CN1870045A - Image picture encipher and decipher method - Google Patents
Image picture encipher and decipher method Download PDFInfo
- Publication number
- CN1870045A CN1870045A CN 200510074549 CN200510074549A CN1870045A CN 1870045 A CN1870045 A CN 1870045A CN 200510074549 CN200510074549 CN 200510074549 CN 200510074549 A CN200510074549 A CN 200510074549A CN 1870045 A CN1870045 A CN 1870045A
- Authority
- CN
- China
- Prior art keywords
- image
- cut zone
- encrypted
- picture
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000008707 rearrangement Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 5
- 230000015572 biosynthetic process Effects 0.000 description 3
- 239000004744 fabric Substances 0.000 description 2
- 230000001788 irregular Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000003709 image segmentation Methods 0.000 description 1
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
A method for enciphering and deciphering image pattern includes dividing a frame of original image pattern to be a numbers of region randomly and rearranging said divided regions to form a frame of enciphered image pattern, enabling to do said process cyclically to let enciphered image pattern be changed essentially, restoring original image pattern by carrying out retrace course of rearrangement for realizing deciphering when it is required.
Description
[technical field]
The present invention relates to a kind of encryption and decryption method of image frame, especially relate to a kind of encryption and decryption method that substantial variations takes place as the image frame of encrypted body itself that make.
[background technology]
At present, for solving the multiple technologies that the image image encryption is taked, for example, title has disclosed a kind of enciphering method of photoelectric information for the Chinese patent application 01119110.4 of " a kind of enciphering method of photoelectric information ", piece image or image sets that this patent application uses different colours or different gray-scale pixels to form are encoded to figure, image, document, file and compressed file thereof etc., to realize figure, image, document, file encryption.In the prior art, substantial change originally can't take place in the image frame as encrypted body after above-mentioned technology implementation process finishes.
[summary of the invention]
Can't make the technical matters that substantial variation takes place as the image frame of encrypted body itself in order to overcome existing encryption method, the invention provides a kind of image picture encipher method that substantial variation takes place as the image frame of encrypted body itself that makes.
The present invention solves existing encryption method can't make the technical scheme that technical matters adopted as the image frame generation substantial variation of encrypted body itself be: a kind of encryption method of image frame is provided, and this method comprises: original image is carried out random division; Cut zone to original image rearranges, to form secondary or several encrypted image pictures.
According to a method for optimizing of the present invention, the quantity of cut zone of the present invention can be to be equal to or greater than 2, and cut zone can be circular, oval, polygon or other shape, cut zone can be straight line, curve or the combination of the two around the sideline.
According to another method for optimizing of the present invention, participate in random division and the original image that rearranges can be one secondary or several, participate in random division and the image frame that rearranges can also be secondary or several other image frames that have nothing to do with original image.
According to another method for optimizing of the present invention, area size, shape and the original image of encrypted image picture are identical or different.Cut zone can be arranged in the optional position of encrypted image picture or repeatedly arrange in the zones of different of encrypted image picture.The coordinate direction of cut zone and/or encrypted image picture can be adjusted arbitrarily at any time.
According to another method for optimizing of the present invention, encryption method is repeatedly repeated, so that original image is repeatedly encrypted.
The invention has the beneficial effects as follows: to the original image random division and rearrange, form a width of cloth or several encrypted image pictures, make image frame itself that substantial variation take place, in case stopping leak is close as encrypted body.
[description of drawings]
Fig. 1 is the schematic flow sheet of first embodiment of image picture encipher method of the present invention;
Fig. 2 is the schematic flow sheet of second embodiment of image picture encipher method of the present invention;
Fig. 3 is the schematic flow sheet of the 3rd embodiment of image picture encipher method of the present invention;
Fig. 4 is the schematic flow sheet of the 4th embodiment of image picture encipher method of the present invention;
Fig. 5 is the schematic flow sheet of the 5th embodiment of image picture encipher method of the present invention;
Fig. 6 is the schematic flow sheet of the 6th embodiment of image picture encipher method of the present invention.
[embodiment]
The present invention is further described below in conjunction with drawings and Examples.
Fig. 1 is the schematic flow sheet of first embodiment of image picture encipher method of the present invention, and wherein, the original image 11 that needs to encrypt is fingerprint images.By image Segmentation Technology known in those skilled in the art, original image 11 is split into the cut zone 131-138 that 8 areas differ in size, shape different and need rearrange.Wherein cut zone the 131,134,135, the 136th, rectangle, and the shape of cut zone 132,133,137,138 is irregular polygons.Utilize image permutation technology known in those skilled in the art that the cut zone 131-138 of original image 11 is rearranged the last encrypted image picture 13 that forms in back.When rearranging, variation has all taken place in the grid bearing of each cut zone, for example, cut zone 131 is adjacent with cut zone 132 before rearranging, it is adjacent with cut zone 138 and 132 to become the while after rearranging, and the coordinate direction of cut zone 138 has taken place in rearranging process by 90 degree turn clockwise simultaneously.In the present embodiment, the cut zone that random division goes out is 8, and cut zone is rectangle or irregular polygon, but in actual applications, can as required original image be divided into the zone more than at least 2, and the shape of cut zone can also be circular, oval-shaped other shape.
