CN115834791A - Image encryption and decryption transmission method using matrix key and electronic equipment - Google Patents

Image encryption and decryption transmission method using matrix key and electronic equipment Download PDF

Info

Publication number
CN115834791A
CN115834791A CN202310053159.9A CN202310053159A CN115834791A CN 115834791 A CN115834791 A CN 115834791A CN 202310053159 A CN202310053159 A CN 202310053159A CN 115834791 A CN115834791 A CN 115834791A
Authority
CN
China
Prior art keywords
image
matrix
pixel
user
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310053159.9A
Other languages
Chinese (zh)
Other versions
CN115834791B (en
Inventor
刘昊天
刘冲
赵峰
徐莉萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XCMG Hanyun Technologies Co Ltd
Original Assignee
XCMG Hanyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XCMG Hanyun Technologies Co Ltd filed Critical XCMG Hanyun Technologies Co Ltd
Priority to CN202310053159.9A priority Critical patent/CN115834791B/en
Publication of CN115834791A publication Critical patent/CN115834791A/en
Application granted granted Critical
Publication of CN115834791B publication Critical patent/CN115834791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)

Abstract

The application provides an image encryption and decryption transmission method and electronic equipment by using a matrix key, wherein the encryption transmission method comprises the following steps: acquiring a transmission request aiming at a first image sent by a user terminal, wherein the transmission request comprises a user identifier; when the first image belongs to sensitive content relative to the user identification, generating a 3*3-order reversible matrix key corresponding to the user identification; forming a 1*3-order matrix by the RGB value of each pixel of the first image, and performing operation with the matrix key to form a second image; acquiring a third image matched with the first image; hiding the pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image; and transmitting the fourth image to the user terminal for storage. The method and the device can achieve good information secret transmission effect under the condition that excessive computing resources of the electronic equipment are not occupied.

