[go: nahoru, domu]

CN110502913A - A kind of method that symmetrical hash obscures content - Google Patents

A kind of method that symmetrical hash obscures content Download PDF

Info

Publication number
CN110502913A
CN110502913A CN201910776555.8A CN201910776555A CN110502913A CN 110502913 A CN110502913 A CN 110502913A CN 201910776555 A CN201910776555 A CN 201910776555A CN 110502913 A CN110502913 A CN 110502913A
Authority
CN
China
Prior art keywords
content
obscure
numbers
ordered series
obscures
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910776555.8A
Other languages
Chinese (zh)
Inventor
杨浩钧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Yi Jian Lou Culture Technology Co Ltd
Original Assignee
Tianjin Yi Jian Lou Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Yi Jian Lou Culture Technology Co Ltd filed Critical Tianjin Yi Jian Lou Culture Technology Co Ltd
Priority to CN201910776555.8A priority Critical patent/CN110502913A/en
Publication of CN110502913A publication Critical patent/CN110502913A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to computer technology technical fields, more particularly to a kind of symmetrical hash obscures the method for content, content is cut into the block or individual of equal sizes according to its feature first, then generate one section according to user password hash and obscure instruction, by after cutting block or individual rearranged according to instruction complete to obscure in original.If input error password can obtain the content of mistake when reduction, otherwise correct, passively obscure to realize, i.e., can all obtain anyway as a result, but only possess original contents ability judging result and whether raw content consistent, result will not be prompted whether correct.This method obscure it is high-efficient, it is easy to use, have and uniqueness and be difficult to crack, compared with other obscure encryption method, this method can keep original contents constant, only reversing of position or sequence, not add new feature and new content to content, and easy to use.

Description

A kind of method that symmetrical hash obscures content
Technical field
The present invention relates to a kind of methods that computer technology technical field more particularly to symmetrical hash obscure content.
Background technique
Have a large amount of encryptions or obfuscation in computer field, a part of technical notes the phase of decryption or reduction Feature is closed, these technologies are easy to be cracked, and another part, which has lost initial data to improve safety, realizes these technologies, These complicated technology realizations, principle have professional, radical change original contents, it is difficult to understand.
The prior art can be obscured according to key or encrypt original document, but change the data structure or original contents of file Cause certain information to lose or can not normally be opened, and new feature can be added to the content after encrypting or obscuring, is easy It is found or reduction is cracked according to feature.
Therefore, the method for content is obscured we have proposed a kind of symmetrical hash for solving the above problems.
Summary of the invention
The purpose of the present invention is to solve disadvantage existing in the prior art, and in a kind of symmetrical hash proposed obscures The method of appearance.
To achieve the goals above, present invention employs following technical solutions:
The method that a kind of symmetrical hash proposed by the present invention obscures content, comprising the following steps:
S1: the object obscured is needed according to the feature analysis of object, it is divided into the block of equivalent size;
S2: obtaining a set of distribution method by parameter, and this method generates the number that total length is block total quantity using a certain feature as parameter Column, and the number in an ordered series of numbers is assigned for each piece after segmentation;
S3: be arranged one or more parameters be can the formula of inverse operator be used to adjust the state of ordered series of numbers and generate new ordered series of numbers, newly to count The sequence of column rearranges block, and so far process of obfuscation is completed;
S4: when needing to restore, formula reversion is inversely calculated, success can be restored.
Preferably, in the S2, a certain feature refers to one of password, fingerprint or vocal print or a variety of.
Preferably, in the S2, each of ordered series of numbers number is not reproducible and has uniqueness.
Preferably, in the S3, parameter refers to one of password, fingerprint or vocal print or a variety of.
Preferably, in the S3, the state for adjusting ordered series of numbers is one of position or sequence of ordered series of numbers or a variety of.
Compared with prior art, the beneficial effects of the present invention are:
1. information is complete, sequence or the position of the content in file are only adjusted, does not add change data structure.
2. easy to use, by computer programming can simple realization this method, can be according to a set of instruction generation scheme pair Multimedia messages are handled, and treatment process is fast, are restored high-quality.
3. safe and reliable, this method does not record any feature and data, keeps content itself reliable and obscure to go back old password Uniquely.
4. can transporting, this method obscure after file still can be taken as normal file open, transmission, keep original text Part structure.
Detailed description of the invention
Fig. 1 is embodiment schematic diagram proposed by the present invention.
Specific embodiment
Unless otherwise defined, all technologies used herein and scientific term have and the common skill of fields of the present invention The normally understood identical meaning of art personnel.When there is a conflict, the definition in this specification shall prevail." quality, concentration, temperature What degree, time or other values or parameter were limited with range, preferred scope or a series of upper limit preferred values and lower preferable values When Range Representation, this be should be understood as specifically disclosing by any range limit or preferred value and any range lower limit or preferably Any pairing of value is formed by all ranges, regardless of whether the range separately discloses.
The embodiment of the present invention proposes a kind of method that symmetrical hash obscures content, comprising the following steps:
Step 1: it, is divided into the block of equivalent size by the object for being needed to obscure according to the feature analysis of object.
Step 2: writing a set of distribution method, this method for parameter, is generated total with a certain feature (password, fingerprint, vocal print) Length is the ordered series of numbers of block total quantity, assigns the number in an ordered series of numbers for each piece after segmentation, each of ordered series of numbers number is not It repeats and there is uniqueness.
Step 3: write one or more parameters be can the formula of inverse operator be used to adjust the position of ordered series of numbers or sequence and generate New ordered series of numbers rearranges block with the sequence of new ordered series of numbers, and so far process of obfuscation is completed.
In addition, formula reversion is inversely calculated, success can be restored when needing to restore.
The realization for a kind of method that symmetrical hash obscures content referring to attached drawing figure one, be characterized by block of pixels, according to The Internal Code of each of password character be parameter, adjust block of pixels position and sequence, thus realize image obscure with also The realization process of original, attached drawing one is as follows:
User inputs password: 19970823 pairs of images are obscured, and obfuscator is instructed according to password generated, and it is big that image is cut into 4*4 Small segment (16384 pieces) generates instruction according to the quantity of block and the relationship of user password and resequences to original image, then benefit It is restored with password 19970823, obtains original image, and another demonstration is then using password 19971225, image is still chaotic It is shapeless, so going back primary failure.
It is whether correct without any active prompt reduction in reduction process, it needs to compare or know by original image Dawn original image can judge whether to restore successfully.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (5)

