[go: up one dir, main page]

CN1332353C - Method for implementing image copyright control - Google Patents

Method for implementing image copyright control Download PDF

Info

Publication number
CN1332353C
CN1332353C CNB2004100179925A CN200410017992A CN1332353C CN 1332353 C CN1332353 C CN 1332353C CN B2004100179925 A CNB2004100179925 A CN B2004100179925A CN 200410017992 A CN200410017992 A CN 200410017992A CN 1332353 C CN1332353 C CN 1332353C
Authority
CN
China
Prior art keywords
data stream
key
image
transfer function
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100179925A
Other languages
Chinese (zh)
Other versions
CN1691060A (en
Inventor
史新轲
任真
何代水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Appliances Shanghai Corp
Original Assignee
Inventec Appliances Shanghai Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Shanghai Corp filed Critical Inventec Appliances Shanghai Corp
Priority to CNB2004100179925A priority Critical patent/CN1332353C/en
Publication of CN1691060A publication Critical patent/CN1691060A/en
Application granted granted Critical
Publication of CN1332353C publication Critical patent/CN1332353C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to an image copyright control realizing method. In the standard producing process of an image, the image is encrypted by a key and an encryption function under the conditions that the data amount is not increased, and the image quality is not changed. For users with authorization, namely users with the key, can decrypt the image by the key so that the image is correctly displayed and used; for users without authorization, decryption can not be realized due to the absence of the key so that the image can not be correctly displayed. As a result, the purpose of controlling image copyright is reached.

Description

A kind of method that realizes image copyright control
Technical field
The invention relates to a kind of method that realizes image copyright control, particularly relevant for the method for a kind of image encryption and deciphering.
Background technology
Along with popularizing of network and computer, the parent that the image download function also obtains users looks at.Image is a kind of digitizing goods, and it also has literary property, and the image that completes is when transmitting in network, and the wright can not prevent that unauthorized user from reading arbitrarily and revising image, and this makes image to be downloaded arbitrarily, to duplicate and to use.For instance, image is elaborated, and become product and be placed on confession download in the website, and by downloading, image promptly can be read and duplicate use arbitrarily, and the literary property of this sampled images just can not be effectively protected.
If image can carry out a kind of algorithm for encryption with the form of data stream in manufacturing process, but this image is placed in the download images website of mandate, after the user is authorized to, employed key when the user obtains image encryption just can be correctly decoded, and demonstrates correct image.If unauthorized user just can not solve correct image after downloading.Therefore, can utilize a kind of method of image encryption to protect image copyright, make it does not duplicated use arbitrarily.
Data encryption technology promptly is meant an information, also be called expressly (plain text), through encryption key (Encryption key) and encryption function conversion, become after the insignificant ciphertext (cipher text), be resent to the take over party, and deciphering is the take over party with this ciphertext process decryption function and decruption key (Decryptionkey), is reduced into expressly.Thisly allow data receiver and take over party be used for encryption and decryption with some special information, promptly so-called key.In general, data encryption technology is only the user who is authorized, that is has the user of decruption key, could correctly remove password and insignificant ciphertext is reduced into original plaintext.
Summary of the invention
Therefore, purpose of the present invention is exactly that a kind of method that realizes image copyright control is being provided, and the image encryption by to making only allows the user who is authorized correctly to decipher, to realize the control of image copyright.
According to above-mentioned purpose of the present invention, a kind of method that realizes image copyright control is proposed, in graphics standard manufacturing process, increase a kind of algorithm with the form of data stream, do not increasing data volume and do not changing under the situation of image quality image encryption.And the user who obtains the authorization promptly has the user of key, then can utilize this key, and image is decrypted, with correct demonstration and use this image.For the user who is not authorized, owing to there is not key to be decrypted, thus can not correctly show and use this image, and then reach the purpose that image copyright is controlled.
The present invention proposes a kind of method that realizes image copyright control, by image encryption to making, can correctly decipher with the user who only allows to be authorized, the method comprises the steps: at first at least, one key is provided, this key is the data stream of a multidigit unit, and this key is changed and shift operation, to produce first sub-key and second sub-key.Then, image is carried out an encrypting step, this encrypting step is a kind of operation method, at least comprise: make the image data stream that comprises the image information by an initial conversion function, export first data stream, make first data stream and first sub-key carry out computing by first operating function, export second data stream, second data stream is passed through the exchange transfer function, export the 3rd data stream, the 3rd data stream and second sub-key are carried out computing by second operating function, export the 4th data stream and with the 4th data stream by final transfer function, get final product afterwards an image data stream of having encrypted.The image data stream that the user who is authorized has encrypted to this then carries out a decryption step, this decryption step comprises at least: this image data stream of having encrypted is passed through original initial transfer function, can obtain the 4th data stream, the 4th data stream and second sub-key are carried out computing by former second operating function, can obtain the 3rd data stream, with the 3rd data stream by former exchange transfer function, can obtain second data stream, make second data stream and first sub-key carry out computing by former first operating function, can obtain first data stream and make first data stream, just can obtain comprising the original digital image data stream of image information by former final transfer function.
Description of drawings
For the present invention and advantage thereof are had more complete understanding, in comment backward, be aided with accompanying drawing and do more detailed elaboration, wherein:
Fig. 1 a has illustrated the ciphering process synoptic diagram of preferred embodiment of the present invention;
Fig. 1 b has illustrated the decrypting process synoptic diagram of preferred embodiment of the present invention;
Fig. 2 has illustrated the encrypt and decrypt process synoptic diagram of preferred embodiment of the present invention.
Embodiment
For purpose of the present invention, feature and advantage can be become apparent, in following literal, enumerate a preferred embodiment, and conjunction with figs., be described in detail below.
Preferred embodiment of the present invention discloses a kind of method of image copyright control, please refer to Fig. 1 a, and it has illustrated the ciphering process synoptic diagram of preferred embodiment of the present invention.Then please refer to Fig. 1 b, it has illustrated the decrypting process synoptic diagram of preferred embodiment of the present invention.And Fig. 2 has illustrated the encrypt and decrypt process synoptic diagram of preferred embodiment of the present invention.Preferred embodiment of the present invention only allows the user who is authorized correctly decipher by the mode to image encryption.
The cryptographic algorithm of encrypting step comprises five functions: initial conversion function IP101, an operating function f K1102, exchange transfer function SW103, another operating function f K2104 and final transfer function IP -1105.Wherein, operating function f K1102 with operating function f K2104 comprise conversion and the complex calculation that substitute, and its input end not only has the image data stream input by cryptographic algorithm, also comprise the input of key; Exchange transfer function SW103 is the two halves that is used for exchanging (Switch) data stream; And final transfer function IP -1The 105th, the inverse conversion of initial conversion function IP101.Use the conversion of a plurality of steps and substitute to produce more complicated algorithm, thereby make cryptanalysis more difficult.After original digital image data stream passed through these five functional operation in regular turn, the image data stream that can have been encrypted also was called ciphertext.
The employed key of preferred embodiment of the present invention produces two sub-keys in the mode shown in Fig. 1 a and Fig. 1 b again.Key is earlier through a transfer function P 10111, carry out a shift operation 112 then.The output of shift operation 112 is by a transfer function P 8After 113, just produced first sub-key (sub-key K as shown in Fig. 1 a 1) input to the operating function f in the encrypting step K1102, carry out computing with the image data stream that passes through cryptographic algorithm.In addition, the output of shift operation 112 also is input to another shift registor and carries out a shift operation 114, passes through an other transfer function P again 8After 115, produce second sub-key (sub-key K as shown in Fig. 1 a 2) input to the operating function f in the encrypting step K2104, carry out computing again with the image data stream that passes through cryptographic algorithm.
Decryption step is found among Fig. 1 b, and it comes down to the anti-process of encrypting step.With ciphertext, that is the image data stream of having encrypted, above-mentioned initial conversion function IP101, operating function f passed through in regular turn K2102, exchange transfer function SW103, operating function f K1104 with final transfer function IP -1105 carry out computing, the original digital image data that can correctly be deciphered stream with key.
Following function compound operation can be used to represent compactly cryptographic algorithm:
IP -1。f K2。SW。f K1。IP
This process also can be written as:
Ciphertext=IP -1(f K2(SW (f K1(IP (original digital image data stream)))))
Wherein
K 1=P 8(displacement (P 10(key)))
K 2=P 8(displacement (displacement (P 10(key))))
And decrypting process comes down to the anti-process of ciphering process:
Original digital image data stream=IP -1(f K1(SW (f K2(IP (ciphertext)))))
Be that preferred embodiment work one of the present invention is described in more detail hereinafter with the image data stream of eight bits and the key of ten bits.Cryptographic algorithm with the image data stream of eight bits (for example: 10111101) and the key of ten bits as input, and the ciphertext block that produces eight bits is as output.When after the user who is authorized is obtaining key, deciphering, decipherment algorithm with the ciphertext block of eight bits and the same key that is used for producing this ciphertext as input, to produce eight original bit view data stream packets.
In preferred embodiment of the present invention, when image product was being encrypted, key was the ten bit keys that a transmit leg and take over party share, and this key also generates two eight bit sub-keys of the particular step that is used for the encryption and decryption algorithm.At first, key is earlier through a transfer function P 10111, if key list is shown (k 1, k 2, k 3, k 4, k 5, k 6, k 7, k 8, k 9, k 10), with transfer function P 10111 are defined as:
P 10(k 1,k 2,k 3,k 4,k 5,k 6,k 7,k 8,k 9,k 10)=
(k 3,k 5,k 2,k 7,k 4,k 10,k 1,k 9,k 8,k 6)
That is, the bit rearrangement of respectively importing of key is exported, then according to shown in the subscript of output bit, for example: the bit of first output is the 3rd bit of former input to the output order, and the bit of second output is the 5th bit of former input ... by that analogy.The key of supposing this ten bit is (1010000010), then passes through transfer function P 10111 are output as (1000001100).Then carry out a shift operation 112, respectively the first five bit and back five bits are carried out a ring shift left operation, the result of gained is (0000111000) like this.Then a transfer function P is passed through in the output of shift operation 112 8113 carry out translation operation.If key list is shown (k 1, k 2, k 3, k 4, k 5, k 6, k 7, k 8, k 9, k 10), with transfer function P 8113 are defined as:
P 8(k 1,k 2,k 3,k 4,k 5,k 6,k 7,k 8,k 9,k 10)=
(k 6,k 3,k 7,k 4,k 8,k 5,k 10,k 9)
This translation operation is according to above-listed method, selects eight bits line replacement of going forward side by side from ten bits, so just obtains first sub-key (sub-key K as shown in Fig. 1 a 1), its result is (10100100).This sub-key K 1Input to the operating function f in the encrypting step K1102, carry out computing with the image data stream that passes through cryptographic algorithm.
Then get back to a pair of five bit strings that produce by shift operation 112, each five bit string is carried out a ring shift left operation of 2, can obtain (0010000011) from (0000111000).The ten bit strings that will obtain again at last, are through an other transfer function P 8After 115, just produced second sub-key (sub-key K as shown in Fig. 1 a 2), its result is (01000011).This sub-key K 2Input to the operating function f in the encrypting step K2104, carry out computing again with the image data stream that passes through cryptographic algorithm.
The present invention can also other cryptographic algorithm or form reach, image data stream can obtain the higher ciphertext of security through many more encryption functions and secret key encryption.
Though the present invention discloses as above with a preferred embodiment; right its is not in order to limit the present invention; anyly be familiar with present technique field person; without departing from the spirit and scope of the present invention; when can being used for a variety of modifications and variations, so protection scope of the present invention is as the criterion when looking accompanying the claim person of defining.

Claims (3)

1. method that realizes image copyright control, the image encryption by to making only allows the user who is authorized correctly to decipher, and this method comprises the steps: at least
One key is provided, and this key is the data stream of a multidigit unit;
Image is carried out an encrypting step, and this encrypting step is a kind of operation method, and this encrypting step comprises at least:
A1. the image data stream that makes a multidigit unit that comprises the image information can be exported first data stream afterwards by an initial conversion function;
A2. make this first data stream and this key carry out computing, can export second data stream afterwards by first operating function;
A3. this second data stream is exchanged transfer function by one, can export the 3rd data stream afterwards;
A4. the 3rd data stream and this key are carried out computing by second operating function, can export the 4th data stream afterwards; And
A5. the 4th data stream is passed through a final transfer function, can get an image data stream of having encrypted afterwards; And
The user who is authorized carries out a decryption step to this image data stream of having encrypted, and this decryption step comprises at least:
B1. the image data stream that this has been encrypted can obtain the 4th data stream by this initial conversion function;
B2. the 4th data stream and this key are carried out computing by this second operating function, can obtain the 3rd data stream;
B3. the 3rd data stream is exchanged transfer function by this, can obtain this second data stream;
B4. make this second data stream and this key carry out computing, can obtain this first data stream by this first operating function; And
B5. make this first data stream by this final transfer function, can obtain comprising the image data stream of this multidigit unit of image information;
This final transfer function is the inverse conversion of this initial conversion function.
2. the method for realization image copyright control as claimed in claim 1 is characterized in that this key also comprises the computing that produces first sub-key and second sub-key, and this computing comprises at least:
This key is carried out the first transfer function computing, first shift operation and the second transfer function computing, to produce this first sub-key; And
This key is carried out this first transfer function computing, this first shift operation, second shift operation and this second transfer function computing, to produce this second sub-key; In above-mentioned steps a2 and b2, use this first sub-key, in above-mentioned steps a4 and b4, use this second sub-key.
3. a method that realizes image copyright control by the image encryption to making, can correctly be deciphered with the user who only allows to be authorized, and this method comprises the steps: at least
One key is provided, and this key is the data stream of a multidigit unit, and this key is carried out computing, and this computing comprises at least:
This key is carried out the first transfer function computing, first shift operation and the second transfer function computing, to produce first sub-key; And
This key is carried out this first transfer function computing, this first shift operation, second shift operation and this second transfer function computing, to produce second sub-key;
Image is carried out an encrypting step, and this encrypting step is a kind of operation method, and this encrypting step comprises at least:
Make an image data stream that comprises the image information by an initial conversion function, can export first data stream afterwards;
Make this first data stream and this first sub-key carry out computing, can export second data stream afterwards by first operating function;
This second data stream by an exchange transfer function, can be exported the 3rd data stream afterwards;
The 3rd data stream and this second sub-key are carried out computing by second operating function, can export the 4th data stream afterwards; And
The 4th data stream by a final transfer function, can be got an image data stream of having encrypted afterwards; And
The user who is authorized carries out a decryption step to this image data stream of having encrypted, and this decryption step comprises at least:
This image data stream of having encrypted by this initial conversion function, can be obtained the 4th data stream;
The 4th data stream and this second sub-key are carried out computing by this second operating function, can obtain the 3rd data stream;
The 3rd data stream by this exchange transfer function, can be obtained this second data stream;
Make this second data stream and this first sub-key carry out computing, can obtain this first data stream by this first operating function; And
Make this first data stream by this final transfer function, can obtain comprising this image data stream of image information;
This final transfer function is the inverse conversion of this initial conversion function.
CNB2004100179925A 2004-04-28 2004-04-28 Method for implementing image copyright control Expired - Fee Related CN1332353C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100179925A CN1332353C (en) 2004-04-28 2004-04-28 Method for implementing image copyright control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100179925A CN1332353C (en) 2004-04-28 2004-04-28 Method for implementing image copyright control

Publications (2)

Publication Number Publication Date
CN1691060A CN1691060A (en) 2005-11-02
CN1332353C true CN1332353C (en) 2007-08-15

Family

ID=35346488

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100179925A Expired - Fee Related CN1332353C (en) 2004-04-28 2004-04-28 Method for implementing image copyright control

Country Status (1)

Country Link
CN (1) CN1332353C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009084573A1 (en) * 2007-12-27 2009-07-09 Keiko Ogawa Information distribution system and program for the same

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1330819A (en) * 1998-10-15 2002-01-09 三菱商事株式会社 Method and device for protecting digital data by double re-encryption
CN1378382A (en) * 2001-03-26 2002-11-06 三星电子株式会社 Method for controlling data transmission and receiving containing encrypted data stream
JP2003244449A (en) * 2002-02-18 2003-08-29 Canon Inc Image management method and image processing apparatus having encryption processing function
WO2003098546A1 (en) * 2002-05-21 2003-11-27 Koninklijke Philips Electronics N.V. Tamper-resistant visual encryption method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1330819A (en) * 1998-10-15 2002-01-09 三菱商事株式会社 Method and device for protecting digital data by double re-encryption
CN1378382A (en) * 2001-03-26 2002-11-06 三星电子株式会社 Method for controlling data transmission and receiving containing encrypted data stream
JP2003244449A (en) * 2002-02-18 2003-08-29 Canon Inc Image management method and image processing apparatus having encryption processing function
WO2003098546A1 (en) * 2002-05-21 2003-11-27 Koninklijke Philips Electronics N.V. Tamper-resistant visual encryption method and device

Also Published As

Publication number Publication date
CN1691060A (en) 2005-11-02

Similar Documents

Publication Publication Date Title
CN101753292B (en) Methods and devices for a chained encryption mode
CN102611549B (en) Data encryption equipment and storage card
JP5704159B2 (en) Block encryption device, block decryption device, block encryption method, block decryption method, and program
US20100202606A1 (en) Two strings private key (symmetric) encryption and decryption method
US7613297B2 (en) Method and apparatus for data encryption
Reyad et al. Key-based enhancement of data encryption standard for text security
US20110085663A1 (en) Method for the access-related or communication-related random encryption and decryption of data
CN100382485C (en) Method for Designing Optimal Encryption Function and Optimized Encryption Device
US20060233361A1 (en) Device, method, and program for encrypton and decryption and recording medium
JP2000511755A (en) How to encrypt binary code information
EP2904731B1 (en) Method and device for digital data blocks encryption and decryption
Meghrajani et al. Universal share for multisecret image sharing scheme based on Boolean operation
US20080219448A1 (en) Multiple-layers encryption/decryption and distribution of copyrighted contents
CN108494554A (en) A kind of data symmetric encryption method based on double plaintexts
CN1332353C (en) Method for implementing image copyright control
JP5586758B1 (en) Dynamic encryption key generation system
Lee et al. Design and evaluation of a block encryption algorithm using dynamic-key mechanism
JP2008035305A (en) Encryption method and data concealing method
GB2463031A (en) Encrypting data or providing an encryption key
JP5023610B2 (en) Data exchange method and system
JP5293612B2 (en) ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM
JPH09233065A (en) Encryption device and encryption method
Nayak et al. A Scrutiny of AES-Based Image Encryption and Decryption for Fraudulent Data Security and Defense Against Intrusion Attacks
Shete et al. Novel Hybrid Encryption Algorithm and its Application in Text and Image Encryption
Verma et al. An innovative Enciphering Scheme based on Caesar Cipher

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070815

Termination date: 20200428