotic sequence ykConversion to numerical values in the interval [0, 256 ]]A matrix between. The following formula may be used:
Figure BDA0002842278750000121
and generating a matrix by arranging each numerical value according to the second encrypted image.
And then carrying out bit exclusive OR on the second encrypted image and the gray matrix to generate an intermediate image. And finally, performing dot multiplication on the intermediate image and the symbol matrix to generate the third encrypted image.
Furthermore, the initial parameter in the process of encrypting the second encrypted image, for example, the initial value x (0), the structure parameter p and the transient process parameter may be saved in advance as a key or transmitted to the terminal device for decrypting the image.
And subsequently, the third encrypted image can be used as an encryption result corresponding to the image to be encrypted and sent to another intelligent terminal or stored locally. When the encrypted result needs to be decrypted, the decryption can be realized by adopting the inverse process corresponding to the image encryption method, namely:
decrypting the third encrypted image according to the inverse algorithm corresponding to the second encryption algorithm to generate a second encrypted image;
splitting the second encrypted image based on a splicing rule for splicing the first encrypted images to generate a plurality of first encrypted images;
decrypting each first encrypted image according to a preset inverse algorithm corresponding to a first encryption algorithm to generate a split image corresponding to each first encrypted image;
and splicing all the split images to generate a decrypted image.
And performing inverse transformation on the third encrypted image by using the initial parameters in the chaotic function to obtain a second encrypted image. And then selecting different reconstruction distances to perform Fresnel diffraction integral holographic reconstruction based on preset wavelength, and obtaining information in p1, p2, p3 and p4 after secondary decryption. Finally, the p1, the p2, the p3 and the p4 are spliced back to the original image.
As shown in fig. 5, in this embodiment, a terminal for decryption obtains an initial value and a parameter in a Logistic chaotic sequence encryption, and uses the initial value and the parameter as a decryption key for the first round of primary decryption to obtain a first chaotic sequence and a second chaotic sequence, that is, a Logisitc chaotic sequence in the graph, and then performs inverse fresnel transform according to a wavelength and a distance written by the terminal for encryption, and then obtains a decrypted image. The image noise reduction can be carried out after the Fresnel inverse transformation is carried out, so that the noise interference caused by substitution in the encryption and decryption processes can be reduced.
Further, as shown in fig. 6, based on the above image encryption method, the present invention also provides an intelligent terminal, which includes a processor 10, a memory 20 and a display 30. Fig. 6 shows only some of the components of the intelligent terminal, but it should be understood that not all of the shown components are required to be implemented, and more or fewer components may be implemented instead.
The memory 20 may be an internal storage unit of the intelligent terminal in some embodiments, such as a hard disk or a memory of the intelligent terminal. The memory 20 may also be an external storage device of the Smart terminal in other embodiments, such as a plug-in hard disk, a Smart Memory Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the Smart terminal. Further, the memory 20 may also include both an internal storage unit and an external storage device of the smart terminal. The memory 20 is used for storing application software installed in the intelligent terminal and various data, such as program codes of the installed intelligent terminal. The memory 20 may also be used to temporarily store data that has been output or is to be output. In one embodiment, the memory 20 stores an image encryption program 40, and the image encryption program 40 can be executed by the processor 10 to implement the image encryption method of the present application.
The processor 10 may be a Central Processing Unit (CPU), a microprocessor or other data Processing chip in some embodiments, and is used for running program codes stored in the memory 20 or Processing data, such as executing the image encryption method, and the like.
The display 30 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch panel, or the like in some embodiments. The display 30 is used for displaying information at the intelligent terminal and for displaying a visual user interface. The components 10-30 of the intelligent terminal communicate with each other via a system bus.
In one embodiment, when the processor 10 executes the image encryption program 40 in the memory 20, the following steps are implemented:
acquiring an image to be encrypted, splitting the image to be encrypted and generating a plurality of split images;
for each split image, encrypting the split image according to a preset first encryption algorithm to generate a first encrypted image corresponding to the split image;
integrating the first encrypted images corresponding to the split images respectively to generate second encrypted images;
and encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image.
Splitting the image to be encrypted to generate a plurality of split images, specifically comprising:
splitting the image to be encrypted into sub-images with the number equal to a preset splitting number;
and generating split images respectively corresponding to the sub-images according to a preset split image rule, wherein the corresponding coordinate areas of the sub-images in the corresponding split images are mutually independent.
The generating, according to a preset split image rule, split images corresponding to the respective sub-images specifically includes:
splitting an image coordinate region in a preset background image into sub-coordinate regions with the number equal to the split number, and enabling the sub-coordinate regions to correspond to the sub-images one by one;
and for each sub-image, pasting the sub-image to the background image according to the sub-coordinate area corresponding to the sub-image, and generating a split image corresponding to the sub-image.
Wherein the first encryption algorithm and the second encryption algorithm each independently comprise an optical-based data encryption algorithm.
The method includes the steps of obtaining a split image, generating a first encrypted image corresponding to the split image, and specifically including:
and for each split image, performing interference imaging on the split image based on a preset Fresnel digital holographic experimental light path to generate a digital holographic image corresponding to the split image.
The method includes the steps that for each split image, interference imaging is carried out on the split image based on a preset Fresnel digital holographic experimental light path, and a digital holographic image corresponding to the split image is generated, and specifically includes:
and for each split image, based on a preset incident wave wavelength and a preset optical axis distance, interfering the split image with a preset reference wave to generate a digital holographic image corresponding to the split image.
The second encryption algorithm is a Logistic chaotic sequence algorithm, and the encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image specifically includes:
and performing pixel scrambling on each pixel of the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate a third encrypted image.
The pixel scrambling is performed on each pixel of the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate the third encrypted image, and the method specifically includes:
calculating a first chaotic sequence and a second chaotic sequence corresponding to the second encrypted image according to a preset initial parameter and a preset chaotic function;
generating a symbol matrix corresponding to the first chaotic sequence according to a preset threshold; and
generating a gray matrix corresponding to the second chaotic sequence according to a preset gray function;
performing bit exclusive or on the second encrypted image and the gray matrix to generate an intermediate image;
and performing dot multiplication on the intermediate image and the symbol matrix to generate the third encrypted image.
The present invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores an image encryption program, which when executed by a processor implements the steps of the image encryption method as described above.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by instructing relevant hardware (such as a processor, a controller, etc.) through a computer program, and the program can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The computer readable storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. An image encryption method, comprising:
acquiring an image to be encrypted, splitting the image to be encrypted to generate a plurality of split images;
for each split image, encrypting the split image according to a preset first encryption algorithm to generate a first encrypted image corresponding to the split image;
integrating the first encrypted images corresponding to the split images respectively to generate second encrypted images;
and encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image.
2. The image encryption method according to claim 1, wherein the splitting the image to be encrypted to generate a plurality of split images specifically comprises:
splitting the image to be encrypted into sub-images with the number equal to a preset splitting number;
and generating split images respectively corresponding to the sub-images according to a preset split image rule, wherein the coordinate areas of the sub-images in the corresponding split images are mutually independent.
3. The image encryption method according to claim 2, wherein the generating split images respectively corresponding to the sub-images according to a preset split image rule specifically includes:
splitting an image coordinate region in a preset background image into sub-coordinate regions with the number equal to the split number, and enabling the sub-coordinate regions to correspond to the sub-images one by one;
and for each sub-image, pasting the sub-image to the background image according to the sub-coordinate area corresponding to the sub-image, and generating a split image corresponding to the sub-image.
4. The image encryption method of claim 1, wherein the first encryption algorithm and the second encryption algorithm each independently comprise an optically-based data encryption algorithm.
5. The image encryption method according to claim 1, wherein the first encryption algorithm is a fresnel digital holographic encryption algorithm, the first encrypted image is a digital holographic image, and the encrypting the split image according to a preset first encryption algorithm for each split image to generate a first encrypted image corresponding to the split image specifically includes:
and for each split image, performing interference imaging on the split image based on a preset Fresnel digital holographic experimental light path to generate a digital holographic image corresponding to the split image.
6. The image encryption method according to claim 5, wherein for each split image, based on a preset fresnel digital holographic experimental optical path, performing interference imaging on the split image to generate a digital holographic image corresponding to the split image, specifically includes:
and for each split image, based on a preset incident wave wavelength and a preset optical axis distance, interfering the split image with a preset reference wave to generate a digital holographic image corresponding to the split image.
7. The image encryption method according to any one of claims 1 to 6, wherein the second encryption algorithm is a Logistic chaotic sequence algorithm, and the encrypting the second encrypted image according to a preset second encryption algorithm to generate a third encrypted image specifically includes:
and performing pixel scrambling on each pixel in the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate a third encrypted image.
8. The image encryption method according to claim 7, wherein the pixel scrambling is performed on each pixel in the second encrypted image based on a preset Logistic chaotic sequence algorithm to generate the third encrypted image, specifically comprising:
calculating a first chaotic sequence and a second chaotic sequence corresponding to the second encrypted image according to a preset initial parameter and a preset chaotic function;
generating a symbol matrix corresponding to the first chaotic sequence according to a preset threshold value;
generating a gray matrix corresponding to the second chaotic sequence according to a preset gray function;
performing bit exclusive or on the second encrypted image and the gray matrix to generate an intermediate image;
and performing dot multiplication on the intermediate image and the symbol matrix to generate the third encrypted image.
9. An intelligent terminal, characterized in that, intelligent terminal includes: memory, a processor and an image encryption program stored on the memory and executable on the processor, the image encryption program when executed by the processor implementing the steps of the image encryption method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores an image encryption program which, when executed by a processor, implements the steps of the image encryption method according to any one of claims 1 to 8.
CN202011496366.4A 2020-12-17 2020-12-17 Image encryption method, intelligent terminal and computer readable storage medium Pending CN114650342A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011496366.4A CN114650342A (en) 2020-12-17 2020-12-17 Image encryption method, intelligent terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011496366.4A CN114650342A (en) 2020-12-17 2020-12-17 Image encryption method, intelligent terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114650342A true CN114650342A (en) 2022-06-21