Description

Image encryption and decryption transmission method using matrix key and electronic equipment
Technical Field
The present application relates to the field of information security technologies, and in particular, to an image encryption transmission method using a matrix key, an image decryption transmission method using a matrix key, a storage medium, and an electronic device.
Background
With the rapid development of internet technology and communication technology, a large amount of image data is transmitted and stored in networks and communications, however, when the internet provides convenience for information sharing, a large amount of data is leaked, tampered, stolen, and the like. Ensuring the security of information has become an important direction for internet technology research. Image data is an important carrier of human information, and the protection of image data and the research of image encryption technology become an important and urgent research topic of information security.
For image encryption, firstly, the security of an encryption mode is considered, and secondly, the complexity and the operation amount of an encryption algorithm are also considered. However, some existing image encryption methods simply consider the security of the encryption method, and do not consider the complexity and the amount of operation of the encryption algorithm, so that the image encryption and decryption need to consume a large amount of computing resources.
Disclosure of Invention
In view of the above, it is desirable to provide an image encryption transmission method using a matrix key, an image decryption transmission method using a matrix key, a storage medium, and an electronic device, so as to minimize the consumption of system computing resources while ensuring the security of information transmission.
In a first aspect of the present application, there is provided an image encryption transmission method using a matrix key, the method including:
acquiring a transmission request aiming at a first image sent by a user terminal, wherein the transmission request comprises a user identifier;
when the first image belongs to sensitive content relative to the user identification, generating a 3*3-order reversible matrix key corresponding to the user identification;
forming a 1*3-order matrix by the RGB value of each pixel of the first image, and performing operation with the matrix key to form a second image;
acquiring a third image matched with the first image;
hiding the pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image;
and transmitting the fourth image to the user terminal for storage.
In one embodiment, the method further comprises:
detecting whether the authority required for transmitting the first image exceeds the authority corresponding to the user identification; and/or
Detecting whether the current operating environment of the user terminal belongs to a non-safe environment;
and when any one detection result is yes, judging that the first image belongs to sensitive content relative to the user identification.
In one embodiment, the method further comprises:
when the number of times of inputting errors of the login account matched with the user identification in a preset time period exceeds a preset number threshold value is detected, and/or
When detecting that the user terminal does not belong to a common device corresponding to the user identity,
and judging that the current operation environment of the user terminal belongs to an unsafe environment.
In one embodiment, the sum of each row of elements in the matrix key is a fixed value, and the forming of the RGB values of each pixel of the first image into a 1*3 order matrix and the performing of the operation with the matrix key to form the second image includes:
forming 1*3-order matrixes from the RGB values of each pixel of the first image, and multiplying the matrixes by the matrix keys to obtain new 1*3-order matrixes;
and dividing the three elements of the new 1*3 order matrix by the fixed value respectively and rounding to obtain a result which is used as the RGB value of the pixel corresponding to the second image.
In one embodiment, the generating a 3*3-order invertible matrix key corresponding to the user identifier includes:
and receiving the fixed value sent by the user terminal, and generating the matrix key according to the fixed value, wherein the fixed value is a numerical value input by a user on the user terminal.
In one embodiment, the acquiring a third image matching the first image includes:
and acquiring an image with the highest similarity with the first image from a preset image library as the third image, wherein the size of the third image is larger than that of the first image.
In a second aspect of the present application, there is provided an image decryption transmission method using a matrix key, the method including:
acquiring an image display request sent by a user terminal, wherein the request comprises a user identifier and an image identifier of an image to be displayed, and the image to be displayed is a fourth image stored according to the method in any embodiment of the application;
determining an inverse matrix of a matrix key for decrypting the image to be displayed and a third image based on the image identifier;
separating a second image from the fourth image based on the third image;
decrypting the second image according to the inverse matrix to obtain a first image;
and detecting whether the user identification has the authority of accessing the first image, and if so, displaying the first image on the user terminal.
In one embodiment, when the user identifier does not have the right to access the first image, the third image is displayed on the user terminal.
In a third aspect of the present application, an electronic device is provided, including:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the methods of any embodiment of the present application.
In a fourth aspect of the present application, a computer-readable storage medium is provided, having executable instructions stored thereon, which when executed by a processor, cause the processor to perform the method of any of the embodiments of the present application.
According to the image encryption transmission method by using the matrix key, the image decryption transmission method by using the matrix key, the storage medium and the electronic equipment, for the first image to be transmitted, the matrix key is firstly used for calculating the first image to form the second image, and then the pixel information in the second image is hidden into the third image, so that through two times of simple processing, excessive computing resources are not needed to be spent, the safety of the first image can be well guaranteed, and a good information confidentiality effect can be achieved.
Drawings
FIG. 1 is a diagram illustrating an application scenario of an image encryption transmission method using a matrix key according to an embodiment;
FIG. 2 is a flow diagram illustrating a method for encrypted transmission of images using a matrix key in one embodiment;
FIG. 3 is a flow chart illustrating hiding pixel information in a second image into a third image according to an embodiment;
FIG. 4 is a flow chart illustrating an image encryption transmission method using a matrix key according to another embodiment;
FIG. 5 is a flowchart illustrating an image decryption transmission method using a matrix key according to an embodiment;
FIG. 6 is a diagram of the internal structure of an electronic device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Such as the terms "first," "second," etc., as used herein, may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first image may be referred to as a second image, and similarly, a second image may be referred to as a first image, without departing from the scope of the present application. The first image and the second image are both images, but they are not the same image.
Further, as used herein, the terms "comprises," "comprising," and the like, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
As shown in fig. 1, the image encryption transmission method and the image decryption transmission method in the present application can be applied to the application scenario shown in fig. 1. Wherein the user may browse the relevant information provided by the backend server 120 on his user terminal 110. For example, the corresponding platform account can be logged in, and related data browsing and operation can be performed. Some data provided on the server 120 may have different sensitivity levels or require certain authority to access, and in some cases, a user may bypass related authority check through some system bugs, so that the corresponding information may be viewed on the user terminal 110, and the information may be stored locally in an image manner by capturing a screen or clicking a corresponding data storage operation. After detecting the storage request triggered by the data storage operation, the server 120 may obtain the corresponding data to be stored, preliminarily convert the data to the first image, encrypt the first image, form a fourth image, and transmit the fourth image to the user terminal 110 for storage.
Meanwhile, when the user needs to open the encrypted fourth image on the terminal of the user, the fourth image may be sent to the backend server 120, and the backend server 120 may restore the corresponding first image based on the decryption operation corresponding to the encryption operation, and provide the first image for the user terminal to display when detecting that the user has the right to access the first image. Through the encryption and decryption operations, the image data is prevented from being easily leaked.
In one embodiment, as shown in fig. 2, there is provided an image encryption transmission method using a matrix key, the method including:
step 202, acquiring a transmission request for a first image sent by a user terminal.
In this embodiment, the transmission request includes a user identifier, and the user identifier is used to uniquely identify the identity of the user. The transmission request may be a request to transmit the image on the server locally to the user terminal. For example, the request may be a request triggered by a screen capture operation on a screen, a request triggered by a save operation for downloading an image for information displayed on a terminal, or a save request triggered by another operation mode.
After the electronic device obtains the transmission request, a first image corresponding to the request can be obtained, wherein the first image is an original image to be encrypted.
Step 204, generating 3*3 order invertible matrix key corresponding to the user identifier.
In this embodiment, the electronic device presets a generation rule of the matrix key, and may generate a corresponding matrix key based on the generation rule. The matrix key may be a reversible matrix of order 3*3, the matrix key being a matrix used to encrypt the first image. The generated matrix key can be related to the user identification, so that the matrix keys correspondingly used by different users are different, and the users can have individual encryption modes.
