CN109819138A - A kind of method and system of monitoring field sampling - Google Patents

A kind of method and system of monitoring field sampling Download PDF

Info

Publication number
CN109819138A
CN109819138A CN201910082251.1A CN201910082251A CN109819138A CN 109819138 A CN109819138 A CN 109819138A CN 201910082251 A CN201910082251 A CN 201910082251A CN 109819138 A CN109819138 A CN 109819138A
Authority
CN
China
Prior art keywords
information
data
executor
location information
scene
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910082251.1A
Other languages
Chinese (zh)
Other versions
CN109819138B (en
Inventor
解鑫
李文攀
陈鑫
许秀艳
白雪
嵇晓燕
王妍
杨凯
孙宗光
王正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA ENVIRONMENTAL MONITORING GENERAL STATION
Original Assignee
CHINA ENVIRONMENTAL MONITORING GENERAL STATION
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA ENVIRONMENTAL MONITORING GENERAL STATION filed Critical CHINA ENVIRONMENTAL MONITORING GENERAL STATION
Priority to CN201910082251.1A priority Critical patent/CN109819138B/en
Publication of CN109819138A publication Critical patent/CN109819138A/en
Application granted granted Critical
Publication of CN109819138B publication Critical patent/CN109819138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application discloses a kind of method and systems of monitoring field sampling, are related to environmental monitoring technology field, solve the technical problem of the data falseness caused in the prior art by GPS location fraud.The method of the monitoring field sampling of the application, includes the following steps: to receive field data;Field data is parsed, location information is obtained;Judge executor whether at the scene according to location information;At the scene in response to executor, the sampled data that executor returns is received.The application is mainly used for monitoring sampling.

