Facebook-compression-resistance image encryption method
An encryption method and encryption method technology, applied in image watermarking, encryption device with shift register/memory, image data processing, etc., can solve problems such as low encryption security, exposed images, and low attack resistance, and achieve Good safety, good application prospects, and good adaptability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] The concrete steps of this embodiment are as follows:
[0052] 1. Image encryption process:
[0053] Such as Figure 5 An 8×8 image block shown in (a) is encrypted for the first time. Firstly, it is subjected to DCT transformation, and then a standard quantization table with a quality factor of 71 is selected for the block to quantize it, and the obtained Figure 5 (b). Therefore, for an image block with a size of less than H×W, it can be divided into blocks, and then each block is DCT transformed and quantized in this way, then there are a total of DC coefficients, and several AC nonzero coefficients.
[0054] Encrypt the DC coefficients, set the encryption key K=3, arrange all the DC coefficients in the two-dimensional matrix according to the original order, and move them downward for K times and to the right for K times to obtain a new coefficient matrix . The new coefficient matrix is used as the image DC coefficients of each block in sequence. Assume F...
Embodiment 2
[0058] In order to test the effect of this embodiment, experiments and analysis are carried out from three aspects: encryption effect, common attack effect and image quality.
[0059] Taking the commonly used standard test image of 512×512 pixels as an example, using the key K=23, the effects of different image encryption, uploading to Facebook, and downloading and viewing are as follows: figure 1 shown.
[0060] If there is no correct key, in order to verify the reliability of the encryption, the wrong key 21, 22 and 24, 25 are respectively used to decrypt Figure 1(a), the effect is as follows figure 2 shown.
[0061] Encrypted image without key figure 1 (a) Carry out DCM (DC category mapping), NCC (non-zero AC coefficient count), EAC (energy of AC coefficients block) and PLZ (position of last non-zero AC coefficients) four attacks, the effect is as follows image 3 shown.
[0062] If there is a correct key, the decryption effect on the image is as follows: Figure 4 sh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