Family

ID=81991218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011496366.4A Pending CN114650342A (en) 2020-12-17 2020-12-17 Image encryption method, intelligent terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114650342A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device
CN117786644A (en) * 2024-02-28 2024-03-29 青岛山科智汇信息科技有限公司 Safe face recognition system with face self-characteristics participating in encryption and decryption

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN1870045A (en) * 2005-05-27 2006-11-29 刘畅 Image picture encipher and decipher method
US20100074443A1 (en) * 2007-05-30 2010-03-25 Fujitsu Limited Image encryption and image decryption apparatus and method
US20150095643A1 (en) * 2013-09-30 2015-04-02 Juniper Networks, Inc. Encrypting images on a client device for secure transmission and storage on a storage device
US20160148000A1 (en) * 2014-11-25 2016-05-26 Freescale Semiconductor, Inc. Method and apparatus for encoding image data
CN111105339A (en) * 2019-12-23 2020-05-05 郑州轻工业大学 Image encryption method based on multidimensional chaotic system and Joseph scrambling
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN1870045A (en) * 2005-05-27 2006-11-29 刘畅 Image picture encipher and decipher method
US20100074443A1 (en) * 2007-05-30 2010-03-25 Fujitsu Limited Image encryption and image decryption apparatus and method
US20150095643A1 (en) * 2013-09-30 2015-04-02 Juniper Networks, Inc. Encrypting images on a client device for secure transmission and storage on a storage device
US20160148000A1 (en) * 2014-11-25 2016-05-26 Freescale Semiconductor, Inc. Method and apparatus for encoding image data
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device
CN111105339A (en) * 2019-12-23 2020-05-05 郑州轻工业大学 Image encryption method based on multidimensional chaotic system and Joseph scrambling

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
万力超: "无透镜数字全息显微图像增强方法及其应用研究", 中国优秀硕士学位论文全文数据库信息科技辑, no. 2017, pages 135 - 80 *
贺楚雄,田绍槐: "基于灰度级出现频数的数字图像置乱程度衡量方法", 中国图象图形学报, vol. 15, no. 2, pages 220 - 228 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device
CN117786644A (en) * 2024-02-28 2024-03-29 青岛山科智汇信息科技有限公司 Safe face recognition system with face self-characteristics participating in encryption and decryption
CN117786644B (en) * 2024-02-28 2024-05-14 青岛山科智汇信息科技有限公司 Safe face recognition system with face self-characteristics participating in encryption and decryption

Similar Documents

Publication Publication Date Title
Pan et al. Research on digital image encryption algorithm based on double logistic chaotic map
US11947680B2 (en) Model parameter training method, terminal, and system based on federation learning, and medium
Gao et al. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory
Lee et al. An extended visual cryptography algorithm for general access structures
US7159112B1 (en) Decryption of graphics data in a graphics processing pipeline
Song et al. A novel batch image encryption algorithm using parallel computing
CN111898145B (en) Neural network model training method, device, equipment and medium
CN114650342A (en) Image encryption method, intelligent terminal and computer readable storage medium
CN114065252A (en) Privacy set intersection method and device with condition retrieval and computer equipment
CN113761563B (en) Data intersection calculation method and device and electronic equipment
Yan et al. Partial secret image sharing for (k, n) threshold based on image inpainting
CN110737905A (en) Data authorization method, data authorization device and computer storage medium
CN117349685A (en) Clustering method, system, terminal and medium for communication data
Krasilenko et al. Matrix Models of Cryptographic Transformations of Video Images Transmitted from Aerial-Mobile Robotic Systems
CN116049851B (en) Ciphertext processing system and method based on full homomorphic encryption
CN116664128A (en) Electronic certificate encryption method, device, equipment and medium
Li et al. An image encryption algorithm based on improved lifting-like structure and cross-plane zigzag transform
CN106683030B (en) Quantum multi-image encryption algorithm based on quantum multi-image model and three-dimensional transformation
CN113158203A (en) SOC chip, circuit and external data reading and writing method of SOC chip
Liu et al. Meaningful share generation for (2, 2)-multiple visual secret sharing scheme without pixel expansion
CN110535623A (en) A kind of image encryption method, device, equipment and readable storage medium storing program for executing
CN116028969B (en) Privacy calculation method based on data encryption technology
Cai et al. Partial encryption of feature-based product models for collaborative development
CN113434845B (en) Business handling method and device, electronic equipment and computer readable storage medium
Wang et al. Color image encryption based on discrete trinion Fourier transform and compressive sensing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination