[go: up one dir, main page]

CN1904938A - Encryption method for army fighting - Google Patents

Encryption method for army fighting Download PDF

Info

Publication number
CN1904938A
CN1904938A CN 200510036122 CN200510036122A CN1904938A CN 1904938 A CN1904938 A CN 1904938A CN 200510036122 CN200510036122 CN 200510036122 CN 200510036122 A CN200510036122 A CN 200510036122A CN 1904938 A CN1904938 A CN 1904938A
Authority
CN
China
Prior art keywords
image
encrypted
encryption
template
painted areas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510036122
Other languages
Chinese (zh)
Other versions
CN100461211C (en
Inventor
刘畅
董德周
刘江海
胡一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liu Chang International Co Ltd
Original Assignee
Liu Chang International Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu Chang International Co Ltd filed Critical Liu Chang International Co Ltd
Priority to CNB2005100361227A priority Critical patent/CN100461211C/en
Publication of CN1904938A publication Critical patent/CN1904938A/en
Application granted granted Critical
Publication of CN100461211C publication Critical patent/CN100461211C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relate to a encrypt method for arm battling image. It includes the following steps: creating image encrypt template that has the different coloring area, dividing the image and rearranging to form interspace encrypt image, diving the interspace encrypt image in coloring area on image encrypt template. The invention could create one or plural image encrypt image template and dividing and rearranging the images to generate one or plural image encrypt area, and finally form a encrypt image. One or plural encrypt image would be processed priority or synchronously to accelerate decrypt process.

Description

The encryption method of army fighting
[technical field]
The present invention relates to a kind of encryption method of army fighting, relate in particular to a kind of army fighting encryption method based on four-color conjecture.
[background technology]
Painted is one of foremost field in the figure opinion.Four-color conjecture refers to the problem that requires proof such, promptly at the most with 4 kinds of colors to the map overlay on plane or the sphere, neighboring countries or regional formed zone are shown with different colours.There is more than 150 year in four-colour problem as a famous in the world mathematics difficult problem, and long-term nothing is separated.On June 13rd, 1878, the mathematics that four-color conjecture is held in London by famous mathematician Kai Lai (Cayley) at that time can be gone up formally and propose, and agree the paper that general (A.b.Kempe) deliver at U.S.'s mathematics magazine in 1879 and does not solve four-colour problem.1890 the famous mathematician Xi Wude of Britain (Heawood) provided the conclusion of a mistake.The document " graph theory " of publishing house of Beijing Institute of Technology publication in 1997 is pointed out: " four-color conjecture is a famous mathematics difficult problem that does not still obtain theoretical proof so far." document " set theory and graph theory " published of 1998 years BJ University Presses points out: " up to the present, four-color conjecture is not solved completely.”
The paper of one piece " about discussion of maximum planes graph coloring " being submitted to by Dong Dezhou that the 18th the 4th phase of volume of " science and technology circular " July in 2002 delivers has disclosed the part Study achievement about four-color conjecture.To this, the algebraic process man of department of mathematics of Changsa Univ. points out old 10 days Mays in 2004 of advancing: " this paper is a breakthrough of maximum planes map colouring problem ".
Fig. 1 is the synoptic diagram of a famous counter-example of four-color conjecture.In the counter-example of Fig. 1, there is a y-g path that connects yellow dots will (y) and green point (g), constitutes a closed-loop path C 1(the empty thick line among Fig. 1), because its existence resembles a blockade line r-b chain is separated into two parts, a part is enclosed in C 1In, another part is by every at C 1Outward.These two parts are kept apart by the y-g chain, constitute relatively independent zone.At C 1Outward r, b dichromatism are exchanged (expression in the drawings is a standardized horizontal stroke below r, b, as r, b), the point that soon was coated with the r look originally all changes and is coated with the b look, and the point that is coated with the b look all changes and is coated with the r look.Because C 1In and C 1Outer all is relatively independent zone, so exchange the back like this to C 1In can not exert an influence.Result after exchanging as shown in Figure 2.Fig. 2 is the synoptic diagram of Dong De look Thursday guess theorem to the intermediate proof process of counter-example.In the adjacent vertex of Fig. 2 vertex v to be colored, there is a path that all belongs to the r-y chain between the 3rd r and the 5th the y, this path adds v, just constitutes a closed-loop path C 2(the empty thick line among Fig. 2).In like manner, at C 2In b, g dichromatism are exchanged, after exchanging, 5 summits around the v are followed successively by r, b, r, b, three kinds of colors of y, at last V are coated g.So just make whole summits all coat color, and make adjacent vertex different colours, four kinds of colors altogether, as shown in Figure 3.Fig. 3 is a key to exercises synoptic diagram of Dong De look Thursday guess certification theory.Fig. 4 is an effect synoptic diagram of Dong De look Thursday guess certification theory.Can see by this figure, by the regional random alignment that 23 arbitrary shapes of black, dark-grey, light gray, Bai Si kind color showing constitute, the color difference of adjacent area, zone institute color be 4 kinds.
[summary of the invention]
The present invention encrypts the part Study application of result of four-color conjecture and deciphering in army fighting.
The invention provides a kind of army fighting encryption method.This encryption method comprises: create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of each image encryption template; Treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image; Middle encrypted image is cut apart and is aligned in the painted areas of a certain color on the image encryption template.
According to a method for optimizing of the present invention, image encryption template of the present invention can be one or more.
According to a method for optimizing of the present invention, painted areas of the present invention be shaped as polygon, circle or oval.
According to a method for optimizing of the present invention, the painted color of painted areas of the present invention is at least two kinds.
According to a method for optimizing of the present invention, the painted color of painted areas of the present invention is four kinds.
According to a method for optimizing of the present invention, image to be encrypted of the present invention can be several, wherein, after each image to be encrypted cut apart and rearrange, respectively each intermediate cryptographic image is aligned to the painted areas of the different colours of image encryption template.
According to a method for optimizing of the present invention, image to be encrypted of the present invention can be several, respectively each image to be encrypted is cut apart and rearranged and each intermediate cryptographic image is aligned to the painted areas of the different colours of image encryption template.
According to a method for optimizing of the present invention, encryption method of the present invention is different with the position of this cut zone in the intermediate cryptographic image that forms after rearranging with the position that rearranges at least one cut zone that makes image to be encrypted by cutting apart.
According to a method for optimizing of the present invention, encryption method of the present invention is treated encrypted image and is carried out repeated segmentation and rearrange formation intermediate cryptographic image.
The present invention also provides a kind of fight of army encrypted image, and this encrypted image is formed by following steps: create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of each image encryption template; Treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image; Middle encrypted image is cut apart and is aligned in the painted areas of a certain color on the image encryption template.
