Image encryption method and device based on joint zero-watermark embedding
An encryption method and zero watermark technology, applied in the field of information security, can solve the problems of privacy leakage, illegal plagiarism, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0087] As an implementation manner, the key matrix C can be obtained by the formula C(i+1)=mod(mod(sp(mod(C(i)×cr1,M)+1)×10 14 ,256)+C(i)-K(i),2 8 ), where the initial value C(0) is cr2, and K(i) is a set of random numbers generated by random seeds, and its length is 32.
[0088] It should be noted that the secret key matrix C in this embodiment can be generated based on the approximate components, or can be generated from any of the horizontal detail components, vertical detail components, and diagonal detail components, which is not limited in this implementation , in addition, the key matrix mentioned in this embodiment is the key matrix C generated above.
[0089] Step S140, process each of the decimal matrices to obtain 4 first decimal vectors, and sort the vector elements in each of the first decimal vectors, and determine the position of each vector element after sorting before sorting The position in the first decimal vector is described to obtain 4 first position ve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


