Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmission method and device based on image encryption

A data transmission method and technology for encrypting data, applied in the field of data transmission methods and devices based on image encryption, can solve the problems of low security factor, easy to be deciphered and obtained, insufficient encryption strength, etc., and achieve the effect of ensuring efficiency

Inactive Publication Date: 2020-04-28
HUNAN KUANGCHU TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above method can guarantee the security of data transmission to a certain extent, because the encryption and transmission process are only pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and device based on image encryption
  • Data transmission method and device based on image encryption
  • Data transmission method and device based on image encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] A data transmission method based on image encryption, the method performs the following steps:

[0057] Step S1: Input the first image for encryption, perform image processing on the first image, so that the image data is converted into matrixed numerical data, and process the matrixed numerical data, so that the matrixed numerical data is converted into single row data, Use the converted single-row data as the first key for encryption;

[0058] Step S2: inputting the second image for encryption, performing image processing on the second image, so that the image data is converted into matrixed numerical data, and processing the matrixed numerical data, so that the matrixed numerical data is converted into single row data, Use the converted single-row data as the second key for encryption;

[0059] Step S3: Perform bitwise operations on the first key and the second key to obtain the final encryption key;

[0060] Step S4: Encrypt the data to be transmitted according to...

Embodiment 2

[0068] On the basis of the previous embodiment, in the step S1: input the first image for encryption, perform image processing on the first image, convert the image data into matrixed numerical data, and process the matrixed numerical data , so that the matrixed numerical data is converted into a single row of data, and the converted single row of data is used as the method of encrypting the first key to perform the following steps:

[0069] Step S1.1: counting the gray level histogram of the digital image to be processed;

[0070] Step S1.2: Check whether there is an offset in the gray level histogram, perform histogram edge compensation on the offset gray level histogram, and calculate the binarization threshold for the compensated gray level histogram;

[0071] Step S1.3: Binarize the image according to the domain value.

[0072] Specifically, the gray level histogram is a function about the gray level distribution, and is a statistics on the gray level distribution in the...

Embodiment 3

[0083] On the basis of the previous embodiment, in the step S2: input the second image for encryption, perform image processing on the second image, convert the image data into matrixed numerical data, and process the matrixed numerical data , so that the matrixed numerical data is converted into a single row of data, and the converted single row of data is used as the second key for encryption to perform the following steps:

[0084] Step S2.1: Use the edge detection operator to perform edge detection on the input grayscale image, and select the edge intensity threshold range from 0.05 to 0.15;

[0085] Step S2.2: Initialize the statistical values ​​of all gray levels to 0;

[0086] Step S2.3: Use progressive scanning to find edge points, measure the range of gray scale variation of 9 points in the neighborhood of the edge point and the position of the edge point, assign 1 to the statistical weight increment of all gray levels within the range, Do the same for other edge poi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and particularly relates to a data transmission method and device based on image encryption. The method comprises the following steps: S1, inputting a first image for encryption, performing image processing on the first image to convert image data into matrix numerical data, processing the matrix numerical data to convert the matrix numerical data into single-row data, and taking the converted single-row data as a first secret key for encryption; S2, inputting a second image for encryption, performing image processing on the secondimage to convert the image data into matrix numerical data, processing the matrix numerical data to convert the matrix numerical data into single-row data, and taking the converted single-row data asa second secret key for encryption; S3, operating the first secret key and the second secret key bit by bit to obtain a final encryption secret key, and taking the numeralized picture data as the key, so the problem that the traditional key is easy to crack is avoided, and the security of data transmission is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a data transmission method and device based on image encryption. Background technique [0002] In the complex environment of the Internet, data security during transmission is very important. If no necessary encryption measures are taken and plain text transmission is adopted, hackers can easily intercept data packets on the network and use the public TCP / IP protocol to The package is decomposed to obtain our core data. [0003] In order to solve the above problems, the traditional method is to use the existing encryption and decryption algorithm to directly encrypt the plaintext, and store and transmit the ciphertext according to the established storage and transmission protocol. [0004] Although the above method can guarantee the security of data transmission to a certain extent, because the encryption and transmission process are only processed for the plai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/32G06F21/60
CPCG06F21/602H04N1/32272
Inventor 叶才青
Owner HUNAN KUANGCHU TECH CO LTD