Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Resistance to brute force attacks" patented technology

Intra-class coefficient scrambling-based JPEG image encryption method

The invention relates to an intra-class coefficient scrambling-based JPEG image encryption method. The method comprises the following steps: firstly reading in a JPEG image file, acquiring a Huffman coding table and image data which undergoes JPEG coding compression, carrying out decoding to acquire all the non-zero quantized DCT coefficient numerical values and positions and carrying out classification; selecting a password, carrying out chaotic iteration by utilizing the password, so as to generate a chaotic sequence, and scrambling the non-zero coefficients and 8*8 block of each class by utilizing the chaotic sequence; and carrying out entropy coding on a scrambled quantized DCT coefficient matrix, and writing the coded data into the JPEG image file so as to complete intra-class coefficient scrambling-based JPEG image encryption. According to the method disclosed in the invention, scrambling is carried out on different classes of quantized DCT coefficients through the chaotic sequence, and the quantized DC coefficients and the non-zero AC coefficients are processed by directly using one encryption scheme, so that the safety and the high efficiency are both considered; and the encrypted images are similar to clear text image files in the aspect of size, and have high compression ratios.
Owner:CHANGAN UNIV

Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256

The invention provides an image encryption method based on novel two-dimensional composite chaotic mapping and SHA-256. The method comprises the following steps: calculating a Hash value of a to-be-encrypted image by using an SHA-256 Hash function, and taking the Hash value as a system input key; linking plaintext image information and the whole image encryption process closely by using the one-way irreversible characteristic of Hash calculation, therefore, the algorithm key space is expanded, and violent attacks of attackers can be effectively resisted; carrying out blocking and operation on the hash value to obtain an iterative initial parameter of the composite chaotic system; substituting into a composite chaotic system for iteration and processing to generate a chaotic sequence; converting the to-be-encrypted image into a one-dimensional matrix; sorting and scrambling the original image based on the chaotic sequence; performing primary diffusion processing on the matrix based on the chaos sequence to obtain an encrypted matrix; performing secondary diffusion processing on the encryption matrix through a parameter generated by a key to obtain a secondary encryption matrix; and finally, reconstructing to obtain an encrypted image. According to the invention, the security of image encryption is improved, and the execution cost is reduced.
Owner:HUAQIAO UNIVERSITY +1

Bidirectional authentication method for ultra-lightweight mobile RFID system

The invention relates to the technical field of communication, and particularly relates to the safety certification problem among a tag, a reader and a back-end database in a mobile RFID system. The method comprises the following steps: (1) the reader sends the request information to the tag; (2) the reader sends the tag response request information and the own information to the database; (3) thedatabase authenticates the reader and the tag; (4) the reader authenticates the database; (5) the tag authenticates the database. According to the invention, the protocol of the system adopts a cyclic checking function and a simple exclusive-or and cascade algorithm to encrypt the to-be-transmitted information. In this way, the anonymity of the tag and the bidirectional authentication of the system are realized. Meanwhile, the calculation amount of the database and the tag is effectively reduced. A tag random number is generated by a back-end database random number generation mechanism and then is forwarded to the tag or automatically updated through the cyclic checking function. Therefore, the hardware cost of the tag is reduced. According to the invention, a dynamic ID and a cyclic checking function mechanism are utilized, so that the system can resist various attacks.
Owner:XIDIAN UNIV

Biometric key extraction method based on fingerprint bit string and error correction coding

The invention provides a biometric key extraction method based on a fingerprint bit string and error correction coding. The biometric key extraction method based on the fingerprint bit string and the error correction coding comprises the following steps: designing an irreversible and changeable variable function or parameter based on the fingerprint bit string and the error correction coding algorithm to transform the original biological features; transforming the original template into a conversion template; and generating a biological feature revocable template. According to the invention, the problem of automatic registration between the registration template and the verification template in the transform domain is solved by means of fuzzy extraction, therefore, the rejection rate of the biological authentication is low, and the availability of the authentication scheme is ensured. The invention takes the fuzzy extraction technology as the main line and combines the error correction coding technology to extract the unique and stable key from the fingerprint images with certain randomness and fuzziness, and any step does not need to store original fingerprint information, therefore, the user fingerprint privacy information can be maximally protected while realizing the fingerprint feature encryption; the biometric key extraction method based on the fingerprint bit string and error correction coding can resist the brute force attack, the tampering / intercepting template database attack and the multi template cross matching attack based on ARM homologous fingerprints.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

