Device and method based on pixel encryption

An image device and pixel technology, applied in the field of information security, can solve problems such as inability to prevent shooting, and achieve the effect of enhancing confidentiality and high stability

Pending Publication Date: 2019-08-02
沈阳圣狩软件科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The object of the present invention is to provide a device and method based on pixel encryption, which solves the problem of preventing shooting from the source of file output

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method based on pixel encryption
  • Device and method based on pixel encryption
  • Device and method based on pixel encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 1 It is a structural diagram of a device based on pixel encryption according to Embodiment 1 of the present invention. see figure 1 , this embodiment provides a device based on pixel encryption, which includes: a signal processing device 1 , an encryption sub-device 2 , an image device 3 and a display device 4 .

[0044] The output end of the signal processing device 1 is electrically connected to the input end of the encryption sub-device 2 . The signal processing device 1 is used to decompose the pixels of the file to be encrypted to obtain the processed file, and is also used to collect the specific content of the file to be encrypted, and send the processed file to the encryption sub-device 2 . The signal processing device 1 adopts a SiI9011 chip. Files to be encrypted include but are not limited to text, pictures and videos.

[0045] The output end of the encryption sub-device 2 is electrically connected with the input end of the imaging device 3 . The ...

Embodiment 2

[0055] figure 2 It is a flow chart of the pixel-based encryption method according to Embodiment 2 of the present invention. see figure 2 , this embodiment 2 provides a method based on pixel encryption, which includes:

[0056] Step 201, obtain the file to be encrypted. Files to be encrypted include but are not limited to text, pictures and videos.

[0057] Step 202, performing pixel decomposition processing on the file to be encrypted to obtain the processed file. It specifically includes: acquiring a display image of the file to be encrypted, and splitting pixels of the display image.

[0058] Step 203, perform classification processing on all pixels of the processed file to obtain classified pixels. Specifically include:

[0059]Divide pixels with the same RGB value in all pixels of the processed file into one category. RGB represents the colors of the three channels of red (red, R), green (green, G), and blue (blue, B). The RGB color mode is a color standard in the...

Embodiment 3

[0065] This embodiment provides a pixel encryption system. The pixel encryption system includes: a signal processing device, an encryption sub-device and an image device.

[0066] The signal source transmits the file to be encrypted to the signal processing device. Files to be encrypted include text, pictures, and videos.

[0067] The signal processing device receives and collects the file to be encrypted, copies the original RGB value of the file to be encrypted, decomposes the original pixels of each frame of the image in the file to be encrypted to obtain a processed file, and transmits the processed file to the encryption sub-device.

[0068] The signal source and the signal processing device are connected through a high-definition multimedia interface (High Definition Multimedia Interface, HDMI). The signal processing device is electrically connected with the encryption sub-device.

[0069] The encryption sub-device encrypts the processing file, generates an encrypted ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device and method based on pixel encryption in the technical field of information security. The device based on pixel encryption comprises a signal processing device, an encryption sub-device, an image device and a display device. The signal processing device is used for carrying out pixel decomposition on the to-be-encrypted file to obtain a processed file. The encryption subdevice is used for encrypting the processing file to obtain an encrypted file. The image device is used for fitting the encrypted file to generate an encrypted image; the display device is used for displaying the encrypted image. According to the device based on pixel encryption, a to-be-encrypted file is processed through a signal processing device, and an encryption sub-device encrypts theprocessed file. A new picture is generated through the image device, an original picture is changed, and the situation that information of a to-be-encrypted file is leaked through a shooting means isfundamentally eradicated.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a device and method based on pixel encryption. Background technique [0002] With the rapid development of the Internet and the Internet of Things, the amount of data information is developing in a blowout manner. Therefore, anti-shooting security technology has become extremely important. At present, the existing watermark encryption technology only adds a watermark background to the document, and then traces the source of the leak afterwards, which does not achieve the purpose of preventing shooting; the interference image generated by polarization technology can be viewed only by wearing general polarized glasses, and it does not achieve preventing shooting. the goal of. Therefore, there is a problem in the prior art that anti-photographing cannot be performed from the source of file output. Contents of the invention [0003] The object of the present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/182H04N19/42H04N19/44H04N19/46H04L29/06H04L29/08
CPCH04N19/182H04N19/42H04N19/44H04N19/46H04L67/06H04L63/0428
Inventor 祝涛
Owner 沈阳圣狩软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products