In one embodiment, step 204 is performed when the first image belongs to sensitive content relative to the user identification.
Specifically, it may be detected whether the right required for transmitting the first image exceeds the right corresponding to the user identifier, and/or whether the current operating environment of the user terminal belongs to an insecure environment. If any of the detection results is yes, for example, if the environment is identified as a non-secure environment and/or the data to be saved has a certain sensitivity, it is determined that the data to be saved belongs to a sensitive content with respect to the user identifier, and step 204 is executed.
The content in the first image may be content with certain sensitivity, and it needs to have certain authority to perform operations such as displaying, saving, transmitting, etc., so the electronic device can obtain the authority of the user based on the user identifier, and compare the authority required for saving the first image with the authority of the user, if it is detected that the authority is not satisfied, step 204 is executed.
In this embodiment, when the authority of the user is insufficient, it indicates that the user stores the first image through an irregular way, which may bypass the detection of the system, and at this time, the user is blocked from storing the first image, so that step 204 is continuously performed.
In one embodiment, when the number of input errors of the login account matched with the user identifier in a preset time period is detected to exceed a preset number threshold, and/or when the user terminal is not detected to belong to the common equipment corresponding to the user identifier, the current operating environment of the user terminal is determined to belong to the non-safe environment.
Whether the login account and the password of the user are abnormal within a preset time period or not can be detected, and/or whether the equipment for logging in the user information belongs to the non-use equipment or not can be detected, if one of the items is yes or both are yes, the current operating environment of the user terminal is judged to belong to the non-safe environment, further, the data to be stored can be judged to belong to sensitive content relative to the user identifier, and step 204 is executed.
The abnormality may be whether a password input error exceeding a preset number of times is continuously generated within a preset time period. The preset time period can be any suitable time period within the last day, within a week or within 3 hours, and the preset times can be any suitable times such as 3 times, 5 times, 8 times and the like.
Step 206, forming 1*3 order matrix from the RGB value of each pixel of the first image, and performing operation with the matrix key to form the second image.
Wherein each pixel in the first image comprises RGB values, i.e., R, G, and B values, which the electronic device can place in a 1*3 order matrix, three elements of which represent the R, G, and B values of the pixel at the corresponding location, respectively.
The matrix and matrix key operations may be any suitable matrix operations to form a new 1*3 order matrix, and the values of the elements in the formed new matrix may be the RGB values of the corresponding pixels in the second image. That is, after each pixel in the first image is subjected to the above operation, the corresponding pixel in the second image can be obtained.
The operation mode of the matrix and the matrix key can be any suitable operation such as multiplication or division of two matrices.
The size of the formed second image is the same as that of the first image, and the pixels in the second image are the encrypted values of the pixels at the corresponding positions in the first image.
Step 208, a third image matching the first image is obtained.
In this embodiment, the third image is an image used for fusing with the second image, an image library of the third image is preset in the electronic device, and a suitable image may be selected from the image library as the third image matched with the first image.
Specifically, the third image matched with the first image may be an image having a certain similarity with the first image, so that when the second image is fused, a user who does not know the first image may consider the corresponding third image as a required image, thereby improving the concealment of information in the first image.
The electronic device may calculate similarity between the first image and each image in the image library, and select an image with the highest similarity as the third image. The images in the image library may be public images.
In one embodiment, an image with the highest similarity to the first image is obtained from a preset image library as a third image, and the size of the third image is larger than that of the first image.
Wherein the size of the image represents the size of the number of pixels in the image, and the memory of the first image and the size of the third image are not the same. Wherein the number of pixels of the selected third image is greater than the number of pixels of the first image. For example, the size of the first image is m0 × n0, and the size of the third image is m1 × n1, where m1 × n1> m0 × n0. For example, m 1. Gtoreq.2m0 and n 1. Gtoreq.2n0 may be set.
The second image has the same size as the first image, and the fourth image has the same size as the third image. In the finally formed fourth image, the pixel information of the first image is not fused in the pixel points of each position, so that the concealment of the first image is further enhanced.
The image library of the third image stores a plurality of third images for image fusion with the required image, and the images have different sizes. Optionally, there are also a plurality of numbers of each same size image. The electronic device may determine the size of the third image that needs to be selected based on the size of the first image. Specifically, the size of the third image may be set to be more than 2 times the size of the first image, and the electronic device may determine the size of the third image that needs to be selected.
After the size of the third image is determined, the image with the highest similarity to the first image may be selected from the image library as the image for fusion with the second image.
Wherein, the electronic device can calculate the similarity between the image with proper size and the first image, thereby selecting the image with the highest phase velocity as the third image. And determining a corresponding third image required to be selected according to the image saving operation of the user, and further taking the image as the third image.
For example, if the first image is a user information table under a certain functional unit of the system, the electronic device may select an image having a size close to the user information table under the functional unit and larger than that of the first image from the image library, and use the image as the third image. The selected third image may be an image specially set for fusing with the first image under the functional unit.
In the method, the third image with high similarity to the first image is further selected to be fused with the second image, so that the finally generated fourth image is relatively close to the first image, and therefore, a person who does not know that the fourth image is a processed image may directly use the fourth image as the first image, and the safety of data in the first image can be further improved.
Step 210, hiding the pixel information in the second image into the third image, and forming a fourth image and an image identifier which can be used as a key for decrypting the fourth image.
In this embodiment, the pixel a in the second image and the corresponding pixel B in the third image may be superimposed to form the corresponding pixel in the fourth image. The superposition may be a weighted sum, and the pixel a and the pixel B may be pixels at the same position in the image or pixels at different positions.
Specifically, pixels in the second image may be determined to be fused with pixels in the third image, based on the determined pixels. For example, the determined pixel is the pixel at the same position, the two pixels are subjected to weighted summation, and the summed pixel value is used as the pixel value at the position corresponding to the fourth image.
The weights of the two images can be set to any suitable normalized value according to the situation, for example, the weights can be both set to 0.5, or the weight of the second image can be set to 0.3, and the weight of the third image can be set to 0.7. Further, the weight of the third image is greater than the weight of the second image, so that the information of the second image can be further hidden.
In one embodiment, independent weights may be set for each channel in the RGB values, such as weights c1 and d1 in the second and third images for the R value, weights c2 and d2 in the second and third images for the G value, and weights c3 and d3 in the second and third images for the B value, where c1> d1, c2> d2, and c3> d3.
When the fourth image is generated, a key for correspondingly decrypting the fourth image may be formed based on the above-mentioned image operation process, and the decryption key is used as the image identifier of the fourth image. I.e. also simultaneously generating an image identification which can be used as a key for decrypting the fourth image. In this way, after the electronic device acquires the fourth image, the first image can be directly restored based on the image identifier of the electronic device.
And step 212, transmitting the fourth image to the user terminal for storage.
In this embodiment, the fourth image is transmitted to the user terminal for saving. The user terminal may be the identified terminal that initiates the image saving operation.
After the electronic device completes processing the first image according to the steps, the formed fourth image can be transmitted from the platform to the user terminal so as to be stored on the user terminal.
According to the image encryption transmission method using the matrix key, for the first image to be transmitted, firstly, the matrix key is used for calculating the first image to form the second image, and then, the pixel information in the second image is hidden in the third image, so that through two times of simple processing, excessive computing resources are not needed to be spent, the security of the first image can be well ensured, and a good information confidentiality effect can be achieved.
In one embodiment, the sum of each row of elements in the matrix key is a fixed value, and step 206 includes: forming 1*3-order matrixes from the RGB values of each pixel of the first image, and multiplying the matrixes by a matrix key to obtain new 1*3-order matrixes; and dividing the three elements of the 1*3 order matrix by a fixed value respectively, and rounding to obtain a result which is used as the RGB value of the corresponding pixel of the second image.
