Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image encryption method, device and equipment and readable storage medium

An encryption method and image technology, which are applied to secure communication devices, secure communication through chaotic signals, and key distribution, can solve the problem that the real-time requirements of image encryption cannot be met, the computing performance and storage resources are incomparable, and the secret key occupies a large storage space. And other issues

Inactive Publication Date: 2019-12-03
GUANGDONG INSPUR BIG DATA RES CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of mobile smart devices (such as smart phones, smart watches, etc.), the demand for image encryption on mobile smart devices has become increasingly prominent, but the DRPE encryption method based on discrete cosine transform has the disadvantage that the secret key occupies a large amount of storage space and consumes computing resources. Larger problems, it is difficult to apply to mobile smart devices whose computing performance and storage resources are difficult to compare, and it cannot meet people's real-time needs for image encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method, device and equipment and readable storage medium
  • Image encryption method, device and equipment and readable storage medium
  • Image encryption method, device and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Please refer to figure 1 , figure 1 It is an implementation flowchart of an image encryption method in an embodiment of the present invention, and the method includes the following steps:

[0063] S101. Acquire an image to be encrypted, a first chaotic mapping matrix, and a second chaotic mapping matrix.

[0064] Wherein, the image to be encrypted may be any image that needs to be encrypted. For example, it could be a photo of the ID to be transferred.

[0065] The image to be encrypted can be directly captured by an image acquisition device such as a camera, or the image to be encrypted can be obtained by communicating and interacting with other devices and receiving images sent by other devices; it can also directly read pre-stored images from readable storage media. The image to be encrypted.

[0066] Wherein, the first chaotic mapping matrix and the second chaotic mapping matrix may be the same or different. The chaotic mapping matrix can be obtained by using t...

Embodiment 2

[0086] After the image is encrypted, the encrypted image needs to be decrypted when the image needs to be viewed. If both the decryption process and the encryption process are implemented on the same device, please refer to figure 2 The decryption process shown, figure 2 It is an implementation flowchart of an image decryption method in an embodiment of the present invention, and the method includes the following steps:

[0087] S201. Perform discrete cosine transform on the encrypted image to obtain a fourth image.

[0088] If the image decryption process and the image encryption process are implemented on the same device, the matrix obtained during the encryption process can be directly used for decryption during the decryption process.

[0089] First, a discrete cosine transform is performed on the encrypted image, and at this time a fourth image can be obtained.

[0090] S202. Calculate an inverse matrix of the third matrix and multiply it with the fourth image to obt...

Embodiment 3

[0096] Considering that the image is encrypted, it is often encrypted when the image needs to be transmitted to ensure the security of the image. In order for the receiver to decrypt the encrypted image, the decryption key and the encrypted image can also be sent to the receiver. That is, on the basis of the above method embodiments, after the image encryption is completed, the following steps can also be performed:

[0097] Step 1, using the first random parameter group and the second random parameter group as keys;

[0098] Step 2, transmit the key and the encrypted image to the receiving end.

[0099]It should be noted that, in this embodiment, in order to reduce data transmission, the first random parameter group and the second random parameter group are directly used as keys. It can be known from the above second embodiment that the first chaotic mapping matrix and the second chaotic mapping matrix may also be used as keys. Of course, the matrix required in the decrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method. The method comprises the following steps: obtaining a to-be-encrypted image, a first chaotic mapping matrix and a second chaotic mapping matrix; multiplying the to-be-encrypted image by the first chaotic mapping matrix to obtain a first image; carrying out discrete cosine transform on the first image and the second chaotic mapping matrix to obtain a second image and a third matrix; multiplying the third matrix by the second image to obtain a third image; and performing inverse discrete cosine transform on the third image to obtain an encrypted image. Thus, when the method is adopted to encrypt the image, the occupied computing resources can be reduced, and the storage space can be reduced, so that the method can be suitable for equipmentwith poor computing performance and / or small storage space, and due to the fact that the occupied computing resources are small, computing is simple, and the real-time requirement of image encryptionprocessing can be met. The invention further discloses an image encryption device and equipment and a readable storage medium, which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the technical field of image security, in particular to an image encryption method, device, equipment and readable storage medium. Background technique [0002] Optical image encryption technology is widely used in the field of image security because it can quickly process large amounts of data through the application of related algorithms. Especially in 1995, Double Random Phase Encryption (DRPE) was proposed for the first time, and image encryption has attracted widespread attention. This method uses technologies such as cosine transform to encrypt information in the space domain and frequency domain; in the field of image encryption, this technology mainly uses random phase encryption methods on the input plane and cosine plane to realize image encryption. During the encryption process, the input image is encrypted. Converted to a white noise image, the decryption process can be viewed as the inverse of the encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCH04L9/001H04L9/0869H04L9/0894H04L9/0819H04L63/0428
Inventor 刘哲
Owner GUANGDONG INSPUR BIG DATA RES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products