Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary two-dimensional code image encryption and decryption method and device

A two-dimensional code and image technology, applied in the computer field, can solve the problems of low encryption algorithm complexity, low security, and high publicity, and achieve the effects of improving security, high sensitivity, and high computational complexity

Inactive Publication Date: 2017-05-10
CHONGQING UNIV OF POSTS & TELECOMM +1
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing two-dimensional code encryption method has low encryption algorithm complexity and high public awareness, is easy to be cracked, and has low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary two-dimensional code image encryption and decryption method and device
  • Binary two-dimensional code image encryption and decryption method and device
  • Binary two-dimensional code image encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] figure 1 It is an application environment diagram for the operation of the method for encrypting and decrypting binary two-dimensional code images in one embodiment. Such as figure 1 As shown, the application environment includes a terminal 110 and a server 120, wherein the terminal 110 and the server 120 communicate through a network.

[0043] The terminal 110 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but is not limited thereto. The encrypted two-dimensional code can be sent between the terminal 110 and the server 120 through the network. The device for encrypting and decrypting binary two-dimensional code images can be in the terminal or in the server.

[0044] In one embodiment, figure 1 The internal structure of the server 120 in figure 2 As shown, the server 120 includes a processor, a storage medium, a memory, and a network interface connected through a system bus. Wherein, the storage medium of the server 120 s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a binary two-dimensional code image encryption method. The method includes obtaining a two-dimensional image, and generating a binary matrix according to the two-dimensional code image; obtaining a secret key which includes an initial value Z and a starting parameter, wherein the initial value Z is larger than 1, and the starting parameter is between 0 and 1; adopting a Z mapping algorithm to generate a two-dimensional secret key matrix according to the secret key; and performing XOR on elements of the binary matrix and elements of the two-dimensional secret key matrix in one-to-one correspondence to obtain an encrypted two-dimensional code image, decryption difficulty is increased, and security of two-dimensional code information is improved. In addition, a binary two-dimensional code image encryption device and binary two-dimensional code image decryption method and device are also provided.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for encrypting and decrypting a binary two-dimensional code image. Background technique [0002] With the development of computer technology, two-dimensional codes usually use black and white binary graphics to record data symbol information. Because they can easily carry information, they have been widely used in various fields, such as data storage through two-dimensional codes, web page login, mobile payment, etc. In order to prevent the important information contained in the two-dimensional code from being stolen and modified, it needs to be encrypted before its transmission and storage to ensure the security and validity of the information carried by the two-dimensional code. [0003] The existing two-dimensional code encryption method has low encryption algorithm complexity and high publicity, is easy to be cracked, and has low security. Contents of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06K19/06
Inventor 刘雨龙李维雅蒋溢
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products