Encryption method for digital archive

An encryption method and file technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as personal information account theft, and achieve the effect of ensuring uniqueness, reducing pixel correlation, and improving security.

Pending Publication Date: 2022-01-28
北京市东成恒悦汽车科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, the production process of the barcode is very simple and the way of transmission is wide, which provides great convenience for various terminal viruses and phishing websites. Distributors of viruses or malicious websites are very likely to directly encode website data into QR codes or put malicious The information i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for digital archive

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Encryption methods include:

[0038] S1. Collect the fingerprint image of the user, and generate a feature description vector after preprocessing, and the description vector is composed of numbers 0, 1;

[0039] S2, collecting user profile attribute information, and generating a two-dimensional code according to the user profile attribute information;

[0040] S3, collect the digital sequence input by the user, and fuse the description vector with the digital sequence to generate a key;

[0041]S4, utilize the key to generate a chaotic matrix, and perform pixel scrambling on the two-dimensional code image according to the chaotic matrix;

[0042] S5 , performing pixel diffusion on the chaotic matrix of the two-dimensional code image after scrambled pixels to obtain an encrypted two-dimensional code image.

[0043] Further, the image processing includes performing image grayscale processing, image enhancement processing, image noise reduction processing, and image bina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method for a digital archive. The encryption method comprises the following steps of: generating a chaotic matrix by taking a secret key fused with fingerprint information and a user input sequence as an initial state of a system, scrambling the positions of image pixel points through the pseudo-randomness of the chaotic matrix, and executing mod operation on the scrambled image and the chaotic matrix at a corresponding position. Therefore, encrypted pixels are changed, a pixel correlation is reduced, and original image information is protected. Meanwhile, the use of the fingerprint information also ensures the uniqueness of the secret key, and encryption security is improved.

Description

Technical field: [0001] The invention belongs to the field of data encryption, and in particular relates to an encryption method for digital archives. Background technique: [0002] At present, the application value of personal data generally stored in the file system is positively related to the potential risk. As a record and reflection of personal health and consumption information, these data can assist people in better health and financial management, and provide more powerful analysis basis and data support for disease diagnosis and treatment and consumer services; at the same time, most of these data involve personal privacy and are sensitive It is extremely sexual. Once a leak occurs, it will affect the normal life of the individual and even the personal safety, and will bring about a series of problems such as sales promotion and fraud. In addition to data storage security issues, the process of data collection and sharing is also vulnerable to the peeping of unaut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0092
Inventor 刘颖李帅
Owner 北京市东成恒悦汽车科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products