The schematic flow sheet of second embodiment of the image picture encipher method of the present invention that Fig. 2 shows.Wherein, original image 21 is a fingerprint image, and original image 23 is and the corresponding name image of fingerprint to rearrange by random division and mixing original image 21,23 is encrypted jointly.In the present embodiment, can generate two encrypted image pictures 25,27, also can generate an encrypted image picture 29.
Fig. 3 is the schematic flow sheet of the 3rd embodiment of image picture encipher method of the present invention.In the present embodiment, original image 31 is divided into 5 row 5 row, in the process that rearranges, makes in the encrypted image 33 the part cut zone carry out coordinate direction and change, and repeatedly arrange, form the encrypted image of 5 row, 6 row at last.
Fig. 4 is the schematic flow sheet of the 4th embodiment of image picture encipher method of the present invention.In the present embodiment, at first original image 41 is divided into 3 row, 3 row, and rearranges the interim encrypted image picture 43 of formation, then, thereby interim encrypted image picture 43 turned clockwise 180 change coordinate directions, the final encrypted image picture 45 of formation.
Fig. 5 is the schematic flow sheet of the 5th embodiment of image picture encipher method of the present invention.At first, image frame 51 is divided into 3 row, 3 row, and rearrange, form the first interim encrypted image picture 53, then, the first interim encrypted image picture 53 is divided into 5 row, 5 row and rearranges the formation second interim encrypted image picture 55, at last, the second interim encrypted image picture 55 is divided into 7 row 7 and is listed as and rearranges and form final encrypted image picture 57.
Fig. 6 is the schematic flow sheet of the 6th embodiment of image picture encipher method of the present invention.Wherein, picture 61 is through the interim encrypted image picture after once encrypting.Picture 63 is another original image that need encrypt different with the original image of interim encrypted image picture.Picture 65 is other image pictures that have nothing to do with interim encrypted image picture 61 and original image 63. Picture 61,63,65 cut at random and mix rearrange.In the present embodiment, can generate the final encrypted image picture 67,69 of two width of cloth, also can only generate a secondary final encrypted image picture 611.
In sum, the present invention adopts the method that original image is cut at random and rearranged that image frame is encrypted.In cutting process, the quantity of cut zone can be to be equal to or greater than 2, and cut zone can be circle, ellipse, polygon or other shape.Cut zone around the sideline can be straight line, curve or the combination of the two.The original image that participates in random division and rearrange can be one secondary or several.The image frame that participates in random division and rearrange can also be secondary or several other image frames that have nothing to do with original image.In the process that rearranges, area size, shape and the original image of encrypted image picture are identical or different.Cut zone can be arranged in the optional position of encrypted image picture or repeatedly arrange in the zones of different of encrypted image picture.The coordinate direction of cut zone and/or encrypted image picture can be adjusted arbitrarily at any time.In addition, can also repeatedly repeat, so that image frame is repeatedly encrypted encryption method.
When adopting encryption method of the present invention that image frame is encrypted, original image generation substantial variations is in case stopping leak is close.
When needed, can carry out backward arrangement again, realize the deciphering of image frame the cut zone of encrypted image picture.
This method can be used as the algorithm of computer software programming, uses the computer software of this method design can realize image picture encipher and deciphering.
Above-mentioned detailed description only is exemplary description, and those skilled in the art can design various embodiments according to different actual needs under the situation of the scope and spirit that do not break away from the present invention and protected.
Claims (10)
1. the encryption method of an image frame said method comprising the steps of:
A. original image is carried out random division;
B. the cut zone to described original image rearranges, to form secondary or several encrypted image pictures.
2. encryption method according to claim 1 is characterized in that: the quantity of described cut zone is equal to or greater than 2, and described cut zone is circular, oval, polygon.
3. according to the described encryption method of claim 1, it is characterized in that: described cut zone around the sideline be straight line, curve or the combination of the two.
4. encryption method according to claim 1 and 2 is characterized in that: participate in random division and the original image that rearranges be one secondary or several.
5. encryption method according to claim 1 is characterized in that: participate in random division and the image frame that rearranges is secondary or several other image frames that have nothing to do with described original image.
6. encryption method according to claim 1 is characterized in that: the area size of described encrypted image picture, shape and described original image are identical or different.
7. encryption method according to claim 1 is characterized in that: described cut zone can be arranged in the optional position of described encrypted image picture or repeatedly arrange in the zones of different of described encrypted image picture.
8. encryption method according to claim 1 is characterized in that: the coordinate direction of described cut zone and/or described encrypted image picture can be adjusted arbitrarily at any time.
9. encryption method according to claim 1 is characterized in that: described method also comprises repeating step a and step b, so that described encrypted image picture is encrypted again.
10. the decryption method of an image frame, described method comprises: the cut zone to the encrypted image picture rearranges with the reduction original image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510074549 CN1870045A (en) | 2005-05-27 | 2005-05-27 | Image picture encipher and decipher method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510074549 CN1870045A (en) | 2005-05-27 | 2005-05-27 | Image picture encipher and decipher method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1870045A true CN1870045A (en) | 2006-11-29 |
Family
ID=37443702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200510074549 Pending CN1870045A (en) | 2005-05-27 | 2005-05-27 | Image picture encipher and decipher method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1870045A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102340688A (en) * | 2010-07-16 | 2012-02-01 | 于培宁 | Image sequence encrypting and decrypting method |
CN104504350A (en) * | 2015-01-04 | 2015-04-08 | 京东方科技集团股份有限公司 | Display device, watching device, display method and watching method |
CN106295286A (en) * | 2015-06-04 | 2017-01-04 | 联想移动通信软件(武汉)有限公司 | A kind of encrypting fingerprint processing method, device and terminal |
CN110390635A (en) * | 2018-04-19 | 2019-10-29 | 张佳炜 | Two-dimensional barcode information encryption method, coding/decoding method and device based on image procossing |
CN110502913A (en) * | 2019-08-22 | 2019-11-26 | 天津一鉴楼文化科技有限公司 | A kind of method that symmetrical hash obscures content |
CN112149163A (en) * | 2020-09-22 | 2020-12-29 | 山东旗帜信息有限公司 | Image file security processing method and device |
CN114650342A (en) * | 2020-12-17 | 2022-06-21 | Tcl商用信息科技(惠州)有限责任公司 | Image encryption method, intelligent terminal and computer readable storage medium |
-
2005
- 2005-05-27 CN CN 200510074549 patent/CN1870045A/en active Pending
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102340688A (en) * | 2010-07-16 | 2012-02-01 | 于培宁 | Image sequence encrypting and decrypting method |
CN102340688B (en) * | 2010-07-16 | 2017-02-15 | 于培宁 | Image sequence encrypting and decrypting method |
CN104504350A (en) * | 2015-01-04 | 2015-04-08 | 京东方科技集团股份有限公司 | Display device, watching device, display method and watching method |
CN104504350B (en) * | 2015-01-04 | 2018-01-05 | 京东方科技集团股份有限公司 | Display device, viewing apparatus, display methods and viewing method |
CN106295286A (en) * | 2015-06-04 | 2017-01-04 | 联想移动通信软件(武汉)有限公司 | A kind of encrypting fingerprint processing method, device and terminal |
CN110390635A (en) * | 2018-04-19 | 2019-10-29 | 张佳炜 | Two-dimensional barcode information encryption method, coding/decoding method and device based on image procossing |
CN110502913A (en) * | 2019-08-22 | 2019-11-26 | 天津一鉴楼文化科技有限公司 | A kind of method that symmetrical hash obscures content |
CN112149163A (en) * | 2020-09-22 | 2020-12-29 | 山东旗帜信息有限公司 | Image file security processing method and device |
CN112149163B (en) * | 2020-09-22 | 2022-07-05 | 山东旗帜信息有限公司 | Image file security processing method and device |
CN114650342A (en) * | 2020-12-17 | 2022-06-21 | Tcl商用信息科技(惠州)有限责任公司 | Image encryption method, intelligent terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1870045A (en) | Image picture encipher and decipher method | |
Zhang et al. | Image encryption based on three-dimensional bit matrix permutation | |
Li et al. | Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata | |
Wong et al. | A fast image encryption scheme based on chaotic standard map | |
Chai et al. | A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion | |
US20130179690A1 (en) | Method and apparatus for fast image encryption and invisible digital watermark | |
CN103491279B (en) | The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system | |
RU2374770C1 (en) | Method for steganographical cloaking of information | |
CN109889686A (en) | Based on H fractal structure and dynamically from the image encryption method of invertible matrix | |
CN103440613B (en) | The color image encrypting method of hyperchaos Rossler system | |
CN106228504B (en) | Digital image encryption method based on plaintext and key structure encryption parameter | |
Chen et al. | A Geometry-Based Secret Image Sharing Approach. | |
CN106100819A (en) | Image encrypting and decrypting system and image encrypting and decrypting method | |
Makki et al. | A survey of image encryption algorithms | |
CN110784619A (en) | Novel parallel image encryption method based on chaos | |
CN103093127B (en) | Method and system of dynamic copyright protection based on sudoku and multiple digital watermarks | |
Sajitha et al. | Review on various image encryption schemes | |
CN111177746A (en) | Efficient visual secret sharing method with core participants | |
Abdlrudha et al. | Low complexity high security image encryption based on nested PWLCM chaotic map | |
Ye et al. | A chaotic image encryption scheme using swapping based confusion approach | |
CN109922225A (en) | A kind of new rectangular image three-dimensional encryption method | |
CN101393636A (en) | Method and apparatus for adding invisible watermark into image | |
Bin et al. | Image encryption algorithm based on chaotic map and S-DES | |
CN1168058C (en) | Data enciphering method for dynamic cipher coding | |
CN1917613A (en) | Method of encrypting dynamic image locally |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |