Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption method and device and image decryption method and device

An encryption method and encryption key technology, applied in computer security devices, instruments, computing, etc., can solve the problems of consumption, encrypted data volume expansion, large storage space, etc., to enhance encryption effect, reduce storage requirements, and avoid extreme expansion. Effect

Active Publication Date: 2020-06-23
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this data encryption scheme will cause a sharp increase in the amount of encrypted data, causing the cloud server to consume a large amount of additional storage space, which is contrary to the cloud's desire to reduce the storage burden.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device and image decryption method and device
  • Image encryption method and device and image decryption method and device
  • Image encryption method and device and image decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Such as figure 1 As shown, the embodiment of the present invention is an image encryption method. Unlike text data, image data has particularity: a single pixel value usually does not have clear semantics, and only when it is observed together with neighboring pixels can it form a certain semantics model. Therefore, it is not necessary to perform high-intensity homomorphic encryption on each pixel. It only needs to introduce randomness between adjacent pixels to disturb the original pattern and make it unrecognizable, so as to achieve the purpose of encryption.

[0043] An image encryption method in an embodiment of the present invention, comprising:

[0044] Based on the encryption key, a first random sequence and a second random sequence are generated; the second random sequence is a binary sequence, which is used to indicate the reciprocal sequence element in the first random sequence;

[0045] generating a third random sequence according to the first random sequen...

Embodiment 2

[0063] Such as figure 2 As shown, the present invention implements an image encryption method, comprising:

[0064] Based on the encryption key, a first random sequence and a second random sequence are generated; the second random sequence is a binary sequence, which is used to indicate the reciprocal sequence element in the first random sequence;

[0065] generating a third random sequence according to the first random sequence and the second random sequence;

[0066] According to the third random sequence, random base conversion is performed to decrypt the encrypted image data.

[0067] Preferably, performing random base conversion according to the third random sequence to decrypt the encrypted image data includes:

[0068] (1) splitting the encrypted image data, and obtaining the i-th element from the lowest bit to the highest bit of the encrypted image data;

[0069] (2) Perform decryption and restoration of the first image data according to the following formula.

[...

Embodiment 3

[0084] The present invention implements an image encryption device, comprising:

[0085] The first and second sequence generation modules generate a first random sequence and a second random sequence based on the encryption key; the second random sequence is a binary sequence used to indicate the reciprocal sequence element in the first random sequence;

[0086] The third sequence generating module generates a third random sequence according to the first random sequence and the second random sequence;

[0087] The image encryption module performs random base conversion according to the third random sequence, and encrypts the input first image data.

[0088] The present invention implements an image decryption device, comprising:

[0089] The first and second sequence generation modules generate a first random sequence and a second random sequence based on the encryption key; the second random sequence is a binary sequence used to indicate the reciprocal sequence element in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption and correction method and device and an image decryption method and device, and belongs to the technical field of image encryption. The image encryption andcorrection method includes: generating a first random sequence and a second random sequence based on the encryption key; wherein the second random sequence is a binary sequence and is used for indicating a sequence element taking a reciprocal from the first random sequence; generating a third random sequence according to the first random sequence and the second random sequence; random system conversion is executed according to the third random sequence, and input first image data is encrypted, so that a constant system number is re-expressed by utilizing a random system, the extreme expansionof the encrypted data volume of the image is avoided, and the storage requirement of a cloud server and the calculation load during encryption domain processing are reduced; according to the invention, the third random sequence is generated based on the second random sequence used for indicating the sequence element taking the reciprocal from the first random sequence and the first random sequence, so that the encryption result is more random, and the encryption effect is enhanced.

Description

technical field [0001] The present application relates to the technical field of image encryption, in particular to an image encryption method and device, and an image decryption method and device. Background technique [0002] In a cloud storage environment, users and the cloud have different needs. Users want their data privacy to be protected, while the cloud wants to be able to process user data, such as data compression and retrieval, to more effectively save storage space and shorten response time. Users can encrypt data to protect data privacy, while the cloud needs to process encrypted data without decryption, which promotes the development of signal processing in the encrypted domain and has received widespread attention. [0003] Graig Centry proposed a homomorphic encryption scheme in the paper "A fully homomorphic encryption scheme", which is used to encrypt generalized data, which can perform various operations on encrypted data that can be performed on plainte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/60
Inventor 杨建权常杰王员根钱静朱国普
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI