Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Effective image compression and encryption amalgamation method

An image compression and image technology, applied in image coding, image data processing, complex mathematical operations, etc., can solve the problem that the 56-bit key length is difficult to resist exhaustive attacks, and achieve the effect of reducing the amount of calculation

Inactive Publication Date: 2004-10-13
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of the times, the 56bit key length of the DES encryption algorithm has been difficult to resist exhaustive attacks, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Effective image compression and encryption amalgamation method
  • Effective image compression and encryption amalgamation method
  • Effective image compression and encryption amalgamation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Figures 1, 2, and 3 show examples of wavelet decomposition of actual images. It reveals that the energy of the digital image after wavelet transform is highly concentrated in the smooth version (low frequency part or brightness sub-image). In addition, due to the typesetting requirements of the article, Figures 1, 2, 3, 5, and 6 are the results of using WINDOWS drawing tools to reduce the length and width by one time, which all bring a small amount of distortion, but none of them hinder the explanation of the problem.

[0019] Combine below Figure 4 The specific implementation steps of the method of the present invention are described in detail.

[0020] Step 1: For original image input, digital images (such as images in BMP format) collected by various image acquisition devices can be input. The experimental image of the method of the present invention is as shown in FIG. 1 : a Lena image of 256×256×8, which is a standard use case of image processing experiments.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network image communication, specially an image-compressing and encryption blending method which can reduce operating amount of image encrypting and deciphering. It adopts triple-DES algorithm to encrypt and decipher the digits corresponding to the smooth part instead of the whole image through quantization coding and entropy coding. Its main steps: wavelet transformation, entropy coding, encrypting digit block through quantization coding and entropy coding, deciphering, reverse entropy coding, reverse quantizing, and wavelet reverse transforming. On the condition of not affecting image compressing effect, it achieves the higher-strength encrypting effect and remarkably reduces the operating amount of encrypting and deciphering.

Description

technical field [0001] The invention relates to the technical field of network image communication, in particular to an image compression and encryption fusion method capable of reducing the calculation amount of image encryption and decryption. It is mainly aimed at the application of secure transmission of image information in the network environment. Background technique [0002] With the rapid development of network technology, it has opened up a way for the dissemination of information on the Internet, and a large amount of information can be released and transmitted on the Internet quickly and conveniently, but at the same time, this has also brought about hidden dangers in the security of network information. According to statistics, a hacking incident occurs almost every 20 seconds around the world. Now, network information security technology is not only related to the privacy of personal communications, but also to the business secrets and survival of an enterpris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/14G06T9/00
Inventor 钟尚平高庆狮
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products