CN108881664B - Image storage and opening method, processing equipment, processing system and storage device - Google Patents

Image storage and opening method, processing equipment, processing system and storage device Download PDF

Info

Publication number
CN108881664B
CN108881664B CN201810752663.7A CN201810752663A CN108881664B CN 108881664 B CN108881664 B CN 108881664B CN 201810752663 A CN201810752663 A CN 201810752663A CN 108881664 B CN108881664 B CN 108881664B
Authority
CN
China
Prior art keywords
sequence
image
chaotic
original image
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810752663.7A
Other languages
Chinese (zh)
Other versions
CN108881664A (en
Inventor
刘俊
王宇杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongtou Huaxun Terahertz Technology Co ltd
Original Assignee
Shenzhen Zhongtou Huaxun Terahertz Technology Co Ltd
China Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongtou Huaxun Terahertz Technology Co Ltd, China Communication Technology Co Ltd filed Critical Shenzhen Zhongtou Huaxun Terahertz Technology Co Ltd
Priority to CN201810752663.7A priority Critical patent/CN108881664B/en
Publication of CN108881664A publication Critical patent/CN108881664A/en
Application granted granted Critical
Publication of CN108881664B publication Critical patent/CN108881664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The application discloses an image storage and opening method, processing equipment, a processing system and a storage device, wherein the image storage method comprises the steps of receiving an original image, wherein the original image is obtained by scanning of a millimeter wave security check instrument; encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image; and sending the encrypted image and the key to a storage system for storage. Through the mode, the original image scanned and obtained by the millimeter wave security check instrument can be encrypted and stored.

