Unlock instant, AI-driven research and patent intelligence for your innovation.

Facebook-compression-resistance image encryption method

An encryption method and encryption method technology, applied in image watermarking, encryption device with shift register/memory, image data processing, etc., can solve problems such as low encryption security, exposed images, and low attack resistance, and achieve Good safety, good application prospects, and good adaptability

Active Publication Date: 2018-03-27
ANHUI UNIVERSITY
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can guarantee the quality of the image when it is decrypted, but the security of the encryption is not high, and the basic outline of the image will be exposed under some attack methods
[0006] Among the existing methods, for the image encryption of the Facebook social network platform, the image information encryption effect is relatively high, but the anti-attack is very low, because when Facebook processes the uploaded image, it reads from the pixel domain, and then performs JPEG compression, in today's encryption schemes, only water-washing encryption and AC coefficient XOR encryption are performed on the image DC coefficients, because after the image DCT transformation and quantization, XOR encryption is performed according to the same binary data stream, and the number of non-zero AC coefficients And the position of the last non-zero AC coefficient will not change, and the size of the smaller AC coefficient will not change too much, so by attacking the AC coefficient, the basic outline of the image can be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Facebook-compression-resistance image encryption method
  • Facebook-compression-resistance image encryption method
  • Facebook-compression-resistance image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The concrete steps of this embodiment are as follows:

[0052] 1. Image encryption process:

[0053] Such as Figure 5 An 8×8 image block shown in (a) is encrypted for the first time. Firstly, it is subjected to DCT transformation, and then a standard quantization table with a quality factor of 71 is selected for the block to quantize it, and the obtained Figure 5 (b). Therefore, for an image block with a size of less than H×W, it can be divided into blocks, and then each block is DCT transformed and quantized in this way, then there are a total of DC coefficients, and several AC nonzero coefficients.

[0054] Encrypt the DC coefficients, set the encryption key K=3, arrange all the DC coefficients in the two-dimensional matrix according to the original order, and move them downward for K times and to the right for K times to obtain a new coefficient matrix . The new coefficient matrix is ​​used as the image DC coefficients of each block in sequence. Assume F...

Embodiment 2

[0058] In order to test the effect of this embodiment, experiments and analysis are carried out from three aspects: encryption effect, common attack effect and image quality.

[0059] Taking the commonly used standard test image of 512×512 pixels as an example, using the key K=23, the effects of different image encryption, uploading to Facebook, and downloading and viewing are as follows: figure 1 shown.

[0060] If there is no correct key, in order to verify the reliability of the encryption, the wrong key 21, 22 and 24, 25 are respectively used to decrypt Figure 1(a), the effect is as follows figure 2 shown.

[0061] Encrypted image without key figure 1 (a) Carry out DCM (DC category mapping), NCC (non-zero AC coefficient count), EAC (energy of AC coefficients block) and PLZ (position of last non-zero AC coefficients) four attacks, the effect is as follows image 3 shown.

[0062] If there is a correct key, the decryption effect on the image is as follows: Figure 4 sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Facebook-compression-resistance image encryption method. The method sequentially includes the following steps: carrying out 8x8 block partitioning on an image; carrying out discrete cosine transform and quantization on each block; encrypting a DC coefficient and AC coefficients of the image; using the image blocks as units to encrypt the image; carrying out out-of-bound processing; and carrying out secondary encryption. According to the method, characteristics of a Facebook social-network platform on image processing are combined, realization is simple, security is high, and various attacks can be effectively resisted. The method has wide application prospects for image encryption protection based on the Facebook social-network platform.

Description

technical field [0001] The invention relates to image compression and encryption technology, in particular to an image encryption method resistant to Facebook compression. Background technique [0002] In the information age of the 21st century, with the development of the Internet and the popularity of mobile devices, social networks have gradually become an inseparable part of our lives. Today, the mainstream social networking platforms in the world include Google+, Facebook, WeChat and Twitter, etc. Wait. However, with the widespread application of social networks, people begin to pay more and more attention to personal privacy and security. As a main medium of information exchange, pictures are uploaded every day on mainstream social network platforms such as Facebook. The image contains a lot of private information, including the appearance of the characters, geographical location and even commercial secret information. As a result, privacy protection in social networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04L9/06H04L9/14
CPCG06T1/005H04L9/0618H04L9/065H04L9/14
Inventor 殷赵霞刘晓庆
Owner ANHUI UNIVERSITY