The sum of each row of elements of the matrix key is a fixed value, which can be a preset fixed value, or an arbitrary fixed value set by a user in a self-defined way.
In one embodiment, a fixed value sent by a user terminal is received, and a matrix key is generated according to the fixed value, wherein the fixed value is a numerical value input on the user terminal by a user.
The user terminal can provide an interface for inputting the fixed value, acquire the fixed value output by the user, and send the fixed value to the electronic equipment based onThe fixed value generates a corresponding matrix key. For example, the fixed value K can be 6, and the key matrix A generated based on the fixed value can be
Figure SMS_1
The electronic device may traverse to read the pixels in the first image, obtain the RGB value of each single pixel, for example, the RGB value of one pixel is put into 1*3 order matrix B as B = [253 86 104], multiply matrix B with matrix a, and obtain new 1*3 order matrix C. C = B × a = [1035 276 1347], and the matrix C is divided by the fixed value K, rounded by rounding, and the obtained R value, G value, and B value are [ R G B ] = [173 225], respectively, which is the RGB value of the corresponding pixel in the second image.
Processing is performed for each pixel value in the first image, resulting in the second image.
In one embodiment, hiding the pixel information in the second image into the third image comprises: hiding the pixel information at the position (x, y) in the second image into the pixel information at the position (x ', y') in the third image. Where (x, y) and (x ', y') are not necessarily equal, (x, y) denotes a position in the x-th row and y-th column of the image.
In this embodiment, the electronic device may calculate a mapping relationship between each of the positions (x, y) and (x ', y'), and based on the corresponding mapping relationship, may determine which pixel in the third image the pixel in each of the second images needs to be fused with.
For example, if the corresponding position of (1,1) is calculated to be (2,3) based on the mapping relationship, the pixel at the position of (1,1) in the second image and the pixel at the position of (2,3) in the third image may be fused.
In one embodiment, the corresponding mapping relationship may be established separately for the pixel value of each channel, and the pixel value of different channels at the same position in the second image is different from the position of the pixel of the corresponding channel in the third image.
For example, for a pixel at a position (x, y) in the second image, the R value corresponds to (x 1, y 1), the G value corresponds to (x 2, y 2), and the B value corresponds to (x 3, y 3). Namely, the R value at (x, y) in the second image is fused with the R value at (x 1, y 1) in the third image, the G value at (x, y) in the second image is fused with the G value at (x 2, y 2) in the third image, and the B value at (x, y) in the second image is fused with the B value at (x 3, y 3) in the third image. Here, x1, x2 and x3 are not necessarily the same, and y1, y2 and y3 are also not necessarily the same.
In this embodiment, the safety of the information in the first image can be further improved by further disturbing the fused position of the pixels in the second image and the third image.
In one embodiment, as shown in fig. 3, hiding the pixel information in the second image into the third image comprises:
step 302, a corresponding pixel fusion matrix D is obtained.
In this embodiment, the electronic device is preset with a corresponding pixel fusion matrix D, where the pixel fusion matrix is used to calculate which position of the pixel in the third image the pixel at each position in the corresponding channel is fused with, that is, calculate the position information of the pixel in the corresponding third image. The positions of the pixels of the channels at the same position and the pixels to be fused in the third image may be the same or different. When the positions are the same, the pixel fusion matrix can be a two-dimensional matrix, and when the positions are different, the pixel fusion matrix D is a three-dimensional matrix comprehensively set for all channels of the image, wherein one dimension is used for representing the corresponding channel, and the other two dimensions are used for representing the horizontal and vertical coordinates of the corresponding position. The channels of the image include an R channel, a G channel, and a B channel for embodying the RGB values described above.
In step 304, a pixel fusion parameter e corresponding to the user is calculated.
The electronic device further presets a corresponding pixel fusion parameter e, which may be determined according to information of the user, for example, the fusion parameter e may be calculated according to a certain rule according to a user identifier of the user. The parameter e may be a corresponding numerical value or a corresponding matrix. It is understood that the pixel fusion parameters e corresponding to different users are not necessarily the same.
And step 306, calculating the positions of the pixel at each position of each channel in the second image and the pixel to be fused of the corresponding channel in the third image based on the pixel fusion parameter e and the pixel fusion matrix D.
And 308, fusing the pixel at each position of each channel in the second image with the pixel at the position of the pixel to be fused of the channel corresponding to the third image.
Specifically, the electronic device may perform corresponding operation on the parameter e and the matrix D according to a preset mathematical operation rule, and the calculated result may be used as a position corresponding to the pixel to be fused, and the position is used to fuse the corresponding pixel with the pixel in the second image.
In this embodiment, a simple fusion matrix D is set, and then the corresponding fusion parameter e is calculated according to the information of the user, so that the position of the pixel, which is to be fused and corresponds to the pixel in the second image, in the third image can be calculated based on the fusion matrix D and the fusion parameter e. And the fusion parameter e is calculated according to the information of the user, so that the positions of fusing the pixels in the second image and the pixels in the first image are different when the same first image is stored by different users, and the safety of the image transmission process is further improved.
In one embodiment, the position information (x, y) of the pixel in the second image may be multiplied by the fusion parameter e and the pixel fusion matrix D, and the obtained result may be subjected to a remainder operation with a suitable value, so as to obtain the position information of the corresponding pixel and the pixel to be fused in the third image.
For example, the fusion matrix D is a three-dimensional matrix, which may be a three-dimensional matrix of 3 × 2, where 3 is the number of channels of three channels of RGB. The value under the first dimension calculated based on the fusion matrix is the position information of the pixel of the first image under the corresponding channel and the pixel to be fused in the third image.
If the fusion matrix D is a two-dimensional matrix and each channel has a two-dimensional matrix independently, the two-dimensional matrix may be 2*2, and the vector calculated by the two-dimensional matrix may be 1*2 or 2*1, and parameters of the vector respectively represent row fusion position information and column fusion position information for a pixel.
If the fusion matrix D is a two-dimensional matrix and each channel uses a two-dimensional matrix comprehensively, the two-dimensional matrix may be a k × k two-dimensional matrix, and the final calculation result may be a k-dimensional vector, where each dimension represents position information of a pixel of the first image and a pixel to be fused in the third image under one channel. k is the number of channels, e.g. 3.
If the fusion matrix D is a one-dimensional matrix, it may be 1*k or k × 1, each channel comprehensively uses the matrix, and similarly, the value of each dimension is calculated as the position information of the pixel of the first image and the pixel to be fused in the third image under the corresponding channel.
In one embodiment, the following may be expressed according to the formula: (x ', y') = e · (x, y) · D · mod (M, N), and the position (x ', y') of the pixel at the position (x, y) corresponding to the second image in the third image is calculated.
The fusion matrix D is a 2 × 2 matrix, each channel may be correspondingly configured with a different fusion matrix D, and e may be a parameter calculated according to user information, for example, may be any suitable value such as 0.1,1,2,2.5, 10, and the like. x 'is the row position of the pixel to be fused in the third image, y' is the column position of the pixel to be fused in the third image, x is the row position of the pixel to be fused in the second image, y is the column position of the pixel to be fused in the second image, mod (M, N) represents that the first value in the calculated e- (x, y) -D is rounded by M, the second value in the calculated e- (x, y) -D is rounded by N, and M and N are parameters which are determined according to the size of the third image and are larger than 0.
In one embodiment, the values of M and N may be determined according to the finally selected size of the third image, for example, M is directly taken as the value of the number of rows of the third image, and N is taken as the value of the number of columns of the third image. For example, if the number of pixels of the selected third image is 1000 x 2000, then M is 1000 and n is 2000. If a certain calculated value of e · (x, y) · D is (1024.3, 2058.2), the corresponding value of e · (x, y) · D · mod (M, N) is (24, 58), i.e., x '=24, y' =58, which means that the pixel corresponding to the (x, y) position in the second image and the pixel corresponding to the (24, 58) position in the third image are merged.
For example, M is 1000 and N is 2000. For the R channel, the corresponding fusion matrix D is
Figure SMS_2
And e is 1.
Then x '=3,y' =5 can be calculated for the pixel point at row 1 and column 2 (i.e. x is 1,y is 2), which means that the R value of the pixel corresponding to the position (1,2) in the second image is fused with the R value of the pixel corresponding to the position (3,5) in the third image.
For the G channel, the corresponding fusion matrix D is
Figure SMS_3
And e is 2.
Then x '=3,y' =5 can be calculated for the pixel point at the 1 st row and 2 nd column position (i.e. x is 1,y is 2), which means that the G value of the pixel corresponding to the position (1,2) in the second image is fused with the G value of the pixel corresponding to the position (6, 14) in the third image.
In this embodiment, by using the above formula, the positions of each pixel in each channel in the second image and the fused pixel in the corresponding channel in the third image can be simply and quickly determined, and the pixels in the two positions are fused, so that the security can be improved, and the computing resources are not excessively occupied.
