CN105991559A - User safety login method based on image encryption technology - Google Patents
User safety login method based on image encryption technology Download PDFInfo
- Publication number
- CN105991559A CN105991559A CN201510059780.1A CN201510059780A CN105991559A CN 105991559 A CN105991559 A CN 105991559A CN 201510059780 A CN201510059780 A CN 201510059780A CN 105991559 A CN105991559 A CN 105991559A
- Authority
- CN
- China
- Prior art keywords
- client
- cryptographic secret
- user
- expanding
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention relates to a user safety login method based on an image encryption technology. The user safety login method comprises the steps: a client performs MD5 encryption on a user password to obtain a password ciphertext; the client embeds a user name into an image through STDM; the client generates a control flow according to a random seed stored in local, and embeds the encrypted password ciphertext into the image through the STDM; the client sends the image to a server end; the server end extracts the user name from the received image through the STDM; the server end generates a control flow according to a random seed stored in local, and obtains the password ciphertext from the received image through the STDM; the server end obtains the password ciphertext through verification, and if verification is successful, a new random seed is generated and the new random seed and the verification passing information are sent to the client together; the client updates the random seed; and if verification is not successful, failure of verification is prompted. Compared with the prior art, based on a traditional STDM, the user safety login method based on an image encryption technology utilizes the random seeds to generate the control flows to embed the ciphertext into the image, so that the safety of the system is improved.
Description
Technical field
The present invention relates to information security field, especially relate to a kind of user security based on image encryption technology and step on
Lu Fangfa.
Background technology
Along with Internet technology develops rapidly, people's living standard improves, and quality strengthens, but the most under cover
Huge potential safety hazard.As protection userspersonal information and the important means of property safety, authentication is all kinds of
The function that website and software are indispensable, is embodied in user at the beginning and logs in, if payment platform or involve
Pecuniary exchange also has further certification.Network is developing to mobile direction in a word, and people live increasingly
Convenient, also expose a lot of problem simultaneously.Many famous Web site and software vendor are disclosed in transmission user in succession and step on
Plaintext transmission during record information, password can be carried out MD5 computing transmission by only a part of website, but at MD5
MD5 simple after verifying not impact resistant the most whether safety.The company that safety ratio is relatively focused on by a few family of only a few
The AES that can use TLS is encrypted, but it uses CBC block cipher mode to fall into enemy hands.2013
In February in year, NadhemAlFardan and Kenny Paterson is found that the attack pattern of an entitled Luck13,
The block cipher mode of the CBC mode that this attack pattern primary challenge SSL/TLS takes.Attack and can pass through
Block the mode (such as being linked by the intentional drop of Malware, TLS can retransmit automatically) that TLS connects, allow transmission
Fang Fanfu sends same encrypted content (ciphertext of such as cookie or password), and TLS sends the time of error message
The analysis of difference, Luck13 attacks can crack ciphertext within a short period of time.Therefore, direct plaintext transmission or letter
Single encryption can not protect user profile well, just can intercept and capture user simply with packet capturing analysis and log in content.
For important information transmitting procedure as log-on message or payment verification, combine the most ripe cloud skill
Art, it is proposed that the method for oneself.
Summary of the invention
Defect that the purpose of the present invention is contemplated to overcome above-mentioned prior art to exist and provide a kind of and add based on image
The user security login method of secret skill art.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of user security login method based on image encryption technology, it is characterised in that comprise the following steps:
(1) client logs in password and carries out md5 encryption and obtain cryptographic secret user;
(2) user name is embedded in picture by client by digital watermark method based on expanding and transforming jitter modulation;
(3) client generates with the random seed being stored in this locality and controls stream, is carried out based on extension by this control stream
Cryptographic secret is embedded in picture by the digital watermark method of conversion jitter modulation;
(4) picture is sent to server end by client;
(5) server end is carried from the picture received by digital watermark method based on expanding and transforming jitter modulation
Take out user name;
(6) server end generates with the random seed being stored in this locality and controls stream, is carried out based on expansion by this control stream
The digital watermark method of exhibition conversion jitter modulation extracts cryptographic secret from the picture received;
(7) server end carrys out the cryptographic secret extracted in verification step (6) with the cryptographic secret being saved in this locality, if
It is proved to be successful, then generates a new random seed, and be sent to client, client in the lump with being verified information
End updates random seed, and client completes to log in;Otherwise then pointing out authentication failed, client logs in failure.
