Image encryption method and device and image decryption method and device
An encryption method and encryption key technology, applied in computer security devices, instruments, computing, etc., can solve the problems of consumption, encrypted data volume expansion, large storage space, etc., to enhance encryption effect, reduce storage requirements, and avoid extreme expansion. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] Such as figure 1 As shown, the embodiment of the present invention is an image encryption method. Unlike text data, image data has particularity: a single pixel value usually does not have clear semantics, and only when it is observed together with neighboring pixels can it form a certain semantics model. Therefore, it is not necessary to perform high-intensity homomorphic encryption on each pixel. It only needs to introduce randomness between adjacent pixels to disturb the original pattern and make it unrecognizable, so as to achieve the purpose of encryption.
[0043] An image encryption method in an embodiment of the present invention, comprising:
[0044] Based on the encryption key, a first random sequence and a second random sequence are generated; the second random sequence is a binary sequence, which is used to indicate the reciprocal sequence element in the first random sequence;
[0045] generating a third random sequence according to the first random sequen...
Embodiment 2
[0063] Such as figure 2 As shown, the present invention implements an image encryption method, comprising:
[0064] Based on the encryption key, a first random sequence and a second random sequence are generated; the second random sequence is a binary sequence, which is used to indicate the reciprocal sequence element in the first random sequence;
[0065] generating a third random sequence according to the first random sequence and the second random sequence;
[0066] According to the third random sequence, random base conversion is performed to decrypt the encrypted image data.
[0067] Preferably, performing random base conversion according to the third random sequence to decrypt the encrypted image data includes:
[0068] (1) splitting the encrypted image data, and obtaining the i-th element from the lowest bit to the highest bit of the encrypted image data;
[0069] (2) Perform decryption and restoration of the first image data according to the following formula.
[...
Embodiment 3
[0084] The present invention implements an image encryption device, comprising:
[0085] The first and second sequence generation modules generate a first random sequence and a second random sequence based on the encryption key; the second random sequence is a binary sequence used to indicate the reciprocal sequence element in the first random sequence;
[0086] The third sequence generating module generates a third random sequence according to the first random sequence and the second random sequence;
[0087] The image encryption module performs random base conversion according to the third random sequence, and encrypts the input first image data.
[0088] The present invention implements an image decryption device, comprising:
[0089] The first and second sequence generation modules generate a first random sequence and a second random sequence based on the encryption key; the second random sequence is a binary sequence used to indicate the reciprocal sequence element in th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