In one embodiment, after step 306, further comprising: and detecting whether a plurality of pixels fused with the second image exist at the position to be fused in the third image calculated in each channel, and if so, selecting other pixels which are not fused with the pixels in the second image in the third image.
In this embodiment, since the positions to be fused calculated at different positions may be the same, if the pixel values at the positions to be fused in the third image are fused with the pixel values at multiple positions in the second image, the pixels in the second image cannot be restored. And the electronic equipment further detects and calculates whether the positions to be fused in the third image are repeated under the same channel after finishing the positions of all the pixel points in the second image and the corresponding positions of the pixel points to be fused in the third image, and if so, adjusts the positions to be fused in the third image to other positions which are not fused.
Specifically, the position to be fused of the first pixel occupying the repetition position may be kept unchanged, and the pixel of the second image corresponding to the repetition position in the third image, which is calculated later, is selected to be fused with the pixel of the unfused position closest to the repetition position in the third image.
For example, after the fusion position of each pixel is calculated, if it is detected that there is a channel where the pixel points at the (x 1, y 1) and (x 2, y 2) positions in the second image and the pixel point to be fused in the third image are both at the (x 1', y 1') position, the sorted (x 2, y 2) and other unfused positions in the third image may be fused, for example, the unfused (x 2', y 2') position closest to the (x 2, y 2) position is selected as the pixel value at the new position to be fused for fusion.
In one embodiment, as shown in fig. 4, another image encryption transmission method using a matrix key is provided, the method including:
step 402, acquiring a transmission request for a first image sent by a user terminal.
In this embodiment, the request includes a user identifier. The data saving request may be a saving request triggered by a saving operation performed on a related image in the system, or may be a saving request triggered by a screen-capturing operation performed on other information displayed in the system.
The electronic device can determine corresponding data to be saved based on the saving request of the user, and then convert the data to be saved into a first image, and if the data to be saved is image data, the image data can be directly used as the first image.
For example, a user terminal is requesting to download image data related to certain related process information in an MES system (manufacturing execution system). The electronic device can obtain the data storage request, wherein the storage request comprises the user identification and the image needing to be accessed, and the image is the first image.
And 404, when the first image belongs to the sensitive content relative to the user identifier, receiving a fixed value sent by the user terminal, and generating a 3*3-order reversible matrix key according to the fixed value.
In this embodiment, the fixed value is a numerical value input by the user on the user terminal. The user terminal can prompt that the first image has sensitivity relative to the user and needs to be encrypted, displays a corresponding fixed value input interface, receives a fixed value input by the user, and sends the fixed value to the electronic equipment. The electronic equipment acquires the fixed value K, and generates a corresponding 3*3 order reversible matrix key A based on the fixed value, so that the sum of each row of elements of the matrix key is equal to the fixed value.
Step 406, forming 1*3 order matrix from the RGB value of each pixel of the first image, and multiplying the matrix key to obtain a new 1*3 order matrix.
The electronic device may place the RGB values of the pixels at each location into a 1*3 order matrix B RGB, and perform the operation B a to obtain a new 1*3 order matrix C.
And step 408, dividing the three elements of the 1*3 order matrix by a fixed value respectively and rounding to obtain a result as the RGB value of the pixel corresponding to the second image.
And dividing the calculated matrix C by a fixed value K, and rounding to obtain a numerical value, namely the RGB value of the pixel at the corresponding position in the second image. Wherein the second image is the same size as the first image. For example, the RGB value matrix C at the (x, y) position in the first image, the corresponding RGB value matrix D calculated according to the above process, and then the new RGB value obtained by dividing by the fixed value and rounding, are used as the pixel value at the (x, y) position in the second image.
Step 410, an image with the highest similarity to the first image is obtained from a preset image library as a third image, and the size of the third image is larger than that of the first image.
Preferably, the size of the third image may be 2 times or more the size of the first image, for example, may be 2 times, 3 times, 3.5 times, 4 times, or any other suitable value. The sensitive image data in the system is limited, so that the electronic device can correspondingly set a corresponding third image for each sensitive first image, and the third image and the corresponding sensitive image have certain similarity. The third image has a larger size to better hide the data of the first image.
Taking the MES system as an example, the electronic device may preset a plurality of third images related to the process flow, where the third images may be real process flow images without sensitivity or false process flow images after processing. When the first image is identified as the image related to the corresponding process flow, a third image which is most similar to the first image and has a larger pixel amount than the first image can be selected from a third image library related to the process flow.
In step 412, a corresponding pixel fusion matrix D is obtained.
Preferably, the electronic device may set a corresponding pixel fusion matrix D for each channel under the RGB channels. For example, for an R value of a pixel under an R channel, a pixel fusion matrix is D1, for a G value of a pixel under a G channel, a pixel fusion matrix is D2, and for a B value of a pixel under a B channel, a corresponding fusion matrix is set to D3. The three matrices may be 2 × 2 square matrices, but the three matrices are not necessarily the same.
The three fusion matrices may be fixed matrices preset by the system, or matrices calculated by generating a model according to a preset matrix, where the model may use the user identifier as an input and perform operations to generate the three matrices.
In step 414, a pixel fusion parameter e corresponding to the user is calculated.
The determination of the pixel fusion parameters is also related to the user identification, and the electronic device can determine the corresponding fusion parameters according to the above process. The pixel fusion parameters calculated for different user identities are different, so that a second image formed for the same image is also different. Therefore, when different users acquire sensitive images, the sensitive images cannot be cracked by the same cracking means.
Step 416, calculating the pixel value at the (x, y) position in the second image and the (x ', y') position at the pixel value to be fused in the third image in the corresponding channel according to the formula (x ', y') = b · (x, y) · a · mod (M, N).
Preferably, the electronic device may calculate the position of the pixel of each channel in the second image and the pixel to be fused in the third image based on the formula. The image width M and the image height N may be the image width and the image height of the third image that needs to be used.
For example, when the determined third dimension is that the width M is 2000, the image height N is 1000, for the R channel, the calculated pixel fusion parameter b =2 for a certain user identifier, and the corresponding pixel fusion matrix D1 is
Figure SMS_4
Then, for the pixel point at the 1 st row and 2 nd column position (i.e. x is 1,y is 2), x 'is 6,y' is 10, that is, the R value of the pixel at the (1,2) position in the second image and the R value of the pixel at the (6, 10) position in the third image can be fused.
In one embodiment, after step 416, further comprising: and detecting whether the calculated positions (x ', y') to be fused in the third image in each channel correspond to the positions of a plurality of pixels in the second image, if so, selecting the positions which are not fused in the third image as the positions corresponding to the pixels in the second image.
In this embodiment, there may be a repetition in the fusion position of the pixel calculated based on the above formula, and when there is a repetition, the pixel may be adjusted according to a preset adjustment rule.
For example, the position of the pixel in the second image that occupies the repeating position in the third image is kept unchanged, and the pixel in the corresponding repeating position that is calculated later is fused with the pixel in the third image at the position that is closest to the position to be fused and is not fused, and the newly selected position is used as the fusion position corresponding to the pixel value in the second image.
After the electronic device completes the confirmation of the position of one pixel in the second image and the position of the pixel to be fused in the third image, the information of the next pixel in the second image is read, and calculation is performed according to the above mode until all pixels in the second image are traversed.
Step 418, fusing the pixel at each position of each channel in the second image with the pixel at the position of the pixel to be fused of the channel corresponding to the third image, so as to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image.
Preferably, the calculated fusion position may be an adjusted position to be fused where no position repetition exists. Therefore, the situation that the same pixel in the third image is fused with a plurality of pixels in the second image to cause decryption failure can be avoided.
The electronic device may set a fusion weight of the second image and the third image, where the fusion weight may be a normalized weight, and the weight of the second image may be set to be smaller than the weight of the third image, and the normalized weights of the channels may be set independently. And under the same channel, carrying out weighted summation on the pixel points with the same position, and taking the pixel value obtained by summation as the pixel value of the position under the channel corresponding to the fourth image.
The normalized weight of the first image and the normalized weight of the second image can be set to any appropriate value according to the situation, and the weight of the third image is larger than the weight of the second image, so that the information of the second image can be further hidden.
