Search

CN-122027751-A - Information security encryption method based on cloud platform

CN122027751ACN 122027751 ACN122027751 ACN 122027751ACN-122027751-A

Abstract

The invention discloses an information security encryption method based on a cloud platform, which belongs to the technical field of information processing and comprises the following steps of S1, extracting channel values of an image to be encrypted, generating final keys of all channels for pixel points, S2, replacing and confusing to obtain value-level encryption channel values of the pixel points, S3, carrying out iterative operation to determine joint keys of all the pixel points, S4, carrying out cross-channel association to determine secondary encryption channel values of the pixel points, S5, generating RGB matrixes according to the three secondary encryption channel values of the pixel points, and determining an encryption image stored by the cloud platform. The cross-channel secondary encryption realizes three-channel cyclic association, breaks channel independence, avoids single-channel breaking risk, forms complete confusion and diffusion by three-layer operation, and can effectively resist common attack means such as statistical attack, differential attack, pixel correlation analysis and the like by diffusing small changes of single pixels to the whole image.

Inventors

  • YANG XIN
  • MEI HAORAN
  • ZHENG XUE
  • ZHANG XIUYANG
  • Kong Pu

Assignees

  • 四川水利职业技术学院

Dates

Publication Date
20260512
Application Date
20260414

Claims (9)

  1. 1. The information security encryption method based on the cloud platform is characterized by comprising the following steps of: S1, extracting each channel value of an image to be encrypted, and generating a final key of each channel for a pixel point; s2, replacing and confusing according to the final key of each channel of the pixel point to obtain a value-level encryption channel value of the pixel point; S3, carrying out iterative operation according to the value-level encryption channel values of the pixel points, and determining the joint key of each pixel point; S4, performing cross-channel correlation according to the value-level encryption channel value of the pixel point and the joint key, and determining a secondary encryption channel value of the pixel point; S5, generating an RGB matrix according to the three secondary encryption channel values of the pixel points, and determining an encryption image stored by the cloud platform.
  2. 2. The cloud platform-based information security encryption method according to claim 1, wherein the S1 includes the sub-steps of: s11, mirror image filling is carried out on edge pixel points in an image to be encrypted, and 3 multiplied by 3 neighborhood of each pixel point is extracted; S12, taking an average value of channel values corresponding to 3X 3 neighborhood of each pixel point as a neighborhood average value of each channel, taking a standard deviation of channel values corresponding to 3X 3 neighborhood of each pixel point as texture fluctuation values of each channel, wherein the channel values comprise an R channel value, a G channel value and a B channel value; s13, generating random numbers, mapping neighborhood average values of all channels into first keys by using the random numbers, and mapping texture fluctuation values of all channels into second keys; s14, performing exclusive or fusion on the first key and the second key to generate a final key of each channel.
  3. 3. The cloud platform-based information security encryption method according to claim 2, wherein in S13, pixel points are Is a first key of (2) The expression of (2) is: ; Wherein, the Representing pixel points Is used for the channel neighborhood mean value of (1), The first random number is represented by a first random number, A second random number is represented by a second random number, A row of pixel points is represented, A column representing a pixel point; in the S13, the pixel point Is a second key of (2) The expression of (2) is: ; Wherein, the Representing pixel points Is used for the channel texture fluctuation value of (1), The third random number is represented by a number, Representing a fourth random number.
  4. 4. The cloud platform-based information security encryption method according to claim 1, wherein the S2 includes the sub-steps of: S21, converting the final key of each channel and the value of each channel of the pixel point into binary; s22, taking the lowest three bits of the final key of each channel to replace the binary system of each channel value; S23, converting the replacement result into decimal system to obtain a bit-level encryption channel value of the pixel point; s24, according to the bit-level encryption channel values of the pixel points, the channel values of the pixel points are mixed to obtain the value-level encryption channel values of the pixel points.
  5. 5. The cloud platform-based information security encryption method according to claim 4, wherein in S21, the expression for replacing the binary system of each channel value is: ; Wherein, the The most significant bit after the substitution is indicated, The next highest order after the substitution is indicated, The least significant bit after the permutation is indicated, Representing the lowest three bits of value to which the final key corresponds.
  6. 6. The cloud platform based information security encryption method according to claim 4, wherein the S24 includes the sub-steps of: S241, multiplying a bit-level encryption channel value of a pixel point with a final key of each channel to serve as a first nonlinear operation factor; s242, taking the difference between 255 and the final key of each channel of the pixel point as a second nonlinear operation factor; S243, after the first nonlinear operation factor and the second nonlinear operation factor are added, the modulus operation is carried out with 256 to obtain the value-level encryption channel value of the pixel point.
  7. 7. The cloud platform-based information security encryption method according to claim 1, wherein the S3 includes the sub-steps of: s31, taking an average value of three value-level encryption channel values of the pixel points as a channel fusion average value of the pixel points; S32, taking standard deviation of three value-level encryption channel values of the pixel points as channel fusion texture values of the pixel points; S33, extracting a local entropy value of the pixel point; S34, selecting an initial pixel point, multiplying a channel fusion mean value, a channel fusion texture fluctuation value and an entropy value of the initial pixel point, and then performing modulo operation with 256 to serve as an initial iteration value; And S35, iterating the rest pixel points according to the initial iteration value, and determining the joint key of each pixel point.
  8. 8. The cloud platform-based information security encryption method according to claim 7, wherein in S34, the expression for iterating the rest of pixels is: ; Wherein, the Represent the first The joint key of the individual pixels, Represent the first The joint key of the individual pixels, A fifth random number is indicated as such, A sixth random number is indicated as such, The seventh random number is indicated as such, Represent the first The channel fusion means of the individual pixels, Represent the first The channels of the individual pixels fuse texture values.
  9. 9. The cloud platform-based information security encryption method according to claim 7, wherein in S4, pixel points are The secondary encryption channel value of (a) comprises a secondary encryption R channel value, a secondary encryption G channel value and a secondary encryption B channel value, and the expression is as follows: Wherein, the Representing pixel points The R-channel value is encrypted at the value level of (a), Representing pixel points The value level of (c) encrypts the G-channel value, Representing pixel points The B-channel value is encrypted at the value level of (a), Representing the joint key of the pixel point.

Description

Information security encryption method based on cloud platform Technical Field The invention belongs to the technical field of information processing, and particularly relates to an information security encryption method based on a cloud platform. Background With the popularization of cloud computing technology, massive image data are stored, transmitted and shared through a cloud platform, and the security and privacy protection requirements of image information are increasingly urgent. The image encryption is used as a core technology for guaranteeing the safety of cloud platform image data, and the core aim is to enable the encrypted image not to be illegally interpreted by confusing pixel values and diffusion characteristic distribution, ensure that legal users can decrypt the image through a secret key without distortion, and adapt to actual application scenes of cloud platform batch processing, low calculation power consumption and high compatibility. At present, the existing image encryption technology is mainly divided into three types, but has obvious defects in terms of safety, cloud suitability or innovation, and is difficult to meet the high-order requirements of cloud platform image encryption: 1. The traditional symmetric encryption technology (such as AES and DES adaptive image encryption) is characterized in that the technology relies on an external seed set manually to generate a secret key, the secret key multiplexing risk is high, the encryption process only carries out global operation on pixel values, the self visual characteristics (brightness, texture and the like) of the image are not combined, the image is easy to crack by statistical attack and differential attack, meanwhile, the encryption operation complexity is high, the calculation power requirement on batch processing of a large number of images of a cloud platform is not friendly, and the processing efficiency is low. 2. Encryption technology based on pixel scrambling is realized by replacing pixel coordinates or binary bit sequences, but the scrambling rules are mostly in a global fixed mode (such as fixed cyclic shift and random permutation matrix), the confusion and diffusion effects of single scrambling operation are insufficient, the encryption strength is low, an attacker can restore an original image through pixel correlation analysis, and the boundary pixel processing mode is rough, feature deletion is easy to occur, and decryption integrity is influenced. 3. The cloud platform adaptive light encryption technology simplifies the encryption process for adapting to the low computation power requirement of the cloud platform, and adopts single-channel independent encryption and simple exclusive OR operation to generate a key, but has two main core problems that the key generation depends on external parameters, the security depends on seed confidentiality, the key leakage risk is easy to occur, the channel independence is strong, an attacker can reconstruct an image after independently cracking a single channel, and the security protection capability is weak. Disclosure of Invention The invention provides an information security encryption method based on a cloud platform for solving the problems. The technical scheme of the invention is that the information security encryption method based on the cloud platform comprises the following steps: S1, extracting each channel value of an image to be encrypted, and generating a final key of each channel for a pixel point; s2, replacing and confusing according to the final key of each channel of the pixel point to obtain a value-level encryption channel value of the pixel point; S3, carrying out iterative operation according to the value-level encryption channel values of the pixel points, and determining the joint key of each pixel point; S4, performing cross-channel correlation according to the value-level encryption channel value of the pixel point and the joint key, and determining a secondary encryption channel value of the pixel point; S5, generating an RGB matrix according to the three secondary encryption channel values of the pixel points, and determining an encryption image stored by the cloud platform. The pixel values of the three channels are in one-to-one correspondence according to the positions, and are combined into an MxNx3 three-dimensional matrix (M is the number of image rows, N is the number of columns, and 3 represents three RGB channels), so that a complete RGB pixel matrix is formed, and the RGB matrix is encoded into an image format suitable for cloud storage. Further, S1 comprises the following sub-steps: s11, mirror image filling is carried out on edge pixel points in an image to be encrypted, and 3 multiplied by 3 neighborhood of each pixel point is extracted; S12, taking an average value of channel values corresponding to 3X 3 neighborhood of each pixel point as a neighborhood average value of each channel, taking a standard deviation of channel val