CN115203723B - Information encryption processing system for temple - Google Patents

Information encryption processing system for temple Download PDF

Info

Publication number
CN115203723B
CN115203723B CN202210851762.7A CN202210851762A CN115203723B CN 115203723 B CN115203723 B CN 115203723B CN 202210851762 A CN202210851762 A CN 202210851762A CN 115203723 B CN115203723 B CN 115203723B
Authority
CN
China
Prior art keywords
image
encryption
processing
matrix
temple
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210851762.7A
Other languages
Chinese (zh)
Other versions
CN115203723A (en
Inventor
周海
倪旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Donghao Information Engineering Co ltd
Original Assignee
Zhejiang Donghao Information Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Donghao Information Engineering Co ltd filed Critical Zhejiang Donghao Information Engineering Co ltd
Priority to CN202210851762.7A priority Critical patent/CN115203723B/en
Publication of CN115203723A publication Critical patent/CN115203723A/en
Application granted granted Critical
Publication of CN115203723B publication Critical patent/CN115203723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses an information encryption processing system for a temple, which collects temple data through an acquisition module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. By performing encryption hiding on temple information at corners of temple images, leakage is avoided, and a safer and more compact information encryption scheme is realized.

Description

Information encryption processing system for temple
Technical Field
The invention belongs to the field of information encryption, and particularly relates to an information encryption processing system applicable to temples.
Background
Data encryption is a technology with long history, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and ciphertext is recovered into plaintext through a decryption algorithm and a decryption key. Its core is cryptography. Data encryption is still one of the most reliable ways for computer systems to protect information. The information is encrypted by utilizing a password technology, so that information concealment is realized, and the effect of protecting the safety of the information is achieved. The purpose of data transmission encryption techniques is to encrypt the data stream in transmission, typically both line encryption and end-to-end encryption. Line encryption is focused on lines regardless of source and destination, and is used to provide security protection for confidential information by using different encryption keys for each line. End-to-end encryption refers to the automatic encryption of information by the sender and the encapsulation of packets by TCP/IP, then traversing the internet as unreadable and unrecognizable data, which when arriving at the destination, will be automatically reassembled, decrypted, and made readable.
In the prior art, no scheme for encrypting privacy problems in the temple image exists, and particularly, some information used in the inside is added to the top corner part area of the temple image, so that privacy is easy to expose after outflow. Therefore, the present invention provides an information encryption processing system for temple, which aims to solve the above technical drawbacks.
Disclosure of Invention
The invention mainly aims to provide an information encryption processing system for temples, which aims to solve the technical problem that the equipment terminals are unfavorable for management and control.
In order to achieve the above object, an information encryption processing system for a temple is provided, the system comprising:
the acquisition module is used for acquiring temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the system further comprises: a first processing module for performing the following first processing operation on the region sub-image to obtain a first processing matrix
Figure DEST_PATH_IMAGE001
The method comprises the steps of carrying out a first treatment on the surface of the The first processing matrix
Figure 77819DEST_PATH_IMAGE001
The array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure 761610DEST_PATH_IMAGE002
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;
Figure DEST_PATH_IMAGE003
is normally distributed;
Figure 615297DEST_PATH_IMAGE004
scaling factors for the images;
Figure DEST_PATH_IMAGE005
is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure 758964DEST_PATH_IMAGE006
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure DEST_PATH_IMAGE007
representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrix
Figure 924367DEST_PATH_IMAGE001
Resetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix
Figure 162581DEST_PATH_IMAGE008
An encryption module for encrypting the second processing matrix K and the third processing matrix
Figure 995408DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure DEST_PATH_IMAGE009
Figure 746195DEST_PATH_IMAGE010
Preferably, for the second processing matrix K and the third processing matrix
Figure 930052DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure DEST_PATH_IMAGE011
Figure 440799DEST_PATH_IMAGE010
Comprising using isomorphic encryption functions
Figure 862553DEST_PATH_IMAGE012
Executing the second processing matrix K and the third processing matrix
Figure DEST_PATH_IMAGE013
Is encrypted by (a):
Figure 808075DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE015
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 620174DEST_PATH_IMAGE016
the first to represent the current number
Figure 528087DEST_PATH_IMAGE016
Bits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix
Figure DEST_PATH_IMAGE017
Figure 991298DEST_PATH_IMAGE018
And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
In addition, the method for encrypting information for temple is characterized in that the method comprises the following steps:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the method further comprises:
a first processing step of performing a first processing operation on the region sub-image to obtain a first processing matrix
Figure 693675DEST_PATH_IMAGE001
The method comprises the steps of carrying out a first treatment on the surface of the The first processing matrix
Figure 320965DEST_PATH_IMAGE001
The array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure 704673DEST_PATH_IMAGE002
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;
Figure DEST_PATH_IMAGE019
is normally distributed;
Figure 835440DEST_PATH_IMAGE004
scaling factors for the images;
Figure 131554DEST_PATH_IMAGE005
is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure 511720DEST_PATH_IMAGE020
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 167961DEST_PATH_IMAGE007
representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrix
Figure 887655DEST_PATH_IMAGE001
Resetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix
Figure 728572DEST_PATH_IMAGE008
An encryption step, for the second processing matrix K and the third processing matrix
Figure 720668DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 508495DEST_PATH_IMAGE017
Figure 879434DEST_PATH_IMAGE018
Preferably, for the second processing matrix K and the third processing matrix
Figure 32197DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 59059DEST_PATH_IMAGE011
Figure 447315DEST_PATH_IMAGE010
Comprising using isomorphic encryption functions
Figure 561508DEST_PATH_IMAGE012
Executing the second processing matrix K and the third processing matrix
Figure 947490DEST_PATH_IMAGE013
Is encrypted by (a):
Figure 523965DEST_PATH_IMAGE021
Figure DEST_PATH_IMAGE022
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 122437DEST_PATH_IMAGE016
the first to represent the current number
Figure 405651DEST_PATH_IMAGE016
Bits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix
Figure 149485DEST_PATH_IMAGE009
Figure 213255DEST_PATH_IMAGE010
And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
The information encryption processing system for the temple provided by the invention can be used for collecting temple data through the collecting module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. The invention realizes a safer and more compact information encryption scheme by carrying out encryption hiding on temple information at corners of temple images to avoid leakage.
Drawings
Fig. 1 is a block diagram of an information encryption processing system for a temple according to an embodiment of the present invention;
fig. 2 is a flowchart of an information encryption processing method for a temple according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings of the specification, it being understood that the preferred embodiments described herein are for illustration and explanation only, and not for limitation of the present invention, and embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
Example 1
Referring to fig. 1, fig. 1 is a block diagram of an information encryption processing system applicable to a temple, and in this embodiment, an information encryption processing system applicable to a temple is provided, the system includes:
the acquisition module 10 acquires temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
an encryption module 20, configured to perform an encryption operation on the region sub-image to obtain an encrypted region sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the system further comprises: a first processing module for performing the following first processing operation on the region sub-image to obtain a first processing matrix
Figure 818680DEST_PATH_IMAGE001
The method comprises the steps of carrying out a first treatment on the surface of the The first processing matrix
Figure 956401DEST_PATH_IMAGE001
The array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure 12081DEST_PATH_IMAGE002
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;
Figure 923668DEST_PATH_IMAGE019
is normally distributed;
Figure 395100DEST_PATH_IMAGE004
scaling factors for the images;
Figure 715223DEST_PATH_IMAGE005
is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure 551592DEST_PATH_IMAGE020
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 262059DEST_PATH_IMAGE007
representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrix
Figure 599500DEST_PATH_IMAGE001
Resetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix
Figure 898763DEST_PATH_IMAGE008
An encryption module for encrypting the second processing matrix K and the third processing matrix
Figure 968350DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 228430DEST_PATH_IMAGE017
Figure 979348DEST_PATH_IMAGE018
Preferably, for the second processing matrix K and the third processing matrix
Figure 8484DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 248973DEST_PATH_IMAGE011
Figure 625377DEST_PATH_IMAGE010
Comprising using isomorphic encryption functions
Figure 39041DEST_PATH_IMAGE012
Executing the second processing matrix K and the third processing matrix
Figure 63629DEST_PATH_IMAGE013
Is encrypted by (a):
Figure 740598DEST_PATH_IMAGE021
Figure 975270DEST_PATH_IMAGE022
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 51679DEST_PATH_IMAGE016
the first to represent the current number
Figure 258670DEST_PATH_IMAGE016
Bits; i, j represents the coordinate position of the current digit in the matrix;
specifically, in this embodiment, for example, the right vertex angle of the current temple image has some privacy information of the temple, in order to avoid that unrelated persons acquire some images of specific detail information areas, the application needs to encrypt the privacy information. The region sub-image size may be taken to be 28 x 28.
Preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix
Figure 903278DEST_PATH_IMAGE009
Figure 235033DEST_PATH_IMAGE010
And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
Specifically, in this embodiment, for the area sub-image size of 28×28, the first processing operation is performed to obtain the matrix I. We convert matrix I into matrix K and matrix
Figure 193762DEST_PATH_IMAGE008
. For a region sub-image size of 28×28, a matrix K of 24×24 may be further defined;
Figure 51996DEST_PATH_IMAGE020
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 759184DEST_PATH_IMAGE007
representing a convolution operation; k is a constant matrix which can be 5*5, and each number in the matrix can take a value of 0.04; k is a second processing matrix; for the second processing matrix K and the third processing matrix
Figure 702869DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 199709DEST_PATH_IMAGE017
Figure 584554DEST_PATH_IMAGE023
Comprising using isomorphic encryption functions
Figure 774227DEST_PATH_IMAGE024
Executing the second processing matrix K and the third processing matrix
Figure 329842DEST_PATH_IMAGE013
Is encrypted by (a):
Figure DEST_PATH_IMAGE025
where 0.ltoreq.i, j<28; for the following
Figure 427111DEST_PATH_IMAGE015
The method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 869725DEST_PATH_IMAGE016
the first to represent the current number
Figure 292616DEST_PATH_IMAGE016
Bits; i, j represents the coordinate position of the current digit in the matrix, 0.ltoreq.i, j<24。
Figure 414156DEST_PATH_IMAGE016
For example, it may be set to be larger than 0 and smaller than 10. For encryption matrices
Figure 672705DEST_PATH_IMAGE017
Figure 625618DEST_PATH_IMAGE018
The values of the corresponding coordinates may be superimposed by corresponding products, e.g., the same (1, 1) coordinates may be multiplied to generate the ciphertext matrix.
In addition, as shown in fig. 2, the method further includes:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image.
Preferably, the method further comprises:
a first processing step of performing a first processing operation on the region sub-image to obtain a first processing matrix
Figure 829197DEST_PATH_IMAGE001
The method comprises the steps of carrying out a first treatment on the surface of the The first processing matrix
Figure 172454DEST_PATH_IMAGE001
The array size is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure 142684DEST_PATH_IMAGE002
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, m represents the gray scale of the pixel point of the regional sub-image;
Figure 809158DEST_PATH_IMAGE019
is normally distributed;
