CN115203723B - Information encryption processing system for temple - Google Patents
Information encryption processing system for temple Download PDFInfo
- Publication number
- CN115203723B CN115203723B CN202210851762.7A CN202210851762A CN115203723B CN 115203723 B CN115203723 B CN 115203723B CN 202210851762 A CN202210851762 A CN 202210851762A CN 115203723 B CN115203723 B CN 115203723B
- Authority
- CN
- China
- Prior art keywords
- image
- encryption
- processing
- matrix
- temple
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses an information encryption processing system for a temple, which collects temple data through an acquisition module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. By performing encryption hiding on temple information at corners of temple images, leakage is avoided, and a safer and more compact information encryption scheme is realized.
Description
Technical Field
The invention belongs to the field of information encryption, and particularly relates to an information encryption processing system applicable to temples.
Background
Data encryption is a technology with long history, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and ciphertext is recovered into plaintext through a decryption algorithm and a decryption key. Its core is cryptography. Data encryption is still one of the most reliable ways for computer systems to protect information. The information is encrypted by utilizing a password technology, so that information concealment is realized, and the effect of protecting the safety of the information is achieved. The purpose of data transmission encryption techniques is to encrypt the data stream in transmission, typically both line encryption and end-to-end encryption. Line encryption is focused on lines regardless of source and destination, and is used to provide security protection for confidential information by using different encryption keys for each line. End-to-end encryption refers to the automatic encryption of information by the sender and the encapsulation of packets by TCP/IP, then traversing the internet as unreadable and unrecognizable data, which when arriving at the destination, will be automatically reassembled, decrypted, and made readable.
In the prior art, no scheme for encrypting privacy problems in the temple image exists, and particularly, some information used in the inside is added to the top corner part area of the temple image, so that privacy is easy to expose after outflow. Therefore, the present invention provides an information encryption processing system for temple, which aims to solve the above technical drawbacks.
Disclosure of Invention
The invention mainly aims to provide an information encryption processing system for temples, which aims to solve the technical problem that the equipment terminals are unfavorable for management and control.
In order to achieve the above object, an information encryption processing system for a temple is provided, the system comprising:
the acquisition module is used for acquiring temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the system further comprises: a first processing module for performing the following first processing operation on the region sub-image to obtain a first processing matrixThe method comprises the steps of carrying out a first treatment on the surface of the The first processing matrixThe array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;is normally distributed;scaling factors for the images;is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrixResetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix;
An encryption module for encrypting the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、。
Preferably, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、Comprising using isomorphic encryption functionsExecuting the second processing matrix K and the third processing matrixIs encrypted by (a):
wherein, the liquid crystal display device comprises a liquid crystal display device,the first to represent the current numberBits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix、And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
In addition, the method for encrypting information for temple is characterized in that the method comprises the following steps:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the method further comprises:
a first processing step of performing a first processing operation on the region sub-image to obtain a first processing matrixThe method comprises the steps of carrying out a first treatment on the surface of the The first processing matrixThe array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;is normally distributed;scaling factors for the images;is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrixResetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix;
An encryption step, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、。
Preferably, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、Comprising using isomorphic encryption functionsExecuting the second processing matrix K and the third processing matrixIs encrypted by (a):
wherein, the liquid crystal display device comprises a liquid crystal display device,the first to represent the current numberBits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix、And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
The information encryption processing system for the temple provided by the invention can be used for collecting temple data through the collecting module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. The invention realizes a safer and more compact information encryption scheme by carrying out encryption hiding on temple information at corners of temple images to avoid leakage.
