A kind of exchange cipher watermark encryption, decryption method and system

A watermark encryption and cipher technology, applied in the field of information security, can solve problems affecting the availability of vector geographic data, redundant decryption steps, difficult to meet the security protection of vector geographic data, etc., achieve good imperceptibility and improve security

Active Publication Date: 2022-07-22
NANJING JIYIN INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If watermark is embedded in the ciphertext vector geographic data, the embedded watermark will cause the ciphertext data to be decrypted incorrectly, thus affecting the usability of the vector geographic data
On the other hand, if the watermark is first embedded and then encrypted, it is impossible to directly extract the watermark from the ciphertext domain, and the process of extracting the watermark not only has redundant decryption steps, but also exposes the plaintext data to the detection environment, which greatly reduces the vector geographic data. Security during distribution
It can be seen that the direct combination of encryption technology and digital watermarking technology is difficult to meet the needs of full life cycle security protection of vector geographic data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of exchange cipher watermark encryption, decryption method and system
  • A kind of exchange cipher watermark encryption, decryption method and system
  • A kind of exchange cipher watermark encryption, decryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0115] In this embodiment, a watermark is first embedded in the vector geographic data, and then scrambling and encryption are performed to obtain the vector geographic data encrypted by the watermark. figure 1 It is a schematic flowchart of Embodiment 1 of the present invention, such as figure 1 The specific process is as follows:

[0116] Step 101: Generate binary watermark information based on the chaotic sequence scrambling encryption algorithm according to the watermark information. Specifically: first, according to the watermark information, a binary sequence of the watermark information is generated according to the computer code; then, based on the iteration number N of the chaotic sequence, a chaotic sequence scrambling encryption algorithm is used to generate the scrambled binary watermark information {W n |n=1,2,...,n}, W i = 0 or 1, W i Represents binary watermark information W n The value of the ith element in .

[0117] Step 102: Obtain the vector geographic...

Embodiment 2

[0148] The difference from Embodiment 1 is that in this embodiment, vector geographic data is first scrambled and encrypted, and then a watermark is embedded in the encrypted vector geographic data, thereby obtaining watermark-encrypted vector geographic data. The same is that the methods used for watermark embedding and scrambling encryption are the same as those in Embodiment 1. figure 2 It is a schematic flowchart of Embodiment 2 of the present invention, such as figure 2 shown, including the following steps:

[0149] Step 201: Obtain vector geographic data to be encrypted.

[0150] Step 202: Traverse the vector geographic data to be encrypted to obtain abscissa set sequence and ordinate set sequence. Step 202-Step 203 is the random encryption process. This step is mainly to traverse the geographic coordinate set in the data to obtain the abscissa set sequence {PX n |n=1,2,...,N} and the ordinate set sequence {PY n |n=1, 2, . A sequence of ordinates of points.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for encrypting and decrypting an exchange cipher watermark. Firstly, the coordinate values ​​of the vector geographic data are rearranged in order to ensure the robustness of the sequence before and after scrambling encryption; then, based on the normalized digital watermarking algorithm, the watermark information is embedded in the normalized coordinate value sequence according to the parity; Finally, the vector geographic data is encrypted according to the conventional vector geographic data scrambling encryption algorithm. This algorithm combines the watermarking operation with the encryption and decryption operations, which not only has good imperceptibility, but also satisfies the separation of the vector geographic data watermark embedding extraction and the image encryption and decryption state, and improves the security of the vector geographic data in the whole life cycle. . The invention provides effective technical means for copyright and security protection of vector geographic data.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for encrypting and decrypting an exchange password watermark. Background technique [0002] With the development and popularization of computer technology and mobile Internet technology, vector geographic data, as an important part of national infrastructure construction and national basic geographic information database, is increasingly being used in all aspects of individual, collective and national production and life. . At the same time, the development of digitization, networking and informatization has provided great convenience for the distribution and sharing of vector geographic data, but at the same time it has also brought security issues that cannot be ignored. In the information age, data is the basis for carrying information, and the exchange of information is inseparable from the transmission of data, but the open network environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467H04L9/00H04N1/32
CPCH04N19/467H04N1/32272H04N1/3232H04N1/32352H04L9/001
Inventor 邹秀珍周子宸崔翰川吴清华曹江华康天乐
Owner NANJING JIYIN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products