Data encryption and decryption method and system
A data encryption and data decryption technology, which is applied in the field of data security, can solve the problems of low security of encryption and decryption methods, and achieve the effects of complex filling methods, improved data security, and strong randomness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] see figure 1 , the present embodiment provides a data encryption and decryption method, the data encryption step comprising:
[0038] Step 101. Calculate the total length L of the data to be encrypted, and determine the required C original pictures for filling the data to be encrypted according to the total length L.
[0039] Wherein, the determination method of the C original pictures may be:
[0040] The first one is to randomly generate or randomly specify the image size X*Y, calculate the number C of images to be provided according to the total length L and the image size X*Y, and then obtain C original images with the size X*Y. In this method, the C original pictures with the specification of X*Y can be randomly selected from the built-in picture library, or can be specified by the user or taken by the camera.
[0041] The second method is to acquire multiple original pictures in sequence. When acquiring an original picture, it is estimated whether other original...
Embodiment 2
[0063] Embodiment 2 provides a data encryption and decryption system, including a data encryption device and a data decryption device.
[0064] Data encryption devices include:
[0065] The original picture acquisition unit is used to calculate the total length L of the data to be encrypted, and determine the required C original pictures for filling the data to be encrypted according to the total length L;
[0066] The filling setting unit is used to set the picture filling order and RGBA filling option and order corresponding to each original picture, and record it at the specified position of each original picture;
[0067] The filling execution unit is configured to fill the C original pictures with the data to be encrypted according to the picture filling sequence corresponding to each original picture and the RGBA filling options and order according to the preset filling rules, and obtain corresponding C encrypted pictures.
[0068] Data decryption devices include:
[0...
Embodiment 3
[0073] This embodiment provides a computer-readable storage medium, including instructions. When the instructions are run on a computer, the computer can execute the data encryption and decryption method described in Embodiment 1.
[0074] The above-mentioned computer-readable medium may include: any entity or device capable of carrying the above-mentioned instructions, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory), random access Memory (RAM, Random Access Memory), electrical carrier signal, telecommunication signal, and software distribution medium, etc.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
