Image multi-secret transmission method, device and system based on bidirectional authentication

A technology of secure transmission and two-way authentication, which is applied in the field of multiple secure transmission of images based on two-way authentication. The effect of protecting security

Inactive Publication Date: 2020-04-21
合肥道正数据科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the digital images obtained by people have reached tens of billions, which play an important role in the national economy and daily life. The transmission of images on the network is becoming more and more frequent, and the confidentiality and privacy of images are becoming more and more popular among users. At present, the information encryption method commonly used in image transmission and storage makes it impossible for others to know the content of the image itself, but after seeing the encrypted image, others think it is important and will decipher it. If it cannot be deciphered, it will be destroyed, which is not conducive to the protection of the image. Safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] It should be noted that certain names are used in the specification and claims to refer to specific components. It should be understood that those skilled in the art may use different names to refer to the same component. The specification and claims of the present application do not use the difference in name as a way to distinguish components, but use the substantial difference in function of components as a criterion for distinguishing components. As used in the specification and claims of this application, "comprising" o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of image secret transmission and discloses a multi-secret transmission method, device and system based on a bidirectional authentication image. The methodcomprises the following steps of: establishing an encrypted carrier image database, encrypting an image, establishing transmission channel authentication, performing encrypted transmission, decryptingdata and recovering an image. The device comprises a voice receiving terminal, a client, a server and a background database, the system comprises one or more processors, a storage device and a multi-secret transmission device based on bidirectional authentication images. The image is split and rearranged, so that the image transmission security and privacy protection capability can be improved, the image data is prevented from being maliciously eavesdropped or counterfeited, meanwhile, a relatively good maintaining effect of the image is ensured, distortion is avoided, and the method has a relatively good practical value.

Description

technical field [0001] The invention relates to the technical field of secure image transmission, in particular to a method, device and system for multiple secure transmission of images based on two-way authentication. Background technique [0002] With the rapid development of science and technology, the Internet industry has risen, and data transmission has become an indispensable communication method in people's daily life. In order to ensure the safety of the communication process, data is transmitted between the sender and the receiver. Whenever, the transmitted data needs to be encrypted. [0003] In some occasions with high security requirements, how to achieve unity from mutual authentication of data transmission to confidential transmission of data, while not only ensuring general security, but also overcoming various malicious active attacks and Data theft is also a key issue to be solved; [0004] At present, the digital images obtained by people have reached te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04N1/32
CPCH04L9/0631H04N1/32272
Inventor 夏波张辰辰另大兵蒋舜瞿安东李松霍良辰张鹏李家红
Owner 合肥道正数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products