CN107845055B - Image encryption method for resisting Facebook compression - Google Patents
Image encryption method for resisting Facebook compression Download PDFInfo
- Publication number
- CN107845055B CN107845055B CN201710579130.9A CN201710579130A CN107845055B CN 107845055 B CN107845055 B CN 107845055B CN 201710579130 A CN201710579130 A CN 201710579130A CN 107845055 B CN107845055 B CN 107845055B
- Authority
- CN
- China
- Prior art keywords
- image
- coefficient
- block
- blocks
- coefficients
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000006835 compression Effects 0.000 title claims abstract description 24
- 238000007906 compression Methods 0.000 title claims abstract description 24
- 238000013139 quantization Methods 0.000 claims abstract description 7
- 239000011159 matrix material Substances 0.000 claims description 33
- 125000004122 cyclic group Chemical group 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 8
- 238000000638 solvent extraction Methods 0.000 claims description 4
- 230000008602 contraction Effects 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 239000003550 marker Substances 0.000 claims description 2
- 239000000203 mixture Substances 0.000 claims description 2
- 230000000750 progressive effect Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 6
- 230000000903 blocking effect Effects 0.000 abstract description 2
- 230000000694 effects Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000005406 washing Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 241001504519 Papio ursinus Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses an image encryption method for resisting Facebook compression, which sequentially comprises the following steps: 8 multiplied by 8 blocking is carried out on the image; performing discrete cosine transform and quantization on each block; encrypting the image DC coefficient and the AC coefficient; encrypting the image by taking the image block as a unit; performing border crossing processing; and (5) carrying out secondary encryption. The method combines the characteristics of the Facebook social network platform on image processing, is simple to realize, has high safety, can effectively resist various attacks, and has wide application prospect on image encryption protection based on the Facebook social network platform.
Description
Technical Field
The invention relates to an image compression and encryption technology, in particular to an image encryption method for resisting Facebook compression.
Background
In the 21 st century informatization age, with the development of the internet and the popularization of mobile devices, social networks have become an inseparable part of our lives, and the mainstream social network platforms in the world now include Google +, Facebook, WeChat and Twitter, etc. However, as social networks are widely used, people are concerned about personal privacy security more and more, and pictures are taken as a main information communication medium, hundreds of millions of pictures are uploaded every day on mainstream social network platforms such as Facebook, and the pictures contain a large amount of privacy information including the appearance, geographical position and even business secret information of people. Privacy protection in social networks is therefore of increasing interest. With the development of image encryption technology, image encryption analysis technology has also advanced greatly. General encryption technology can easily obtain a part of image information under external attack, so that at present, a safer and more effective image encryption method is adopted, and in reality, users of a social network platform have great demands on privacy protection. The global user volume of Facebook in 12 months of 2016 exceeded 23 hundred million, becoming the largest social networking site worldwide.
Facebook has a unique way to handle uploaded images and thus also presents a significant difficulty for image encryption research based on Facebook social networking platform. When images are uploaded to Facebook, for oversizeJPEG (Joint Photographic Experts group) is a committee which sets forth the compression standard for still images under the international organization for standardization (ISO) leader, JPEG (Joint Photographic Experts group) is a committee which has succeeded in short years, and is widely used in the fields of Internet and digital cameras, JPEG (Joint Photographic Experts group) being a compression standard for JPEG that 80% of images on websites employ the JPEG compression standard which only describes how to convert an image into a data stream of bytes, but does not describe how the bytes are sealed on any specific storage medium, JPEG compression standard being a lossy compression format which can compress images in a small storage space, JPEG compression standard reading the pixel values of an image first, quantizing the image into small blocks of 398 blocks, and quantizing each block of the image into small blocks of discrete cosine (D) after each discrete cosine transform (8 × 8) of each block of DCT block, and then quantizing each block of the DCT block into a discrete cosine (D) block (each block of DCT)i,j0 < i, j < 7, wherein D0,0Referred to as DC coefficients, the remainder are AC coefficients. Differential encoding is used for the DC coefficients, and run-length encoding and entropy encoding are used for the AC coefficients.