In described step (1), the software fingerprinting logging in password software logged in this user of user is combined by client
Generate user for this software log in password after, then carry out md5 encryption.
Described random seed is local zone time during server authentication user cipher ciphertext success.
Described client is passed through based on transform expansion after username and password ciphertext is converted to 128 0-1 bit streams
The digital watermark method of jitter modulation embeds in picture.
In described step (2), user name is passed through digital watermark method based on expanding and transforming jitter modulation by client
Embed in picture particularly as follows:
(201) client generates 24 very color BMP pictures of 256 × 256 pixels;
(202) picture generated in step (301) is carried out the dct transform of 8 × 8, obtains 32 × 32 DCT
Coefficient matrix;
(203) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter
The digital watermark method of system embeds the user name of 128;
In described step (3), client generates with the random seed being stored in this locality and controls stream, is flowed by this control
Carry out digital watermark method based on expanding and transforming jitter modulation cryptographic secret embedded in picture particularly as follows:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(302) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion
The digital watermark method embedding cryptographic secret of exhibition conversion jitter modulation:
(3021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (301)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method embeds 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(3022) judge whether 128 cryptographic secret have had fully embedded into, if YES then it is embedding to complete cryptographic secret
Enter, if it has not, return to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out the inverse transformation of dct transform.
In described step (5), server end passes through digital watermark method based on expanding and transforming jitter modulation from reception
To picture in extract user name particularly as follows:
(501) picture received is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT systems
Matrix number;
(502) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter
The digital watermark method of system extracts user name;
In described step (6), server end generates with the random seed being stored in this locality and controls stream, by this control
Stream carries out digital watermark method based on expanding and transforming jitter modulation and extracts cryptographic secret from the picture received
Particularly as follows:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(602) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion
The digital watermark method extraction cryptographic secret of exhibition conversion jitter modulation:
(6021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (601)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(6022) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext,
If it has not, return to step (6021).
During in described step (7), server end is saved in the picture that the cryptographic secret of this locality is built-in being saved in this locality
, concrete cryptographic secret extracting method is:
(701) picture being saved in this locality is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32
DCT coefficient matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(703) according to following rule, 32 × 32 coefficient matrixes are carried out the digital water modulated based on expanding and transforming jitter
Impression method extraction cryptographic secret:
(7031) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (702)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(7032) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext,
If it has not, return to step (7031).
Described 0-1 controls the length of flow control stream less than 896.
Described client is mobile terminal or PC terminal.
Communicated by ssl protocol between described client and server.
Compared with prior art, the invention have the advantages that
1., on the basis of traditional digital watermark method based on expanding and transforming jitter modulation, utilize Cipher Strength
High pseudorandom number generator ANSI x9.17 produces pseudo random number and flows as control, becomes based on extension remaining
On the basis of changing the digital watermark method anti-interference height of jitter modulation own and the advantage of suppression host's interference, enter one
The safety of step increase system.
The most each software introduces software fingerprinting, produces unique software identification.Be combineding with each other with original code, it is new to produce
Password, accordingly even when multiple account uses same password, without worrying to there is insecurity.It may be said that simultaneously
Safety and and convenience are taken into account.
3. utilize powerful calculating ability and the storage capacity of cloud service instantly, select in communication process with picture be
Carrier is transmitted.At server end, carry out the storage of data also with picture, so in communication and storage two
Safety has all been accomplished to promote by individual link.
Accompanying drawing explanation
Fig. 1 is the data flow diagram communicated between the client and server of the present invention;
Detailed description of the invention
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.
Embodiment 1
Client: user's software in PC inputs its username and password, and PC end is according to user name and user
Select the software logged in, find the corresponding software fingerprinting of this software and time seed in the local database, and will use
The original password of family input is combined with software fingerprinting, encrypts through md5, forms 16 cryptographic secret, turn further
The cryptographic secret of 128 0-1 bit streams of chemical conversion.User name fills into 128 0-1 bit streams equally.