Description

A kind of method and system of monitoring field sampling
Technical field
This application involves environmental monitoring technology fields, and in particular to a kind of method and system of monitoring field sampling.
Background technique
In the prior art, the usual way for recording the position of field data is exactly that the longitude and latitude in record location at that time is sentenced It is disconnected whether to reach designated position.But falseness can be arranged through the analog position function of mobile phone in the longitude and latitude in location at that time GPS information, and false GPS information is fed back into system, thus the problem of appearance position falseness.Position falseness will lead to Data are false, and live technical work cannot be protected, damage the interests of client.
Summary of the invention
The purpose of the application is to propose a kind of method and system of monitoring field sampling, lead in the prior art for solving Cross the technical problem for the data falseness that GPS location fraud causes.
The method of the monitoring field sampling of the application, includes the following steps: to receive field data;Field data is parsed, is obtained Obtain location information;Judge executor whether at the scene according to location information;At the scene in response to executor, executor is received to return Sampled data.
Optionally, location information includes the longitude and latitude in GPS information, the longitude and latitude in image information, obtains location information Time, image information photo opporunity stamp and convert the ciphertext of encrypted image information.
Preferably, judge whether method at the scene includes: the position extracted in location information to executor according to location information Confidence breath and temporal information;The data accuracy of Extracting Information is judged;It is accurate in response to the data of Extracting Information, to figure As information carries out conversion encryption, acquisition ciphertext;The ciphertext of acquisition is compared with the ciphertext in field data;In response to obtaining Ciphertext it is consistent with the ciphertext in field data, the data of image information are accurate;It is accurate in response to the data of image information, judgement Executor is at the scene.
Preferably, the method data accuracy of Extracting Information judged include: by the location information of extraction and when Between information be compared respectively with the corresponding informance prestored;Compare extraction location information and the location information prestored, extract Whether the difference of temporal information and the temporal information prestored is in threshold range;Location information, temporal information in response to extraction Difference in threshold range, the data of Extracting Information are accurate.
Preferably, conversion encryption is carried out to image information, the method for obtaining ciphertext includes: to extract the longitude and latitude of live image Degree, photo opporunity stamp, and live image is converted into matrix;By the longitude and latitude of live image, photo opporunity stamp and matrix difference It is converted into information flow;Information flow is converted into ciphertext by Encryption Algorithm.
Optionally, in response to the location information of extraction, the difference of temporal information any difference outside threshold range, judgement Executor at the scene, does not send executor to client and does not instruct at the scene.
Optionally, inconsistent in response to the ciphertext in the ciphertext and field data of acquisition, the data inaccuracy of image information, Judge that executor at the scene, does not send executor to client and do not instruct at the scene.
Optionally, image information is RGB image.
The method of the monitoring field sampling of the application, on the one hand, distinguish the location information in location information, temporal information It is compared with the location information prestored, demonstrates the accuracy of location information;On the one hand, by the image information in field data Encrypted authentication is carried out, image information is avoided and is distorted in transmission process, ensure that the accuracy of data.
The system that the application also proposes a kind of monitoring field sampling, the side suitable for monitoring field as described above sampling Method, comprising:
First receiving module, for receiving field data;
Parsing module obtains location information for parsing field data;
Judgment module, for judging executor whether at the scene according to location information;
Second receiving module, at the scene, receiving the sampled data that executor returns in response to executor.
The system of the monitoring field sampling of the application is consistent with the technical effect of method that the monitoring field of the application samples, It does not just repeat one by one herein.
The application also proposes a kind of client, comprising:
Station acquisition unit, location information and image information for collection site;
Encryption unit obtains the ciphertext of image information for converting encrypted image information;
Input unit, for inputting the sampled data at scene;
Transmission unit, for sending data.
The client of the application encrypts the image information in field data, avoids image information and is being transmitted across It is distorted in journey, ensure that the accuracy of data.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application can also be obtained according to these attached drawings other for those of ordinary skill in the art Attached drawing.
Fig. 1 is the flow chart of the method for the monitoring field sampling of the application;
Fig. 2 be judge executor whether the flow chart of method at the scene;
Fig. 3 is the flow chart judged the data accuracy of location information;
Fig. 4 is that the application to image information carries out conversion encryption, obtains the flow chart of ciphertext;
Fig. 5 is the flow chart that information flow is converted to ciphertext by Encryption Algorithm of the application;
Fig. 6 is the block diagram of the system of the monitoring field sampling of the application;
Fig. 7 is the block diagram of the client of the application.
Specific embodiment