Drawings
Fig. 1 is a block diagram of an information encryption processing system for a temple according to an embodiment of the present invention;
fig. 2 is a flowchart of an information encryption processing method for a temple according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings of the specification, it being understood that the preferred embodiments described herein are for illustration and explanation only, and not for limitation of the present invention, and embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
Example 1
Referring to fig. 1, fig. 1 is a block diagram of an information encryption processing system applicable to a temple, and in this embodiment, an information encryption processing system applicable to a temple is provided, the system includes:
the acquisition module 10 acquires temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
an encryption module 20, configured to perform an encryption operation on the region sub-image to obtain an encrypted region sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the system further comprises: a first processing module for performing the following first processing operation on the region sub-image to obtain a first processing matrixThe method comprises the steps of carrying out a first treatment on the surface of the The first processing matrixThe array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;is normally distributed;scaling factors for the images;is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrixResetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix;
An encryption module for encrypting the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、。
Preferably, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、Comprising using isomorphic encryption functionsExecuting the second processing matrix K and the third processing matrixIs encrypted by (a):
wherein, the liquid crystal display device comprises a liquid crystal display device,the first to represent the current numberBits; i, j represents the coordinate position of the current digit in the matrix;
specifically, in this embodiment, for example, the right vertex angle of the current temple image has some privacy information of the temple, in order to avoid that unrelated persons acquire some images of specific detail information areas, the application needs to encrypt the privacy information. The region sub-image size may be taken to be 28 x 28.
Preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix、And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
Specifically, in this embodiment, for the area sub-image size of 28×28, the first processing operation is performed to obtain the matrix I. We convert matrix I into matrix K and matrix. For a region sub-image size of 28×28, a matrix K of 24×24 may be further defined;the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,representing a convolution operation; k is a constant matrix which can be 5*5, and each number in the matrix can take a value of 0.04; k is a second processing matrix; for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、Comprising using isomorphic encryption functionsExecuting the second processing matrix K and the third processing matrixIs encrypted by (a):where 0.ltoreq.i, j<28; for the followingThe method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,the first to represent the current numberBits; i, j represents the coordinate position of the current digit in the matrix, 0.ltoreq.i, j<24。For example, it may be set to be larger than 0 and smaller than 10. For encryption matrices、The values of the corresponding coordinates may be superimposed by corresponding products, e.g., the same (1, 1) coordinates may be multiplied to generate the ciphertext matrix.
In addition, as shown in fig. 2, the method further includes:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the method further comprises:
a first processing step of performing a first processing operation on the region sub-image to obtain a first processing matrixThe method comprises the steps of carrying out a first treatment on the surface of the The first processing matrixThe array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;is normally distributed;scaling factors for the images;is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrixResetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix;
An encryption step, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、。
Preferably, for the second processing matrix K and the third processing matrixRespectively executing encryption operations and outputting an encryption matrix、Comprising using isomorphic encryption functionsExecuting the second processing matrix K and the third processing matrixIs encrypted by (a):
wherein, the liquid crystal display device comprises a liquid crystal display device,the first to represent the current numberBits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix、And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
In the scheme of the embodiment of the invention, the provided information encryption processing system for the temple collects temple data through the collection module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. The invention realizes a safer and more compact information encryption scheme by carrying out encryption hiding on temple information at corners of temple images to avoid leakage.
While the basic concepts have been described above, it will be apparent to those skilled in the art that the foregoing detailed disclosure is by way of example only and is not intended to be limiting. Although not explicitly described herein, various modifications, improvements, and offsets may occur to those skilled in the art to which this disclosure pertains. Such modifications, improvements, and offset processing are suggested in this specification and, therefore, remain within the spirit and scope of the exemplary embodiments of this specification.
Furthermore, those skilled in the art will appreciate that the various aspects of the specification can be illustrated and described in terms of several patentable categories or circumstances, including any novel and useful procedures, machines, products, or combinations of materials, or any novel and useful modifications thereof. Accordingly, aspects of the present description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as a "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the specification may take the form of a computer product, comprising computer-readable program code, embodied in one or more computer-readable media.
It is noted that, if the description, definition, and/or use of a term in an attached material in this specification does not conform to or conflict with what is described in this specification, the description, definition, and/or use of the term in this specification controls.
Finally, it should be understood that the embodiments described in this specification are merely illustrative of the principles of the embodiments of this specification. Other variations are possible within the scope of this description. Thus, by way of example, and not limitation, alternative configurations of embodiments of the present specification may be considered as consistent with the teachings of the present specification. Accordingly, the embodiments of the present specification are not limited to only the embodiments explicitly described and depicted in the present specification.
