Image encryption method and decryption method based on Hash chain compressed sensing

A hash chain and hash technology, applied in the field of image encryption and decryption based on hash chain compressed sensing, can solve problems such as increased energy consumption of data relay communication, threats to data transmission security, and reduction of key space occupancy. , to achieve the effect of reducing the possibility of data theft, reducing storage space and communication energy consumption, and reducing space occupancy

Active Publication Date: 2018-05-15
BEIJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, a node in a wireless sensor network is likely to form a sending-receiving node pair and a receiving-sending node pair with many other nodes. In order to ensure the security of data transmission, the node needs to store many The measurement matrix for data communication between different nodes, a large number of measurement matrix elements greatly occupy the storage space of the node
Moreover, with the expansion of the scale of wireless sensor networks, sometimes the data communication between node pairs cannot be directly reached, and relay nodes are needed to rebroadcast. At this time, the communication energy consumption of data rebroadcasting increases, and the security of data transmission is also threatened.
In the existing encryption method, it is impossible to reduce the space occupied by the key while ensuring data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and decryption method based on Hash chain compressed sensing
  • Image encryption method and decryption method based on Hash chain compressed sensing
  • Image encryption method and decryption method based on Hash chain compressed sensing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] The terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method and decryption method based on Hash chain compressed sensing. According to the encryption method, a first Hash chain and a second Hash chain are generated according to an initial key; a measurement matrix and an encryption matrix are acquired according to the first Hash chain and the second Hash chain; compressed measurement is carried out on a sparse representation matrix of a plaintext image through the measurement matrix, thereby acquiring a measurement result matrix; and an encrypted image matrix is acquired according to the measurement result matrix and the encryption matrix. Only the initial key needs to be stored in a whole encryption process, so the key storage space and communication consumption are reduced. The key sensitivity ofa Hash function is very high, so completely different Hash sequences are generated due to small changes of an initial key value. The measurement matrix does not need to be stored at a position of a relay node, so the possibility that data is stolen at the position of the relay node is reduced, and the data transmission security is improved. The data security is ensured, and moreover, the key spaceoccupation quantity is reduced.

Description

technical field [0001] The invention relates to information encryption technology, in particular to an image encryption and decryption method based on hash chain compression sensing. Background technique [0002] The Internet of Things is to connect any item to the Internet for information exchange and communication through two-dimensional code reading equipment, radio frequency identification devices, infrared sensors, global positioning systems, laser scanners and other information sensing equipment according to agreed protocols. , to achieve intelligent identification, positioning, tracking, monitoring and management of a network. In the Internet of Things, each information sensing device can be a node, and each node forms a sending-receiving node pair and a receiving-sending node pair with other nodes to realize data transmission in the wireless sensor network. With the promotion of wireless sensor networks in various fields, in transmission system application scenarios...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 彭海朋刘力维李丽香杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products