And step 420, transmitting the fourth image to the user terminal for storage.
According to the image encryption transmission method using the matrix key, the matrix key is firstly set to encrypt the first image in the first layer to form the second image, the image which is larger than the first image in size and is most similar to the first image is selected as the third image, the pixel value in the second image and the third image are fused, and the position in the fused image is not the same, so that the information in the first image can be further hidden, and the safety in the image transmission process is improved.
In one embodiment, as shown in fig. 5, there is provided an image decryption transmission method using a matrix key, the method including:
step 502, an image display request sent by a user terminal is obtained, wherein the request comprises a user identifier and an image identifier of an image to be displayed.
In this embodiment, the image to be displayed is a fourth image stored according to the image encryption transmission method using the matrix key in any embodiment of the present application. The image identification information in the fourth image may embody an encryption manner correspondingly adopted by the image identification information, such as the matrix key, the fixed value, the fusion matrix, the fusion parameter, and the like. The electronic equipment can acquire the corresponding image to be displayed based on the image opening operation of the user, and further acquire the image identifier of the electronic equipment.
Specifically, when the electronic device obtains the image to be displayed, the encryption mode adopted by the electronic device can be calculated according to the corresponding calculation rule based on the image identification information of the image. For example, based on a preset rule, the image identifier of the adopted third image, and the adopted matrix key, the fusion matrix, the fusion parameter, and the like, which need to decrypt the relevant information of the first image, may be calculated.
In one embodiment, a corresponding matrix key library, a corresponding fusion parameter library, and a corresponding fusion matrix library may be preset, and similarly to the third image library, the fusion parameter e and the fusion matrix D used for pixel fusion of the second image and the third image are both in the corresponding fusion parameter library and the corresponding fusion matrix library, and the matrix key used for generating the second image from the first image also exists in the corresponding matrix key library. After the electronic device calculates the image identifier of the corresponding third image based on the image identifier of the image to be displayed, it may generally obtain the corresponding matrix key a, the corresponding fusion parameter e, and the corresponding fusion matrix D directly based on the identifier, or obtain the positions of the fusion parameter e and the fusion matrix D in the respective libraries, and extract the corresponding fusion parameter e and the fusion matrix D based on the positions.
Step 504, an inverse matrix of the matrix key for decrypting the image to be displayed and a third image are determined based on the image identifier.
In this embodiment, after the corresponding matrix key is obtained, the corresponding inverse matrix can be calculated. Likewise, after the corresponding fusion matrix is known, the corresponding inverse matrix may also be calculated.
After the image identifier of the image to be displayed is obtained, a corresponding third image may be obtained from a third image library.
Step 506, the second image is separated from the fourth image based on the third image.
The electronic device also presets a pixel position restoring mode matched with the fusion position, after all information of the mode of the pixel fusion position is known, the corresponding pixel position restoring mode can be inquired or calculated based on the information, the position of the RGB value in the second image after the third image is separated from the fourth image is restored based on the pixel position restoring mode, and the second image corresponding to the image to be displayed is obtained through restoration.
The electronic device may separate the third image and the second image from the fourth image based on an inverse matrix of the fusion matrix, the fusion parameters, the weight, the third image, and the like.
Optionally, the electronic device may first separate the third image from the weight and the third image based on the weight, and then restore, according to the corresponding weight, the inverse matrix, and the fusion parameter, the corresponding RGB value and the position of each RGB value in the second image with respect to the data after the separated third image, so as to finally restore the second image.
And step 508, decrypting the second image according to the inverse matrix to obtain the first image.
After the second image is obtained, the second image may be decrypted based on the inverse matrix F of the matrix key to form the first image.
For example, the RGB values in the second image may also be put into a 1*3 matrix, and multiplied by the inverse matrix F and the corresponding fixed value K, respectively, to obtain a new 1*3 order matrix, where the elements in the matrix are the RGB values of the elements in the first image, respectively. And restoring the RGB value in the corresponding first image by traversing the RGB value of each element in the second image, thereby restoring the complete first image.
Step 510, detecting whether the user identifier has the authority to access the first image, and if so, displaying the first image on the user terminal.
In this embodiment, after obtaining the first image, it is further required to verify whether the user has the right to access the first image, and when the user has the right to access the first image, the first image is displayed on the user terminal. It may be that immediately, the user initiating the image display request may not be the same user as the user encrypting the first image.
In one embodiment, the third image is displayed on the user terminal when the user identification does not have access to the first image.
The electronic device can detect whether the content of the information in the first image belongs to sensitive content relative to the user identifier, and when the content does not belong to the sensitive content, the electronic device judges that the content has the access right and displays the first image. When it is determined that the content belongs to the sensitive content, the third image may be displayed.
Specifically, whether the authority required for consulting the first image exceeds the authority corresponding to the user identifier or not can be detected; and/or detecting whether the current operation environment of the user terminal belongs to an unsafe environment; and when any detection result is yes, judging that the data to be stored belongs to the sensitive content relative to the user identification.
Further, when the number of input errors of the login account matched with the user identifier in a preset time period is detected to exceed a preset number threshold, and/or when the user terminal is detected not to belong to the common equipment corresponding to the user identifier, it is determined that the current operating environment of the user terminal belongs to the non-safe environment.
For example, when a user a stores an image B formed by encrypting the image a by the image encryption transmission method using the matrix key according to the present application on the platform, the image B is sent to the user B. If the user B has higher authority, for example, the user B is a manager of the platform system, and has authority to view the image a restored from the image B, the system displays the decrypted and restored image a. If the image a is still a sensitive image relative to the user a, a third image most similar to the image a used for encrypting the image a is displayed on the terminal of the user a, so that leakage of sensitive information can be prevented.
For example, if the user a accesses the image a on a non-office computer, the system detects that the image a belongs to sensitive data, the third image is displayed, and if the user a has access right, the decrypted image a can be displayed.
The image decryption transmission method using the matrix key can restore the corresponding first image from the image to be displayed by adopting a decryption mode which is adaptive to the image encryption transmission method using the matrix key, and the method can restore the image simply, quickly and safely.
In one embodiment, before step 504, the method further includes: acquiring the key information input by the user, verifying the key information, and executing step 504 after the verification is passed.
In this embodiment, before the electronic device performs image decryption, the electronic device further needs to authenticate a user, and the key information may be key information corresponding to the fourth image before the fourth image is generated. The key information may be the first image identifier of the image, or may be an arbitrarily set appropriate verification code. The security of image display can be further improved by inputting corresponding key information. The verification code may be a verification code generated according to the user identifier used in encryption. In this way, the electronic device can analyze the user identifier used when encrypting the encrypted image from the key information, and determine a specific decryption mode based on the identified user identifier and image identifier.
In one embodiment, a computer-readable storage medium is provided having executable instructions stored thereon that, when executed by a processor, cause the processor to perform the steps in the method embodiments described above.
In one embodiment, there is also provided an electronic device comprising one or more processors; memory having one or more programs stored therein, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the steps of the above-described method embodiments.
In one embodiment, as shown in fig. 6, a schematic structural diagram of an electronic device for implementing embodiments of the present application is shown. The electronic apparatus 600 includes a Central Processing Unit (CPU) 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. A driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that the computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer-readable medium carrying instructions that, in such embodiments, may be downloaded and installed from a network via the communication portion 609, and/or installed from the removable media 611. When executed by the Central Processing Unit (CPU) 601, performs the various method steps described in the present application.
Although example embodiments have been described, it will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the inventive concept. Accordingly, it should be understood that the above-described exemplary embodiments are not limiting, but illustrative.

