An image encryption method and device

An encryption method and image technology, applied in the field of image processing, can solve the problems of obvious outline and concentrated encrypted information.

Active Publication Date: 2019-06-21
CAPITAL NORMAL UNIVERSITY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiment of the present application is to provide an image encryption method and device, which can avoid the concentration of encrypted information, and can further solve the problem of prominent contours

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image encryption method and device
  • An image encryption method and device
  • An image encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] See figure 1 As shown, figure 1 This is a flowchart of an image encryption method provided in the first embodiment of this application, the method includes:

[0080] S101: Obtain a quaternion matrix of the image to be encrypted.

[0081] In a specific implementation, the image to be encrypted is first obtained, and the image to be encrypted is expressed as a first quaternion matrix, and further, the first quaternion matrix is ​​Fourier transformed to obtain the second quaternion matrix.

[0082] Here, the formula for expressing the image to be encrypted as the first quaternion matrix can be f(x,y)=f 1 (x,y)+if 2 (x,y)+jf 3 (x,y)+kf 4 (x,y), where f(x,y) is the first quaternion matrix, f 1 (x,y), f 2 (x,y), f 3 (x,y), f 4 (x, y) is each single-channel image corresponding to the image to be encrypted, where the imaginary units i, j, and k satisfy ij=-ji=k, jk=-kj=i, ki=-ik=j, i 2 =j 2 =k 2 = -1.

[0083] Here, the image to be encrypted can have two forms:

[0084] Form 1: The ima...

Embodiment 2

[0139] Based on the same application concept, the second embodiment of the application also provides an image encryption device corresponding to the image encryption method provided in the first embodiment. Since the principle of the device in the embodiment of the application to solve the problem is the same as that in the above-mentioned embodiment of the application The image encryption method is similar, so the implementation of the device can refer to the implementation of the method, and the repetition will not be repeated.

[0140] See figure 2 As shown, one of the functional module diagrams of an image encryption device 200 provided in the second embodiment of this application; see image 3 As shown, the second functional block diagram of an image encryption device 200 provided in the second embodiment of this application; wherein, the image encryption device 200 includes:

[0141] The obtaining module 210 is used to obtain the quaternion matrix of the image to be encrypted...

Embodiment 3

[0169] Based on the same application concept, see Figure 4 As shown, this is a schematic structural diagram of an electronic device 400 provided in the third embodiment of this application, including: a processor 410, a memory 420, and a bus 430. The memory 420 stores machine-readable instructions executable by the processor 410 When the electronic device 400 is running, the processor 410 and the memory 420 communicate through the bus 430, and the machine-readable instructions are executed when the processor 410 is running. figure 1 For the steps of the image encryption method in the first embodiment of the method shown, for specific implementation manners, please refer to the method embodiment, which will not be repeated here.

[0170] Specifically, when the machine-readable instruction is executed by the processor 410, the following steps are executed:

[0171] Obtain the quaternion matrix of the image to be encrypted;

[0172] Determine the parallel component matrix and the ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of image processing, in particular to an image encryption method and device. The image encryption method comprises the steps of obtaining a quaternion matrix of an image to be encrypted; Determining a parallel component matrix and a vertical component matrix of the to-be-encrypted image based on the quaternion matrix; Determining a complex value mask ofthe to-be-encrypted image based on the parallel component matrix and the vertical component matrix; And generating an encrypted image corresponding to the to-be-encrypted image based on the complex value mask. By adopting the image encryption algorithm, the concentration of encrypted information can be avoided, so that the problem of obvious contour highlighting is further solved, and the security of the image in transmission can be improved.

Description

Technical field [0001] This application relates to the field of image processing technology, and specifically to an image encryption method and device. Background technique [0002] With the rapid development of computer networks and communication technologies, a large number of multimedia data such as images and videos are generated every day. These multimedia data may contain some important or private information. On the one hand, the Internet has brought convenience to the transmission and use of these data; at the same time, the openness and sharing of the network also makes information facing tampering or malicious use, which brings huge losses to people. In order to protect the security of the image content, the image can be encrypted at the sending end. [0003] At present, among the many ways to encrypt images, the quaternion matrix method is widely used to encrypt images. However, the traditional quaternion matrix encryption method still has limitations in the complexity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06T9/00
Inventor 邵珠宏尚媛园赵晓旭丁辉刘铁
Owner CAPITAL NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products