Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Foreground and background separation-based image encryption and decryption methods

An encryption method and image technology, applied in the field of image encryption and decryption based on the separation of foreground and background, can solve the problems that key areas are vulnerable to attacks and cannot be encrypted

Active Publication Date: 2015-08-19
SHAANXI NORMAL UNIV
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its encryption strategy only encrypts regular rectangular areas, but cannot encrypt arbitrary selected irregular areas on the image. At the same time, it only encrypts selected key areas and does not encrypt non-key areas. of critical areas are vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Foreground and background separation-based image encryption and decryption methods
  • Foreground and background separation-based image encryption and decryption methods
  • Foreground and background separation-based image encryption and decryption methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The method of the present invention is described in detail below in conjunction with the specific embodiments of the accompanying drawings:

[0098] The implementation environment of the case: JAVA jdk1.7.0_06, the embodiment of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 is the encryption flow chart, figure 2 is the decryption flow chart.

[0099] The specific implementation steps of maze replacement:

[0100] Step 1: Divide the original matrix M into foreground regions SFore and other regions S Back , where the framed elements in the matrix M represent the foreground area S Fore elements, otherwise other regions S Back element, where the corresponding state can be marked by a binary matrix S, where element 0 corresponds to S on M Fore Elements in the foreground area, element 1 corresponds to S on M Back element;

[0101] S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a foreground and background separation-based image encryption method and decryption method. According to the foreground and background separation-based image encryption method, an image to be encrypted is divided into arbitrarily-selected foreground areas and background areas; encryption with different intensities are performed on arbitrarily-selected critical areas and other areas in the image, and therefore, emphasized protection can be provided for the critical areas selected from the image, and sensitive areas in the image has little possibility of being exposed; and high-intensity encryption can be performed on any irregular sealed communicated areas selected by a user, and ordinary encryption is performed on other non-critical areas; and the encryption method is closely related to key parameters given by the user, and is closely related to the plaintext of the image to be encrypted and selected irregular sealed communicated foreground areas, and therefore, a whole encryption process is extremely sensitive to the initial keys and parameters of the user, the plaintext image of the image to be encrypted and the irregular foreground areas.

Description

technical field [0001] The invention belongs to the cross field of image information security, artificial intelligence and digital image signal processing, and relates to a method for encrypting key areas of irregular images with a permutation-obfuscation framework, and in particular to an image encryption and decryption based on the separation of foreground and background method. Background technique [0002] With the development of computer technology and the widespread application of the Internet, more and more information is transmitted on the network, which brings great security risks while bringing convenience to people. As the main carrier image of information, its security has also attracted much attention. As the core idea to ensure the security of image information, image encryption has become a current research hotspot. [0003] Most of the traditional image encryption algorithms are based on chaotic systems, which use permutation-confusion structure to encrypt ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 邵利平杨璐师军
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products