CN110502913A - A kind of method that symmetrical hash obscures content - Google Patents
A kind of method that symmetrical hash obscures content Download PDFInfo
- Publication number
- CN110502913A CN110502913A CN201910776555.8A CN201910776555A CN110502913A CN 110502913 A CN110502913 A CN 110502913A CN 201910776555 A CN201910776555 A CN 201910776555A CN 110502913 A CN110502913 A CN 110502913A
- Authority
- CN
- China
- Prior art keywords
- content
- obscure
- numbers
- ordered series
- obscures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to computer technology technical fields, more particularly to a kind of symmetrical hash obscures the method for content, content is cut into the block or individual of equal sizes according to its feature first, then generate one section according to user password hash and obscure instruction, by after cutting block or individual rearranged according to instruction complete to obscure in original.If input error password can obtain the content of mistake when reduction, otherwise correct, passively obscure to realize, i.e., can all obtain anyway as a result, but only possess original contents ability judging result and whether raw content consistent, result will not be prompted whether correct.This method obscure it is high-efficient, it is easy to use, have and uniqueness and be difficult to crack, compared with other obscure encryption method, this method can keep original contents constant, only reversing of position or sequence, not add new feature and new content to content, and easy to use.
Description
Technical field
The present invention relates to a kind of methods that computer technology technical field more particularly to symmetrical hash obscure content.
Background technique
Have a large amount of encryptions or obfuscation in computer field, a part of technical notes the phase of decryption or reduction
Feature is closed, these technologies are easy to be cracked, and another part, which has lost initial data to improve safety, realizes these technologies,
These complicated technology realizations, principle have professional, radical change original contents, it is difficult to understand.
The prior art can be obscured according to key or encrypt original document, but change the data structure or original contents of file
Cause certain information to lose or can not normally be opened, and new feature can be added to the content after encrypting or obscuring, is easy
It is found or reduction is cracked according to feature.
Therefore, the method for content is obscured we have proposed a kind of symmetrical hash for solving the above problems.
Summary of the invention
The purpose of the present invention is to solve disadvantage existing in the prior art, and in a kind of symmetrical hash proposed obscures
The method of appearance.
To achieve the goals above, present invention employs following technical solutions:
The method that a kind of symmetrical hash proposed by the present invention obscures content, comprising the following steps:
S1: the object obscured is needed according to the feature analysis of object, it is divided into the block of equivalent size;
S2: obtaining a set of distribution method by parameter, and this method generates the number that total length is block total quantity using a certain feature as parameter
Column, and the number in an ordered series of numbers is assigned for each piece after segmentation;
S3: be arranged one or more parameters be can the formula of inverse operator be used to adjust the state of ordered series of numbers and generate new ordered series of numbers, newly to count
The sequence of column rearranges block, and so far process of obfuscation is completed;
S4: when needing to restore, formula reversion is inversely calculated, success can be restored.
Preferably, in the S2, a certain feature refers to one of password, fingerprint or vocal print or a variety of.
Preferably, in the S2, each of ordered series of numbers number is not reproducible and has uniqueness.
Preferably, in the S3, parameter refers to one of password, fingerprint or vocal print or a variety of.
Preferably, in the S3, the state for adjusting ordered series of numbers is one of position or sequence of ordered series of numbers or a variety of.
Compared with prior art, the beneficial effects of the present invention are:
1. information is complete, sequence or the position of the content in file are only adjusted, does not add change data structure.
2. easy to use, by computer programming can simple realization this method, can be according to a set of instruction generation scheme pair
Multimedia messages are handled, and treatment process is fast, are restored high-quality.
3. safe and reliable, this method does not record any feature and data, keeps content itself reliable and obscure to go back old password
Uniquely.
4. can transporting, this method obscure after file still can be taken as normal file open, transmission, keep original text
Part structure.
Detailed description of the invention
Fig. 1 is embodiment schematic diagram proposed by the present invention.
Specific embodiment
Unless otherwise defined, all technologies used herein and scientific term have and the common skill of fields of the present invention
The normally understood identical meaning of art personnel.When there is a conflict, the definition in this specification shall prevail." quality, concentration, temperature
What degree, time or other values or parameter were limited with range, preferred scope or a series of upper limit preferred values and lower preferable values
When Range Representation, this be should be understood as specifically disclosing by any range limit or preferred value and any range lower limit or preferably
Any pairing of value is formed by all ranges, regardless of whether the range separately discloses.
The embodiment of the present invention proposes a kind of method that symmetrical hash obscures content, comprising the following steps:
Step 1: it, is divided into the block of equivalent size by the object for being needed to obscure according to the feature analysis of object.
