Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for cyclic image encryption on cloud server and local terminal

A cloud server and local encryption technology, applied in the field of cloud servers, can solve problems such as being easily cracked by violence, achieve high security, increase the difficulty of cracking, and increase the difficulty of cracking

Active Publication Date: 2022-07-22
金润方舟科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is different from the encryption standard and encryption method of the prior art and improves security, after the image data encrypted by this method is stolen, since the key and all data exist locally, it is also easy to be cracked by violence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for cyclic image encryption on cloud server and local terminal
  • Method and device for cyclic image encryption on cloud server and local terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like figure 1 As shown, the cloud server and the local end perform cyclic image encryption, and the method performs the following steps:

[0029] Step 1: The local end divides the image to be encrypted into two equal parts, namely the first part and the second part; encrypts the first part to obtain a locally encrypted image; sends the second part of the image to the cloud server;

[0030] Step 2: the cloud server encrypts the received second part of the image to obtain the cloud service encrypted image;

[0031] Step 3: the local end sends the local encrypted image to the cloud server, and at the same time, the cloud server sends the cloud service encrypted image to the local end;

[0032] Step 4: The cloud server encrypts the received local encrypted image again, and at the same time, the local end divides the received cloud service encrypted image into two equal parts, which are the first part of the cloud service encrypted image and the second part of the cloud ser...

Embodiment 2

[0036] On the basis of the previous embodiment, the method for encrypting an image at the local end performs the following steps: performing image processing on the image to be encrypted, so that the image data is converted into matrixed numerical data, and the matrixed numerical data is processed, The matrixed numerical data is converted into single-line data, and the converted single-line data is encrypted to complete image encryption.

[0037] Specifically, cryptography is a security technology in which both parties in the communication perform special transformation of information according to agreed rules. According to specific rules, change plaintext (Plaintext) to ciphertext (Ciphertext). The process of changing from plaintext to ciphertext is called Encryption; the process of recovering the original plaintext from ciphertext is called Decryption. In the early days, passwords only encrypted and decrypted words or numbers. With the development of communication technolog...

Embodiment 3

[0040] On the basis of the previous embodiment, the method for encrypting single-line data includes: selecting at least one target data segment from the single-line data; performing an encryption operation on the selected target data segment according to a preset encryption algorithm to obtain a corresponding encrypted data segment. character string; adjust the character arrangement order of the encrypted character string to obtain the target character string; replace the target data segment in the single-line data with the corresponding target character string to realize data encryption.

[0041] Specifically, end-to-end encryption allows data to always exist in ciphertext form during transmission from source to destination. With end-to-end encryption (also known as off-line encryption or packet encryption), the message is not decrypted until it reaches the end point as it is transmitted, because the message is protected throughout the transmission process, so even if a node i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is in the technical field of cloud services, and in particular relates to a method and a device for performing cyclic image encryption on a cloud server and a local terminal. The method performs the following steps: Step 1: the local end divides the image to be encrypted into two equal parts, namely the first part and the second part; encrypts the first part to obtain a locally encrypted image; sends the second part of the image to the cloud server; step 2: the cloud server encrypts the second part of the image received to obtain the cloud service encrypted image. It separates the images to be encrypted, and then encrypts different parts of the separated images to be encrypted at the local end and the cloud server respectively. At the same time, the local end and the cloud server also transmit the encrypted images to each other, and execute cyclically. The steps of segmentation and encryption are used to realize the cyclic encryption of the encrypted image. The encrypted image cannot be cracked, and the security is extremely high.

Description

technical field [0001] The invention belongs to the technical field of cloud servers, and in particular relates to a method and a device for cyclic image encryption performed by a cloud server and a local terminal. Background technique [0002] With the wide application of multimedia information technology, multimedia data is increasingly widely spread and stored on the Internet. Therefore, in order to effectively protect users' information from being used by illegals, the fundamental measure taken is to transmit and store information confidentially. Traditional encryption algorithms such as International Data Encryption Gorithm (IDEA) and Advanced Encryption Standard (AES) are designed for one-dimensional data streams and are relatively unsuitable for image data encryption. The reason is that image information It has the characteristics of large amount of data, strong correlation between data, and high redundancy, so that when the traditional encryption algorithm is used fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44
CPCH04N1/44
Inventor 孙全刚
Owner 金润方舟科技股份有限公司