ENCRYPTION METHOD
First Claim
Patent Images
1. A method of encrypting a set of two-dimensional (2D) input data, the method comprising the steps of(a) providing a 2D hash array;
- (b) performing a transform operation on the 2D hash array;
(c) generating a binary pseudorandom map based on the transformed 2D hash array; and
(d) generating an encrypted 2D data set by performing a logical XOR operation using the binary pseudorandom map and the bit stream version of the 2D input data.
1 Assignment
0 Petitions
Accused Products
Abstract
There is described a method of encrypting a set of 2D input data, preferably image data. The method comprises obtaining the hash value of a password and re-sizing the hash value to fir the size of the 2D input data. The re-sized data is transformed using an irreversible transform, and the output of the transform is then used to encode the 2D data.
45 Citations
46 Claims
-
1. A method of encrypting a set of two-dimensional (2D) input data, the method comprising the steps of
(a) providing a 2D hash array; -
(b) performing a transform operation on the 2D hash array; (c) generating a binary pseudorandom map based on the transformed 2D hash array; and (d) generating an encrypted 2D data set by performing a logical XOR operation using the binary pseudorandom map and the bit stream version of the 2D input data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 42)
-
-
24. A method of encrypting a set of two-dimensional (2D) input data, the method comprising the steps of:
-
(a) providing a one-dimensional (1D) hash string H(P); (b) resizing the 1D hash string H(P) to a 2D hash string; (c) performing a transform operation on the 2D hash string; and (d) encoding the set of 2D input data to be encrypted based on the transformed 2D hash string to provide an encrypted 2D data set. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
43. A computer program product comprises a computer readable medium on which computer instructions are stored which when executed in a computing device are arranged to encrypt a set of two-dimensional (2D) input data by:
-
(a) providing a 2D hash array; (b) performing a transform operation on the 2D hash array; (c) generating a binary pseudorandom map based on the transformed 2D hash array; and (d) generating an encrypted 2D data set by performing a logical XOR operation using the binary pseudorandom map and the bit stream version of the 2D input data.
-
-
44. An encryption system for encrypting a set of two-dimensional (2D) input data, the system comprising:
-
(a) an input device operable to receive a set of 2D input data; (b) an output device operable to output an encrypted 2D data set; and (c) a processor, the processor operable to; a. provide a one-dimensional (1D) hash string H(P); b. resize the 1D hash string H(P) to a 2D hash string; c. perform a transform operation on the 2D hash string; and d. encode the set of 2D input data to be encrypted based on the transformed 2D hash string to provide an encrypted 2D data set.
-
-
45. An encryption system for encrypting a set of two-dimensional (2D) input data, the system comprising:
-
(a) an input device operable to receive a set of 2D input data; (b) an output device operable to output an encrypted 2D data set; and (c) a processor, the processor operable to; a. provide a 2D hash array; b. perform a transform operation on the 2D hash array; c. generate a binary pseudorandom map based on the transformed 2D hash array; and d. generate an encrypted 2D data set by performing a logical XOR operation using the binary pseudorandom map and the bit stream version of the 2D input data.
-
-
46. A computer program product comprises a computer readable medium on which computer instructions are stored which when executed in a computing device are arranged to decrypt a set of two-dimensional (2D) input data by:
-
(a) providing a 1D has string H(P); (b) resizing the 1D hash string H(P) to a 2D hash string; (c) performing a transform operation on the 2D hash string; and (d) decoding the set of encrypted 2D data based on the transformed 2D hash string to provide a decrypted 2D data set.
-
Specification