Image encryption method and device, image decryption method and device, electronic equipment and storage medium

An encryption method and image technology, applied in the field of information transmission, can solve problems such as slow encryption speed, low security, and complex encryption algorithm, and achieve the effect of fast operation speed and high security

Pending Publication Date: 2020-12-04
湖北微模式科技发展有限公司
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this realistic demand, the overall image encryption method in the prior art has the problems of complex encryption algorithm, slow encryption speed, and low security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device, image decryption method and device, electronic equipment and storage medium
  • Image encryption method and device, image decryption method and device, electronic equipment and storage medium
  • Image encryption method and device, image decryption method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0124] Taking a JPEG image as an example, the image encryption operation is performed, in which the marker matrix is ​​embedded into the DCT coefficient of the JPEG image, and the image encryption process is as follows:

[0125] Pixel block division: the encryptor first decompresses the JPEG image into the airspace to obtain the airspace pixel matrix. Then divide the spatial domain pixel matrix into rectangular blocks. Since there may be cases where the division cannot be done exactly, the image can be scaled or cut in advance to fit the division.

[0126] Encryption block selection: according to the content to be encrypted, the encryptor sets the rectangular block covered by the encrypted content as an encryption block, thus obtaining a marked matrix.

[0127] Key Generation: The encryptor uses the original key to generate key sequences for subsequent intra-block and inter-block scrambling respectively.

[0128] Built-in block scrambling: The encryptor uses the key to scramb...

Embodiment 2

[0132] Also take a JPEG image as an example to perform an image decryption operation, where the marker matrix is ​​embedded into the DCT coefficients of the JPEG image. The image decryption process is as follows:

[0133] Pixel block division: the decryptor first decompresses the encrypted JPEG image into the airspace to obtain the airspace pixel matrix. Then divide the spatial domain pixel matrix into rectangular blocks.

[0134] Encrypted block acquisition: the decryptor extracts the marker matrix from the DCT coefficients of the JPEG image, and combines the marker matrix to obtain the encrypted scrambling matrix.

[0135] Key generation: The decryptor uses the original key to generate a key sequence, which is used for subsequent intra-block and inter-block anti-scrambling respectively.

[0136] Inter-block anti-scrambling: The decryptor uses the key to perform inter-block anti-scrambling on all encrypted blocks. After anti-scrambling, each rectangular block will return to...

Embodiment 3

[0140] Taking a video image as an example, the video image encryption and decryption operations are performed, where the marker matrix is ​​embedded in the DCT coefficients of the video image, and the video image encryption process is as follows:

[0141] Pixel block division: the encryptor first decompresses the video image into the airspace to obtain the airspace pixel matrix. Then divide the spatial domain pixel matrix into rectangular blocks. Since there may be cases where the division cannot be done exactly, the video can be scaled or cut in advance to fit the division.

[0142] The encryption process is exactly the same as that of ordinary images. After the encryption is completed, the encrypted video images are obtained and input into the video encoder to generate video encoding streams.

[0143] Store the marking matrix and manage the key: the encryptor embeds the marking matrix into the DCT coefficient of the video image, and then makes the encrypted video public or s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method and device, an image decryption method and device, electronic equipment and a storage medium. The image encryption method comprises the following steps: dividing a to-be-encrypted image into a plurality of rectangular pixel blocks with the same size; taking the rectangular pixel block covered by the area needing to be encrypted as an encryption block; sequentially carrying out intra-block pixel scrambling and inter-block scrambling on all the encryption blocks; and replacing the encryption blocks before scrambling with the scrambled encryptionblocks in sequence to form an encrypted image. The image decryption method includes: dividing the image to be decrypted into a plurality of rectangular pixel blocks with the same size during decryption; determining an encryption block from all the rectangular pixel blocks; performing inter-block reverse scrambling and intra-block pixel reverse scrambling on all the encrypted blocks to obtain decrypted pixel blocks; and replacing the corresponding encryption blocks with the decryption pixel blocks in sequence to form a decrypted image. According to the invention, the user can restrain the access permission of part of people to part of image content. When the condition is allowed, the user or the authorized party restores the original content through the protected image.

Description

technical field [0001] The invention relates to information transmission technology, in particular to an image encryption and decryption method and device, electronic equipment and a storage medium. Background technique [0002] With the development of digital media and Internet technology, it has become more and more common for individuals or organizations to publish or disseminate images on the Internet. In particular, the rapid progress of cloud computing allows more and more image data to be uploaded to cloud storage. Multi-user access in this big data environment greatly facilitates people's work and life. However, the behavior of publishing or sending unprocessed original pictures also has the risk of revealing personal privacy. [0003] In order to solve the privacy leakage problem caused by the release of image privacy content, an effective and feasible method is to encrypt sensitive parts of the image, such as adding mosaics to related protected content, or direct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 陈友斌徐一波
Owner 湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products