Description

Image storage and opening method, processing equipment, processing system and storage device
Technical Field
The present application relates to the field of security inspection technologies, and in particular, to an image storage and opening method, a processing device, a processing system, and a storage device.
Background
The millimeter wave security check instrument is a current novel security check device, and utilizes the strong penetrability of millimeter waves to most nonpolar materials and the strong reflectivity to metal materials to detect hidden dangerous goods such as cutters, guns, ammunition and the like.
The inventor of this application discovers at long-term research and development in-process, and millimeter wave security check appearance's security check precision is higher and higher, and its scanning security check personnel obtain the image more and more clear, and security check personnel's privacy problem also urgently needs attention.
Disclosure of Invention
The technical problem mainly solved by the application is to provide an image storage and opening method, processing equipment, a processing system and a storage device, which can encrypt and store an original image obtained by scanning of a millimeter wave security check instrument.
In order to solve the technical problem, the application adopts a technical scheme that: there is provided an image storage method, the method comprising: receiving an original image, wherein the original image is obtained by scanning of a millimeter wave security check instrument; encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image; and sending the encrypted image and the key to a storage system for storage.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided an image opening method, the method including: receiving an instruction of opening an encrypted image, wherein the encrypted image is formed by encrypting an original image obtained by scanning of a millimeter wave security check instrument; downloading the encrypted image from a storage system and obtaining a key corresponding to the encrypted image; decrypting the encrypted image using the key to obtain the original image.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided an image processing apparatus including: a transceiver circuit; and a processing circuit coupled to the transceiver circuit, wherein the processing circuit and the transceiver circuit operate to implement the method of any of the above embodiments.
In order to solve the above technical problem, another technical solution adopted by the present application is: an image processing system is provided, including a first image processing apparatus, a second image processing apparatus, and a storage system; the first image processing device is used for receiving an original image, and the original image is obtained by scanning of a millimeter wave security check instrument; encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image; sending the encrypted image and the key to the storage system for storage; the second image processing device is used for receiving an instruction for opening the encrypted image; downloading the encrypted image from a storage system and obtaining a key corresponding to the encrypted image; decrypting the encrypted image using the key to obtain the original image.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided a device having a storage function, on which program data is stored, the program data being executable by a server to implement the method described in any of the above embodiments.
The beneficial effect of this application is: different from the prior art, the storage method provided by the application comprises the following steps: and receiving an original image obtained by scanning of the millimeter wave security check instrument, and encrypting and storing the original image so as to protect the privacy of security check personnel and prevent the privacy from being stolen by non-working personnel.
In addition, in the image opening method provided by the application, only the internal software of the system can view the original image, even if an unauthorized user obtains the encrypted image, the illegal user cannot view the original image as long as the secret key and the encryption and decryption algorithm are not leaked.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
FIG. 1 is a schematic flow chart diagram illustrating an embodiment of an image storage method according to the present application;
FIG. 2 is a schematic flow chart of one embodiment of step S102 in FIG. 1;
FIG. 3 is a schematic flow chart diagram illustrating an embodiment of an image opening method according to the present application;
FIG. 4 is a schematic flow chart of one embodiment of step S303 in FIG. 3;
FIG. 5 is a schematic structural diagram of an embodiment of an image processing apparatus according to the present application;
FIG. 6 is a schematic diagram of an embodiment of an image processing system according to the present application;
fig. 7 is a schematic structural diagram of an embodiment of the device with a storage function according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an embodiment of an image storage method according to the present application, where the method is based on a first image processing device, and the first image processing device may be a communication server, and the image storage method includes:
s101: and receiving an original image, wherein the original image is obtained by scanning of a millimeter wave security check instrument.
Specifically, in one embodiment, the step S101 includes, before, the display workstation sending a human body scanning instruction to the millimeter wave security check instrument; the millimeter wave security check instrument scans a human body after receiving a human body scanning instruction to generate a human body scanning image, namely an original image; the millimeter wave security check instrument sends the original image to a display workstation, the display workstation transmits the original image to first image processing equipment in a wireless network or Bluetooth mode, and the first image processing equipment transmits the original image to a picture judging workstation for manual picture judgment on one hand and performs subsequent processing on the original image on the other hand.
S102: the original image is encrypted to form an encrypted image and a key corresponding to the encrypted image is generated.
Specifically, in one embodiment, the step S102 includes: the original image is encrypted using a Logistic algorithm to form an encrypted image. The Logistic Logistic algorithm is a chaotic encryption algorithm, the principle is that original images are overlapped with chaotic sequences to realize encryption of the original images, and the decryption method is to realize decryption by adopting a chaotic sequence reproduction method.