Claims (10)

1. An image encryption transmission method using a matrix key, the method comprising:
acquiring a transmission request aiming at a first image sent by a user terminal, wherein the transmission request comprises a user identifier;
when the first image belongs to sensitive content relative to the user identification, generating a 3*3-order reversible matrix key corresponding to the user identification;
forming a 1*3-order matrix by the RGB value of each pixel of the first image, and performing operation with the matrix key to form a second image;
acquiring a third image matched with the first image;
hiding the pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image;
and transmitting the fourth image to the user terminal for storage.
2. The method of claim 1, further comprising:
detecting whether the authority required for transmitting the first image exceeds the authority corresponding to the user identification; and/or
Detecting whether the current operating environment of the user terminal belongs to a non-safe environment;
and when any one detection result is yes, judging that the first image belongs to sensitive content relative to the user identification.
3. The method of claim 2, further comprising:
when the number of times of inputting errors of the login account matched with the user identification in a preset time period exceeds a preset number threshold value is detected, and/or
When detecting that the user terminal does not belong to a common device corresponding to the user identity,
and judging that the current operation environment of the user terminal belongs to an unsafe environment.
4. The method of claim 1, wherein the sum of each row of elements in the matrix key is a fixed value, and wherein the forming the RGB values of each pixel of the first image into a 1*3 order matrix, operating with the matrix key, forms a second image comprises:
forming 1*3-order matrixes from the RGB values of each pixel of the first image, and multiplying the matrixes by the matrix keys to obtain new 1*3-order matrixes;
and dividing the three elements of the new 1*3 order matrix by the fixed value respectively and rounding to obtain a result as the RGB value of the corresponding pixel of the second image.
5. The method of claim 4, wherein generating a 3*3 order invertible matrix key corresponding to the user identifier comprises:
and receiving the fixed value sent by the user terminal, and generating the matrix key according to the fixed value, wherein the fixed value is a numerical value input by a user on the user terminal.
6. The method of claim 1, wherein said obtaining a third image that matches the first image comprises:
and acquiring an image with the highest similarity with the first image from a preset image library as the third image, wherein the size of the third image is larger than that of the first image.
7. An image decryption transmission method using a matrix key, the method comprising:
acquiring an image display request sent by a user terminal, wherein the request comprises a user identifier and an image identifier of an image to be displayed, and the image to be displayed is a fourth image saved according to the method of any one of claims 1 to 6;
determining an inverse matrix of a matrix key for decrypting the image to be displayed and a third image based on the image identifier;
separating a second image from the fourth image based on the third image;
decrypting the second image according to the inverse matrix to obtain a first image;
and detecting whether the user identification has the authority of accessing the first image, and if so, displaying the first image on the user terminal.
8. The method of claim 7,
and when the user identification does not have the right of accessing the first image, displaying the third image on the user terminal.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-8.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 8.
CN202310053159.9A 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment Active CN115834791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310053159.9A CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310053159.9A CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Publications (2)