Claims (2)
1. An information encryption processing system for temple, the system comprising:
the acquisition module is used for acquiring temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; the sub-image of the encryption area is overlapped to the temple image data to generate an encryption image;
the system further comprises:
the first processing module is used for executing the following first processing operation on the regional sub-image to acquire a first processing matrix I; the size of the first processing matrix I array is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:wherein, m represents the gray scale of the pixel point of the regional sub-image; />Is normally distributed; gamma is the image scaling factor; beta is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:wherein (1)>Representing a convolution operation; k is a constant matrix; k is a second processing matrix;
resetting each element value according to the positive and negative of each element in the first processing matrix I, wherein the negative number is set to 0; the positive number element is set to 1 to acquire a third processing matrix Sign (I);
an encryption module for performing encryption operation on the second processing matrix K and the third processing matrix Sign (I) respectively, and outputting encryption matrices [ K ], [ Sign (I) ];
and respectively executing encryption operation on the second processing matrix K and the third processing matrix Sign (I), and outputting encryption matrices [ K ], [ Sign (I) ], wherein the encryption of the second processing matrix K and the third processing matrix [ Sign (I) ] is executed by adopting an isomorphic encryption function Enc ():
[Sign(I)] i,j =Enc(Sign(I) i,j );
where l represents the first bit of the current number; i, j represents the coordinate position of the current digit in the matrix;
performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
and superposing the encryption matrixes [ K ] and [ Sign (I) ] to generate a ciphertext matrix, and replacing the regional sub-images in the temple image data with the ciphertext matrix to generate an encrypted image.
2. An information encryption processing method for temple, the method comprising:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; the sub-image of the encryption area is overlapped to the temple image data to generate an encryption image;
the method further comprises the steps of:
a first processing step of executing the following first processing operation on the region sub-image to acquire a first processing matrix I; the size of the first processing matrix I array is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:wherein, m represents the gray scale of the pixel point of the regional sub-image; />Is normally distributed; gamma is the image scaling factor; beta is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:wherein (1)>Representing a convolution operation; k is a constant matrix; k is a second processing matrix;
resetting each element value according to the positive and negative of each element in the first processing matrix I, wherein the negative number is set to 0; the positive number element is set to 1 to acquire a third processing matrix Sign (I);
an encryption step of performing encryption operation on the second processing matrix K and the third processing matrix Sign (I) respectively, and outputting encryption matrices [ K ], [ Sign (I) ];
and respectively executing encryption operation on the second processing matrix K and the third processing matrix Sign (I), and outputting encryption matrices [ K ], [ Sign (I) ], wherein the encryption of the second processing matrix K and the third processing matrix Sign (I) is executed by adopting an isomorphic encryption function Enc ():
[Sign(I)] i,j =Enc(Sign(I) i,j );
where l represents the first bit of the current number; i, j represents the coordinate position of the current digit in the matrix;
performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
and superposing the encryption matrixes [ K ] and [ Sign (I) ] to generate a ciphertext matrix, and replacing the regional sub-images in the temple image data with the ciphertext matrix to generate an encrypted image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210851762.7A CN115203723B (en) | 2022-07-20 | 2022-07-20 | Information encryption processing system for temple |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210851762.7A CN115203723B (en) | 2022-07-20 | 2022-07-20 | Information encryption processing system for temple |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115203723A CN115203723A (en) | 2022-10-18 |
CN115203723B true CN115203723B (en) | 2023-06-09 |
Family
ID=83582055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210851762.7A Active CN115203723B (en) | 2022-07-20 | 2022-07-20 | Information encryption processing system for temple |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115203723B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