Can (password of the user name of 128 and 128 be close by 256bit information for ensureing that host image is sufficiently large
Literary composition) embed, we use 24 very color bmp pictures of 256 × 256.The picture generated is carried out 8 × 8
Dct transform, obtains 32 × 32 DCT coefficient matrixes;To in 32 × 32 DCT coefficient matrixes front 32 × 4
Individual matrix carries out the user name that digital watermark method based on expanding and transforming jitter modulation embeds 128;
According to the time seed extracted from local data base, utilize pseudo random number based on ANSI X9.17
Generator, inputs using time seed as it, obtains the 0-1 control stream that one including at least 128 1.
Skip front 32 × 4 matrixes, carry out becoming based on extension to rear 32 × 28 coefficient matrixes according to following rule
The digital watermark method changing jitter modulation embeds the cryptographic secret of 128, and specific rules is as follows:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right
The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and embeds 1 cryptographic secret, as
Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if
It is no, returns to step (1).
After completing the embedding of username and password ciphertext, picture is sent to server end according to SSL mode by PC end.
Server end: after the picture received for server carries out the dct transform of 8 × 8, obtain 32 × 32
Individual DCT coefficient matrix, carries out digital water based on expanding and transforming jitter modulation in the most front 32 × 4 matrixes
Impression method extracts user name;
From data base, extract, according to the user name extracted, the time seed that this user is corresponding, utilize based on ANSI
The pseudorandom number generator of X9.17, inputs this time seed as it, obtains one including at least 128 1
0-1 control stream;
Skip front 32 × 4 matrixes, carry out becoming based on extension to rear 32 × 28 coefficient matrixes according to following rule
Change the digital watermark method of jitter modulation and extract the cryptographic secret of 128:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right
The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and extracts 1 cryptographic secret, as
Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if
It is no, returns to step (6021).
After extracting the cryptographic secret in the picture that PC end transmits, server end also needs to take out being somebody's turn to do of local preservation
The cryptographic secret of user is used for verifying, in the present embodiment, it is also embedding that server end is saved in the cryptographic secret of this locality
Enter in the picture being saved in this locality.
Therefore, the picture being saved in this locality is first carried out the dct transform of 8 × 8 by server end, obtains 32 × 32
Individual DCT coefficient matrix;
Utilize pseudorandom number generator based on ANSI X9.17, using described be stored in this locality random seed as
Its input, obtains the 0-1 control stream that one including at least 128 1;
According to following rule, 32 × 32 coefficient matrixes are carried out the digital watermarking side modulated based on expanding and transforming jitter
The cryptographic secret of method extraction 128:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right
The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and extracts 1 cryptographic secret, as
Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if
It is no, returns to step (1).
After extracting the cryptographic secret of local preservation, by two cryptographic secret phase comparisons.If be consistent, just to client
End sends License Info and updates the time seed in local data base, and the most also notice client is updated to this new life
The time seed become.Additionally, the time seed newly-generated with this is also regenerated control stream by server end, will
Cryptographic secret embeds the checking work in local picture, when user's next time logs in again.
Embodiment 2
The present embodiment is substantially the same manner as Example 1, and uniquely distinguishing the client being in the present embodiment is mobile phone terminal,
Mobile phone terminal, by WLAN or mobile network and server end communication, is suitable for current network and gradually tends to moving
The trend of dynamicization.
Claims (10)
1. a user security login method based on image encryption technology, it is characterised in that comprise the following steps:
(1) client logs in password and carries out md5 encryption and obtain cryptographic secret user;
(2) user name is embedded in picture by client by digital watermark method based on expanding and transforming jitter modulation;
(3) client generates with the random seed being stored in this locality and controls stream, is carried out based on extension by this control stream
Cryptographic secret is embedded in picture by the digital watermark method of conversion jitter modulation;
(4) picture is sent to server end by client;
(5) server end is carried from the picture received by digital watermark method based on expanding and transforming jitter modulation
Take out user name;
(6) server end generates with the random seed being stored in this locality and controls stream, is carried out based on expansion by this control stream
The digital watermark method of exhibition conversion jitter modulation extracts cryptographic secret from the picture received;
(7) server end carrys out the cryptographic secret extracted in verification step (6) with the cryptographic secret being saved in this locality, if
It is proved to be successful, then generates a new random seed, and be sent to client, client in the lump with being verified information
End updates random seed, and client completes to log in;Otherwise then pointing out authentication failed, client logs in failure.
A kind of user security login method based on image encryption technology the most according to claim 1, it is special
Levying and be, in described step (1), client is by the software fingerprinting logging in password and the logged in software of this user of user
In conjunction with generate user for this software log in password after, then carry out md5 encryption.
A kind of user security login method based on image encryption technology the most according to claim 1 and 2,
It is characterized in that, described random seed is local zone time during server authentication user cipher ciphertext success.
A kind of user security login method based on image encryption technology the most according to claim 3, it is special
Levying and be, described client is passed through based on extension after username and password ciphertext is converted to 128 0-1 bit streams
The digital watermark method of conversion jitter modulation embeds in picture.
5. according to a kind of based on image encryption technology the user security login method described in claim 4, its
It is characterised by,
In described step (2), user name is passed through digital watermark method based on expanding and transforming jitter modulation by client
Embed in picture particularly as follows:
(201) client generates 24 very color BMP pictures of 256 × 256 pixels;
(202) picture generated in step (301) is carried out the dct transform of 8 × 8, obtains 32 × 32 DCT
Coefficient matrix;
(203) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter
The digital watermark method of system embeds the user name of 128;
In described step (3), client generates with the random seed being stored in this locality and controls stream, is flowed by this control
Carry out digital watermark method based on expanding and transforming jitter modulation cryptographic secret embedded in picture particularly as follows:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(302) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion
The digital watermark method embedding cryptographic secret of exhibition conversion jitter modulation:
(3021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (301)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method embeds 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(3022) judge whether 128 cryptographic secret have had fully embedded into, if YES then it is embedding to complete cryptographic secret
Enter, if it has not, return to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out the inverse transformation of dct transform.
6. according to a kind of based on image encryption technology the user security login method described in claim 5, its
It is characterised by,
In described step (5), server end passes through digital watermark method based on expanding and transforming jitter modulation from reception
To picture in extract user name particularly as follows:
(501) picture received is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT systems
Matrix number;
(502) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter
The digital watermark method of system extracts user name;
In described step (6), server end generates with the random seed being stored in this locality and controls stream, by this control
Stream carries out digital watermark method based on expanding and transforming jitter modulation and extracts cryptographic secret from the picture received
Particularly as follows:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(602) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion
The digital watermark method extraction cryptographic secret of exhibition conversion jitter modulation:
(6021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (601)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(6022) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext,
If it has not, return to step (6021).
A kind of user security login method based on image encryption technology the most according to claim 6, it is special
Levying and be, in described step (7), server end is saved in local cryptographic secret and is built-in being saved in the figure of this locality
In sheet, concrete cryptographic secret extracting method is:
(701) picture being saved in this locality is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32
DCT coefficient matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality
Input as it, obtain the 0-1 control stream that one including at least 128 1;
(703) according to following rule, 32 × 32 coefficient matrixes are carried out the digital water modulated based on expanding and transforming jitter
Impression method extraction cryptographic secret:
(7031) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (702)
According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation
Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(7032) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext,
If it has not, return to step (7031).
8. log according to a kind of based on image encryption technology the user security described in claim 5 or 6 or 7
Method, it is characterised in that described 0-1 controls the length of flow control stream less than 896.
9. according to a kind of based on image encryption technology the user security login method described in claim 1, its
Being characterised by, described client is mobile terminal or PC terminal.