Figure 511534DEST_PATH_IMAGE004
scaling factors for the images;
Figure 404404DEST_PATH_IMAGE005
is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure 256953DEST_PATH_IMAGE020
the method comprises the steps of carrying out a first treatment on the surface of the Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 122141DEST_PATH_IMAGE007
representing a convolution operation; k is a constant matrix; k is a second processing matrix;
and according to the first processing matrix
Figure 792157DEST_PATH_IMAGE001
Resetting the positive and negative of each element of the plurality of elements to each element value, wherein the negative number is set to 0; the positive element is set to 1 to obtain a third processing matrix
Figure 798421DEST_PATH_IMAGE008
An encryption step, for the second processing matrix K and the third processing matrix
Figure 579296DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 298990DEST_PATH_IMAGE011
Figure 280852DEST_PATH_IMAGE010
Preferably, for the second processing matrix K and the third processing matrix
Figure 882735DEST_PATH_IMAGE008
Respectively executing encryption operations and outputting an encryption matrix
Figure 670563DEST_PATH_IMAGE011
Figure 166135DEST_PATH_IMAGE010
Comprising using isomorphic encryption functions
Figure 443532DEST_PATH_IMAGE012
Executing the second processing matrix K and the third processing matrix
Figure 142498DEST_PATH_IMAGE013
Is encrypted by (a):
Figure 734016DEST_PATH_IMAGE021
Figure 225041DEST_PATH_IMAGE022
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure 48507DEST_PATH_IMAGE016
the first to represent the current number
Figure 828245DEST_PATH_IMAGE016
Bits; i, j represents the coordinate position of the current digit in the matrix;
preferably, an encryption operation is performed on the region sub-image to obtain an encrypted region sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
encrypting the matrix
Figure 20191DEST_PATH_IMAGE009
Figure 975509DEST_PATH_IMAGE010
And superposing to generate a ciphertext matrix, and replacing the ciphertext matrix with the encrypted region sub-image in the temple image data to generate an encrypted image.
In the scheme of the embodiment of the invention, the provided information encryption processing system for the temple collects temple data through the collection module; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels; the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superposing the encrypted region sub-image on the temple image data to generate an encrypted image. The invention realizes a safer and more compact information encryption scheme by carrying out encryption hiding on temple information at corners of temple images to avoid leakage.
While the basic concepts have been described above, it will be apparent to those skilled in the art that the foregoing detailed disclosure is by way of example only and is not intended to be limiting. Although not explicitly described herein, various modifications, improvements, and offsets may occur to those skilled in the art to which this disclosure pertains. Such modifications, improvements, and offset processing are suggested in this specification and, therefore, remain within the spirit and scope of the exemplary embodiments of this specification.
Furthermore, those skilled in the art will appreciate that the various aspects of the specification can be illustrated and described in terms of several patentable categories or circumstances, including any novel and useful procedures, machines, products, or combinations of materials, or any novel and useful modifications thereof. Accordingly, aspects of the present description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as a "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the specification may take the form of a computer product, comprising computer-readable program code, embodied in one or more computer-readable media.
It is noted that, if the description, definition, and/or use of a term in an attached material in this specification does not conform to or conflict with what is described in this specification, the description, definition, and/or use of the term in this specification controls.
Finally, it should be understood that the embodiments described in this specification are merely illustrative of the principles of the embodiments of this specification. Other variations are possible within the scope of this description. Thus, by way of example, and not limitation, alternative configurations of embodiments of the present specification may be considered as consistent with the teachings of the present specification. Accordingly, the embodiments of the present specification are not limited to only the embodiments explicitly described and depicted in the present specification.