In an application scenario, the encrypting the original image by using the Logistic algorithm to form an encrypted image specifically includes:
s201: presetting a branch parameter mu0And an initial chaotic parameter x0Wherein 3.569945672 < mu0≤4,0<x0<1。
Specifically, when 3.569945672 < μ0When the logical stutty Logistic mapping table is less than or equal to 4, the logical stutty Logistic mapping table shows chaotic characteristics, the generated numerical value sequence has the characteristics of no periodicity and no repetition, and mu0Can be 3.6, 3.7, 3.8, 3.9, 4, etc., x0Can get0.1, 0.2, 0.5, 0.8, etc. Due to the chaotic nature of Logistic mapping, x is twice0The differences are very small and the sequences produced after many iterations are also quite different. For example when mu0When 3.89765, x00.67856431 and 0.67856432, respectively, the sequence differences resulting from 100 iterations are very large. Thus the initial value x of each scanned image0May be different or the same. In addition, the branch parameter μ corresponding to different original images0And may be the same or different.
S202: using a predetermined branch parameter mu0Initial chaotic parameter x0And obtaining a first sequence containing M chaotic parameters in an iterative mode, wherein the size of M is the same as the total number of pixel points of the original image.
Specifically, in an embodiment, before the step S202, the total number of pixel points of the original image may be obtained in advance as M, and then the first sequence is obtained by using the following mapping formula:
xk+1=μ0xk(1-xk);
wherein, mu0Is a preset branch parameter; k is a subscript and is an integer ≧ 0, e.g., k ≧ 0,1,2,3 … … M, xkIs a chaotic parameter corresponding to subscript k, xk+1The first sequence is a chaotic parameter corresponding to the subscript k + 1: x is the number of1,x2,.....,xMOf course, in other embodiments, the first sequence may be defined as: x is the number of0,x1,x2,.....,xM
S203: all chaotic parameters in the first sequence are converted into integers between 0 and 255 to form a second sequence.
Specifically, in one embodiment, this step S203 includes: and uniformly amplifying all chaotic parameters in the first sequence by 100000 times, and then performing modulus operation on 256 to obtain a second sequence in an integer form between 0 and 255. This step is intended to prepare for the subsequent step S204, because the intensity value of the color component of each pixel point is between 0 and 255, and the subsequent step S204 is facilitated after the first sequence is converted into the second sequence of integers between 0 and 255 through the modulo operation.
S204: and performing exclusive or processing on each color component value of each pixel point in the original image and the corresponding integer form chaotic parameter in the second sequence to obtain each processed color component value of each pixel point and further obtain the encrypted image, wherein one pixel point only corresponds to one integer form chaotic parameter.
Specifically, in one embodiment, the manner of implementing the step S204 may be: numbering all pixel points in an original image line by line from left to right or from right to left in sequence, wherein the numbering is 1,2,3 … … and M in sequence; then, the pixel points in the original image are processed one by one according to the following method until all the pixel points are processed: obtaining the color component value corresponding to R, G, B of the pixel point with current number L and the color component value corresponding to x in the second sequenceLCorresponding integer value PLSeparately, the corresponding color component value of R, G, B and PLAnd performing exclusive-or processing to obtain the processed R ', G ' and B ', and recombining the processed R ', G and B ' values into a pixel point, thereby forming a pixel point of the encrypted image. Of course, in other embodiments, the numbering may be performed in other manners, such as column-by-column top-to-bottom or bottom-to-top, etc.
In another embodiment, the manner of implementing the step S204 may be: assuming that an original image comprises A × B pixel points, each pixel point has a corresponding coordinate, the initial point of the coordinate is (1, 1), and the end point is (A, B); generating corresponding coordinates by each integer in the second sequence formed in the step S203, where the start of the coordinates is (1, 1) and the end of the coordinates is (a, B); processing the pixel points in the original image one by one according to the following method until all the pixel points are processed: obtaining an integer value P in a second sequence corresponding to the current pixel point coordinateLObtaining R, G, B color component values corresponding to the current pixel point, and respectively comparing R, G, B color component values with PLXOR processing to obtain processed R ', G ' and B ', and re-synthesizing the processed R ', G and B ' into a pixel pointAnd a pixel point of the encrypted image is formed.
Of course, in other embodiments, other encryption methods in the prior art may be used to encrypt the original image, which is not limited in this application.
S103: and sending the encrypted image and the key to a storage system for storage.
Specifically, in an embodiment, the storage system includes a database and a storage server, and the step S103 specifically includes: and sending the key to a database for storage, and sending the encrypted image to a storage server for storage. That is, the key and the encrypted image are stored separately, but in other embodiments, the key and the encrypted image may also be stored together, which is not limited in this application. In an application scenario, a key metadata table is preset in a database, and the key metadata table is updated correspondingly every time a key is obtained. In another application scenario, the storage server may store the encrypted image and information such as a file name corresponding to the encrypted image at the same time, so that the encrypted image may be obtained later based on the information such as the file name.
In another embodiment, step S103 further includes, before: and obtaining the message digest algorithm fifth version MD5 value of the encrypted image, wherein the message digest algorithm MD5 value corresponds to the digital fingerprint of the encrypted image, and the message digest algorithm MD5 value of each encrypted image is different. The above-mentioned secret key includes: fifth version of message digest algorithm MD5 value, preset branch parameter mu0And a first sequence.
Referring to fig. 3, fig. 3 is a flowchart illustrating an embodiment of an image opening method according to the present application, where the method is based on a second image processing device, and the second image processing device may be a network server, and the method includes:
s301: and receiving an instruction of opening an encrypted image, wherein the encrypted image is formed by encrypting an original image obtained by scanning of the millimeter wave security check instrument.
Specifically, in one embodiment, a worker logs into the system from a web browser and accesses a scan record list page, where each record of the scan record list stores image information generated by each scan: file address, file name, device ID, creation time, etc.; when the worker selects one record in the list and views the image, the second image processing apparatus receives an instruction to open the encrypted image.
S302: the encrypted image is downloaded from the storage system and a key corresponding to the encrypted image is obtained.
Specifically, in an embodiment, the storage system includes a database and a storage server, and the step S302 specifically includes: downloading the encrypted image from the storage server; a key corresponding to the encrypted image is obtained from a database.
In another embodiment, the obtaining of the key corresponding to the encrypted image in step S302 includes: obtaining a message digest algorithm fifth version MD5 value of the encrypted image; calling a key metadata table pre-stored in a storage system to obtain a key containing a message digest algorithm fifth version MD5 value, wherein the key comprises: fifth version of message digest algorithm MD5 value, preset branch parameter mu0And the first sequence comprises M chaotic parameters, and the size of M is the same as the total number of pixel points of the original image. Since the message digest algorithm MD5 value is different for each encrypted image, the key uniquely corresponding to the encrypted image may be retrieved from the message digest algorithm MD5 value.
S303: the encrypted image is decrypted using the key to obtain the original image.
Specifically, in an embodiment, please refer to fig. 4, fig. 4 is a schematic flowchart illustrating an embodiment of step S303 in fig. 3, where the step S303 includes:
s401: converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence; for example, after all chaotic parameters in the first sequence are uniformly amplified by 100000 times, the modulus of 256 is taken, and then the second sequence in the form of an integer between 0 and 255 is obtained.
S402: and performing exclusive or processing on each color component value of each pixel point in the encrypted image and the corresponding integer form chaotic parameter in the second sequence to obtain each processed color component value of each pixel point and further obtain the decrypted original image, wherein one pixel point only corresponds to one integer form chaotic parameter. Specifically, the step is similar to the step S204, and is not described herein again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an embodiment of an image processing apparatus according to the present application. The image processing device provided by the application can be a communication server, a network server and the like, and comprises a transceiver circuit 101 and a processing circuit 102; the processing circuit 101 is coupled to the transceiver circuit 102, and when the processing circuit 101 and the transceiver circuit 102 operate, the steps in the image storage method or the steps in the image opening method in any of the above embodiments are performed. Of course, in other embodiments, the image processing apparatus may include other devices, such as a display circuit, and the like, which is not limited in this application.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of an image processing system according to the present application, where the image processing system includes a first image processing apparatus 201, a second image processing apparatus 202, and a storage system 203.
In an application scenario, the first image processing device 201 may be a communication server, and the first image processing device 201 is configured to receive an original image, where the original image is obtained by scanning with a millimeter wave security check device; encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image; the encrypted image and the key are sent to the storage system 203 for storage.
In another application scenario, the second image processing device 202 may be a web server, or a client plus a web server, and the second image processing device 202 is configured to receive an instruction to open an encrypted image; downloading the encrypted image from the storage system 203 and obtaining a key corresponding to the encrypted image; the encrypted image is decrypted using the key to obtain the original image.
In yet another application scenario, where the encrypted image and the key are stored separately, the storage system 203 provided herein includes a database 204 and a storage server 205, the key is stored in the database 204, and the encrypted image is stored in the storage server 205.
In still another application scenario, the image processing system provided by the present application may further include other components, such as a display workstation, a mapping workstation, a millimeter wave security check device, and the like, which is not limited in this application.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an embodiment of a device with storage function 30 according to the present application, in which program data 300 is stored on the device with storage function, and when the program data 300 is executed by a processor, the steps in the image storage method or the image opening method in any of the embodiments are implemented. In one application scenario, the device 30 with a storage function may be a usb disk, a hard disk, or the like.
In summary, unlike the prior art, the storage method provided by the present application includes: and receiving an original image obtained by scanning of the millimeter wave security check instrument, and encrypting and storing the original image so as to protect the privacy of security check personnel and prevent the privacy from being stolen by non-working personnel. In addition, in the image opening method provided by the application, only the internal software of the system can view the original image, even if an unauthorized user obtains the encrypted image, the illegal user cannot view the original image as long as the secret key and the encryption and decryption algorithm are not leaked.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (5)