1. a kind of method that symmetrical hash obscures content, which comprises the following steps:
S1: the object obscured is needed according to the feature analysis of object, it is divided into the block of equivalent size;
S2: obtaining a set of distribution method by parameter, and this method generates the number that total length is block total quantity using a certain feature as parameter Column, and the number in an ordered series of numbers is assigned for each piece after segmentation;
S3: be arranged one or more parameters be can the formula of inverse operator be used to adjust the state of ordered series of numbers and generate new ordered series of numbers, newly to count The sequence of column rearranges block, and so far process of obfuscation is completed;
S4: when needing to restore, formula reversion is inversely calculated, success can be restored.
2. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that a certain in the S2 Feature refers to one of password, fingerprint or vocal print or a variety of.
3. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S2, the number Each of column number is not reproducible and has uniqueness.
4. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S3, parameter Refer to one of password, fingerprint or vocal print or a variety of.
5. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S3, adjustment The state of ordered series of numbers is one of position or sequence of ordered series of numbers or a variety of.
CN201910776555.8A 2019-08-22 2019-08-22 A kind of method that symmetrical hash obscures content Pending CN110502913A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910776555.8A CN110502913A (en) 2019-08-22 2019-08-22 A kind of method that symmetrical hash obscures content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910776555.8A CN110502913A (en) 2019-08-22 2019-08-22 A kind of method that symmetrical hash obscures content

Publications (1)

Publication Number Publication Date
CN110502913A true CN110502913A (en) 2019-11-26

Family

ID=68588970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910776555.8A Pending CN110502913A (en) 2019-08-22 2019-08-22 A kind of method that symmetrical hash obscures content

Country Status (1)

Country Link
CN (1) CN110502913A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112787814A (en) * 2021-01-20 2021-05-11 四川湖山电器股份有限公司 Upper computer communication encryption method and system
CN113268769A (en) * 2021-05-25 2021-08-17 平安普惠企业管理有限公司 Method, system and storage medium for processing biological characteristic data based on random confusion

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1295695A (en) * 1999-01-27 2001-05-16 西伯班克株式会社 Method and apparatus for encoding image information into puzzle-type
CN1658235A (en) * 2004-02-17 2005-08-24 株式会社东芝 Device and method for embedding and detecting digital wartermark in image
CN1870045A (en) * 2005-05-27 2006-11-29 刘畅 Image picture encipher and decipher method
CN101682682A (en) * 2007-05-30 2010-03-24 富士通株式会社 Image encyption device, image decyption device, method, and program
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN105577354A (en) * 2015-12-10 2016-05-11 陕西师范大学 Image encryption and decryption method based on probability interval division and dynamic probability events
CN106156653A (en) * 2016-07-05 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of method and system of data storage
CN106600516A (en) * 2016-11-10 2017-04-26 江苏信息职业技术学院 Digital fingerprint based image insertion method
CN109379507A (en) * 2018-09-18 2019-02-22 湖北工程学院 A kind of guard method of image, storage medium
CN109635756A (en) * 2018-12-17 2019-04-16 黑龙江大学 It merges fingerprint and refers to the two dimensional code identity identifying method of vein
CN109672804A (en) * 2018-12-21 2019-04-23 北京维大成科技有限公司 A kind of encryption and decryption method and its system of image
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109981918A (en) * 2019-03-01 2019-07-05 上海电力学院 A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1295695A (en) * 1999-01-27 2001-05-16 西伯班克株式会社 Method and apparatus for encoding image information into puzzle-type
CN1658235A (en) * 2004-02-17 2005-08-24 株式会社东芝 Device and method for embedding and detecting digital wartermark in image
CN1870045A (en) * 2005-05-27 2006-11-29 刘畅 Image picture encipher and decipher method
CN101682682A (en) * 2007-05-30 2010-03-24 富士通株式会社 Image encyption device, image decyption device, method, and program
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN105577354A (en) * 2015-12-10 2016-05-11 陕西师范大学 Image encryption and decryption method based on probability interval division and dynamic probability events
CN106156653A (en) * 2016-07-05 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of method and system of data storage
CN106600516A (en) * 2016-11-10 2017-04-26 江苏信息职业技术学院 Digital fingerprint based image insertion method
CN109379507A (en) * 2018-09-18 2019-02-22 湖北工程学院 A kind of guard method of image, storage medium
CN109635756A (en) * 2018-12-17 2019-04-16 黑龙江大学 It merges fingerprint and refers to the two dimensional code identity identifying method of vein
CN109672804A (en) * 2018-12-21 2019-04-23 北京维大成科技有限公司 A kind of encryption and decryption method and its system of image
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109981918A (en) * 2019-03-01 2019-07-05 上海电力学院 A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙力等: "基于位置换的混沌对称图像加密算法", 《计算机应用与软件》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112787814A (en) * 2021-01-20 2021-05-11 四川湖山电器股份有限公司 Upper computer communication encryption method and system
CN113268769A (en) * 2021-05-25 2021-08-17 平安普惠企业管理有限公司 Method, system and storage medium for processing biological characteristic data based on random confusion

Similar Documents

Publication Publication Date Title
US10484344B2 (en) System and method for authenticating users
US10320765B2 (en) Method and system for securing communication
US9172533B2 (en) Method and system for securing communication
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
US9077710B1 (en) Distributed storage of password data
AU2013101034B4 (en) Registration and authentication of computing devices using a digital skeleton key
CN106161006B (en) Digital encryption algorithm
US9596263B1 (en) Obfuscation and de-obfuscation of identifiers
CN107251476A (en) Secret communication is managed
EP2955657A1 (en) Apparatuses and methods for password authentication
CN104281815B (en) The method and system of file encryption-decryption
CN107078899A (en) The method of obfuscated data
EP2924953B1 (en) Method and system for encrypted data synchronization for secure data management
CN106878013A (en) A kind of encryption and decryption method and device of file
CN100401309C (en) Tax controlling equipment software edition intelligent upgrade encryption identification method
CN110502913A (en) A kind of method that symmetrical hash obscures content
TW201003451A (en) Safety storage device with two-stage symmetrical encryption algorithm
CN104038828B (en) RSA hash signature content protection optimizing method based on AES encryption
US10025918B2 (en) Apparatus and method for password authentication
CN103457721B (en) A kind of method and device of Mass production password
US10341110B2 (en) Securing user credentials
Nielson et al. Practical Cryptography in Python: Learning Correct Cryptography by Example
CN103763097A (en) Security encryption method for password or secret key
EP2876569A1 (en) Apparatuses and methods for password authentication
CN111651788A (en) Terminal access control system and method based on lattice code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126

RJ01 Rejection of invention patent application after publication