Encoding Method of Chinese Character Cipher Based on Image Pixel Coordinates

A technology of image pixel coordinates and coding method, which is applied in the new Chinese character encryption algorithm and cipher coding field, can solve the problems of Chinese character message replacement encryption and security protection cipher coding method, etc., and achieves strong robustness and anti-cryptoanalysis ability. , the algorithm is simple, and the effect of ensuring confidentiality

Active Publication Date: 2017-07-28
LIAONING UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption coders are enthusiastic about using various complex mathematical formulas, curves and matrices to study the encryption and security protection of images, including image hiding technology derived from traditional steganography, digital watermarking technology for digital multimedia copyright protection, and digital image protection. Encrypted image scrambling technology, etc., but no password encoding method for replacing encryption and security protection for Chinese character messages using RGB digital image pixel coordinates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encoding Method of Chinese Character Cipher Based on Image Pixel Coordinates
  • Encoding Method of Chinese Character Cipher Based on Image Pixel Coordinates
  • Encoding Method of Chinese Character Cipher Based on Image Pixel Coordinates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] One, design idea of ​​the present invention is as follows:

[0046] 1. Chinese characters exist in the form of binary numbers in computers and networks, and have the same digital characteristics as the pixel values ​​of RGB digital images. Therefore, for each Chinese character, a completely matching binary can be found in the appropriate RGB image. Bit string, and take out the corresponding pixel coordinates to replace the Chinese characters for transmission and storage.

[0047] 2. Select the binary bit string matching the Chinese character in the RGB image by random number, and use the corresponding pixel coordinates to replace the Chinese character, so as to avoid the frequency characteristics of the replacement password and completely solve the attack problem of the frequency statistics analysis of the replacement password .

[0048]3, the Chinese characters are divided into two bytes or more sub-blocks, pixel matching is carried out for each sub-block and the coor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Chinese character password encoding method based on image pixel coordinates. The encryption process: (1) input a Chinese character string in plain text, and take out the string length K; (2) read the public key image f1 and the private key image f2 respectively, Generate the key image F, and take out the image size M×N; (3) Convert each Chinese character into binary data and divide it into high and low byte blocks, and store them in the cell arrays destr{i,1} and destr{ i, 2}; (4) cyclically search for the pixel values ​​matching the cell arrays destr{i,1} and destr{i,2} respectively in F, and read their pixel coordinates and store them in the two-dimensional matrix left[ x, y] and right[x, y]; (5) Randomly take out two coordinate values ​​in left[x, y] and right[x, y] to replace the high byte and low byte blocks of the Chinese character ; (6) 4 values ​​of these two coordinates are transposed by the agreed transposition order, and output in the four-dimensional matrix xyv[]; (7) when i=K, the encryption process ends, and the output K row four-dimensional matrix xyv[] ] is the ciphertext. The encryption method has the advantages of good confidentiality and flexible and convenient key management, and is a safe Chinese character password encoding method.

Description

technical field [0001] The invention relates to a Chinese character cipher encoding method based on a digital image, is a new Chinese character encryption algorithm and a cipher encoding method, and belongs to the fields of cryptography and information security. Background technique [0002] With the popularization, application and development of computers and computer networks, information security and information security issues are becoming more and more important, and have even been raised to the strategic level of national security. Cryptography is one of the research focuses in the field of information security, and cryptography and cryptographic algorithms are the core content of cryptography. [0003] Typical of traditional cryptographic algorithms are substitution ciphers and transposition ciphers. Substitution ciphers indicate that each character / bit in the text is replaced with another character / bit in the ciphertext, including single-letter substitution, multi-l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 张绍成李鹏范铁生马旭王大勇张雯菲
Owner LIAONING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products