CN109657483A (en) * | 2018-11-27 | 2019-04-19 | 哈尔滨工业大学(深圳) | A kind of image encryption method and system |
CN111696020A (en) * | 2020-06-08 | 2020-09-22 | 重庆渝抗医药科技有限公司 | Working method for synthesizing encrypted information based on block chain medicine packaging image |
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005080100A (en) * | 2003-09-02 | 2005-03-24 | Matsushita Electric Ind Co Ltd | Movement monitoring system and movement monitor terminal |
US8948385B2 (en) * | 2007-05-31 | 2015-02-03 | Pfu Limited | Electronic document encrypting system, decrypting system, program and method |
TWI599907B (en) * | 2015-10-29 | 2017-09-21 | 財團法人工業技術研究院 | Data transmission apparatus, a data read apparatus, a data encoding and decoding apparatus, and a method thereof |
CN112040086B (en) * | 2019-06-03 | 2023-06-06 | 湖北微模式科技发展有限公司 | Image encryption and decryption methods and devices, equipment and readable storage medium |
CN110223389B (en) * | 2019-06-11 | 2021-05-04 | 中国科学院自动化研究所 | Scene modeling method, system and device fusing image and laser data |
CN112218161B (en) * | 2019-07-09 | 2023-03-31 | 中国移动通信有限公司研究院 | Video encryption method, device and equipment |
CN110417539B (en) * | 2019-08-02 | 2023-04-28 | 齐齐哈尔大学 | Color image encryption method for dynamic chaos and matrix convolution operation |
CN112437048A (en) * | 2020-11-06 | 2021-03-02 | 国民技术股份有限公司 | Image encryption method, first image encryption device, second image encryption device and system |
CN112541899B (en) * | 2020-12-15 | 2023-12-22 | 平安科技(深圳)有限公司 | Incomplete detection method and device of certificate, electronic equipment and computer storage medium |
CN114390316A (en) * | 2021-12-27 | 2022-04-22 | 深圳瑞德博智信息技术有限公司 | Processing method and device for image acquisition synchronous encryption privacy protection |
-
2022
- 2022-07-20 CN CN202210851762.7A patent/CN115203723B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
CN109657483A (en) * | 2018-11-27 | 2019-04-19 | 哈尔滨工业大学(深圳) | A kind of image encryption method and system |
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN111696020A (en) * | 2020-06-08 | 2020-09-22 | 重庆渝抗医药科技有限公司 | Working method for synthesizing encrypted information based on block chain medicine packaging image |
Also Published As
Publication number | Publication date |
---|---|
CN115203723A (en) | 2022-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111526115B (en) | Context-based management for secure augmented reality applications | |
US20030048908A1 (en) | System and method for protecting the content of digital cinema products | |
US20130279690A1 (en) | Preserving image privacy when manipulated by cloud services | |
CN109767375A (en) | The method and system of image watermark insertion and retrospect | |
CN109803142B (en) | Encrypted domain image reversible data hiding method based on neighborhood prediction | |
CN112040086B (en) | Image encryption and decryption methods and devices, equipment and readable storage medium | |
CN114036542A (en) | Data encryption and decryption method and computer storage medium | |
CN105678114A (en) | Image preview method and device | |
CN114390316A (en) | Processing method and device for image acquisition synchronous encryption privacy protection | |
CN105426724A (en) | Electronic image encryption method and device, electronic image decryption method and device, and equipment | |
CN112035847B (en) | Image encryption and decryption methods and devices, electronic equipment and storage medium | |
Kaur | A hybrid approach for video steganography using edge detection and identical match techniques | |
CN115203723B (en) | Information encryption processing system for temple | |
CN102184518A (en) | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection | |
CN113297613A (en) | Key access method, key processing device, key processing equipment and computer storage medium | |
CN111031322B (en) | BMP image encryption and decryption method and device of self-synchronizing chaotic stream cipher | |
CN115330580B (en) | Image content encryption algorithm based on data addition | |
CN113206926B (en) | Method for balancing privacy and usability of image based on three-pixel-point encryption | |
CN115001666A (en) | Image local encryption algorithm based on bit plane template XOR | |
CN105025203A (en) | Image encryption and decryption method combining physiological features and image capture device thereof | |
CN114374773A (en) | Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end | |
CN111131270B (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
Kumar et al. | Hiding the text messages of variable size using encryption and decryption algorithms in image steganography | |
Yadav et al. | A hybrid approach to metamorphic cryptography using KIMLA and DNA concept | |
CN115225771B (en) | Method and device for hiding reversible information of encrypted image and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |