Unlock instant, AI-driven research and patent intelligence for your innovation.

A security verification method of encryption algorithm based on JPEG encrypted image

A technology of encryption algorithm and verification method, which is applied in the field of encryption algorithm security verification based on JPEG encrypted image, can solve the problems of large influence of compression rate, etc., and achieve the effect of simple steps.

Active Publication Date: 2019-01-25
CHANGAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Disadvantages: Changing the length of the 0 run, the compression rate is greatly affected;
Therefore, there are risks in the traditional method; the traditional method cannot resist the attack of non-zero count (NZCA). On the basis of this algorithm, there is an improved algorithm combined with the traditional method - FIBS, which is encrypted by the traditional algorithm with 8* The unit of 8 blocks is shuffled and the position of the block is changed, so it can resist non-zero count attacks. Although FIBS changes the position of the block, it does not change the number of non-zero coefficients in the block, so a Method for Verifying Security of FIBS Encryption Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security verification method of encryption algorithm based on JPEG encrypted image
  • A security verification method of encryption algorithm based on JPEG encrypted image
  • A security verification method of encryption algorithm based on JPEG encrypted image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention is described in further detail below in conjunction with accompanying drawing:

[0030] A method for verifying the security of an encryption algorithm based on a JPEG encrypted image, comprising the following steps:

[0031] Step 1), obtain plaintext image P and ciphertext C;

[0032] Step 2), change the number of non-zero coefficients in the first 8*8 blocks of the plaintext image P to obtain the plaintext image as P1, and change the coefficient coordinates of the non-zero coefficients to (x1, y1); pass the plaintext image P1 through Encrypt to get the ciphertext C1, and make the difference between the ciphertext C1 and the ciphertext C to get the coordinates (u1, v1) of the changed coefficient in the ciphertext C, that is, the encrypted coordinates of (x1, y1); through (u1, v1 ) can calculate the block (m,n) where the coefficient is located;

[0033] Step 3), change the number of non-zero coefficients of each 8*8 block in turn according to step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security verification method of an encryption algorithm based on a JPEG encrypted image. Firstly, a plaintext image P and a ciphertext C are obtained. the number of non-zerocoefficients in the first 8*8 block of plaintext image P is changed, and the plaintext image is set as P1, the coefficient coordinates of non-zero coefficients is changed to (x1, y1); The plaintext image P1 is encrypted to obtain the ciphertext C1, and the coordinates (u1, v1) of the coefficients in the ciphertext C are obtained by the difference between the ciphertext C1 and the ciphertext C, andthe block (m, n) where the coefficients are located can be calculated by (u1, v1); the number of non-zero coefficients of each 8*8 block is changed in turn to obtain plaintext coordinates and encrypted ciphertext coordinates; Namely the block position (m, n) of the plaintext block (i, j) is obtained after encryption; Then combined with non-zero counting attack, we can get the overview of the plaintext image, so as to achieve the reconstruction of the draft ciphertext image, and compared with the original plaintext image, we can effectively prove that the analysis of JPEG image encrypted by FIBS encryption algorithm security.

Description

technical field [0001] The invention belongs to the technical field of image processing, and relates to a method for verifying the security of an encryption algorithm based on a JPEG encrypted image. Background technique [0002] Images are an important way for people to obtain information, and digital images and other multimedia technologies based on digital images are gradually becoming an important carrier for people to exchange information. JPEG compressed image can not only provide good compression performance, but also has relatively good reconstruction quality, so it is widely used in the field of image and video processing. With the rapid development of computer network technology, the demand for encryption of private content is also increasing. Image encryption technology has become a key technology to protect the security of digital images. So choosing a strong encryption algorithm is crucial. Image encryption hides visual information through algorithms to prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L9/08G06F21/60
CPCG06F21/602H04L9/0863H04N1/32272
Inventor 李珊珊马若兰周怡彤张红丽
Owner CHANGAN UNIV