CN115834791B - Image encryption and decryption transmission method using matrix key and electronic equipment - Google Patents

Image encryption and decryption transmission method using matrix key and electronic equipment Download PDF

Info

Publication number
CN115834791B
CN115834791B CN202310053159.9A CN202310053159A CN115834791B CN 115834791 B CN115834791 B CN 115834791B CN 202310053159 A CN202310053159 A CN 202310053159A CN 115834791 B CN115834791 B CN 115834791B
Authority
CN
China
Prior art keywords
image
matrix
pixel
user
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310053159.9A
Other languages
Chinese (zh)
Other versions
CN115834791A (en
Inventor
刘昊天
刘冲
赵峰
徐莉萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XCMG Hanyun Technologies Co Ltd
Original Assignee
XCMG Hanyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XCMG Hanyun Technologies Co Ltd filed Critical XCMG Hanyun Technologies Co Ltd
Priority to CN202310053159.9A priority Critical patent/CN115834791B/en
Publication of CN115834791A publication Critical patent/CN115834791A/en
Application granted granted Critical
Publication of CN115834791B publication Critical patent/CN115834791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)

Abstract

The application provides an image encryption and decryption transmission method and electronic equipment using a matrix key, wherein the encryption transmission method comprises the following steps: acquiring a transmission request for a first image sent by a user terminal, wherein the transmission request comprises a user identifier; generating a 3*3-order invertible matrix key corresponding to the user identifier when the first image belongs to sensitive content relative to the user identifier; forming a 1*3-order matrix by using RGB values of each pixel of the first image, and performing operation with the matrix key to form a second image; acquiring a third image matched with the first image; hiding pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image; and transmitting the fourth image to the user terminal for storage. The method and the device can achieve the effect of good information secret transmission under the condition that excessive computing resources of the electronic equipment are not required to be occupied.

Description

Image encryption and decryption transmission method using matrix key and electronic equipment
Technical Field
The present invention relates to the field of information security technologies, and in particular, to an image encryption transmission method using a matrix key, an image decryption transmission method using a matrix key, a storage medium, and an electronic device.
Background
With the rapid development of internet technology and communication technology, a large amount of image data is transmitted and stored in networks and communications, however, when the internet provides convenience for information sharing, a large amount of data is also revealed, tampered, stolen, etc. Ensuring the security of information has become an important direction of internet technology research. Image data is an important carrier of human information, and protection of the image data and research on image encryption technology form an important and urgent information security research subject.
For image encryption, firstly, the security of an encryption mode is considered, and secondly, the complexity and the operand of the encryption algorithm are considered. However, some existing image encryption methods consider the security of the encryption method, and completely disregard the complexity and the operation amount of the encryption algorithm, so that a great deal of computing resources are required for image encryption and decryption.
Disclosure of Invention
In view of this, there is a need to propose an image encryption transmission method using a matrix key, an image decryption transmission method using a matrix key, a storage medium, and an electronic device, so as to reduce the consumption of system computing resources as much as possible while ensuring the security of information transmission.
In a first aspect of the present application, there is provided an image encryption transmission method using a matrix key, the method comprising:
acquiring a transmission request for a first image sent by a user terminal, wherein the transmission request comprises a user identifier;
generating a 3*3-order invertible matrix key corresponding to the user identifier when the first image belongs to sensitive content relative to the user identifier;
forming a 1*3-order matrix by using RGB values of each pixel of the first image, and performing operation with the matrix key to form a second image;
acquiring a third image matched with the first image;
hiding pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image;
and transmitting the fourth image to the user terminal for storage.
In one embodiment, the method further comprises:
detecting whether the authority required for transmitting the first image exceeds the authority corresponding to the user identifier; and/or
Detecting whether the current operation environment of the user terminal belongs to an unsafe environment or not;
and when any one of the detection results is yes, judging that the first image belongs to sensitive content relative to the user identifier.
In one embodiment, the method further comprises:
when detecting that the number of times of input errors of the login account matched with the user identification exceeds a preset number threshold value in a preset time period, and/or
When it is detected that the user terminal does not belong to a common device corresponding to the user identification,
and judging that the current operation environment of the user terminal belongs to an unsafe environment.
In one embodiment, the sum of each row of elements in the matrix key is a fixed value, the forming the RGB value of each pixel of the first image into a 1*3 order matrix, and performing an operation with the matrix key to form a second image includes:
forming a 1*3-order matrix by RGB values of each pixel of the first image, and multiplying the RGB values by the matrix key to obtain a new 1*3-order matrix;
dividing the three elements of the new 1*3 order matrix by the fixed values and rounding, and taking the obtained result as the RGB value of the corresponding pixel of the second image.
In one embodiment, the generating a 3*3 order invertible matrix key corresponding to the user identifier includes:
and receiving the fixed value sent by the user terminal, and generating the matrix key according to the fixed value, wherein the fixed value is a numerical value input by a user on the user terminal.
In one embodiment, the acquiring a third image matching the first image includes:
and acquiring an image with highest similarity with the first image from a preset image library as the third image, wherein the size of the third image is larger than that of the first image.
In a second aspect of the present application, there is provided an image decryption transmission method using a matrix key, the method comprising:
acquiring an image display request sent by a user terminal, wherein the request comprises a user identifier and an image identifier of an image to be displayed, and the image to be displayed is a fourth image stored according to the method in any embodiment of the application;
determining an inverse matrix of a matrix key for decrypting the image to be displayed and a third image based on the image identifier;
separating a second image from the fourth image based on the third image;
decrypting the second image according to the inverse matrix to obtain a first image;
and detecting whether the user identifier has the authority to access the first image or not, and if so, displaying the first image on the user terminal.
In one embodiment, the third image is displayed on the user terminal when the user identifier does not have the right to access the first image.
In a third aspect of the present application, there is provided an electronic device, including:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the methods of any of the embodiments of the present application.
In a fourth aspect of the present application, there is provided a computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any of the embodiments of the present application.
According to the image encryption transmission method using the matrix key, the image decryption transmission method using the matrix key, the storage medium and the electronic equipment, for the first image to be transmitted, the first image is operated by using the matrix key to form the second image, and then the pixel information in the second image is hidden into the third image, so that the security of the first image can be well ensured through two simple processes without spending excessive computing resources, and a good information confidentiality effect can be achieved.
Drawings
FIG. 1 is an application scenario diagram of an image encryption transmission method using a matrix key in one embodiment;
FIG. 2 is a flow chart of an image encryption transmission method using a matrix key in one embodiment;
FIG. 3 is a flow chart illustrating hiding pixel information in a second image into a third image according to an embodiment;
FIG. 4 is a flowchart of an image encryption transmission method using a matrix key according to another embodiment;
FIG. 5 is a flow chart of an image decryption transmission method using a matrix key in one embodiment;
fig. 6 is an internal structural diagram of an electronic device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
The terms "first," "second," and the like, as used herein, may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first image may be referred to as a second image, and similarly, a second image may be referred to as a first image, without departing from the scope of the present application. Both the first image and the second image are images, but they are not the same image.
Also as used herein, the terms "comprises," "comprising," and/or the like, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
As shown in fig. 1, the image encryption transmission method and the image decryption transmission method in the present application can be applied to the application scenario shown in fig. 1. Wherein a user can browse relevant information provided by the background server 120 on his user terminal 110. For example, a corresponding platform account number can be logged in, and related data browsing and operation can be performed. The portion of the data provided on the server 120 may have different sensitivity levels or may require a certain authority to access, in some cases, the user may bypass the related authority audit through some system vulnerabilities, so that the user terminal 110 may view the corresponding information, and store the information locally in an image manner through screen capturing or clicking on the corresponding data storage operation. After detecting the storage request triggered by the data storage operation, the server 120 may acquire the data to be stored, convert the data to a first image, encrypt the first image, form a fourth image, and transmit the fourth image to the user terminal 110 for storage.
Meanwhile, when the user needs to open the encrypted fourth image on the terminal, the fourth image may be sent to the background server 120, and the background server 120 may restore the corresponding first image based on the decryption operation corresponding to the encryption operation, and when it is detected that the user has the right to access the first image, provide the first image to the user terminal for display. Through the encryption and decryption operation, the image data is prevented from being easily leaked.
In one embodiment, as shown in fig. 2, there is provided an image encryption transmission method using a matrix key, the method comprising:
step 202, a transmission request for a first image sent by a user terminal is obtained.
In this embodiment, the transmission request includes a user identifier, where the user identifier is used to uniquely identify the identity of the user. The transmission request may be a request to transmit an image on the server to the user terminal locally. For example, the request may be triggered by a screen capturing operation of a screen, may be triggered by a save operation of downloading an image for information displayed by a terminal, or may be triggered by another operation mode.
After the electronic device obtains the transmission request, the electronic device may obtain a first image corresponding to the request, where the first image is an original image to be encrypted.
Step 204, generating 3*3 order invertible matrix keys corresponding to the user identifications.
In this embodiment, the electronic device presets a rule for generating a matrix key, and may generate a corresponding matrix key based on the rule. The matrix key may be a 3*3 order invertible matrix, the matrix key being a matrix used to encrypt the first image. The generated matrix key can be related to the user identifier, so that the matrix keys correspondingly used by different users are different, and the users can have the personal encryption mode.
In one embodiment, step 204 is performed when the first image belongs to sensitive content with respect to the user identification.
Specifically, it may be detected whether the rights required for transmitting the first image exceed the rights corresponding to the user identifier, and/or whether the current operating environment of the user terminal belongs to an unsafe environment. If any one of the detection results is yes, for example, if the detection result is recognized as an unsafe environment and/or the data to be saved has a certain sensitivity, it is determined that the data to be saved belongs to sensitive content relative to the user identifier, and step 204 is performed.
The content in the first image may be a content with a certain sensitivity, which needs to have a certain authority to perform operations such as displaying, storing, transmitting, etc., so the electronic device may obtain the authority of the user based on the user identifier, compare the authority required for storing the first image with the authority of the user, and execute step 204 if the authority is not satisfied.
In this embodiment, when the authority of the user is insufficient, it is indicated that the user saves the first image by an irregular way, and may bypass the detection of the system, and the user is blocked from saving, so that the step 204 is continued.
In one embodiment, when the number of times that the login account matching the user identifier inputs errors in the preset time period exceeds a preset number of times threshold, and/or when the user terminal is detected not to belong to a common device corresponding to the user identifier, the current operation environment of the user terminal is determined to belong to an unsafe environment.
Whether the login account number and the password of the user are abnormal or not in a preset time period and/or whether equipment logging in the user information belongs to very common equipment or not can be detected, if one of the equipment is yes or both the equipment is yes, the current operation environment of the user terminal is judged to belong to an unsafe environment, further the data to be saved can be judged to belong to sensitive content relative to the user identifier, and step 204 is executed.
The abnormality may be whether a password input error more than a preset number of times is continuously generated within a preset time period. The preset time period may be any suitable time period in the last day, in the week, in the 3 hours, etc., and the preset times may be any suitable times of 3 times, 5 times, 8 times, etc.
In step 206, the RGB values of each pixel of the first image are formed into a 1*3 order matrix, which is operated with the matrix key to form a second image.
Wherein each pixel in the first image includes an RGB value, i.e., an R value, a G value, and a B value, the electronic device may place the RGB value into a 1*3 order matrix, and three elements in the matrix represent the R value, the G value, and the B value of the pixel in the corresponding position, respectively.
The operation of the matrix and the matrix key may be any suitable matrix operation, a new 1*3 order matrix is formed, and the values of the elements in the formed new matrix may be RGB values of the corresponding pixels in the second image. That is, after each pixel in the first image is subjected to the above operation, a corresponding pixel in the second image can be obtained.
The operation mode of the matrix and the matrix key can be any suitable operation such as multiplication or division of the two matrices.
The size of the formed second image is the same as that of the first image, and the pixels in the second image are encrypted values of the pixels at the corresponding positions in the first image.
Step 208, a third image is acquired that matches the first image.
In this embodiment, the third image is an image used for fusing with the second image, an image library of the third image is preset in the electronic device, and an appropriate image may be selected from the image library as the third image matched with the first image.
Specifically, the third image matched with the first image may be an image having a certain similarity with the first image, so that when the second image is fused, a user who is not clear of the first image considers that the corresponding third image is the required image, thereby improving the concealment of the information in the first image.
The electronic device may calculate a similarity between the first image and each image in the image library, and select an image with the highest similarity as the third image. The images in the image library may be publicly available images.
In one embodiment, an image with highest similarity to the first image is obtained from a preset image library as a third image, and the size of the third image is larger than that of the first image.
Wherein the size of the image represents the size of the number of pixels in the image, and the size of the first image and the size of the third image are not the same. Wherein the number of pixels of the third image is selected to be greater than the number of pixels of the first image. For example, the size of the first image is m0 x n0, and the size of the third image is m1 x n1, where m1 x n1> m0 x n0. For example, m1 is not less than 2m0, and n1 is not less than 2n0.
The size of the second image is the same as the size of the first image, and the size of the fourth image is the same as the size of the third image. In the finally formed fourth image, pixel information of the first image is not fused in the pixel points of each position, so that the concealment of the first image is further enhanced.
The image library of the third image stores a plurality of third images for image fusion with the desired image, the images having a plurality of different sizes. Optionally, the number of images of each same size is also plural. The electronic device may determine the size of the third image to be selected based on the size of the first image. Specifically, the size of the third image may be set to be more than 2 times that of the first image, and then the electronic device may determine the size of the third image to be selected.
After determining the size of the third image, one of the images with the highest similarity to the first image may be selected from the image library as the image for fusion with the second image.
The electronic device may calculate a similarity between the image having the appropriate size and the first image, so as to select the image with the highest phase velocity as the third image. And determining a corresponding third image to be selected according to the image storage operation of the user, and further taking the image as the third image.
For example, if the first image is a user information table under a certain functional unit of the system, the electronic device may select, from the image library, an image having a size larger than that of the first image, which is close to the user information table under the functional unit, and use the selected image as the third image. The selected third image may be a specially designed image for fusion with the first image under the functional unit.
In the method, the third image with high similarity with the first image is further selected to be fused with the second image, so that the finally generated fourth image is relatively close to the first image, and therefore, it is unclear that the fourth image is a person who is a processed image, and the fourth image can be directly taken as the first image, and the safety of data in the first image can be further improved.
In step 210, pixel information in the second image is hidden in the third image, forming a fourth image and an image identifier that can be used as a key to decrypt the fourth image.
In this embodiment, the pixel a in the second image and the corresponding pixel B in the third image may be superimposed to form the corresponding pixel in the fourth image. The superposition may be a weighted sum, and the pixel a and the pixel B may be pixels at the same position in the image or pixels at different positions.
Specifically, pixels in the second image may be determined to be fused with pixels in the third image, and fusion may be performed based on the determined pixels. For example, the determined pixels are pixels at the same position, the two pixels are weighted and summed, and the pixel value obtained by summation is taken as the pixel value at the corresponding position of the fourth image.
The weights of the two may be set to any suitable normalized value according to the situation, for example, the weights may be set to 0.5, or the weight of the second image is set to 0.3, and the weight of the third image is set to 0.7. Further, the weight of the third image is larger than that of the second image, so that the information of the second image can be further hidden.
In one embodiment, independent weights may be set for each channel in the RGB values, such as c1 and d1 for R values, c2 and d2 for G values, and c3 and d3 for B values, where c1> d1, c2> d2, and c3> d3 for the second and third images.
And when the fourth image is generated, a key for correspondingly decrypting the fourth image can be formed based on the image operation process, and the decryption key is used as an image identifier of the fourth image. I.e. also simultaneously generates an image identification which can be used as a key for decrypting the fourth image. In this way, after the electronic device acquires the fourth image, the electronic device can directly restore the first image based on the image identifier.
And step 212, transmitting the fourth image to the user terminal for storage.
In this embodiment, the fourth image is transmitted to the user terminal for saving. The user terminal may be the identified terminal that initiated the image save operation.
After the electronic device completes the processing of the first image according to the steps, the formed fourth image can be transmitted from the platform to the user terminal, so that the fourth image can be saved on the user terminal.
According to the image encryption transmission method using the matrix key, for the first image to be transmitted, the first image is firstly operated by using the matrix key to form the second image, and then the pixel information in the second image is hidden into the third image, so that the first image is well ensured to achieve good information confidentiality effect after twice simple processing, namely, excessive computing resources are not required to be spent.
In one embodiment, the sum of each row of elements in the matrix key is a fixed value, step 206 includes: forming a 1*3-order matrix by RGB values of each pixel of the first image, and multiplying the RGB values by a matrix key to obtain a new 1*3-order matrix; dividing the new 1*3 order matrix three elements by fixed values and rounding, and taking the obtained result as RGB value of the corresponding pixel of the second image.
The sum of each row of elements of the matrix key is a fixed value, and the fixed value can be a preset fixed value or any fixed value which is set by a user in a self-defining way.
In one embodiment, a fixed value sent by the user terminal is received, the matrix key is generated according to the fixed value, and the fixed value is a numerical value input by the user on the user terminal.
The user terminal can provide an interface for inputting a fixed value, acquire the fixed value output by the user, send the fixed value to the electronic equipment, and the electronic equipment generates a corresponding matrix key based on the fixed value. For example, the fixed value K may be 6, and the key matrix A generated based on the fixed value may be
Figure SMS_1
The electronic device may traverse the pixels in the first image to obtain RGB values of each individual pixel, for example, the RGB value of one pixel is put into a 1*3 order matrix B to be b= [253 86 104], and the matrix B is multiplied by the matrix a to obtain a new 1*3 order matrix C. C=b=a= [1035 276 1347], dividing the matrix C by the fixed value K, rounding, and obtaining R, G and B values respectively [ rg B ] = [173 46 225], which are RGB values of the corresponding pixel in the second image.
Each pixel value in the first image is processed to finally form the second image.
In one embodiment, hiding pixel information in the second image into the third image includes: the pixel information in the second image at the position (x, y) is hidden into the pixel information in the third image at the position (x ', y'). Where (x, y) and (x ', y') are not necessarily equal, (x, y) represents the position in the image of the x-th row and y-th column.
In this embodiment, the electronic device may calculate a mapping relationship between each position (x, y) and (x ', y'), and determine, based on the corresponding mapping relationship, which pixel in the third image needs to be fused with the pixel in each second image.
For example, if the position corresponding to (1, 1) is calculated to be (2, 3) based on the mapping relationship, the pixel at the (1, 1) position in the second image and the pixel at the (2, 3) position in the third image may be fused.
In one embodiment, a corresponding mapping relationship may be set up for each pixel value of a channel separately, where the pixel value of a different channel in the same position in the second image is different from the position of the pixel of the corresponding channel in the third image.
For example, for a pixel at a position (x, y) in the second image, the R value corresponds to a position (x 1, y 1), the G value corresponds to a position (x 2, y 2), and the B value corresponds to a position (x 3, y 3). The R value at (x, y) in the second image is fused with the R value at (x 1, y 1) in the third image, the G value at (x, y) in the second image is fused with the G value at (x 2, y 2) in the third image, and the B value at (x, y) in the second image is fused with the B value at (x 3, y 3) in the third image. Wherein x1, x2 and x3 are not necessarily identical, and y1, y2 and y3 are not necessarily identical.
In this embodiment, the security of the information in the first image may be further improved by further disturbing the position of the fusion of the pixels in the second image and the third image.
In one embodiment, as shown in fig. 3, hiding pixel information in the second image into the third image includes:
step 302, a corresponding pixel fusion matrix D is obtained.
In this embodiment, the electronic device is preset with a corresponding pixel fusion matrix D, where the pixel fusion matrix is used to calculate which position pixel in the third image is fused with the pixel in each position in the corresponding channel, that is, calculate the position information of the corresponding pixel in the third image. The positions of the pixels of the channels at the same position and the pixels to be fused in the third image may be the same or different. When the two-dimensional matrix is at the same position, the pixel fusion matrix D is a three-dimensional matrix comprehensively arranged for all channels of the image, wherein one dimension is used for reflecting the corresponding channel, and the other two dimensions are used for reflecting the abscissa of the corresponding position. The channels of the image include R, G, and B channels for embodying the above RGB values.
Step 304, a pixel fusion parameter e corresponding to the user is calculated.
The electronic device is further preset with a corresponding pixel fusion parameter e, and the parameter e can be determined according to information of a user, for example, the fusion parameter e can be calculated according to a certain rule according to a user identification of the user. The parameter e may be a corresponding value or a corresponding matrix. It will be appreciated that the pixel fusion parameters e corresponding to different users are not necessarily the same.
Step 306, calculating the positions of the pixels at each position under each channel in the second image and the pixels to be fused of the corresponding channels in the third image based on the pixel fusion parameters e and the pixel fusion matrix D.
And 308, fusing the pixels at each position under each channel in the second image with the calculated pixels at the positions of the pixels to be fused of the corresponding channel of the third image.
Specifically, the electronic device may perform corresponding operation on the parameter e and the matrix D according to a preset mathematical operation rule, and the calculated result may be used as a position corresponding to the pixel to be fused, and fuse the corresponding pixel with the pixel in the second image at the position.
In this embodiment, by setting a simple fusion matrix D, and then calculating a corresponding fusion parameter e according to the information of the user, the position of the pixel fused with the pixel corresponding to the second image in the third image can be calculated based on the fusion matrix D and the fusion parameter e. And because the fusion parameter e is calculated according to the information of the user, when the same first image is stored by different users, the positions of fusing the pixels in the second image and the pixels in the first image are different, and the safety of the image transmission process is further improved.
In one embodiment, the position information (x, y) of the pixel in the second image may be multiplied by the fusion parameter e and the pixel fusion matrix D, and the obtained result may be compared with a suitable value, so as to obtain the position information of the corresponding pixel and the pixel to be fused in the third image.
For example, the fusion matrix D is a three-dimensional matrix, and may be a 3×2×2 three-dimensional matrix, where 3 is the number of three channels of RGB. The numerical value under the first dimension calculated based on the fusion matrix is the position information of the pixel of the first image under the corresponding channel and the pixel to be fused in the third image.
If the fusion matrix D is a two-dimensional matrix and there is a two-dimensional matrix under each channel independently, the two-dimensional matrix may be a 2×2 two-dimensional matrix, and the vector may be a vector 1*2 or a vector 2*1 calculated by the two-dimensional matrix, where parameters of the vector represent row fusion position information and column fusion position information for pixels respectively.
If the fusion matrix D is a two-dimensional matrix and each channel uses a two-dimensional matrix comprehensively, the two-dimensional matrix may be a k-by-k two-dimensional matrix, and the final calculated result may be a k-dimensional vector, where each dimension represents the position information of the pixel of the first image and the pixel to be fused in the third image under one channel. k is the number of channels, e.g. 3.
If the fusion matrix D is a one-dimensional matrix, it may be a matrix of 1*k or k×1, and the matrix is comprehensively used by each channel, and similarly, the value of each dimension is calculated as the position information of the pixel of the first image and the pixel to be fused in the third image under the corresponding channel.
In one embodiment, the formula may be according to: (x ', y')=e· (x, y) ·d·mod (M, N) to calculate the position (x ', y') of the pixel in the third image fused with the pixel at the position (x, y) corresponding to the second image.
The fusion matrix D is a 2×2 matrix, each channel may be correspondingly provided with a different fusion matrix D, and e may be a parameter calculated according to user information, for example, may be any suitable value such as 0.1,1,2,2.5, 10, etc. x 'is the row position of the pixel to be fused in the third image, y' is the column position of the pixel to be fused in the third image, x is the row position of the pixel to be fused in the second image, y is the column position of the pixel to be fused in the second image, mod (M, N) represents a parameter which is greater than 0 and is determined according to the size of the third image, and the calculated first value of e (x, y) D is rounded off to M and the calculated second value of e (x, y) D is rounded off to N.
In one embodiment, the values of M and N may be determined according to the size of the third image to be finally selected, for example, M is directly valued as the number of lines of the third image, and N is the number of columns of the third image. For example, the selected third image has a pixel count of 1000 x 2000, where M is 1000 and n is 2000. If a certain value of the calculated e· (x, y) ·d is (1024.3, 2058.2), the corresponding e· (x, y) ·d·mod (M, N) value is (24, 58), that is, x '=24, y' =58, which means that the pixel corresponding to the (x, y) position in the second image is fused with the pixel corresponding to the (24, 58) position in the third image.
For example, M is 1000 and N is 2000. For R channel, its corresponding fusion matrix D is
Figure SMS_2
E is 1./>
Then for the pixel point at the 1 st row and 2 nd column position (i.e., x is 1 and y is 2), x '=3 and y' =5 can be calculated, which means that the R value of the pixel corresponding to the (1, 2) position in the second image is fused with the R value of the pixel corresponding to the (3, 5) position in the third image.
For the G channel, its corresponding fusion matrix D is
Figure SMS_3
E is 2.
Then for the pixel at the 1 st row and 2 nd column position (i.e., x is 1 and y is 2), x '=3 and y' =5 can be calculated, which means that the G value of the pixel in the second image corresponding to the (1, 2) position is fused with the G value of the pixel in the third image at the (6, 14) position.
In this embodiment, by using the above formula, the position of each pixel under each channel in the second image and the position of the fused pixel under the corresponding channel in the third image can be simply and quickly determined, and the pixels at the two positions are fused, so that the safety can be improved, and the computational resource is not excessively occupied.
In one embodiment, after step 306, further comprising: detecting whether a plurality of pixels fused with the second image exist at the position to be fused in the third image calculated in each channel, and if so, selecting other pixels which are not fused with the pixels in the second image in the third image.
In this embodiment, since the positions to be fused calculated at different positions may be the same, if the pixel values at the positions to be fused in the third image are fused with the pixel values at the positions in the second image, the pixels in the second image cannot be restored. And the electronic equipment further detects and calculates whether the positions to be fused in the third image are repeated under the same channel after finishing the positions of all the pixel points in the second image and the corresponding positions of the pixel points to be fused in the third image, and adjusts the positions to be fused in the third image if the positions to be fused are repeated.
Specifically, the position to be fused of the first pixel occupying the repetition position is kept unchanged, and the pixel of the second image corresponding to the repetition position in the third image calculated later is selected to be fused with the pixel of the unfused position nearest to the repetition position in the third image.
For example, after calculating the fusion position of each pixel, if it is detected that a channel exists, the pixel point in the second image at the (x 1, y 1), (x 2, y 2) position and the pixel point to be fused in the third image are both at the (x 1', y 1') position, then the (x 2, y 2) position sequenced in the next sequence and other unfused positions of the third image may be fused, for example, the position (x 2', y 2') closest to the (x 2, y 2) position is selected as the pixel value at the new position to be fused.
In one embodiment, as shown in fig. 4, there is provided another image encryption transmission method using a matrix key, the method comprising:
step 402, a transmission request for a first image sent by a user terminal is obtained.
In this embodiment, the request includes a user identifier. The data save request may be a save request triggered by a save operation performed on an image associated with the system, or may be a save request triggered by a screenshot operation performed on other information displayed in the system.
The electronic device may determine the corresponding data to be saved based on the save request of the user, and further convert the data to the first image, and if the data to be saved is image data, the image data may be directly used as the first image.
For example, the user terminal is requesting to download image data in the MES system (manufacturingexecution system) that is related to certain relevant process information. The electronic device may obtain the data saving request, where the saving request includes the user identifier and the image to be accessed, and the image is the first image.
And step 404, when the first image belongs to sensitive content relative to the user identification, receiving a fixed value sent by the user terminal, and generating 3*3-order reversible matrix keys according to the fixed value.
In this embodiment, the fixed value is a value input by the user on the user terminal. The user terminal can prompt that the first image has sensitivity relative to the user, encryption is needed, a corresponding fixed value input interface is displayed, a fixed value input by the user is received, and the fixed value is sent to the electronic equipment. The electronic device obtains the fixed value K, and generates a corresponding 3*3-order invertible matrix key a based on the fixed value such that the sum of elements of each row of the matrix key is equal to the fixed value.
In step 406, the RGB values of each pixel of the first image are formed into a 1*3 order matrix, which is multiplied by the matrix key to obtain a new 1*3 order matrix.
The electronics can put the RGB values of the pixels at each location into a 1*3 th order matrix B RGB, and compute B x a, taking the resulting matrix as the new 1*3 th order matrix C.
In step 408, the three elements of the new 1*3 order matrix are divided by the fixed values and rounded, and the obtained result is used as the RGB value of the corresponding pixel of the second image.
For the calculated matrix C, dividing the calculated matrix C by a fixed value K, and rounding to obtain a numerical value which is the RGB value of the pixel at the corresponding position in the second image. Wherein the second image is the same size as the first image. For example, the RGB value matrix C at the (x, y) position in the first image is calculated according to the corresponding RGB value matrix D calculated in the above process, and then divided by a fixed value and rounded, and the obtained new RGB value is used as the pixel value at the (x, y) position in the second image.
In step 410, an image with the highest similarity to the first image is obtained from the preset image library as a third image, and the size of the third image is larger than the size of the first image.
Preferably, the size of the third image may be more than 2 times the size of the first image, such as may be any suitable value of 2 times, 3 times, 3.5 times, 4 times, etc. The sensitive image data in the system is limited, so the electronic equipment can correspondingly set a corresponding third image for each sensitive first image, and the third image has a certain similarity with the corresponding sensitive image. The third image has a larger size to better hide the data of the first image.
Taking the MES system as an example, the electronic device may preset a plurality of third images related to the process flow, where the third images may be real process flow images without sensitivity, or false process flow images after processing. When the first image is identified as the image related to the corresponding process flow, a third image which is most similar to the first image and has a pixel number larger than that of the first image can be selected from a third image library related to the process flow.
In step 412, a corresponding pixel fusion matrix D is obtained.
Preferably, the electronic device may set a corresponding pixel fusion matrix D for each channel under the RGB channels. For example, the pixel fusion matrix of the R value of the pixel under the R channel is D1, the pixel fusion matrix of the G value of the pixel under the G channel is D2, and the corresponding fusion matrix is set as D3 for the B value of the pixel under the B channel. The three matrices may be 2 x 2 square matrices, but the three matrices are not necessarily identical.
The three fusion matrices may be fixed matrices preset by the system, or may be matrices calculated by generating a model according to the preset matrices, where the model may take a user identifier as input, and perform an operation to generate three matrices.
In step 414, a pixel fusion parameter e corresponding to the user is calculated.
The determination of the pixel fusion parameters is also related to the user identification, and the electronic device can determine the corresponding fusion parameters according to the above process. The pixel fusion parameters calculated for different user identifications are different, so that the second images formed for the same image are also different. Thus, when different users acquire sensitive images, the sensitive images cannot be cracked by adopting the same cracking means.
Step 416, calculating the (x ', y') position where the pixel value at the (x, y) position in the second image and the pixel value to be fused are located in the third image under the corresponding channel according to the formula (x ', y') =b· (x, y) ·a·mod (M, N).
Preferably, the electronic device may calculate the position of the pixel of each channel in the second image and the pixel to be fused in the third image based on the formula. The image width M and the image height N may be the image width and the image height of the third image to be used.
For example, when the determined third dimension is 2000 for width M and 1000 for image height N, for R channels therein, for a certain user identification, the calculated pixel fusion parameter b=2, and the corresponding pixel fusion matrix D1 is
Figure SMS_4
Then for the pixel point at the 1 st row and 2 nd column position (i.e. x is 1 and y is 2), x 'is 6 and y' is 10, i.e. the R value of the pixel at the (1, 2) position in the second image can be fused with the R value of the pixel at the (6, 10) position in the third image.
In one embodiment, after step 416, further comprising: and detecting whether the calculated positions (x ', y') to be fused in the third image correspond to the positions of a plurality of pixels in the second image in each channel, and if so, selecting the positions which are not fused in the third image as the positions corresponding to the pixels in the second image.
In this embodiment, the fusion position of the pixels calculated based on the above formula may have a repetition, and when there is a repetition, the fusion position may be adjusted according to a preset adjustment rule.
For example, the calculated first pixel occupying the repeated position in the third image may be kept unchanged, and the pixel corresponding to the repeated position calculated later is fused with the pixel in the third image at the position closest to the position to be fused, which is not fused, and the newly selected position is used as the fused position corresponding to the pixel value in the second image.
After completing the confirmation of the position of one pixel in the second image and the position of the pixel to be fused in the third image, the electronic device reads the information of the next pixel in the second image, and calculates the information according to the mode until all the pixels in the two images are traversed Mo Di.
In step 418, the pixels at each position under each channel in the second image are fused with the calculated pixels at the positions of the pixels to be fused of the corresponding channel in the third image, so as to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image.
Preferably, the calculated fusion position may be an adjusted position to be fused where there is no position repetition. Thus, the situation that the same pixel in the third image is fused with a plurality of pixels in the second image and cannot be decrypted can be avoided.
The electronic device may set a fusion weight of the second image and the third image, where the fusion weight may be a normalized weight, and the weight of the second image may be set to be smaller than the weight of the third image, and the normalized weights of the channels may be set independently. And under the same channel, carrying out weighted summation on the pixel points with the same position, and taking the pixel value obtained by summation as the pixel value at the position under the corresponding channel of the fourth image.
The normalized weights of the two images can be set to any proper value according to the situation, and the weight of the third image is larger than the weight of the second image, so that the information of the second image can be further hidden.
And step 420, transmitting the fourth image to the user terminal for storage.
According to the image encryption transmission method using the matrix key, the first layer encryption is carried out on the first image through setting the matrix key, the second image is formed, the image which is larger than the first image in size and is most similar to the first image is selected as the third image, the pixel value in the second image and the third image are fused, the positions in the fused images are not in the same position, information in the first image can be further hidden, and safety in the image transmission process is improved.
In one embodiment, as shown in fig. 5, there is provided an image decryption transmission method using a matrix key, the method comprising:
step 502, obtaining an image display request sent by a user terminal, wherein the request comprises a user identifier and an image identifier of an image to be displayed.
In this embodiment, the image to be displayed is a fourth image stored according to the image encryption transmission method using a matrix key in any embodiment of the present application. The image identification information in the fourth image may represent an encryption mode adopted by the fourth image, such as the above matrix key, a fixed value, a fusion matrix, a fusion parameter, and the like. The electronic equipment can acquire the corresponding image to be displayed based on the image opening operation of the user, and further acquire the image identification of the image to be displayed.
Specifically, when the electronic device obtains the image to be displayed, the encryption mode adopted by the electronic device can be calculated according to the corresponding calculation rule based on the image identification information of the image. For example, the image identifier of the adopted third image, and the related information of the adopted matrix key, fusion matrix, fusion parameter and the like, which need to be decrypted, can be calculated based on a preset rule.
In one embodiment, a corresponding matrix key library, a fusion parameter library and a fusion matrix library can be preset, and similarly to the third image library, fusion parameters e and fusion matrices D adopted by pixel fusion of the second image and the third image are both in the corresponding fusion parameter library and fusion matrix library, and a matrix key adopted by the first image to generate the second image is also in the corresponding matrix key library. After the electronic device calculates the image identifier of the corresponding third image based on the image identifier of the image to be displayed, the electronic device can generally directly obtain the corresponding matrix key a, the fusion parameter e and the fusion matrix D based on the identifier, or obtain the positions of the fusion parameter e and the fusion matrix D in the respective libraries respectively, and extract the corresponding fusion parameter e and the fusion matrix D based on the positions.
At step 504, an inverse matrix of a matrix key used to decrypt the image to be presented and a third image are determined based on the image identification.
In this embodiment, after the corresponding matrix key is obtained, the corresponding inverse matrix can be calculated. Similarly, after knowing the corresponding fusion matrix, the corresponding inverse matrix may also be calculated.
After the image identifier of the image to be displayed is obtained, a corresponding third image can be obtained from a third image library.
Step 506, separating the second image from the fourth image based on the third image.
The electronic device further presets a pixel position restoring mode matched with the fusion position, after knowing all information of the pixel fusion position mode, the corresponding pixel position restoring mode can be queried or calculated based on the information, the position of the RGB value in the second image after the third image is separated from the fourth image is restored based on the pixel position restoring mode, and the second image corresponding to the image to be displayed is obtained through restoration.
The electronic device may separate the third image and the second image from the fourth image based on an inverse of the fusion matrix, the fusion parameter, the weight, the third image, and the like.
Optionally, the electronic device may first separate the third image from the third image based on the weight and the third image, and then restore the corresponding RGB values and the positions of each RGB value in the second image according to the corresponding weight, the inverse matrix and the fusion parameter for the data of the separated third image, so as to finally restore the second image.
And step 508, decrypting the second image according to the inverse matrix to obtain a first image.
After the second image is obtained, the second image may be decrypted based on the inverse matrix F of the matrix key, forming the first image.
For example, the RGB values in the second image may also be put into a matrix 1*3, and multiplied by the inverse matrix F and the corresponding fixed value K, respectively, to obtain a new 1*3 th-order matrix, where the elements in the matrix are the RGB values of the elements in the first image, respectively. And restoring the RGB values in the corresponding first image by traversing the RGB values of each element in the second image, thereby restoring the complete first image.
Step 510, detecting whether the user identifier has the right to access the first image, if so, displaying the first image on the user terminal.
In this embodiment, after the first image is obtained, it is further required to verify whether the user has the right to access the first image, and when the user has the right to access the first image, the first image is displayed on the user terminal. It may be that immediately the user initiating the image display request may not be the same user as the user encrypting the first image.
In one embodiment, the third image is displayed on the user terminal when the user identification does not have permission to access the first image.
The electronic device may detect whether the content of the information in the first image belongs to sensitive content with respect to the user identifier, and when the content does not belong to the sensitive content, determine that the first image has access rights, and display the first image. When the content belongs to the sensitive content, the access right is judged not to be available, and a third image can be displayed at the moment.
Specifically, it may be detected whether the rights required for referring to the first image exceed the rights corresponding to the user identifier; and/or detecting whether the current operating environment of the user terminal belongs to an unsafe environment; and when any one of the detection results is yes, judging that the data to be stored belongs to sensitive content relative to the user identification.
Further, when detecting that the number of times of input errors of the login account matched with the user identifier exceeds a preset number of times threshold in a preset time period and/or when detecting that the user terminal does not belong to a common device corresponding to the user identifier, determining that the current operation environment of the user terminal belongs to an unsafe environment.
For example, when a certain user a holds an image B formed by encrypting the image a by the image encryption transmission method using the matrix key of the present application on the platform, the image B is transmitted to the user B. If user B has higher authority, for example, user B is an administrator of the platform system, who has authority to view image A restored from image B, the system will decrypt and display restored image A. If the image a is still sensitive to the user a, a third image, which is the most similar to the image a and can be used for encrypting the image a, is displayed on the terminal of the user a, so that leakage of sensitive information can be prevented.
When, for example, user a accesses the image a on a non-office computer, the system detects that it belongs to sensitive data, and displays the third image, and when the user a has access rights on an allowed work computer, the decrypted image a can be displayed.
According to the image decryption transmission method using the matrix key, the corresponding first image is restored from the image to be displayed by adopting a decryption mode which is suitable for the image encryption transmission method using the matrix key, and the method can restore the image simply, quickly and safely.
In one embodiment, prior to step 504, further comprising: the key information input by the user is acquired, the key information is verified, and after the verification is passed, step 504 is executed.
In this embodiment, the electronic device further needs to authenticate the user before decrypting the image, and the key information may be the key information corresponding to the image before generating the fourth image. The key information can be the first image identification of the image, and can also be any set proper verification code. By inputting the corresponding key information, the safety of image display can be further improved. The verification code can be generated according to the user identification adopted in encryption. In this way, the electronic device can analyze the user identification used in encrypting the encrypted image from the key information, and determine a specific decryption manner based on the identified user identification and image identification.
In one embodiment, a computer-readable storage medium is provided having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the steps of the method embodiments described above.
In one embodiment, there is also provided an electronic device comprising one or more processors; and a memory, wherein the memory stores one or more programs, and the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the steps in the method embodiments described above.
In one embodiment, as shown in fig. 6, a schematic structural diagram of an electronic device for implementing embodiments of the present application is shown. The electronic device 600 includes a Central Processing Unit (CPU) 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data required for the operation of the electronic apparatus 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/O interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on drive 610 so that a computer program read therefrom is installed as needed into storage section 608.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer-readable medium carrying instructions that, in such embodiments, may be downloaded and installed from a network via the communication portion 609 and/or installed from the removable medium 611. When executed by a Central Processing Unit (CPU) 601, performs the various method steps described in this application.
Although example embodiments have been described, it will be apparent to those skilled in the art that various changes and modifications can be made without departing from the spirit and scope of the inventive concept. Accordingly, it should be understood that the above-described example embodiments are not limiting, but rather illustrative.

Claims (9)

1. A method for encrypted transmission of an image using a matrix key, the method comprising:
acquiring a transmission request for a first image sent by a user terminal, wherein the transmission request comprises a user identifier;
generating a 3*3 order invertible matrix key corresponding to the user identifier when the first image belongs to sensitive content relative to the user identifier, comprising: receiving a fixed value sent by the user terminal, generating the matrix key according to the fixed value, wherein the fixed value is a numerical value input by a user on the user terminal, and the sum of elements in each row in the matrix key is the fixed value;
forming a 1*3-order matrix by using RGB values of each pixel of the first image, and performing operation with the matrix key to form a second image;
acquiring a third image matched with the first image;
Hiding pixel information in the second image into the third image to form a fourth image and an image identifier which can be used as a key for decrypting the fourth image;
and transmitting the fourth image to the user terminal for storage.
2. The method according to claim 1, wherein the method further comprises:
detecting whether the authority required for transmitting the first image exceeds the authority corresponding to the user identifier; and/or
Detecting whether the current operation environment of the user terminal belongs to an unsafe environment or not;
and when any one of the detection results is yes, judging that the first image belongs to sensitive content relative to the user identifier.
3. The method according to claim 2, wherein the method further comprises:
when detecting that the number of times of input errors of the login account matched with the user identification exceeds a preset number threshold value in a preset time period, and/or
When it is detected that the user terminal does not belong to a common device corresponding to the user identification,
and judging that the current operation environment of the user terminal belongs to an unsafe environment.
4. The method of claim 1, wherein said forming the RGB values for each pixel of the first image into a 1*3 order matrix, operating with the matrix key, forming a second image, comprises:
Forming a 1*3-order matrix by RGB values of each pixel of the first image, and multiplying the RGB values by the matrix key to obtain a new 1*3-order matrix;
dividing the three elements of the new 1*3 order matrix by the fixed values and rounding, and taking the obtained result as the RGB value of the corresponding pixel of the second image.
5. The method of claim 1, wherein the acquiring a third image that matches the first image comprises:
and acquiring an image with highest similarity with the first image from a preset image library as the third image, wherein the size of the third image is larger than that of the first image.
6. A method for decrypting and transmitting an image using a matrix key, the method comprising:
acquiring an image display request sent by a user terminal, wherein the request comprises a user identifier and an image identifier of an image to be displayed, and the image to be displayed is a fourth image saved according to the method of any one of claims 1 to 5;
determining an inverse matrix of a matrix key for decrypting the image to be displayed and a third image based on the image identifier;
separating a second image from the fourth image based on the third image;
Decrypting the second image according to the inverse matrix to obtain a first image;
and detecting whether the user identifier has the authority to access the first image or not, and if so, displaying the first image on the user terminal.
7. The method of claim 6, wherein the step of providing the first layer comprises,
and when the user identification does not have the right of accessing the first image, displaying the third image on the user terminal.
8. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-7.
9. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1 to 7.
CN202310053159.9A 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment Active CN115834791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310053159.9A CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310053159.9A CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Publications (2)

Publication Number Publication Date
CN115834791A CN115834791A (en) 2023-03-21
CN115834791B true CN115834791B (en) 2023-04-25

Family

ID=85520732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310053159.9A Active CN115834791B (en) 2023-02-03 2023-02-03 Image encryption and decryption transmission method using matrix key and electronic equipment

Country Status (1)

Country Link
CN (1) CN115834791B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566500B (en) * 2018-03-02 2021-02-26 西南交通大学 Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism
CN112040086B (en) * 2019-06-03 2023-06-06 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, equipment and readable storage medium
CN111182169B (en) * 2019-11-13 2022-02-25 腾讯科技(深圳)有限公司 Image processing method, image processing device, computer readable medium and electronic equipment
CN115208557A (en) * 2021-04-09 2022-10-18 ***通信集团安徽有限公司 Data encryption method and device, electronic equipment and computer storage medium
CN113612596A (en) * 2021-07-02 2021-11-05 重庆邮电大学 Image self-decryption method based on hyperchaotic system
CN114036542A (en) * 2021-11-15 2022-02-11 阿里巴巴(中国)有限公司 Data encryption and decryption method and computer storage medium

Also Published As

Publication number Publication date
CN115834791A (en) 2023-03-21

Similar Documents

Publication Publication Date Title
AU2018299716B2 (en) Key attestation statement generation providing device anonymity
CN108463827B (en) System and method for detecting sensitive information leakage while preserving privacy
CN108604262B (en) Protecting web pages, web applications, and applications
JP5023075B2 (en) Computer-implemented authentication interface system
US9577829B1 (en) Multi-party computation services
CN106575334A (en) Accessing a secured software application
WO2020018182A1 (en) Public-private key pair protected password manager
US20230362018A1 (en) System and Method for Secure Internet Communications
Kaur et al. A secure data classification model in cloud computing using machine learning approach
CN114417364A (en) Data encryption method, federal modeling method, apparatus and computer device
CN114240347A (en) Business service secure docking method and device, computer equipment and storage medium
EP3335144B1 (en) Browser attestation challenge and response system
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN115834791B (en) Image encryption and decryption transmission method using matrix key and electronic equipment
CN114500044A (en) Data verification method and device, storage medium and electronic equipment
Al-Shqeerat An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography.
Subbiah et al. An approach for enhancing secure cloud storage using vertical partitioning algorithm
CN115834790B (en) Information encryption transmission method and information decryption transmission method based on pixel movement
EP3316547A1 (en) Parameter based data access on a security information sharing platform
Inam et al. Blockchain based medical image encryption using Arnold’s cat map in a cloud environment
Shaikh et al. Implementation of authentication using graphical password cloud computing
Singh et al. Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification
Abrar et al. Multi-Layer Token Framework for Data Protection in Cloud Computing
Ahmad CLOUD SECURITY VULNERABILITIES AND SOLUTION MODEL
CN117173826A (en) Control system and method for face recognition access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant