Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chinese character-to-picture encryption method

An encryption method and technology for Chinese characters, which are applied in the fields of digital data protection, electrical digital data processing, instruments, etc., can solve the problems of few Chinese character encryption algorithms, large amount of information, poor readability and reproducibility of ciphertext, etc.

Active Publication Date: 2020-07-07
NANTONG UNIVERSITY
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most mainstream information encryption and decryption technologies mainly focus on information composed of single-byte characters such as letters, numbers, and English punctuation marks. There are few existing encryption algorithms for Chinese characters, mainly based on simple inversion, Area code position exchange, XOR, and more complex operations such as chaotic encryption
With the existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor. At the same time, because the picture can contain a large amount of information, encrypting Chinese characters into pictures is a better way to carry ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character-to-picture encryption method
  • Chinese character-to-picture encryption method
  • Chinese character-to-picture encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] According to the encryption method of a kind of Chinese character conversion picture in the above-mentioned specific embodiment, the steps are as follows:

[0070](1) Taking a certain Chinese character as "an encryption method for converting Chinese characters to pictures is a relatively simple and feasible method. Pictures refer to flat media composed of graphics, images, etc. There are many formats of pictures, but generally they can be It is divided into two categories: bitmap and vector diagram. The characteristic of chaos is that the orderly motion form that originally followed simple physical laws suddenly deviates from the expected regularity under certain conditions and becomes a disordered form. Chaos refers to Deterministic dynamical system is unpredictable and similar to random motion due to its sensitivity to the initial value. It is also called chaos. The English word comes from Greek, and the original meaning is the scene before the beginning of the univers...

Embodiment 2

[0086] According to the above-mentioned encryption method for converting Chinese characters to pictures, a certain section of Chinese characters to be encrypted is still: "A kind of encryption method for converting Chinese characters to pictures is a relatively simple and feasible method. A picture refers to a structure composed of graphics, images, etc. Print media. There are many formats of pictures, but generally they can be divided into two categories: dot matrix and vector graphics. The characteristic of chaos is the orderly movement form that originally follows simple physical laws, and suddenly deviates from the expected regularity under certain conditions Instead, it becomes a disordered form. Chaos refers to the unpredictable, random-like motion of a deterministic dynamical system due to its sensitivity to the initial value. It is also called chaos. The English word comes from Greek, and its original meaning It is the scene before the beginning of the universe, and its...

Embodiment 3

[0092] According to the above-mentioned encryption method for converting Chinese characters into pictures, the encryption steps are similar to those in Embodiment 1, and only a certain section of Chinese characters to be encrypted changes slightly: the first Chinese character "one" becomes "two"; or the 27th Chinese character "." becomes "!"; or the 55th Chinese character "But" becomes "Dan"; or the 100th Chinese character "Zhong" becomes "Zhong"; or the 151st Chinese character "De" becomes "地" ; or the 199th Chinese character "random" becomes "enemy"; or the 230th Chinese character "fu" becomes "fu"; or the 270th Chinese character "heavy" becomes "child"; or the 302nd Chinese character ". " into "combined", the encryption results of converting Chinese characters to pictures are shown in Table 2. It can be seen from Table 2 that a slight change in a certain Chinese character to be encrypted will cause the encrypted color picture to be "unrecognizable", so it can be seen that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Chinese character-to-picture encryption method, which comprises the following steps of: firstly, converting a paragraph of Chinese characters into numeric data one characterby one character to obtain a high-order numeric sequence and a low-order numeric sequence; secondly, generating a chaotic sequence by utilizing a chaotic system according to an external encryption keyand a certain paragraph of to-be-encrypted Chinese characters, and scrambling the high-order numeric sequence and the low-order numeric sequence according to descending and ascending scrambling rulesof the chaotic sequence; respectively converting the scrambled high-order and low-order numeric sequences into binary sequences; and according to a self-defined conversion rule of converting two binary sequences into a numeric sequence and a self-defined R, G and B matrix data filling rule, filling elements in the converted numeric sequence into R, G and B matrixes so as to generate a color picture, and converting the color picture into a two-dimensional code. The Chinese character-to-picture method provided by the invention has good performance of resisting known / selected plaintext attacks,and ensures the security and feasibility of the Chinese character-to-picture conversion encryption method.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to an encryption method for converting Chinese characters into pictures. Background technique [0002] With the rapid development of modern network technology, computer network has become a means of information exchange in many fields. Since the computer network is an open network, information exchange often faces security issues such as information theft, tampering and forgery. At this time, the research and application of information encryption technology is imperative. [0003] At present, most mainstream information encryption and decryption technologies mainly focus on information composed of single-byte characters such as letters, numbers, and English punctuation marks. There are few existing encryption algorithms for Chinese characters, mainly based on simple inversion, Area code position exchange, XOR, and more complex operations such as chaotic encryption. With the existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F40/126
CPCG06F21/602
Inventor 盛苏英苏文博曹倩瑜黄文欢张小美陆平卢成任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products