10. according to a kind of based on image encryption technology user security login method the most described in claim 1,
It is characterized in that, communicated by ssl protocol between described client and server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510059780.1A CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510059780.1A CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105991559A true CN105991559A (en) | 2016-10-05 |
CN105991559B CN105991559B (en) | 2019-03-01 |
Family
ID=57036104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510059780.1A Expired - Fee Related CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991559B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
CN107395629A (en) * | 2017-08-23 | 2017-11-24 | 周口师范学院 | A kind of computer network security registration and verification method |
CN108537009A (en) * | 2017-03-03 | 2018-09-14 | 绍兴读图网络科技有限公司 | A kind of method and system of picture download and legal verification |
CN109214163A (en) * | 2018-09-14 | 2019-01-15 | 厦门北卡信息科技有限公司 | A kind of identity authentication method and device |
CN115348017A (en) * | 2022-10-18 | 2022-11-15 | 阿里巴巴(中国)有限公司 | Ciphertext processing method and device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691103A (en) * | 2019-11-07 | 2020-01-14 | 南京航空航天大学 | Mobile terminal login verification method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090220076A1 (en) * | 2008-02-28 | 2009-09-03 | Fujitsu Limited | Image decrypting apparatus, image encrypting apparatus, and image decrypting method |
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN103427979A (en) * | 2013-06-09 | 2013-12-04 | 浙江工业大学 | Internet picture transparent and safe transmission method based on chaotic encryption |
-
2015
- 2015-02-05 CN CN201510059780.1A patent/CN105991559B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090220076A1 (en) * | 2008-02-28 | 2009-09-03 | Fujitsu Limited | Image decrypting apparatus, image encrypting apparatus, and image decrypting method |
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN103427979A (en) * | 2013-06-09 | 2013-12-04 | 浙江工业大学 | Internet picture transparent and safe transmission method based on chaotic encryption |
Non-Patent Citations (1)
Title |
---|
BRIAN CHEN ETAL: "《Quantization Index Modulation: A Class of Provably》", 《IEEE TRANSACTION ON INFORMATION THEORY》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
WO2018113690A1 (en) * | 2016-12-23 | 2018-06-28 | 腾讯科技(深圳)有限公司 | Login authorisation method and apparatus, and login method and apparatus |
CN108537009A (en) * | 2017-03-03 | 2018-09-14 | 绍兴读图网络科技有限公司 | A kind of method and system of picture download and legal verification |
CN107395629A (en) * | 2017-08-23 | 2017-11-24 | 周口师范学院 | A kind of computer network security registration and verification method |
CN109214163A (en) * | 2018-09-14 | 2019-01-15 | 厦门北卡信息科技有限公司 | A kind of identity authentication method and device |
CN115348017A (en) * | 2022-10-18 | 2022-11-15 | 阿里巴巴(中国)有限公司 | Ciphertext processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105991559B (en) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110601853B (en) | Block chain private key generation method and equipment | |
CN105991559A (en) | User safety login method based on image encryption technology | |
CN104469767B (en) | The implementation method of integrated form security protection subsystem in a set of mobile office system | |
CN110519297B (en) | Data processing method and device based on block chain private key | |
WO2016169423A1 (en) | Data authenticity identification method for safety check of two-dimensional code | |
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
CN101005361B (en) | Server and software protection method and system | |
CN105897424A (en) | Method for enhancing identity authentication | |
CN105631248A (en) | Signing method, forging judgment method and tampering judgment method of electronic contract | |
CN108243176A (en) | Data transmission method and device | |
CN103327034A (en) | Safe login method, system and device | |
CN108848503B (en) | A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis | |
CN110505049A (en) | A kind of text information transmission method, apparatus and system | |
US11374933B2 (en) | Securing digital data transmission in a communication network | |
CN105554344A (en) | Multi-image encryption method based on mixed graphics primitives | |
CN104270346B (en) | The methods, devices and systems of two-way authentication | |
CN107835168A (en) | A kind of authentication method being multiplied based on client information sequence spreading matrix transposition | |
CN110139163B (en) | Method and related device for acquiring bullet screen | |
CN100574320C (en) | A kind of method and terminal installation thereof that improves the safety certification video monitoring | |
CN104618306A (en) | Novel integrated mobile phone data transmission key signal encryption method | |
CN102014136B (en) | Peer to peer (P2P) network secure communication method based on random handshake | |
CN104469758B (en) | More equipment safety login methods | |
CN104683979B (en) | A kind of authentication method and equipment | |
Mohamed et al. | A novel watermarking technique in data transmission between QR codes and database | |
CN105871788A (en) | Server login password generation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190301 Termination date: 20220205 |
|
CF01 | Termination of patent right due to non-payment of annual fee |