One-time password certification system token resynchronization method based on event

A one-time password certification system token resynchronization method based on an event aims to solve the problems of step out of the token due to inconsistency of counter values of a hardware token and an authentication server of the one-time password certification system based on the event and provides a resynchronization method. The method is divided into window inner resynchronization and window outer resynchronization on basis of a preset size of the window and the counter values as synchronization factors. When step out times of the hardware token and the server are within the size of the window, the window inner resynchronization is carried out, repetitive computation command times are smaller than or equal to the window size, and a group of consistent customer commands and service commands, and the resynchronization is achieved; if not, the widow outer resynchronization is carried out, at the moment if three customer commands and service commands are consistent continuously, the resynchronization is achieved, the whole execution process of the resynchronization method is divided into seven steps. The one-time password certification system token resynchronization method based on the event is highly-efficient, simple in computation, low in time consumption of operation, fast in operation speed, small in occupation space of system memory space, and capable of resisting brute force impact of the certification system.
Owner:李慧娟 +2

Compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method

The invention discloses a compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method. Image data are compressed at an encryption end to obtain a compression coefficient matrix, and the matrix is encrypted by combining a hyperchaotic sequence at the encryption end to obtain ciphertext data. And the decryption end sets an initial value of the hyper-chaotic system according to the key, decrypts the ciphertext data by a chaotic sequence of the hyper-chaotic system of the decryption end, and further reduces the ciphertext data to obtain a plaintext image. The encryption end and the decryption end complete encryption and decryption operations by using SOPC resources, the FPGA performs parallel acceleration on the hyperchaotic discretization process in the SOPC, and the ARM processor completes the image encryption and decryption process in combination with a chaotic sequence. According to the method, hardware resources can be effectively saved in the application process, the discretization speed of the hyperchaotic system is increased by applying the parallel computing advantages of the FPGA, and then the working efficiency of an image secrecy system is improved.
Owner:HUNAN UNIV OF SCI & TECH

JPEG image encryption method based on similar coefficient scrambling

The invention relates to an intra-class coefficient scrambling-based JPEG image encryption method. The method comprises the following steps: firstly reading in a JPEG image file, acquiring a Huffman coding table and image data which undergoes JPEG coding compression, carrying out decoding to acquire all the non-zero quantized DCT coefficient numerical values and positions and carrying out classification; selecting a password, carrying out chaotic iteration by utilizing the password, so as to generate a chaotic sequence, and scrambling the non-zero coefficients and 8*8 block of each class by utilizing the chaotic sequence; and carrying out entropy coding on a scrambled quantized DCT coefficient matrix, and writing the coded data into the JPEG image file so as to complete intra-class coefficient scrambling-based JPEG image encryption. According to the method disclosed in the invention, scrambling is carried out on different classes of quantized DCT coefficients through the chaotic sequence, and the quantized DC coefficients and the non-zero AC coefficients are processed by directly using one encryption scheme, so that the safety and the high efficiency are both considered; and the encrypted images are similar to clear text image files in the aspect of size, and have high compression ratios.
Owner:CHANGAN UNIV

Image encryption method and device based on double-entropy source hyperchaotic system and storage medium

The invention discloses an image encryption method and device based on a double-entropy source hyper-chaotic system and a storage medium, and the method comprises the steps: firstly constructing a pseudo-random number generator based on a six-dimensional memristor hyper-chaotic system and two-dimensional SF-SIMM hyper-chaotic mapping, and obtaining a complex sequence with a double-entropy source structure; performing iteration by a pseudo random number generator to obtain a corresponding pseudo random matrix; and finally, diffusing pixels of the original image based on the obtained pseudo-random matrix, and encrypting the original image into a ciphertext image. According to the method, a six-dimensional memristor hyper-chaotic system and two-dimensional SFSIMM hyper-chaotic mapping are combined and applied to image encryption, a new image encryption method is provided, and the method has high key sensitivity and high differential attack resistance; the secret key space is far large, and violent attacks can be effectively resisted; the information of the ciphertext image can be well hidden, and the security of the ciphertext image is ensured; the information entropy of the ciphertext image is very close to a theoretical value, and the method has high entropy attack resistance.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products