Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for encrypting and decrypting picture

An encryption method and picture technology, applied in the field of picture processing, can solve problems such as picture information leakage

Inactive Publication Date: 2018-12-18
GUANGZHOU SHIYUAN ELECTRONICS CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a picture encryption and decryption method and device to at least solve the technical problem of picture information leakage caused by the lack of effective picture encryption means

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for encrypting and decrypting picture
  • Method and device for encrypting and decrypting picture
  • Method and device for encrypting and decrypting picture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0030] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a picture encryption and decryption method and apparatus. The method comprises the following steps: determining a picture to be encrypted; determining a second key map in the first key map, wherein the first secret key map is used for encrypting a picture to be encrypted by the three primary color values of pixel points in the first secret key map, the second secret key map is a first rectangular area formed by taking a designated point in the first secret key map as a vertex of the first rectangular area and taking a length and a width of the picture to be encrypted as a length and a width of the first rectangular area; the pixel points in the picture to be encrypted are encrypted according to the three primary color values of the pixel points in the second secret key map to obtain the encrypted picture. The present application solves a technical problem of picture information disclosure due to a lack of effective picture encryption means.

Description

technical field [0001] The present application relates to the field of image processing, in particular, to a method and device for encrypting and decrypting images. Background technique [0002] With the development of cameras, there are more and more image application scenarios, but the security issues of images have not attracted the attention of the public. For example, the images captured in some confidential scenes are also transmitted in clear text during network transmission, thus losing the confidentiality of images. Features. [0003] A commonly used image encryption method at this stage is to cut the image into multiple fragments, and then reassemble the fragments to complete the encryption of the image. But the disadvantage of this encryption method is that this method does not change the color information of the picture, and people who are familiar with the picture can still roughly know the original information of the picture, resulting in poor picture encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/16
CPCG06F21/16G06F21/602
Inventor 陈全
Owner GUANGZHOU SHIYUAN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products