Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
An encryption method and engineering drawing technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as high time complexity and format damage, and achieve the effect of improving encryption efficiency and facilitating management and maintenance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions proposed in the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0030] The first step in the embodiment of the present invention is key preprocessing, refer to figure 1 Including the following steps:
[0031] Step 1: Choose DCT block size G, encryption strength F and key Key=k 1 k 2 ...k n ;
[0032] Step 2: Obtain the initial value x of the two-dimensional Logistic mapping (see formula (3)) from formulas (1) and (2) 0 ,y 0 . The control parameter u of the two-dimensional Logistic mapping is obtained from formula (4) 1 , u 2 .
[0033] v alue 1 = ( ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