1. An image storage method, characterized in that the method comprises:
receiving an original image, wherein the original image is obtained by scanning of a millimeter wave security check instrument;
encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image;
sending the encrypted image and the secret key to a storage system for storage;
the encrypting the original image to form an encrypted image includes:
encrypting the original image by using a Logistic algorithm to form an encrypted image;
the encrypting the original image using a Logistic algorithm to form an encrypted image, comprising:
presetting a branch parameter mu0And an initial chaotic parameter x0Wherein 3.569945672 < mu0≤4,0<x0<1;
Using the preset branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative mode, wherein the size of M is the same as the total number of pixel points of the original image;
converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence;
performing exclusive or processing on each color component value of each pixel point in the original image and the corresponding integer form chaotic parameter in the second sequence to obtain each color component value of each pixel point after processing, and further obtain the encrypted image, wherein one pixel point only corresponds to one integer form chaotic parameter;
the performing xor processing on each color component value of each pixel point in the original image and the corresponding chaotic parameter in the integer form in the second sequence includes:
numbering all pixel points in the original image line by line from left to right or from right to left in sequence in advance to obtain each color component value of the pixel point with the current number L and x in the second sequenceLCorresponding integer value PLRespectively calculating the color component values and integer values P of the pixels with current serial numbers LLPerforming exclusive or processing; or
Setting the original image to include A x B pixel points, each pixel point having corresponding coordinates, and generating corresponding integer in the second sequenceObtaining an integer value P in the second sequence corresponding to the coordinate of the current pixel pointLRespectively comparing each color component value of the current pixel point with an integer value PLPerforming exclusive or processing;
before the generating a key corresponding to the encrypted image, the method further comprises: obtaining an MD5 value of a fifth version of a message digest algorithm of the encrypted image; the key includes: the fifth version MD5 value and the preset branch parameter mu of the message digest algorithm0And the first sequence;
the storage system comprises a database and a storage server, and the step of sending the encrypted image and the secret key to the storage system for storage comprises the following steps: sending the key to the database for storage, and sending the encrypted image to the storage server for storage;
said utilizing said predetermined branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative manner includes:
the first sequence is obtained by calculation by using the following mapping formula:
xk+1=μ0xk(1-xk);
wherein, mu0Setting the preset branch parameters; k is subscript and is an integer of 0 or more, xkIs a chaotic parameter corresponding to subscript k, xk+1Is a chaotic parameter corresponding to a subscript k + 1;
the converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence comprises:
and uniformly amplifying all chaotic parameters in the first sequence by 100000 times, and then performing modulus operation on 256 to obtain the second sequence in an integer form between 0 and 255.
2. An image opening method, characterized in that the method comprises:
receiving an instruction of opening an encrypted image, wherein the encrypted image is formed by encrypting an original image obtained by scanning of a millimeter wave security check instrument;
downloading the encrypted image from a storage system and obtaining a key corresponding to the encrypted image;
decrypting the encrypted image using the key to obtain the original image;
wherein the original image is encrypted using a Logistic logic algorithm to form an encrypted image;
the encrypting the original image using a Logistic algorithm to form an encrypted image, comprising:
presetting a branch parameter mu0And an initial chaotic parameter x0Wherein 3.569945672 < mu0≤4,0<x0<1;
Using the preset branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative mode, wherein the size of M is the same as the total number of pixel points of the original image;
converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence;
performing exclusive or processing on each color component value of each pixel point in the original image and the corresponding integer form chaotic parameter in the second sequence to obtain each color component value of each pixel point after processing, and further obtain the encrypted image, wherein one pixel point only corresponds to one integer form chaotic parameter;
the performing xor processing on each color component value of each pixel point in the original image and the corresponding chaotic parameter in the integer form in the second sequence includes:
numbering all pixel points in the original image line by line from left to right or from right to left in sequence in advance to obtain each color component value of the pixel point with the current number L and x in the second sequenceLCorresponding integer value PLRespectively calculating the color component values and integer values P of the pixels with current serial numbers LLPerforming exclusive or processing; or
Setting the original image to include A × B pixel points, each pixel point having corresponding coordinates, generating corresponding coordinates for each integer in the second sequence, and obtaining an integer value P in the second sequence corresponding to the coordinates of the current pixel pointLRespectively comparing each color component value of the current pixel point with an integer value PLPerforming exclusive or processing;
the obtaining a key corresponding to the encrypted image includes:
obtaining a message digest algorithm fifth version MD5 value of the encrypted image;
calling a key metadata table pre-stored in the storage system to obtain a key containing the MD5 value of the fifth version of the message digest algorithm, wherein the key comprises: the fifth version MD5 value and the preset branch parameter mu of the message digest algorithm0The first sequence comprises M chaotic parameters, and the size of M is the same as the total number of pixel points of the original image;
the storage system includes a database and a storage server, the downloading the encrypted image from the storage system and obtaining a key corresponding to the encrypted image includes: downloading the encrypted image from the storage server; obtaining the key corresponding to the encrypted image from the database;
said utilizing said predetermined branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative manner includes:
the first sequence is obtained by calculation by using the following mapping formula:
xk+1=μ0xk(1-xk);
wherein, mu0Setting the preset branch parameters; k is subscript and is an integer of 0 or more, xkIs a chaotic parameter corresponding to subscript k, xk+1Is a chaotic parameter corresponding to a subscript k + 1;
the converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence comprises:
and uniformly amplifying all chaotic parameters in the first sequence by 100000 times, and then performing modulus operation on 256 to obtain the second sequence in an integer form between 0 and 255.
3. An image processing apparatus characterized by comprising:
a transceiver circuit;
processing circuitry coupled to the transceiver circuitry, the processing circuitry when in operation with the transceiver circuitry implementing the method of claim 1 or 2.
4. An image processing system characterized by comprising a first image processing apparatus, a second image processing apparatus, and a storage system;
the first image processing device is used for receiving an original image, and the original image is obtained by scanning of a millimeter wave security check instrument; encrypting the original image to form an encrypted image and generating a key corresponding to the encrypted image; sending the encrypted image and the key to the storage system for storage;
the second image processing device is used for receiving an instruction for opening the encrypted image; downloading the encrypted image from a storage system and obtaining a key corresponding to the encrypted image; decrypting the encrypted image using the key to obtain the original image;
wherein the original image is encrypted using a Logistic logic algorithm to form an encrypted image;
the encrypting the original image using a Logistic algorithm to form an encrypted image, comprising:
presetting a branch parameter mu0And an initial chaotic parameter x0Wherein 3.569945672 < mu0≤4,0<x0<1;
Using the preset branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative mode, wherein the size of M is the same as the total number of pixel points of the original image;
Converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence;
performing exclusive or processing on each color component value of each pixel point in the original image and the corresponding integer form chaotic parameter in the second sequence to obtain each color component value of each pixel point after processing, and further obtain the encrypted image, wherein one pixel point only corresponds to one integer form chaotic parameter;
the performing xor processing on each color component value of each pixel point in the original image and the corresponding chaotic parameter in the integer form in the second sequence includes:
numbering all pixel points in the original image line by line from left to right or from right to left in sequence in advance to obtain each color component value of the pixel point with the current number L and x in the second sequenceLCorresponding integer value PLRespectively calculating the color component values and integer values P of the pixels with current serial numbers LLPerforming exclusive or processing; or
Setting the original image to include A × B pixel points, each pixel point having corresponding coordinates, generating corresponding coordinates for each integer in the second sequence, and obtaining an integer value P in the second sequence corresponding to the coordinates of the current pixel pointLRespectively comparing each color component value of the current pixel point with an integer value PLPerforming exclusive or processing;
the storage system comprises a database and a storage server, the key is stored in the database, and the encrypted image is stored in the storage server;
the key includes: the fifth version MD5 value and the preset branch parameter mu of the message digest algorithm0And the first sequence;
said utilizing said predetermined branch parameter mu0Initial chaotic parameter x0Obtaining a first sequence containing M chaotic parameters in an iterative manner includes:
the first sequence is obtained by calculation by using the following mapping formula:
xk+1=μ0xk(1-xk);
wherein, mu0Setting the preset branch parameters; k is subscript and is an integer of 0 or more, xkIs a chaotic parameter corresponding to subscript k, xk+1Is a chaotic parameter corresponding to a subscript k + 1;
the converting all chaotic parameters in the first sequence into integers between 0 and 255 to form a second sequence comprises:
and uniformly amplifying all chaotic parameters in the first sequence by 100000 times, and then performing modulus operation on 256 to obtain the second sequence in an integer form between 0 and 255.
5. An apparatus having a storage function, on which program data is stored, characterized in that the program data is executed by a server to implement the method of claim 1 or 2.
CN201810752663.7A 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device Active CN108881664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810752663.7A CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810752663.7A CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Publications (2)

