Method and device for cyclic image encryption on cloud server and local terminal
A cloud server and local encryption technology, applied in the field of cloud servers, can solve problems such as being easily cracked by violence, achieve high security, increase the difficulty of cracking, and increase the difficulty of cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] like figure 1 As shown, the cloud server and the local end perform cyclic image encryption, and the method performs the following steps:
[0029] Step 1: The local end divides the image to be encrypted into two equal parts, namely the first part and the second part; encrypts the first part to obtain a locally encrypted image; sends the second part of the image to the cloud server;
[0030] Step 2: the cloud server encrypts the received second part of the image to obtain the cloud service encrypted image;
[0031] Step 3: the local end sends the local encrypted image to the cloud server, and at the same time, the cloud server sends the cloud service encrypted image to the local end;
[0032] Step 4: The cloud server encrypts the received local encrypted image again, and at the same time, the local end divides the received cloud service encrypted image into two equal parts, which are the first part of the cloud service encrypted image and the second part of the cloud ser...
Embodiment 2
[0036] On the basis of the previous embodiment, the method for encrypting an image at the local end performs the following steps: performing image processing on the image to be encrypted, so that the image data is converted into matrixed numerical data, and the matrixed numerical data is processed, The matrixed numerical data is converted into single-line data, and the converted single-line data is encrypted to complete image encryption.
[0037] Specifically, cryptography is a security technology in which both parties in the communication perform special transformation of information according to agreed rules. According to specific rules, change plaintext (Plaintext) to ciphertext (Ciphertext). The process of changing from plaintext to ciphertext is called Encryption; the process of recovering the original plaintext from ciphertext is called Decryption. In the early days, passwords only encrypted and decrypted words or numbers. With the development of communication technolog...
Embodiment 3
[0040] On the basis of the previous embodiment, the method for encrypting single-line data includes: selecting at least one target data segment from the single-line data; performing an encryption operation on the selected target data segment according to a preset encryption algorithm to obtain a corresponding encrypted data segment. character string; adjust the character arrangement order of the encrypted character string to obtain the target character string; replace the target data segment in the single-line data with the corresponding target character string to realize data encryption.
[0041] Specifically, end-to-end encryption allows data to always exist in ciphertext form during transmission from source to destination. With end-to-end encryption (also known as off-line encryption or packet encryption), the message is not decrypted until it reaches the end point as it is transmitted, because the message is protected throughout the transmission process, so even if a node i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