The invention has the beneficial effects as follows: by the method for a kind of army fighting encryption of the present invention and deciphering, create a width of cloth and/or multiple image encrypted template, a width of cloth to be encrypted and/or multiple image are cut apart, upset, generate the upset image encryption zone of a width of cloth and/or multiple image encrypted template, at last that it is synthetic to produce encrypted image; In deciphering, can preferentially and/or simultaneously handle a width of cloth and/or several encrypted images respectively according to actual needs, accelerate decrypting process.
[description of drawings]
Fig. 1 is the synoptic diagram that the counter-example of general theory is agree in uncommon Wood denunciation in 1890.
Fig. 2 is the synoptic diagram of Dong De look Thursday guess proof to the intermediate proof process of counter-example.
Fig. 3 is a key to exercises synoptic diagram of Dong De look Thursday guess proof.
Fig. 4 is an effect synoptic diagram of Dong De look Thursday guess proof.
Fig. 5-Fig. 9 is the synoptic diagram of the employed image encryption template of encryption method of the present invention.
Figure 10 is the schematic flow sheet of encryption method one embodiment of the present invention;
Figure 11 is the schematic flow sheet of another embodiment image of encryption method of the present invention.
[embodiment]
The present invention is further described below in conjunction with drawings and Examples.
With reference to Fig. 5-Fig. 9, Fig. 5-Fig. 9 is the synoptic diagram of the employed image encryption template of encryption method of the present invention.In the present invention, image encryption template 5,6,7,8 and 9 is divided into some variform painted areas, and the shape of painted areas can be arbitrarily, and size can be identical or different.The position of painted areas can be designed arbitrary position on the image encryption template at random, but the painted color difference of adjacent area.As shown in the figure, image encryption template 7 among Fig. 7 is made up of painted areas black, white two kinds of colors, image encryption template 9 among Fig. 9 comprises the painted areas of three kinds of different colours, the image encryption template 6 of Fig. 6 is made up of the painted areas of five kinds of colors, and the image encryption template 5,8 among Fig. 5 and Fig. 8 comprises the painted areas of four kinds of different colours.According to the four-color conjecture theory in the background technology, use two or can't carry out during three kind of color paintedly to the painted areas of combination in any, thereby preferably adopt four kinds of colors to carry out painted to the image encryption template.
With reference to Figure 10, Figure 10 is the schematic flow sheet of encryption method one embodiment of the present invention.In Figure 10, image 101 to be encrypted is through over-segmentation and rearrange formation intermediate cryptographic image 103, wherein, treat that encrypted image 101 is cut apart and the method that rearranges to form intermediate cryptographic image 103 is described in detail in the patented claim of " image picture encipher and decryption method " at the title that the applicant submitted on May 27th, 2005, will repeat no more in this application.Variation has taken place at least one cut zone in the image 101 to be encrypted in the intermediate cryptographic image 103 that rearranges back formation, subsequently according to the position at the specific painted areas place on the image encryption template 5 that is pre-created, middle encrypted image 103 is cut apart and arranged according to painted areas specific on the image encryption template 5, form image encryption zone 105, encrypt separately if treat encrypted image 101, image encryption zone 105 is exactly final required encrypted image.
Referring to Figure 11, Figure 11 is the synoptic diagram to another embodiment of encryption method of the present invention.In the present embodiment, image 111 to be encrypted, 131,151 and 171 form intermediate cryptographic image 113 through over-segmentation and after rearranging, 133,153 and 173, again according to the position at the painted areas place of four kinds of particular colors on the image encryption template 8 that is pre-created, respectively with intermediate cryptographic image 113,133,153 and 173 cut apart and place according to painted areas specific on the image encryption template 5 is corresponding one by one, form image encryption zone 115,135,155 and 175, formed image encryption zone 115,135,155 and 175 can be directly as last required encrypted image, perhaps with image encryption district 115,135,155 and 175 are merged together, thereby finish the encryption of all images, produce final desired encrypted image 119.In addition, also intermediate cryptographic image 113,133,153 that can respectively image 111,131,151 to be encrypted and 171 be formed after cutting apart and rearranging and 173 positions according to the painted areas place of four kinds of particular colors on the image encryption template 5 that is pre-created directly are aligned in the same image, can omit follow-up merging process like this.
In addition, encryption method of the present invention can be simultaneously with being aligned in the final encrypted image, so that improve cipher round results with the painted areas of irrelevant other image of encrypted image according to encrypted template.Also can treat encrypted image and carry out repeated segmentation and rearrange, so that improve the cipher round results of intermediate cryptographic image.
When needs are decrypted, can preferentially decipher wherein any width of cloth original image as required, at first from encrypted image, preferentially select a certain specific image and encrypt zone (the image encryption zone of a certain particular color), to cut apart and rearrange according to forming this image encryption zone inverse process again, restore original image.Adopt this method, can accelerate the decrypting process of computing machine.Can certainly decompose four width of cloth images simultaneously, promptly according to the method for zone deciphering, restore original image simultaneously, adopt this method, internal memory that can the reasonable distribution computing machine reaches the purpose of accelerating decrypting process equally.
Above-mentioned detailed description only is exemplary description, and those skilled in the art can design various embodiments according to different actual needs under the situation of the scope and spirit that do not break away from the present invention and protected.

Claims (10)

1. the encryption method of an army fighting, it is characterized in that: described encryption method comprises:
A. create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of described each image encryption template;
B. treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image;
C. described intermediate cryptographic image is cut apart and be aligned in the painted areas of a certain color on the described image encryption template.
2. encryption method according to claim 1 is characterized in that: described image encryption template can be one or more.
3. encryption method according to claim 1 is characterized in that: described painted areas be shaped as polygon, circle or oval.
4. encryption method according to claim 1 is characterized in that: the painted color of described painted areas is at least two kinds.
5. encryption method according to claim 4 is characterized in that: the painted color of described painted areas is four kinds.
6. encryption method according to claim 1, it is characterized in that: described image to be encrypted can be several, wherein, after each described image to be encrypted cut apart and rearrange, respectively each intermediate cryptographic image is aligned to the painted areas of the different colours of described image encryption template.
7. encryption method according to claim 1, it is characterized in that: described image to be encrypted can be several, respectively each described image to be encrypted is cut apart and rearranged and each intermediate cryptographic image is aligned to the painted areas of the different colours of described image encryption template.
8. encryption method according to claim 1 is characterized in that: step b makes the position of at least one cut zone of described image to be encrypted different with the position of cut zone described in the intermediate cryptographic image that forms after rearranging.
9. encryption method according to claim 1 is characterized in that: in step b, described image to be encrypted is carried out repeated segmentation and rearranges formation intermediate cryptographic image.
10. fight of army encrypted image, it is characterized in that: described encrypted image is formed by following steps:
A. create by the painted areas of different colours and arrange the image encryption template that forms, the color difference of the adjacent painted areas of described each image encryption template;
B. treat encrypted image and cut apart and rearrange, form the intermediate cryptographic image;
C. described intermediate cryptographic image is cut apart and be aligned in the painted areas of a certain color on the described image encryption template.
CNB2005100361227A 2005-07-28 2005-07-28 Encryption method for army fighting Expired - Fee Related CN100461211C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100361227A CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100361227A CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Publications (2)

Publication Number Publication Date
CN1904938A true CN1904938A (en) 2007-01-31
CN100461211C CN100461211C (en) 2009-02-11

Family

ID=37674196

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100361227A Expired - Fee Related CN100461211C (en) 2005-07-28 2005-07-28 Encryption method for army fighting

Country Status (1)

Country Link
CN (1) CN100461211C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540823B (en) * 2008-03-21 2011-08-31 富士通株式会社 Image processing apparatus and image processing system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU3560895A (en) * 1995-09-26 1997-04-17 Xian Kan Lin A method for encryption of file
CN1207677C (en) * 2003-06-26 2005-06-22 上海交通大学 Digital waterprint imbedding and extracting method based on remainder image

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540823B (en) * 2008-03-21 2011-08-31 富士通株式会社 Image processing apparatus and image processing system and method

Also Published As

Publication number Publication date
CN100461211C (en) 2009-02-11

Similar Documents

Publication Publication Date Title
CN110417539B (en) A color image encryption method based on dynamic chaos and matrix convolution operation
Wu et al. Sharing visual multi-secrets using circle shares
CN105913368B (en) More image encryptions and authentication method and system based on sparse constraint
US9031228B2 (en) Systems and methods for implementing block cipher algorithms on attacker-controlled systems
CN103455971B (en) The image encryption method that three-dimensional Arnold conversion and chaos sequence combine
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
Kester Image Encryption based on the RGB PIXEL Transposition and Shuffling
CN102795008A (en) Dynamic Mohr encryption method of anti-counterfeiting image
CN107896144A (en) A kind of 3D texture model encryption methods based on chaotic maps
RU2374770C1 (en) Method for steganographical cloaking of information
CN103440613A (en) Color-image encryption method for hyperchaotic Rossler system
MY151920A (en) Fuzzy protection of visual content
CN106301760A (en) A kind of 3D point cloud model encryption method based on chaotic maps
CN107086913A (en) A Colored Two-dimensional Code Encryption and Decryption Method in High Dimensional Chaotic System
CN111105338A (en) Image encryption method based on GAN and chaotic system
Wu et al. Color visual cryptography scheme using meaningful shares
US10787020B2 (en) Security device with a lens array comprising several etched colour patterns
CN104182926B (en) Color image encrypting method based on Hilbert conversion and chaos Liu algorithms
CN106558015A (en) A kind of new intersection composite chaotic multicolor image encryption algorithm
CN100461211C (en) Encryption method for army fighting
CN109586895A (en) A kind of new color image encrypting method
Yang et al. MTVSS:(M) isalignment (T) olerant (V) isual (S) ecret (S) haring on resolving alignment difficulty
Xiao et al. Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption
CN104240177A (en) Colored image encryption method based on chaotic system and fractional order Fourier transform
CN101751658B (en) Image visual separate-management method with minimum pixel expansion and optimal contrast

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211