Publication Number Publication Date
CN108881664A CN108881664A (en) 2018-11-23
CN108881664B true CN108881664B (en) 2021-03-19

Family

ID=64300750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810752663.7A Active CN108881664B (en) 2018-07-10 2018-07-10 Image storage and opening method, processing equipment, processing system and storage device

Country Status (1)

Country Link
CN (1) CN108881664B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995690A (en) * 2019-11-28 2020-04-10 深圳供电局有限公司 Secure storage method and device based on cloud storage
CN114339282A (en) * 2021-12-27 2022-04-12 上海哔哩哔哩科技有限公司 Method and device for transmitting anchor image picture in live broadcast interaction

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
KR101677110B1 (en) * 2016-03-14 2016-11-17 주식회사우경정보기술 Watermark extracting and insertion apparatus for video forgery detection and prevention based zero-knowledge and the method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610408A (en) * 2008-06-16 2009-12-23 北京智安邦科技有限公司 Video protection disorder method and structure
CN201860384U (en) * 2010-08-02 2011-06-08 华南师范大学 Video encryption camera
CN103916234B (en) * 2014-04-11 2016-09-07 中国人民解放军沈阳军区总医院 A kind of chaos medical image encryption method being applied to secret protection
CN104182926B (en) * 2014-07-25 2017-11-14 南京邮电大学 Color image encrypting method based on Hilbert conversion and chaos Liu algorithms

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
KR101677110B1 (en) * 2016-03-14 2016-11-17 주식회사우경정보기술 Watermark extracting and insertion apparatus for video forgery detection and prevention based zero-knowledge and the method thereof

Also Published As

Publication number Publication date
CN108881664A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
US20030048908A1 (en) System and method for protecting the content of digital cinema products
CN105590040B (en) For the method and system of the Digital Right Management of encrypted digital content
CN107454558B (en) Method for achieving Bluetooth automatic connection of master device and slave device through shared information
CN104424409A (en) Application unlocking method and device
JP2009200847A (en) Image encryption apparatus, image decryption apparatus, image encryption method, image decryption method, and image encryption program
CN108881664B (en) Image storage and opening method, processing equipment, processing system and storage device
Nunna et al. Secure data transfer through internet using cryptography and image steganography
Faraoun Design of a new efficient and secure multi-secret images sharing scheme
Rachmawati et al. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
CN109120576B (en) Data sharing method and device, computer equipment and storage medium
CN113726766A (en) Offline identity authentication method, system and medium
CN106452755B (en) The method, apparatus and system of resetting protection password based on client decryption ciphertext
US11276138B2 (en) Image data encryption and rendering system
CN111031352B (en) Audio and video encryption method, security processing method, device and storage medium
CN113497787B (en) File transmission method, equipment and system
CN103220551A (en) Digital resource encryption and decryption system and method based on image processing
CN111385083B (en) Key protection method and key protection system
Li et al. A novel image protection cryptosystem with only permutation stage: multi-shuffling process
US20210143977A1 (en) Method for encoding, transmitting and/or storing and decoding digital information in an unbreakable manner
US11088824B2 (en) Method and apparatus for use in information processing
CN114222260B (en) Peer-to-peer short message transmission method, system, equipment and computer storage medium
KR102564618B1 (en) Encryption system and method using media content file of sender or receiver
JP2006085456A (en) Data distribution system, device and program
CN115225771B (en) Method and device for hiding reversible information of encrypted image and computer equipment
Khan Prudently Secure Information Theoretic LSB Steganography for Digital Grayscale Images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Applicant after: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.

Address before: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Applicant before: SHENZHEN CCT THZ TECHNOLOGY Co.,Ltd.

Applicant before: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20210630

Granted publication date: 20210319

PD01 Discharge of preservation of patent
PD01 Discharge of preservation of patent

Date of cancellation: 20230421

Granted publication date: 20210319

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230613

Address after: 518000 Shenzhen, Baoan District, Xixiang, Guangdong Xixiang street, thirty-seventh fields, 430 estate.

Patentee after: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Address before: 518102 room 430, building 37, chentian Industrial Zone, Baotian 1st Road, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen Zhongtou Huaxun Terahertz Technology Co.,Ltd.

Patentee before: CHINA COMMUNICATION TECHNOLOGY Co.,Ltd.