Image certainty encryption double-blind secrecy matching method

A matching method and deterministic technology, which is applied in image analysis, image data processing, image data processing, etc., can solve the problems of difficult key transmission and distribution, uncrackable, etc.

Active Publication Date: 2015-04-22
WUHAN INST OF PHYSICS & MATHEMATICS CHINESE ACADEMY OF SCI
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The biggest advantage is that it uses a random key with the same length as the message to generate a random output that has no statistical relationship with the original text. According to Shannon's theory, the one-time pad encryption algorithm is absolutely safe and unbreakable; its defective key is transmitted and there are great difficulties in distributing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image certainty encryption double-blind secrecy matching method
  • Image certainty encryption double-blind secrecy matching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] An image deterministic encryption double-blind confidential matching method, the method comprises the following steps:

[0035] (1) Randomly generate a position replacement matrix N according to the size of the image matrix, and save the matrix;

[0036] (2) Use the permutation matrix N to scramble the pixel positions of the target image matrix Y to be matched in terminal A, and obtain the encrypted target image Y to be matched * ;

[0037] (3) Use the permutation matrix N to scramble the pixel positions of each floating image matrix in the terminal B database to obtain the encrypted floating image matrix X * (i), i=1, 2, ..., M, form the encrypted floating image matrix database;

[0038] (4) The target image Y to be matched after being encrypted in terminal A * Send to terminal B, and the encrypted floating image matrix X in terminal B * (i) subtraction, i=1, 2, ..., M, to obtain the residual sequence set {R(i): i=1, 2, ..., M};

[0039] (5) Calculate the non-stat...

Embodiment 2

[0042] An image deterministic encryption double-blind secret matching technology method, the method includes the following steps:

[0043] (1) Establish a database with 20 floating image matrices in terminal B, each image size is 200X200, such as figure 1 as shown in (a);

[0044] (2) Randomly generate a 200×200 position replacement matrix N, and save the matrix;

[0045] (3) Use the position replacement matrix N to scramble the positions of the floating image matrices in the terminal B database to obtain the encrypted floating image matrix X * (i), i=1, 2, ..., 20, obtain the encrypted floating image matrix database, such as figure 1 as shown in (b);

[0046] (4) Use the random matrix N to scramble the pixel position of the target image Y to be matched in terminal A, and obtain the scrambled encrypted target image Y to be matched * ;

[0047] (5) Send the scrambled and encrypted target image to be matched in terminal A to terminal B, and the encrypted floating image matr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image certainty encryption double-blind secrecy matching method and relates to data instability measuring and image matching technology. The image certainty encryption double-blind secrecy matching method can be used for conducting secrecy matching on an image with randomly disordered pixel positions by means of the characteristic that an instability measuring method can be used for measuring the stability of data streams. The image certainty encryption double-blind secrecy matching method has the advantages that the pixel positions of the image are disordered and encrypted, and under the situation that the random number of the positions is unknown, the image cannot be restored and image content cannot be identified; the encrypted image is difficult to decrypt; under the situation that a secret key is known, the image can be easily restored. The image certainty encryption double-blind secrecy matching method has wide application prospects in the fields of identity authentication, information security and the like.

Description

technical field [0001] The invention relates to data instability measurement and image matching technology, in particular to an image deterministic encryption double-blind secret matching technology method. This technology has broad application prospects in the fields of identity authentication and information security. Background technique [0002] In the era of big data, data security is a very important issue. Especially after the recent discontinuation of XP service by Microsoft in the United States, hackers may maliciously invade computers and steal various data, which will inevitably cause irreparable losses to the country, enterprises and other departments or individuals. Image is one of the important data types, how to keep its content secret and how to match it under the condition of confidentiality is a very challenging research topic. Based on the research results at home and abroad, at present, image matching and recognition methods can be mainly divided into t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06T7/00G06F21/60
Inventor 丁义明刘侃曾志高谭秋衡
Owner WUHAN INST OF PHYSICS & MATHEMATICS CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products