Step 2: writing a set of distribution method, this method for parameter, is generated total with a certain feature (password, fingerprint, vocal print)
Length is the ordered series of numbers of block total quantity, assigns the number in an ordered series of numbers for each piece after segmentation, each of ordered series of numbers number is not
It repeats and there is uniqueness.
Step 3: write one or more parameters be can the formula of inverse operator be used to adjust the position of ordered series of numbers or sequence and generate
New ordered series of numbers rearranges block with the sequence of new ordered series of numbers, and so far process of obfuscation is completed.
In addition, formula reversion is inversely calculated, success can be restored when needing to restore.
The realization for a kind of method that symmetrical hash obscures content referring to attached drawing figure one, be characterized by block of pixels, according to
The Internal Code of each of password character be parameter, adjust block of pixels position and sequence, thus realize image obscure with also
The realization process of original, attached drawing one is as follows:
User inputs password: 19970823 pairs of images are obscured, and obfuscator is instructed according to password generated, and it is big that image is cut into 4*4
Small segment (16384 pieces) generates instruction according to the quantity of block and the relationship of user password and resequences to original image, then benefit
It is restored with password 19970823, obtains original image, and another demonstration is then using password 19971225, image is still chaotic
It is shapeless, so going back primary failure.
It is whether correct without any active prompt reduction in reduction process, it needs to compare or know by original image
Dawn original image can judge whether to restore successfully.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (5)
1. a kind of method that symmetrical hash obscures content, which comprises the following steps:
S1: the object obscured is needed according to the feature analysis of object, it is divided into the block of equivalent size;
S2: obtaining a set of distribution method by parameter, and this method generates the number that total length is block total quantity using a certain feature as parameter
Column, and the number in an ordered series of numbers is assigned for each piece after segmentation;
S3: be arranged one or more parameters be can the formula of inverse operator be used to adjust the state of ordered series of numbers and generate new ordered series of numbers, newly to count
The sequence of column rearranges block, and so far process of obfuscation is completed;
S4: when needing to restore, formula reversion is inversely calculated, success can be restored.
2. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that a certain in the S2
Feature refers to one of password, fingerprint or vocal print or a variety of.
3. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S2, the number
Each of column number is not reproducible and has uniqueness.
4. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S3, parameter
Refer to one of password, fingerprint or vocal print or a variety of.
5. the method that a kind of symmetrical hash according to claim 1 obscures content, which is characterized in that in the S3, adjustment
The state of ordered series of numbers is one of position or sequence of ordered series of numbers or a variety of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910776555.8A CN110502913A (en) | 2019-08-22 | 2019-08-22 | A kind of method that symmetrical hash obscures content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910776555.8A CN110502913A (en) | 2019-08-22 | 2019-08-22 | A kind of method that symmetrical hash obscures content |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502913A true CN110502913A (en) | 2019-11-26 |
Family
ID=68588970
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910776555.8A Pending CN110502913A (en) | 2019-08-22 | 2019-08-22 | A kind of method that symmetrical hash obscures content |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502913A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112787814A (en) * | 2021-01-20 | 2021-05-11 | 四川湖山电器股份有限公司 | Upper computer communication encryption method and system |
CN113268769A (en) * | 2021-05-25 | 2021-08-17 | 平安普惠企业管理有限公司 | Method, system and storage medium for processing biological characteristic data based on random confusion |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1295695A (en) * | 1999-01-27 | 2001-05-16 | 西伯班克株式会社 | Method and apparatus for encoding image information into puzzle-type |
CN1658235A (en) * | 2004-02-17 | 2005-08-24 | 株式会社东芝 | Device and method for embedding and detecting digital wartermark in image |
CN1870045A (en) * | 2005-05-27 | 2006-11-29 | 刘畅 | Image picture encipher and decipher method |
CN101682682A (en) * | 2007-05-30 | 2010-03-24 | 富士通株式会社 | Image encyption device, image decyption device, method, and program |
CN104298926A (en) * | 2013-07-19 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Method and device for running encrypted file |
CN105577354A (en) * | 2015-12-10 | 2016-05-11 | 陕西师范大学 | Image encryption and decryption method based on probability interval division and dynamic probability events |
CN106156653A (en) * | 2016-07-05 | 2016-11-23 | 浪潮(北京)电子信息产业有限公司 | A kind of method and system of data storage |
CN106600516A (en) * | 2016-11-10 | 2017-04-26 | 江苏信息职业技术学院 | Digital fingerprint based image insertion method |
CN109379507A (en) * | 2018-09-18 | 2019-02-22 | 湖北工程学院 | A kind of guard method of image, storage medium |
CN109635756A (en) * | 2018-12-17 | 2019-04-16 | 黑龙江大学 | It merges fingerprint and refers to the two dimensional code identity identifying method of vein |
CN109672804A (en) * | 2018-12-21 | 2019-04-23 | 北京维大成科技有限公司 | A kind of encryption and decryption method and its system of image |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109981918A (en) * | 2019-03-01 | 2019-07-05 | 上海电力学院 | A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block |
-
2019
- 2019-08-22 CN CN201910776555.8A patent/CN110502913A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1295695A (en) * | 1999-01-27 | 2001-05-16 | 西伯班克株式会社 | Method and apparatus for encoding image information into puzzle-type |
CN1658235A (en) * | 2004-02-17 | 2005-08-24 | 株式会社东芝 | Device and method for embedding and detecting digital wartermark in image |
CN1870045A (en) * | 2005-05-27 | 2006-11-29 | 刘畅 | Image picture encipher and decipher method |
CN101682682A (en) * | 2007-05-30 | 2010-03-24 | 富士通株式会社 | Image encyption device, image decyption device, method, and program |
CN104298926A (en) * | 2013-07-19 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Method and device for running encrypted file |
CN105577354A (en) * | 2015-12-10 | 2016-05-11 | 陕西师范大学 | Image encryption and decryption method based on probability interval division and dynamic probability events |
CN106156653A (en) * | 2016-07-05 | 2016-11-23 | 浪潮(北京)电子信息产业有限公司 | A kind of method and system of data storage |
CN106600516A (en) * | 2016-11-10 | 2017-04-26 | 江苏信息职业技术学院 | Digital fingerprint based image insertion method |
CN109379507A (en) * | 2018-09-18 | 2019-02-22 | 湖北工程学院 | A kind of guard method of image, storage medium |
CN109635756A (en) * | 2018-12-17 | 2019-04-16 | 黑龙江大学 | It merges fingerprint and refers to the two dimensional code identity identifying method of vein |
CN109672804A (en) * | 2018-12-21 | 2019-04-23 | 北京维大成科技有限公司 | A kind of encryption and decryption method and its system of image |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109981918A (en) * | 2019-03-01 | 2019-07-05 | 上海电力学院 | A kind of encrypted image reversible information hidden method based on the segmentation of quaternary tree dynamic block |
Non-Patent Citations (1)
Title |
---|
孙力等: "基于位置换的混沌对称图像加密算法", 《计算机应用与软件》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112787814A (en) * | 2021-01-20 | 2021-05-11 | 四川湖山电器股份有限公司 | Upper computer communication encryption method and system |
CN113268769A (en) * | 2021-05-25 | 2021-08-17 | 平安普惠企业管理有限公司 | Method, system and storage medium for processing biological characteristic data based on random confusion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10484344B2 (en) | System and method for authenticating users | |
US10320765B2 (en) | Method and system for securing communication | |
US9172533B2 (en) | Method and system for securing communication | |
US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
US9077710B1 (en) | Distributed storage of password data | |
AU2013101034B4 (en) | Registration and authentication of computing devices using a digital skeleton key | |
CN106161006B (en) | Digital encryption algorithm | |
US9596263B1 (en) | Obfuscation and de-obfuscation of identifiers | |
CN107251476A (en) | Secret communication is managed | |
EP2955657A1 (en) | Apparatuses and methods for password authentication | |
CN104281815B (en) | The method and system of file encryption-decryption | |
CN107078899A (en) | The method of obfuscated data | |
EP2924953B1 (en) | Method and system for encrypted data synchronization for secure data management | |
CN106878013A (en) | A kind of encryption and decryption method and device of file | |
CN100401309C (en) | Tax controlling equipment software edition intelligent upgrade encryption identification method | |
CN110502913A (en) | A kind of method that symmetrical hash obscures content | |
TW201003451A (en) | Safety storage device with two-stage symmetrical encryption algorithm | |
CN104038828B (en) | RSA hash signature content protection optimizing method based on AES encryption | |
US10025918B2 (en) | Apparatus and method for password authentication | |
CN103457721B (en) | A kind of method and device of Mass production password | |
US10341110B2 (en) | Securing user credentials | |
Nielson et al. | Practical Cryptography in Python: Learning Correct Cryptography by Example | |
CN103763097A (en) | Security encryption method for password or secret key | |
EP2876569A1 (en) | Apparatuses and methods for password authentication | |
CN111651788A (en) | Terminal access control system and method based on lattice code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191126 |
|
RJ01 | Rejection of invention patent application after publication |