According to the experimental analysis of images in 1038 UCID-v2 image databases, Facebook selects the quality factor of image compression between 71 and 92, because the correlation of the encrypted images is very low, namely the activity of the images is very high, and according to the characteristics of Facebook processing, the images with high activity adopt low compression factor, so that the quantization table with the quality factor of 71 is adopted to compress and quantize the images.
For the image encryption technology based on the Facebook social network platform, the image encryption technology can only ensure that the image encryption technology can play a role in keeping secret when not being attacked by the outside, and can protect information in the image, but can not play a good role when receiving some outside attacks, and can not protect the information in the image from being leaked. Sun et al in 2016 proposed a Facebook social networking platform based image encryption technique that enabled correct decryption of images after Facebook compression. The quality of the image can be well guaranteed when the image is decrypted by the method, but the encryption security is not high, and the basic outline of the image can be exposed under some attack means.
In the existing method, for image encryption of a Facebook social network platform, the encryption effect of image information is relatively high, but the attack resistance is low, because Facebook reads from a pixel domain side when processing an uploaded image, and then JPEG compression is performed, in the current encryption scheme, only water washing encryption and AC coefficient exclusive or encryption are respectively performed on an image DC coefficient, because after image DCT transformation and quantization, exclusive or encryption is performed according to an equivalent binary data stream, the positions of a non-zero AC coefficient and a last non-zero AC coefficient do not change, and the size of a small AC coefficient does not change too much, so that a basic outline of the image can be obtained through attack on the AC coefficient.
Disclosure of Invention
The purpose of the invention is as follows: the invention aims to solve the defects in the prior art and provide an image encryption method for resisting Facebook compression.
The technical scheme is as follows: the invention relates to an image encryption method for resisting Facebook compression, which comprises two steps of encryption and decryption;
(1) the specific process of encryption is as follows:
(1.1) partitioning an image I to be processed, which is given a size of H × W, into blocks of 8 × 8 size, and totally partitioning the blocksEach image block, each block being DCT transformed and a quantization with a quality factor of 71 being selectedThe table quantizes each block, and in each block, the quantized coefficient D ═ D i,j0 < i, j < 7, wherein D0,0Called the DC coefficient, and the rest are AC coefficients;
(1.2) different encryption modes controlled by a secret key K are respectively adopted for the DC coefficient and the AC coefficient: the DC coefficient is changed by adopting an encryption mode of circularly shifting controlled by a key K, the DC coefficient of each block is changed, and a stream key generated by the key K is adopted for the AC coefficient, and a non-zero AC coefficient and a block stream password are used for carrying out bitwise XOR encryption;
(1.3) for pixel blocks having pixel values outside the range of the original pixel values, transmitting them to the receiver using bitmap marking compression, and multiplying the AC coefficients of the out-of-range image blocks by a contraction coefficientThe shrinkage treatment is carried out to the mixture,
(1.4) taking the image block as a basic unit, and carrying out scrambling encryption operation on the whole image according to the key K;
(2) the specific process of decryption is as follows:
(2.1) restoring the image block to the correct block position according to the secret key K;
And (2.3) decrypting the DC coefficient and the AC coefficient of each block according to different decryption modes: the DC coefficient employs an inverse cyclic shift operation determined by the key K, and a stream cipher is generated from the key K, and the image data can be decrypted by bitwise xoring the packets with the encrypted non-zero AC coefficient.
Further, the specific method of the step (1.2) is as follows:
(1.2.1) count all DC coefficients to DCoe ═ DC in the progressive scanning order0,DC1,......,DCn-1One-dimensional matrixPerforming the following steps;
(1.2.2) is provided withConverting a one-dimensional matrix DCoe containing n DC coefficients intoA two-dimensional matrix DCoe' of rows and 4 columns;
(1.2.3) performing cyclic shift operation on the DC coefficient matrix DCoe 'according to the secret key K, wherein the DCoe' after cyclic shift is used as the DC coefficient of each block in sequence;
(1.2.4) generating a binary data stream KA by using a key K, grouping the binary stream keys KA into groups, recording the groups as KA (0) and KA (1),... said.. each group of stream keys has a length of 12, sequentially carrying out bitwise XOR encryption on non-zero AC coefficients, setting a binary system of each non-zero AC coefficient to be l bits, and carrying out encryption on the encrypted AC coefficientsSince the maximum length of the non-zero AC coefficient in the image is 10, the stream key 12 bits are grouped and far exceed the binary length of the AC coefficient, and when the AC coefficient is attacked to change the AC length, the data robustness can be ensured to the maximum extent.
Further, the method for scrambling and encrypting the whole image according to the key K by using the image block as a basic unit in the step (1.4) is as follows:
(1.4.1) image I to be processed with size H × W, the image is partitioned into blocks according to 8 × 8 size, and the blocks are totally divided intoBlocks, denoted as n blocks;
(1.4.2) taking out t blocks at equal intervals in sequence each time: the image I has n blocks in total, every other time for the first timeTaking out one block, taking out t blocks, and remaining n-t blocks in the image according to the first method at intervalsTaking out one block, and the same way is carried out until all blocks are taken out;
(1.4.3) finally arranging the blocks according to the extraction sequence as the positions of the encrypted blocks.
Further, a specific method for restoring the image block to the correct block position in step (2.1) is as follows:
(2.1.1) setting the position marker matrix Loc to {1, 2.... multidot.n } for an image containing n 8 × 8 blocks;
(2.1.2) taking out K values at equal intervals in the Loc according to the key K and the sequence every time, and sequentially putting the K values in the Loc' matrix until all elements are taken out;
(2.1.3) restoring the position of the ith block in the image to the position of the Loc '(i) block according to the Loc' position matrix, thereby realizing the restoration of the position of the image block.
Further, the specific method for decrypting the DC and AC coefficients of the image in the step (2.3) in different manners is as follows:
(2.3.1) counting all DC coefficients in order to DCoe ═ DC0,DC1,......,DCn-1In the one-dimensional matrix;
(2.3.2) converting the one-dimensional matrix DCoe containing n DC coefficients intoA two-dimensional matrix DCoe' of rows and 4 columns;
(2.3.3) performing reverse cyclic shift operation on the DC coefficient matrix DCoe according to the secret key K, wherein the DCoe after cyclic shift is used as the DC coefficient after each block is encrypted in sequence;
(2.3.4) generating a binary data stream KA by the key K, grouping the binary stream keys, recording the binary stream keys as KA (0) and KA (1), and carrying out bitwise XOR operation on the nonzero AC coefficients in sequence when the length of each group of keys is 12, and setting the binary length of the nonzero AC coefficients as l, then decrypting the decrypted AC coefficientsAccording toThis way decryption can be done separately for the DC coefficients and the AC coefficients.
Further, in the step (1.3), the encrypted border-crossing pixel block data is encoded according to a JPEG encoding mode and transmitted to the receiving party.
Has the advantages that: according to the method, the images are encrypted according to the Facebook processing process, in order to avoid the loss of unknown and uncontrollable image information, the size of the images is not required to be too large before uploading, then DCT (discrete cosine transformation) and quantization are carried out on the images to obtain the DC coefficient and the AC coefficient of the images, and the DC coefficient and the AC coefficient of the images are respectively encrypted, so that the images have better safety when resisting external purposeful attacks.
In conclusion, the implementation method is very simple and convenient, is beneficial to encrypting the image transmitted based on the Facebook social network platform, has good adaptability to a real-time communication system, a mobile terminal with limited computing resources and the like due to uncomplicated encryption calculation, and has good application prospect.
Drawings
FIG. 1 is a diagram of an effect of a standard image after encryption in an embodiment;
FIG. 2 is a diagram illustrating the effect of decryption by an error key according to an embodiment;
FIG. 3 is a diagram illustrating the effect of external attacks in an embodiment;
FIG. 4 is a diagram illustrating an embodiment of correctly decrypting a decrypted image;
FIG. 5 is an example AC encryption process data matrix;
FIG. 6 is an embodiment of a DC encryption process data matrix;
FIG. 7 is a diagram illustrating image block scrambling in an embodiment;
FIG. 8 is a schematic overall flow chart of the present invention.
Wherein, fig. 1(a), fig. 1(b) and fig. 1(c) are respectively Lena, Baboon and Elaine encryption effect diagrams; fig. 2(a), fig. 2(b), fig. 2(c) and fig. 2(d) are diagrams of the effect of decrypting 1(a) using 21,22, 24 and 25 error keys, respectively; FIG. 3(a), FIG. 3(b), FIG. 3(c) and FIG. 3(d) are the effect graphs of FIG. 1(a) after encryption of an attack on the image using DCM, NCC, EAC and PLZ, respectively; fig. 4(a), fig. 4(b) and fig. 4(c) are schematic diagrams after decryption of 1(a), 1(b) and 1(c), respectively, with correct keys; FIGS. 5(a), 5(b) and 5(c) are an 8 × 8 image block and a DCT transformed and quantized coefficient matrix and an encrypted AC coefficient matrix, respectively; fig. 6(a) and 6(b) are a matrix containing 16 DC coefficients and a matrix of DC coefficients encrypted with water washing, respectively.
Detailed Description
The technical solution of the present invention is described in detail below, but the scope of the present invention is not limited to the embodiments.
As shown in fig. 8, the image encryption method for resisting Facebook compression of the present invention sequentially includes the following steps: firstly, encrypting, namely performing 8 multiplied by 8 blocking on an image; performing Discrete Cosine Transform (DCT) on each block and quantizing; encrypting the image DC coefficient and the AC coefficient; encrypting the image by taking the image block as a unit; performing border crossing processing; and (5) carrying out secondary encryption. And II, decrypting.
Example 1:
the specific steps of this example are as follows:
firstly, an image encryption process:
an 8 × 8 image block as shown in FIG. 5(a) is subjected to a first encryption operation, first DCT transformed, and then quantized with the selection of a standard quantization table with quality factor 71, resulting in FIG. 5 (b). The total can be divided into H × W sized image partitionsBlocks, each of which is then DCT transformed and quantized in this manner, shareA DC coefficient, and a number of AC non-zero coefficients.
And encrypting the DC coefficients, setting an encryption key K to be 3, arranging all the DC coefficients into a two-dimensional matrix according to the original sequence, circularly moving the DC coefficients downwards for K times, and circularly moving the DC coefficients rightwards for K times to obtain a new coefficient matrix. And taking the new coefficient matrix as the image DC coefficient of each block in sequence. Let fig. 6(a) be a DC coefficient matrix of a certain size 32 × 32, which has 16 DC coefficients in total, and place the 16 coefficient matrices in a two-dimensional DC coefficient matrix of 4 × 4 in sequence, resulting in a new coefficient matrix as in fig. 6 (b). And finally, the DC coefficients of the blocks are sequentially used.
Encrypting the AC coefficients, generating a plurality of binary key streams KA by a key K, grouping the binary key streams KA into groups, recording the binary key streams KA (0) and KA (1), and carrying out bitwise XOR encryption on the non-zero AC coefficients in sequence, setting the binary length of the non-zero AC coefficients as l, and setting the decrypted AC coefficients asThe non-zero AC coefficients as shown in fig. 5(b) are { -2,3,2,1,2,1, -1,1,1, -1, -1} in order according to the Zigzag scanning direction, and after bitwise xor encryption of the packet stream key, the non-zero AC coefficients as shown in fig. 5(c) are { -3, -2, -2, -1,2,1, -1, -1, -1,1}, respectively.
The image blocks are scrambled and encrypted, as shown in fig. 7, with 8 × 8 blocks as the basic unit, and the image blocks are scrambled and rearranged, for example, 256 blocks in fig. 7, every other timeBlock, take out one block, take out K blocks, the picture still remains 256-K blocks, according to the first method, every otherAnd taking out one block, and the same way is carried out until all blocks are taken out. The method can break the original block layout of the image so as to break the outline of the image, and further improve the anti-attack capability of the image.
Example 2:
to detect the effect of the present embodiment, experiments and analyses are performed from three aspects of the encryption effect, the common attack effect, and the image quality.
Taking a common standard test image of 512 × 512 pixels as an example, using the key K ═ 23, the effects of different image encryption, Facebook upload, and download viewing are shown in fig. 1.
If the correct key is not available, fig. 1(a) is decrypted with the wrong keys 21,22 and 24,25 respectively to verify the authenticity of the encryption, and the effect is shown in fig. 2.
The encrypted image shown in fig. 1(a) is subjected to dcm (dc category mapping), NCC (non-zero AC coeffient count), eac (energy of AC coeffients block) and PLZ (position of last non-zero AC coeffients) without a key, and the effect is shown in fig. 3.
If the correct key is available, the effect of decrypting the image is shown in fig. 4.
After the image is encrypted by the method, the original image is invisible, and has good resistance when resisting some attacks, the contour information and the like of the image are not exposed, and the method uses one-time pad and has high safety.
To further illustrate that the image visual effect is not affected after the image information is decrypted by the present invention, table 1 lists the peak signal-to-noise ratio PSNR between the standard test image decryption and the original image. The peak signal-to-noise ratio is an evaluation index of the visual quality of the disguised image, and when the peak signal-to-noise ratio between two gray-scale images is larger than 30dB, human eyes cannot distinguish the two images.
TABLE 1 Standard test image quality after decryption
Claims (4)
1. An image encryption method for resisting Facebook compression is characterized in that: comprises two steps of encryption and decryption;
(1) the specific process of encryption is as follows:
(1.1) partitioning an image I to be processed, which is given a size of H × W, into blocks of 8 × 8 size, and totally partitioning the blocksAn image block, each block is DCT-transformed, and each block is quantized by selecting a quantization table with a quality factor of 71, and in each block, quantized coefficients D ═ D { (D)i,j},0≤i, j is less than or equal to 7, wherein D0,0Called the DC coefficient, and the rest are AC coefficients;
(1.2) different encryption modes controlled by a secret key K are respectively adopted for the DC coefficient and the AC coefficient: the DC coefficient is changed by adopting an encryption mode of circularly shifting controlled by a key K, the DC coefficient of each block is changed, and a stream key generated by the key K is adopted for the AC coefficient, and a non-zero AC coefficient and a block stream password are used for carrying out bitwise XOR encryption;
(1.3) for pixel blocks having pixel values outside the range of the original pixel values, transmitting them to the receiver using bitmap marking compression, and multiplying the AC coefficients of the out-of-range image blocks by a contraction coefficientThe shrinkage treatment is carried out to the mixture,
(1.4) taking the image block as a basic unit, and carrying out scrambling encryption operation on the whole image according to the key K;
(2) the specific process of decryption is as follows:
(2.1) restoring the image block to the correct block position according to the secret key K;
And (2.3) decrypting the DC coefficient and the AC coefficient of each block according to different decryption modes: the DC coefficient adopts reverse cyclic shift operation determined by a key K, a stream cipher is generated by the key K, and the image data can be decrypted by performing bitwise XOR on the packets and the encrypted non-zero AC coefficient;
the specific method of the step (1.2) comprises the following steps:
(1.2.1) count all DC coefficients to DCoe ═ DC in the progressive scanning order0,DC1,......,DCn-1In the one-dimensional matrix;
(1.2.2) is provided withConverting a one-dimensional matrix DCoe containing n DC coefficients intoA two-dimensional matrix DCoe' of rows and 4 columns;
(1.2.3) performing cyclic shift operation on the DC coefficient matrix DCoe 'according to the secret key K, wherein the DCoe' after cyclic shift is used as the DC coefficient of each block in sequence;
(1.2.4) generating a binary data stream KA from a key K, grouping the binary stream keys KA, and recording the binary stream keys KA as KA (0) and KA (1), wherein the length of each stream key is 12, performing bitwise xor encryption on non-zero AC coefficients in sequence, setting a binary sequence of each non-zero AC coefficient to be l bits, and setting an encrypted AC coefficient AC' ═ AC ⊕ KA1→l(i) Because the maximum length of the non-zero AC coefficient in the image is 10, 12 bits of the stream key are a group which is far beyond the binary length of the AC coefficient, and when the AC coefficient is attacked and the AC length is changed, the robustness of the data can be ensured to the maximum extent;
the specific method for decrypting the image DC and AC coefficients in the step (2.3) in different ways is as follows:
(2.3.1) counting all DC coefficients in order to DCoe ═ DC0,DC1,......,DCn-1In the one-dimensional matrix;
(2.3.2) converting the one-dimensional matrix DCoe containing n DC coefficients intoA two-dimensional matrix DCoe' of rows and 4 columns;
(2.3.3) performing reverse cyclic shift operation on the DC coefficient matrix DCoe according to the secret key K, wherein the DCoe after cyclic shift is used as the DC coefficient after each block is encrypted in sequence;
(2.3.4) generating a binary data stream KA by the key K, grouping the binary stream keys, recording the binary stream keys as KA (0) and KA (1), and carrying out bitwise XOR operation on the nonzero AC coefficients in sequence when the length of each group of keys is 12, and setting the binary length of the nonzero AC coefficients as l, then decrypting the binary stream keys and carrying out XOR operation on the nonzero AC coefficientsAC coefficient AC ═ AC ⊕ KA1→l(i) (ii) a In this manner, decryption can be done separately for the DC coefficients and the AC coefficients.
2. The Facebook compression resistant image encryption method of claim 1, wherein: in the step (1.4), the image block is used as a basic unit, and the method for scrambling and encrypting the whole image according to the key K is as follows:
(1.4.1) image I to be processed with size H × W, the image is partitioned into blocks according to 8 × 8 size, and the blocks are totally divided intoBlocks, denoted as n blocks;
(1.4.2) taking out t blocks at equal intervals in sequence each time: the image I has n blocks in total, every other time for the first timeTaking out one block, taking out t blocks, and remaining n-t blocks in the image according to the first method at intervalsTaking out one block, and the same way is carried out until all blocks are taken out;
(1.4.3) finally arranging the blocks according to the extraction sequence as the positions of the encrypted blocks.
3. The Facebook compression resistant image encryption method of claim 1, wherein: the specific method for restoring the image block to the correct block position in the step (2.1) is as follows:
(2.1.1) setting the position marker matrix Loc to {1, 2.... multidot.n } for an image containing n 8 × 8 blocks;
(2.1.2) taking out K values at equal intervals in the Loc according to the key K and the sequence every time, and sequentially putting the K values in the Loc' matrix until all elements are taken out;
(2.1.3) restoring the position of the ith block in the image to the position of the Loc '(i) block according to the Loc' position matrix, thereby realizing the restoration of the position of the image block.
4. The Facebook compression resistant image encryption method of claim 1, wherein: and (1.3) coding the encrypted border-crossing pixel block data according to a JPEG coding mode and transmitting the coded border-crossing pixel block data to a receiving party.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710579130.9A CN107845055B (en) | 2017-07-17 | 2017-07-17 | Image encryption method for resisting Facebook compression |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710579130.9A CN107845055B (en) | 2017-07-17 | 2017-07-17 | Image encryption method for resisting Facebook compression |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107845055A CN107845055A (en) | 2018-03-27 |
CN107845055B true CN107845055B (en) | 2020-10-16 |
Family
ID=61683126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710579130.9A Expired - Fee Related CN107845055B (en) | 2017-07-17 | 2017-07-17 | Image encryption method for resisting Facebook compression |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107845055B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108810555B (en) * | 2018-06-15 | 2020-09-22 | 南开大学 | Thumbnail image privacy protection method based on image compression and elastic resolution |
CN109379507A (en) * | 2018-09-18 | 2019-02-22 | 湖北工程学院 | A kind of guard method of image, storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102176759A (en) * | 2011-02-15 | 2011-09-07 | 天津理工大学 | Method for encrypting video streaming information based on hyper-chaotic sequence |
CN103581677A (en) * | 2012-07-20 | 2014-02-12 | 中国科学院深圳先进技术研究院 | Image encrypted compression and decompression decryption method and device |
CN104144343A (en) * | 2014-07-11 | 2014-11-12 | 东北大学 | Digital image compressing, encrypting and encoding combined method |
KR101644858B1 (en) * | 2015-07-23 | 2016-08-02 | 김경준 | retrieval system using high functional image file |
CN105975869A (en) * | 2016-02-05 | 2016-09-28 | 四川长虹电器股份有限公司 | Adaptive selection encryption method based on salient area |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7792377B2 (en) * | 2007-04-25 | 2010-09-07 | Huper Laboratories Co., Ltd. | Method of image authentication and restoration |
-
2017
- 2017-07-17 CN CN201710579130.9A patent/CN107845055B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102176759A (en) * | 2011-02-15 | 2011-09-07 | 天津理工大学 | Method for encrypting video streaming information based on hyper-chaotic sequence |
CN103581677A (en) * | 2012-07-20 | 2014-02-12 | 中国科学院深圳先进技术研究院 | Image encrypted compression and decompression decryption method and device |
CN104144343A (en) * | 2014-07-11 | 2014-11-12 | 东北大学 | Digital image compressing, encrypting and encoding combined method |
KR101644858B1 (en) * | 2015-07-23 | 2016-08-02 | 김경준 | retrieval system using high functional image file |
CN105975869A (en) * | 2016-02-05 | 2016-09-28 | 四川长虹电器股份有限公司 | Adaptive selection encryption method based on salient area |
Non-Patent Citations (2)
Title |
---|
一种基于数字图像的安全信息传输方案;谢志强;《物联网技术》;20160531;第36-39,42页 * |
多媒体信息隐藏技术;张新鹏;《自然杂志》;20170228;第87-95页 * |
Also Published As
Publication number | Publication date |
---|---|
CN107845055A (en) | 2018-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Long et al. | Separable reversible data hiding and encryption for HEVC video | |
He et al. | JPEG image encryption with improved format compatibility and file size preservation | |
Kurihara et al. | An encryption-then-compression system for jpeg standard | |
Xu et al. | An efficient chaos pseudo-random number generator applied to video encryption | |
Itier et al. | Recompression of JPEG crypto-compressed images without a key | |
Li et al. | Joint image encryption and compression schemes based on 16× 16 DCT | |
CN108810555B (en) | Thumbnail image privacy protection method based on image compression and elastic resolution | |
CN104468090A (en) | Chinese character password encoding method based on image pixel coordinates | |
Ong et al. | Scrambling–embedding for JPEG compressed image | |
Elkamchouchi et al. | New video encryption schemes based on chaotic maps | |
CN110809192B (en) | Video encryption method capable of carrying secret information | |
Chuman et al. | Image manipulation specifications on social networking services for encryption-then-compression systems | |
CN107845055B (en) | Image encryption method for resisting Facebook compression | |
Li et al. | Joint jpeg compression and encryption scheme based on order-8-16 block transform | |
Kalita et al. | A comparative study of steganography algorithms of spatial and transform domain | |
Ullah et al. | Selective region based images encryption | |
Shinde et al. | A survey: video steganography techniques | |
CN115131253B (en) | Secret image sharing method and system for resisting JPEG recompression | |
Su et al. | A privacy protection scheme in H. 264/AVC by data hiding | |
Alirezaei et al. | Efficient video encryption by image key based on hyper-chaos system | |
Liu et al. | A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability. | |
Ghadi et al. | JPEG bitstream based integrity with lightweight complexity of medical image in WMSNS environment | |
Nakachi et al. | A Design Method for Golomb Coding in Layered Scrambled JPEG XS Scheme | |
Abdelmged et al. | A Combined approach of steganography and cryptography technique based on parity checker and huffman encoding | |
Kumar et al. | Secure Video Compression and Integration Technique for Data Transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201016 |