Publication Number Publication Date
CN115834791A true CN115834791A (en) 2023-03-21
CN115834791B CN115834791B (en) 2023-04-25

Family

ID=85520732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310053159.9A Active CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Country Status (1)

Country Link
CN (1) CN115834791B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN111182169A (en) * 2019-11-13 2020-05-19 腾讯科技(深圳)有限公司 Image processing method, image processing device, computer readable medium and electronic equipment
CN112040086A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, equipment and readable storage medium
CN113612596A (en) * 2021-07-02 2021-11-05 重庆邮电大学 Image self-decryption method based on hyperchaotic system
CN114036542A (en) * 2021-11-15 2022-02-11 阿里巴巴(中国)有限公司 Data encryption and decryption method and computer storage medium
CN115208557A (en) * 2021-04-09 2022-10-18 中国移动通信集团安徽有限公司 Data encryption method and device, electronic equipment and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN112040086A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, equipment and readable storage medium
CN111182169A (en) * 2019-11-13 2020-05-19 腾讯科技(深圳)有限公司 Image processing method, image processing device, computer readable medium and electronic equipment
CN115208557A (en) * 2021-04-09 2022-10-18 中国移动通信集团安徽有限公司 Data encryption method and device, electronic equipment and computer storage medium
CN113612596A (en) * 2021-07-02 2021-11-05 重庆邮电大学 Image self-decryption method based on hyperchaotic system
CN114036542A (en) * 2021-11-15 2022-02-11 阿里巴巴(中国)有限公司 Data encryption and decryption method and computer storage medium

Also Published As

Publication number Publication date
CN115834791B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN109886417B (en) Model parameter training method, device, equipment and medium based on federal learning
JP5023075B2 (en) Computer-implemented authentication interface system
CN106575334A (en) Accessing a secured software application
CN101529366A (en) Identification and visualization of trusted user interface objects
CN109102452A (en) A kind of image encryption method based on Latin square scramble and directional diffusion
Singh et al. EiMOL: a secure medical image encryption algorithm based on optimization and the Lorenz system
CN114417364A (en) Data encryption method, federal modeling method, apparatus and computer device
US20190384905A1 (en) Image based authentication code method, server, and authentication code system
CN115225362A (en) Verification method, device, equipment and storage medium of man-machine behavior
CN114240347A (en) Business service secure docking method and device, computer equipment and storage medium
EP3335144B1 (en) Browser attestation challenge and response system
CN116684102A (en) Message transmission method, message verification method, device, equipment, medium and product
CN115834791B (en) Image encryption and decryption transmission method using matrix key and electronic equipment
CN116049802A (en) Application single sign-on method, system, computer equipment and storage medium
CN114500044A (en) Data verification method and device, storage medium and electronic equipment
US20090271632A1 (en) Secret authentication system
Al-Shqeerat An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography.
CN115834790B (en) Information encryption transmission method and information decryption transmission method based on pixel movement
Garg et al. Security techniques for cloud computing environment
Smriti et al. Secure File Storage in Cloud Computing Using a Modified Cryptography Algorithm
CN114493564B (en) Webpage aggregate payment skip system and method based on delayed response
CN107360183A (en) A kind of method and device of hiding checking information
CN115134473B (en) Image encryption method and device
Schlesinger A cryptography course for non-mathematicians
Singh et al. Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant