Living body portrait photo encryption method, living body portrait photo decryption method and living body portrait photo encryption and decryption system
An encryption method and photo technology, applied in the field of information security, can solve the problems of personal information being leaked, fraudulently used, attacked, tampered with, etc., to achieve the effect of improving the security protection system, protecting security, and strengthening protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The present invention will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
[0048] figure 1 A flow chart showing the steps of the method for encrypting a living portrait photo according to the present invention.
[0049] In this embodiment, the live portrait photo encryption method according to the present invention may include:
[0050] Step 101, generating a random number sequence as a random key;
[0051] In one example, a random SM4 key is generated using encryption controls as a subsequent random key.
[0052] Step 102, using the random key to encrypt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


