Font Size: a A A

Research On Encryption Method Based On Coordinate Transformation

Posted on:2022-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:R H YuanFull Text:PDF
GTID:2518306350486774Subject:Surveying the science and technology
Abstract/Summary:PDF Full Text Request
With the advent of the data age,the confidentiality of sensitive data is very important in the process of data transmission.It needs to be encrypted before the transmission of sensitive data.However,in the current data encryption method,for a certain type of data the encryption method is relatively complete,but there is no method that can uniformly encrypt text,vector,and image data.This paper proposes an encryption model based on location transformation,and realizes the universal encryption of text,vector,and image data based on the idea of coordinate transformation in cartography.(1)According to the characteristics of Hanyu Pinyin and common punctuation marks,a text comparison table is made,and the coding rules of Chinese characters are determined to rasterize the text;for vector data,the coordinates of the points constituting the vector are extracted and rasterized;The data is rasterized using the storage structure of the image.The rasterization of the three types of data is realized,and the encrypted format is unified.(2)Based on the idea of coordinate transformation in cartography,with translation,rotation,and zoom as the core of encryption,an encryption model based on position transformation is constructed.(3)Use the year,month,day,hour,minute,second,and week of the current time as the public key for encryption,and use the exponential function as the private key to calculate the encryption parameters,and the matrix and rasterization calculated by the encryption parameters After the text,vector,and image data are matrix products,the matrix obtained after the product is the encrypted data.The encryption method with time as the public key and function as the private key unifies the encryption method.Using time as the public key ensures that the encryption is time sensitive and has advantages in the management of the private key.The specially selected encryption function guarantees the encryption the data is wirelessly related to the original data,which increases the security of encryption.(4)Experiments were carried out on the encryption model with different types of test data.The experimental verification proved that the position transformation encryption model is effective for different types of encrypted data.Based on position transformation are compared.It is proved through examples that the encryption model based on position transformation proposed in this paper is compared with the three commonly used encryption methods.Encryption of the three types of data is more efficient,and retains its original data characteristics and coordinate accuracy for vectors.Compared with image encryption based on chaotic Logistic mapping,it retains its original resolution and achieves lossless encryption.
Keywords/Search Tags:Rasterization, encryption algorithm, data encryption, location transformation
PDF Full Text Request
Related items