Chinese character password encoding method based on image pixel coordinates

A technology of image pixel coordinates and coding method, which is applied in the new Chinese character encryption algorithm and cipher coding field, can solve the problems of Chinese character message replacement encryption and security protection cipher coding method, etc., and achieves strong robustness and anti-cryptoanalysis ability. , the algorithm is simple, and the effect of ensuring confidentiality

Active Publication Date: 2015-03-25
LIAONING UNIVERSITY
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption coders are enthusiastic about using various complex mathematical formulas, curves and matrices to study the encryption and security protection of images, including image hiding technology derived from traditional steganography, digital watermarking technology f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character password encoding method based on image pixel coordinates
  • Chinese character password encoding method based on image pixel coordinates
  • Chinese character password encoding method based on image pixel coordinates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] One, design idea of ​​the present invention is as follows:

[0046] 1. Chinese characters exist in the form of binary numbers in computers and networks, and have the same digital characteristics as the pixel values ​​of RGB digital images. Therefore, for each Chinese character, a completely matching binary can be found in the appropriate RGB image. Bit string, and take out the corresponding pixel coordinates to replace the Chinese characters for transmission and storage.

[0047] 2. Select the binary bit string matching the Chinese character in the RGB image by random number, and use the corresponding pixel coordinates to replace the Chinese character, so as to avoid the frequency characteristics of the replacement password and completely solve the attack problem of the frequency statistics analysis of the replacement password .

[0048]3, the Chinese characters are divided into two bytes or more sub-blocks, pixel matching is carried out for each sub-block and the coor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Chinese character password encoding method based on image pixel coordinates. The encryption process comprises the steps that (1), plaintext Chinese character strings are input, and the length K of each character string is fetched; (2), a public key image f1 and a private key image f2 are read to generate a private key image F, and the size M*N of the image is fetched; (3), each character is converted into binary data and segmented into a high byte block and a low byte block, and the high byte block and the low byte block are stored into a cellular array destr (i, 1) and a cellular array destr (i, 2) respectively; (4), pixel values matched with the cellular array destr (i, 1) and the cellular array destr (i, 2) are searched for in a circulating mode in the F, and pixel coordinates are read and stored into a two-dimensional matrix left (x, y) and a two-dimensional matrix right (x, y); (5), two coordinate values in the left (x, y) and the right (x, y) are fetched randomly for replacing the high byte block and the lower byte block of the character; (6), positions of four values of the two coordinates are changed according to an appointed position changing sequence, and the four values are output into a four-dimensional matrix (x, y, v); (7), when i is equal to K, the encryption process is finished, and the K-line four-dimensional matrix (x, y, v) is output to be a ciphertext. The encryption method has the advantages that privacy is good, and private key management is flexible and convenient, and is the safe Chinese character password encoding method.

Description

technical field [0001] The invention relates to a Chinese character cipher encoding method based on a digital image, is a new Chinese character encryption algorithm and a cipher encoding method, and belongs to the fields of cryptography and information security. Background technique [0002] With the popularization, application and development of computers and computer networks, information security and information security issues are becoming more and more important, and have even been raised to the strategic level of national security. Cryptography is one of the research focuses in the field of information security, and cryptography and cryptographic algorithms are the core content of cryptography. [0003] Typical of traditional cryptographic algorithms are substitution ciphers and transposition ciphers. Substitution ciphers indicate that each character / bit in the text is replaced with another character / bit in the ciphertext, including single-letter substitution, multi-l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 张绍成李鹏范铁生马旭王大勇张雯菲
Owner LIAONING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products