Image encryption method and device, image decryption method and device, equipment and readable storage medium

An encryption method and image technology, applied in the field of information transmission, can solve problems such as being unsuitable for image encryption, and achieve the effect of fast decryption operation and high security.

Active Publication Date: 2020-12-04
湖北微模式科技发展有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Patent documents CN201710203809.8 (an image encryption method based on RC4 algorithm), CN201610856467.5 (an image encryption method and device, key stream generation method and key stream generator), CN201810067051.4 (an image encryption method based on super Chaotic system and multi-level scrambling image encryption method) are both inventions of image content encryption, but these existing image encryption methods are only suitable for image overall encryption, not suitable for image partial content encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device, image decryption method and device, equipment and readable storage medium
  • Image encryption method and device, image decryption method and device, equipment and readable storage medium
  • Image encryption method and device, image decryption method and device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] Next, take an 8*8 color BMP image, select N=4 as an example, and use the RGB three color channels of the BMP image. The encryptor encrypts the original image as three images respectively. Taking one of the color channels as an example, the steps are as follows :

[0094] see image 3 , which is the process of replacing the lowest bit of a single pixel of the original image with a marker matrix.

[0095] Generating a marker matrix: the encryptor generates a marker matrix 3a composed of 0 and 1 according to the pixels involved in the content of the BMP image to be encrypted.

[0096]Steganographically embed the marking matrix into a color channel matrix 3b of the original image: the sender and the receiver agree in advance that the encryptor embeds the marking matrix into the lowest (last) plane of the image to obtain the marked image, that is, the image matrix 3c to be encrypted .

[0097] Such as Figure 4 and Figure 5 , to generate a mask matrix: the encryptor us...

Embodiment 2

[0106] Below with the 8*8 size color BMP image, choose N=4 as example, with the RGB three color channels of the BMP image, the encryptor encrypts the original image (same as embodiment one) as three images respectively, with one of them Taking the color channel as an example, the marking matrix is ​​embedded into the seventh bit plane from high to low of the image to obtain the marked image, that is, the image matrix to be encrypted (such as Figure 7 ).

[0107] For the image pixel matrix to be encrypted from high to low, the five bit planes 1, 2, ..., 4, 7 are XORed with the mask matrix respectively, and the 5th, 6th, and 8th bits of the encrypted image pixel are The bits are the same as before encryption, and the encrypted image pixel matrix (such as Figure 8 ). Correspondingly, when extracting the marker matrix in the decryption step, the marker matrix is ​​extracted from the seventh bit plane, that is, the fifth mask matrix is ​​XORed with the bit plane embedded in the...

Embodiment 3

[0111] In this example, the marking matrix is ​​saved independently and not embedded in the image, that is, the original image is not marked, and it does not form such image 3 The shown image to be encrypted 3c, in this embodiment, the image to be encrypted is the original image, directly for example image 3 The original image shown in 3b with Figure 5 The shown masking matrix is ​​XORed to obtain an encrypted image, and after encryption, the marking matrix is ​​sent to the decryptor separately. The decryptor does not need to extract the mark matrix, and directly uses the mark matrix and the secret key to generate such as Figure 4 The shown random matrix is ​​operated to obtain the mask matrix, and the decrypted image can be obtained by XORing the first 4 mask matrices with the first 4 bit planes of the encrypted image. This final decrypted image is the original image. By saving the marking matrix independently, it can be guaranteed that the decrypted image is exactly t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method and device, an image decryption method and device, equipment and a readable storage medium. The image encryption method comprises the steps that a binary mark matrix is generated according to image content needing to be encrypted in an original image; marking the original image by using the generated marking matrix; randomly forming an encryptionmatrix by adopting a secret key, and performing AND operation on the encryption matrix and the mark matrix to obtain a mask matrix; and performing exclusive-OR operation on the marked image through the mask matrix to form an encrypted image. During decryption, an encrypted pixel marking matrix is restored on a corresponding bit plane by using exclusive-OR operation, and the corresponding bit planes of all encrypted pixels are subjected to exclusive-OR operation again to restore the encrypted pixel content of the image. According to the invention, a user can restrain the access permission of part of people to part of the image content. When the condition is allowed, the user or an authorized party restores the original content through the protected image.

Description

technical field [0001] The invention relates to information transmission technology, in particular to an image encryption and decryption method, device, equipment and readable storage medium. Background technique [0002] With the development of digital media and Internet technology, it has become more and more common for individuals or organizations to publish or disseminate images on the Internet. In particular, the rapid progress of cloud computing allows more and more image data to be uploaded to cloud storage. Multi-user access in this big data environment greatly facilitates people's work and life. However, the behavior of publishing or sending unprocessed original pictures also has the risk of revealing personal privacy. [0003] In order to solve the privacy leakage problem caused by the release of image privacy content, an effective and feasible method is to encrypt sensitive parts of the image, such as adding mosaics to related protected content, or directly dele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L9/08G06F21/62G06F21/60
CPCH04N1/32272H04L9/0863H04L9/0869G06F21/6245G06F21/602
Inventor 陈友斌徐一波
Owner 湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products