Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Encoding Method for Invisible Image Cipher

An image encryption and encoding method technology, applied in the field of image encryption, can solve the problems of strengthening confidential information, geometric shapes are easy to be cracked, copied, stolen, and insufficient information protection, achieving simple encoding rules and preventing reverse identification by people. The effect of extracting information and hidden code is fast

Active Publication Date: 2019-03-08
SHENZHEN TAIJIU INFORMATION SYST CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the above-mentioned technical problem of insufficient information protection, the present invention proposes an invisible image encryption technology, which hides confidential information in the image, and overcomes the problem that the traditional two-dimensional code stores information through geometric shapes and causes the geometric shapes to be exposed outside the naked eye. The disadvantages of being easily cracked, copied, and stolen greatly strengthen the protection of confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Encoding Method for Invisible Image Cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The invention discloses a method for encoding invisible image passwords, which is characterized in that the method comprises the following steps:

[0030] S101: The system receives the specified picture and encryption request from the client, the encrypted information is such as 123456789; the picture is divided into cells and divided according to the horizontal arrangement;

[0031] S102: Perform CMYK four-color color value calculation on the equally divided cells to form a color value database with different values;

[0032] Such as figure 1 , S103: Comparing the C value color difference between two adjacent cells, CN+m-CN≥0 is defined as 1, and the others are defined as 0, adjacent to that is m=1; comparison results are pre-stored according to rules Assign 1 and 0 to form a new set of source characters composed of "0" and "1" with internal logic basis;

[0033] S104: The above-mentioned source characters take 10 data as a unit, and each unit records different infor...

Embodiment 2

[0037] In the above step S103, for the M-value color value difference comparison, KN+m-KN≥0 is defined as 1, and the others are defined as 0, adjacent to that is m=1; the comparison results are assigned 1 and 0 in pre-stored rules, A new set of source characters composed of "0" and "1" with internal logic basis is formed.

Embodiment 3

[0039] In the above step S103, the CMYK value color value difference is compared, and the color value difference is compared by adding the absolute value of each color value of CMYK, and the large cell item of the serial number is greater than or equal to the small cell item of the serial number according to the definition, which is defined as 1, and other Defined as 0, forming a new set of source characters composed of "0" and "1" with internal logic basis.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encoding method of invisible image ciphers. The encoding method comprises the following steps that: a system receives a specified picture and an encryption request from a client end, and performs cell processing on the picture, and equally divides cells in an orderly way; CMYK four-color value calculation is performed on the equally-divided cells, so that a color value database of different numerical values can be formed; the cells are repeatedly extracted according to rules so as to be subjected to paired color value difference comparison, and comparison results are assigned with 1 or 0 based on preset rules, so that a brand new set of source value database with an internal logic basis can be formed; and information to be encrypted is stored in the source value database in a grouped manner. With the encoding method adopted, invisible code information of codes is invisible. The information of a traditional two-dimensional code is stored through a geometrical feature, and the geometrical feature is exposed to naked eyes apparently, and as a result, defects of high possibility of being cracked, copied and stolen of the traditional two-dimensional code exist, while, with the encoding method of the invention adopted, the defects can be eliminated. According to the encoding method, the specified information of the client end is adopted as a key to match comparison value parameters, and therefore, various kinds of situations can be provided, and people can be prevented from reversely recognizing and extracting information.

Description

technical field [0001] The present invention relates to image encryption technology, more particularly, relates to an invisible image password encoding technology. Background technique [0002] A barcode is a graphic identifier that arranges multiple black bars and blanks with different widths according to certain coding rules to express a set of information. Bar codes can mark a variety of information on items, so they have been widely used in many fields. However, there are problems that it is easy to be cracked and the confidentiality is not high. Therefore, the use of traditional two-dimensional codes and the promotion and application of them on a large scale have become difficult problems. [0003] CMYK, also known as printing color mode, is a color mode that relies on reflection. It is the initials of the names of four printing inks: C. Cyan M. Magenta Y. Yellow K. Black, which are usually used in printing by these four colors Reproduce thousands of other colors; ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 陈龙军
Owner SHENZHEN TAIJIU INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products