Claims (2)

1. An information encryption processing system for temple, the system comprising:
the acquisition module is used for acquiring temple data; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
the encryption module is used for executing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; the sub-image of the encryption area is overlapped to the temple image data to generate an encryption image;
the system further comprises:
the first processing module is used for executing the following first processing operation on the regional sub-image to acquire a first processing matrix I; the size of the first processing matrix I array is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure FDA0004160506800000011
wherein, m represents the gray scale of the pixel point of the regional sub-image; />
Figure FDA0004160506800000012
Is normally distributed; gamma is the image scaling factor; beta is an image translation factor;
the second processing module performs the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure FDA0004160506800000013
wherein (1)>
Figure FDA0004160506800000014
Representing a convolution operation; k is a constant matrix; k is a second processing matrix;
resetting each element value according to the positive and negative of each element in the first processing matrix I, wherein the negative number is set to 0; the positive number element is set to 1 to acquire a third processing matrix Sign (I);
an encryption module for performing encryption operation on the second processing matrix K and the third processing matrix Sign (I) respectively, and outputting encryption matrices [ K ], [ Sign (I) ];
and respectively executing encryption operation on the second processing matrix K and the third processing matrix Sign (I), and outputting encryption matrices [ K ], [ Sign (I) ], wherein the encryption of the second processing matrix K and the third processing matrix [ Sign (I) ] is executed by adopting an isomorphic encryption function Enc ():
[Sign(I)] i,j =Enc(Sign(I) i,j );
Figure FDA0004160506800000015
where l represents the first bit of the current number; i, j represents the coordinate position of the current digit in the matrix;
performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
and superposing the encryption matrixes [ K ] and [ Sign (I) ] to generate a ciphertext matrix, and replacing the regional sub-images in the temple image data with the ciphertext matrix to generate an encrypted image.
2. An information encryption processing method for temple, the method comprising:
s1, temple data are collected; the temple data comprises temple image data, and the temple image data is subjected to predetermined encryption area selection and area sub-images are generated; the preset encryption area is any one of four vertex angle areas of the image; the size of the regional sub-image is N x N pixels;
s2, performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; the sub-image of the encryption area is overlapped to the temple image data to generate an encryption image;
the method further comprises the steps of:
a first processing step of executing the following first processing operation on the region sub-image to acquire a first processing matrix I; the size of the first processing matrix I array is consistent with the size of the regional sub-image pixel array;
the first processing operation includes:
Figure FDA0004160506800000021
wherein, m represents the gray scale of the pixel point of the regional sub-image; />
Figure FDA0004160506800000022
Is normally distributed; gamma is the image scaling factor; beta is an image translation factor;
a second processing step of performing the following conversion operation on the first processing matrix to obtain a second processing matrix;
the second processing operation includes:
Figure FDA0004160506800000023
wherein (1)>
Figure FDA0004160506800000024
Representing a convolution operation; k is a constant matrix; k is a second processing matrix;
resetting each element value according to the positive and negative of each element in the first processing matrix I, wherein the negative number is set to 0; the positive number element is set to 1 to acquire a third processing matrix Sign (I);
an encryption step of performing encryption operation on the second processing matrix K and the third processing matrix Sign (I) respectively, and outputting encryption matrices [ K ], [ Sign (I) ];
and respectively executing encryption operation on the second processing matrix K and the third processing matrix Sign (I), and outputting encryption matrices [ K ], [ Sign (I) ], wherein the encryption of the second processing matrix K and the third processing matrix Sign (I) is executed by adopting an isomorphic encryption function Enc ():
[Sign(I)] i,j =Enc(Sign(I) i,j );
Figure FDA0004160506800000031
where l represents the first bit of the current number; i, j represents the coordinate position of the current digit in the matrix;
performing encryption operation on the regional sub-image to obtain an encrypted regional sub-image; and superimpose the encrypted region sub-image on temple image data to generate an encrypted image, comprising:
and superposing the encryption matrixes [ K ] and [ Sign (I) ] to generate a ciphertext matrix, and replacing the regional sub-images in the temple image data with the ciphertext matrix to generate an encrypted image.
CN202210851762.7A 2022-07-20 2022-07-20 Information encryption processing system for temple Active CN115203723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210851762.7A CN115203723B (en) 2022-07-20 2022-07-20 Information encryption processing system for temple

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210851762.7A CN115203723B (en) 2022-07-20 2022-07-20 Information encryption processing system for temple

Publications (2)

Publication Number Publication Date
CN115203723A CN115203723A (en) 2022-10-18
CN115203723B true CN115203723B (en) 2023-06-09

Family

ID=83582055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210851762.7A Active CN115203723B (en) 2022-07-20 2022-07-20 Information encryption processing system for temple

Country Status (1)

Country Link
CN (1) CN115203723B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN109657483A (en) * 2018-11-27 2019-04-19 哈尔滨工业大学(深圳) A kind of image encryption method and system
CN111696020A (en) * 2020-06-08 2020-09-22 重庆渝抗医药科技有限公司 Working method for synthesizing encrypted information based on block chain medicine packaging image
CN111800251A (en) * 2020-05-21 2020-10-20 北京邮电大学 Image compressed sensing encryption and decryption method, device and system based on chaotic source

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005080100A (en) * 2003-09-02 2005-03-24 Matsushita Electric Ind Co Ltd Movement monitoring system and movement monitor terminal
US8948385B2 (en) * 2007-05-31 2015-02-03 Pfu Limited Electronic document encrypting system, decrypting system, program and method
TWI599907B (en) * 2015-10-29 2017-09-21 財團法人工業技術研究院 Data transmission apparatus, a data read apparatus, a data encoding and decoding apparatus, and a method thereof
CN112040086B (en) * 2019-06-03 2023-06-06 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, equipment and readable storage medium
CN110223389B (en) * 2019-06-11 2021-05-04 中国科学院自动化研究所 Scene modeling method, system and device fusing image and laser data
CN112218161B (en) * 2019-07-09 2023-03-31 中国移动通信有限公司研究院 Video encryption method, device and equipment
CN110417539B (en) * 2019-08-02 2023-04-28 齐齐哈尔大学 Color image encryption method for dynamic chaos and matrix convolution operation
CN112437048A (en) * 2020-11-06 2021-03-02 国民技术股份有限公司 Image encryption method, first image encryption device, second image encryption device and system
CN112541899B (en) * 2020-12-15 2023-12-22 平安科技(深圳)有限公司 Incomplete detection method and device of certificate, electronic equipment and computer storage medium
CN114390316A (en) * 2021-12-27 2022-04-22 深圳瑞德博智信息技术有限公司 Processing method and device for image acquisition synchronous encryption privacy protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN109657483A (en) * 2018-11-27 2019-04-19 哈尔滨工业大学(深圳) A kind of image encryption method and system
CN111800251A (en) * 2020-05-21 2020-10-20 北京邮电大学 Image compressed sensing encryption and decryption method, device and system based on chaotic source
CN111696020A (en) * 2020-06-08 2020-09-22 重庆渝抗医药科技有限公司 Working method for synthesizing encrypted information based on block chain medicine packaging image

Also Published As

Publication number Publication date
CN115203723A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
CN111526115B (en) Context-based management for secure augmented reality applications
US20030048908A1 (en) System and method for protecting the content of digital cinema products
US20130279690A1 (en) Preserving image privacy when manipulated by cloud services
CN109767375A (en) The method and system of image watermark insertion and retrospect
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
CN112040086B (en) Image encryption and decryption methods and devices, equipment and readable storage medium
CN114036542A (en) Data encryption and decryption method and computer storage medium
CN105678114A (en) Image preview method and device
CN114390316A (en) Processing method and device for image acquisition synchronous encryption privacy protection
CN105426724A (en) Electronic image encryption method and device, electronic image decryption method and device, and equipment
CN112035847B (en) Image encryption and decryption methods and devices, electronic equipment and storage medium
Kaur A hybrid approach for video steganography using edge detection and identical match techniques
CN115203723B (en) Information encryption processing system for temple
CN102184518A (en) DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN113297613A (en) Key access method, key processing device, key processing equipment and computer storage medium
CN111031322B (en) BMP image encryption and decryption method and device of self-synchronizing chaotic stream cipher
CN115330580B (en) Image content encryption algorithm based on data addition
CN113206926B (en) Method for balancing privacy and usability of image based on three-pixel-point encryption
CN115001666A (en) Image local encryption algorithm based on bit plane template XOR
CN105025203A (en) Image encryption and decryption method combining physiological features and image capture device thereof
CN114374773A (en) Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
Kumar et al. Hiding the text messages of variable size using encryption and decryption algorithms in image steganography
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
CN115225771B (en) Method and device for hiding reversible information of encrypted image and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant