Data transmission method and device based on image encryption
A data transmission method and technology for encrypting data, applied in the field of data transmission methods and devices based on image encryption, can solve the problems of low security factor, easy to be deciphered and obtained, insufficient encryption strength, etc., and achieve the effect of ensuring efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] A data transmission method based on image encryption, the method performs the following steps:
[0057] Step S1: Input the first image for encryption, perform image processing on the first image, so that the image data is converted into matrixed numerical data, and process the matrixed numerical data, so that the matrixed numerical data is converted into single row data, Use the converted single-row data as the first key for encryption;
[0058] Step S2: inputting the second image for encryption, performing image processing on the second image, so that the image data is converted into matrixed numerical data, and processing the matrixed numerical data, so that the matrixed numerical data is converted into single row data, Use the converted single-row data as the second key for encryption;
[0059] Step S3: Perform bitwise operations on the first key and the second key to obtain the final encryption key;
[0060] Step S4: Encrypt the data to be transmitted according to...
Embodiment 2
[0068] On the basis of the previous embodiment, in the step S1: input the first image for encryption, perform image processing on the first image, convert the image data into matrixed numerical data, and process the matrixed numerical data , so that the matrixed numerical data is converted into a single row of data, and the converted single row of data is used as the method of encrypting the first key to perform the following steps:
[0069] Step S1.1: counting the gray level histogram of the digital image to be processed;
[0070] Step S1.2: Check whether there is an offset in the gray level histogram, perform histogram edge compensation on the offset gray level histogram, and calculate the binarization threshold for the compensated gray level histogram;
[0071] Step S1.3: Binarize the image according to the domain value.
[0072] Specifically, the gray level histogram is a function about the gray level distribution, and is a statistics on the gray level distribution in the...
Embodiment 3
[0083] On the basis of the previous embodiment, in the step S2: input the second image for encryption, perform image processing on the second image, convert the image data into matrixed numerical data, and process the matrixed numerical data , so that the matrixed numerical data is converted into a single row of data, and the converted single row of data is used as the second key for encryption to perform the following steps:
[0084] Step S2.1: Use the edge detection operator to perform edge detection on the input grayscale image, and select the edge intensity threshold range from 0.05 to 0.15;
[0085] Step S2.2: Initialize the statistical values of all gray levels to 0;
[0086] Step S2.3: Use progressive scanning to find edge points, measure the range of gray scale variation of 9 points in the neighborhood of the edge point and the position of the edge point, assign 1 to the statistical weight increment of all gray levels within the range, Do the same for other edge poi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