Below with reference to the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Ground description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the application In embodiment, those skilled in the art's every other embodiment obtained without making creative work, all Belong to the range of the application protection.
Embodiment one
Fig. 1 is the flow chart of the method for the monitoring field sampling of the application.As shown in Figure 1, the monitoring field of the application is adopted The method of sample includes:
It receives field data (110);
Specifically, the field data that client returns is received.Field data includes the GPS of the expression client location at scene Information further includes image information and the ciphertext for converting encrypted image information.Wherein, image information is such as RGB image.
Field data is parsed, is obtained location information (120);
Further, the location information of acquisition includes: the longitude and latitude in GPS information, the longitude and latitude in image information, obtains The information such as time of location information, the photo opporunity stamp of image information and the ciphertext of converting encrypted image information.
It should be noted that image can generate acquisition parameters information when shooting, and acquisition parameters information is written to figure The head of piece file, the acquisition parameters information of image include but is not limited to photo opporunity stamp, color coding, picture width, picture Resolution ratio and camera site etc..
The extracting method of longitude and latitude in image information are as follows: the acquisition parameters information of picture is extracted from the head of picture file, And then the camera site of picture, the i.e. longitude and latitude of picture are extracted from acquisition parameters information.In one embodiment, the bat of picture Take the photograph EXIF (Exchangeable Image File, exchangeable image file) information that parameter information is picture.
Executor whether at the scene (130) are judged according to location information;
Specifically, Fig. 2 be judged according to location information executor whether the flow chart of method at the scene, as shown in Fig. 2, Judge whether method at the scene includes: executor according to location information
Extract the location information and temporal information (210) in location information;
In one embodiment, the location information of extraction is the longitude and latitude in GPS information, the longitude and latitude in image information Degree;The temporal information of extraction is the photo opporunity stamp of image information, the time for obtaining location information.
(220) are judged to the data accuracy of Extracting Information;
More specifically, Fig. 3 is the flow chart judged the data accuracy of Extracting Information, as shown in figure 3, to extraction The method that the data accuracy of information is judged includes:
The location information of extraction and temporal information are compared (310) with the corresponding informance prestored respectively;
Illustratively, the location information prestored is to be obtained by base station and store information in the database.The position prestored Confidence breath includes the longitude and latitude of the sampling position prestored.The time for needing to sample, that is, the temporal information prestored are also pre-stored in data In library.
In one embodiment, the location information of extraction and temporal information are weighted summation, the public affairs of calculating respectively Formula are as follows:
P=P1×A+P2× B formula (1)
T=T1×A+T2× B formula (2)
Wherein, P is the location information extracted, P1For the longitude and latitude in GPS information, P2For the longitude and latitude in image information;T For the temporal information of extraction, T1For the time for obtaining location information, T2For the photo opporunity stamp in image information.A and B is preparatory The adduction of the parameter provided, A and B are equal to 1.
The difference of the location information for comparing extraction and the location information prestored, the temporal information of extraction and the temporal information prestored Whether value is in threshold range (320);
Illustratively, for the comparison of longitude and latitude, unit is degree, and threshold value is accurate to after decimal point 5, such as 0.00001~ 0.00009;Comparison for the time, unit are day, and threshold value is less than or equal to 2.
It should be noted that in response to the location information of extraction, the difference of temporal information any difference in threshold range Outside, judge that executor at the scene, does not send executor to client and do not instruct at the scene.
In response to the location information of extraction, temporal information difference in threshold range, the data of Extracting Information are accurate (330)。
It is accurate in response to the data of Extracting Information, conversion encryption is carried out to image information, is obtained ciphertext (230);
Specifically, Fig. 4 is that the application carries out conversion encryption to image information, obtains the flow chart of ciphertext, such as Fig. 4 institute Show, the method for obtaining ciphertext includes:
Longitude and latitude, the photo opporunity stamp of live image are extracted, and live image is converted into matrix (410);
Preferably, RGB image is stored in three-dimensional array.There are three faces for this three-dimensional array, are corresponding in turn in red (Red), green (Green), blue (Blue) three kinds of colors, and the data in face are then the intensity value of these three colors respectively, in face Element correspond to image in pixel.Pixel in image constitutes matrix.
The longitude and latitude of live image, photo opporunity stamp and matrix are converted into information flow (420) respectively;
The form of expression of information flow is character string.Wherein, the longitude and latitude of live image is converted into the first character string and Two character strings;Photo opporunity stamp is converted into third character string;It is the 4th character string by matrix conversion.First character string, second Character string, third character string and the 4th character string constitute information flow.
Information flow is converted into ciphertext (430) by Encryption Algorithm.
Specifically, Fig. 5 is the flow chart that information flow is converted to ciphertext by Encryption Algorithm of the application, as shown in figure 5, The method that information flow is converted into ciphertext by Encryption Algorithm are as follows:
Calculate the data length (510) that information flow needs to fill;
Information flow refers to character string.It needs to be filled each character string, so that the length of message obtains M modulus N meets W mod M=N if message-length is W, the data length for needing to fill is calculated according to this formula.Illustratively, W, M, N are natural number.
Filling information stream obtains the information flow (520) of final lengths;
The method of filling is that, in information flow followed by filling, first of filling is 1, remaining is 0.Letter after addition The memory length that breath stream length can be utilized for is Q.If the length of the message after addition is greater than 2Q, then its low Q is only used The value of position, that is, the message-length after adding is to 2QModulus.After this step carries out, final information flow length is the whole of M Several times.Illustratively, Q is natural number.
Data processing is carried out to the information flow of final lengths, obtains final secret value (530).
Prepare the data for needing to use:
4 constants: A=0x67452301, B=0x0EFCDAB89, C=0x98BADCFE,
D=0x10325476;
4 functions: F (X, Y, Z)=(X&Y) | ((~X) &Z);G (X, Y, Z)=(X&Z) | (Y& (~Z));H(X,Y,Z) =X^Y^Z;I (X, Y, Z)=Y^ (X | (~Z));
The information flow of final lengths is handled with M for a grouping, each grouping carries out 4 round transformations, with above Described 4 constants are that starting variable is calculated, and export 4 variables again, carry out next grouping again with 4 variables of output Operation, if being the last one grouping, this 4 variables are last as a result, i.e. secret value.
(240) are compared with the ciphertext in field data for the ciphertext of acquisition;
Inconsistent in response to the ciphertext in the ciphertext and field data of acquisition, the data inaccuracy of image information, judgement is held Passerby at the scene, does not send executor to client and does not instruct at the scene.
Consistent with the ciphertext in field data in response to the ciphertext of acquisition, the data of image information are accurate (250).
It is accurate in response to the data of image information, judge executor (260) at the scene.
At the scene in response to executor, the sampled data (140) that executor returns is received.
The method of the monitoring field sampling of the application, on the one hand, distinguish the location information in location information, temporal information It is compared with the location information prestored, demonstrates the accuracy of location information;On the one hand, by the image information in field data Encrypted authentication is carried out, image information is avoided and is distorted in transmission process, ensure that the accuracy of data.
Embodiment two
The system that the application also proposes a kind of monitoring field sampling, suitable for the sampling of monitoring field described in embodiment one Method.Fig. 6 be the application monitoring field sampling system block diagram, as shown in fig. 6, the monitoring field of the application sample be System includes:
First receiving module 61, for receiving field data;
Parsing module 62 obtains location information for parsing field data;
Judgment module 63, for judging executor whether at the scene according to location information;
Second receiving module 64, at the scene, receiving the sampled data that executor returns in response to executor.
It should be pointed out that the system of monitoring field sampling further includes database, all data in system are all stored in In database.
The system of the monitoring field sampling of the application is consistent with the technical effect of method that the monitoring field of the application samples, It does not just repeat one by one herein.
Embodiment three
The application also proposes a kind of client, and the system for sampling to the monitoring field of the application provides data, and connects The data that receipts system returns.Fig. 7 is the block diagram of the client of the application, as shown in fig. 7, the client of the application includes:
Station acquisition unit 71, location information and image information for collection site;
Encryption unit 72 obtains the ciphertext of image information for converting encrypted image information;
Input unit 73, for inputting the sampled data at scene;
Transmission unit 74, for sending data.
Specifically, encryption unit 72 converts encrypted image information, obtains the method and the application of the ciphertext of image information Conversion encryption is carried out to image information in embodiment one, the method for obtaining ciphertext is identical.Transmission unit 74 is used to send out to system Send the data of station acquisition unit, encryption unit and input unit.
The client of the application encrypts the image information in field data, avoids image information in transmission process In distort, ensure that the accuracy of data.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.Obviously, those skilled in the art can be to the application Various modification and variations are carried out without departing from spirit and scope.If in this way, these modifications and variations of the application Belong within the scope of the claim of this application and its equivalent technologies, then the application is also intended to encompass these modification and variations and exists It is interior.

Claims (10)

1. a kind of method of monitoring field sampling, which comprises the steps of:
Receive field data;
Field data is parsed, location information is obtained;
Judge executor whether at the scene according to location information;
At the scene in response to executor, the sampled data that executor returns is received.
2. the method as described in claim 1, which is characterized in that location information includes longitude and latitude in GPS information, image information In longitude and latitude, obtain time of location information, image information photo opporunity stamp and convert the close of encrypted image information Text.
3. method according to claim 2, which is characterized in that according to location information judge executor whether method at the scene Include:
Extract the location information and temporal information in location information;
The data accuracy of Extracting Information is judged;
It is accurate in response to the data of Extracting Information, conversion encryption is carried out to image information, obtains ciphertext;
The ciphertext of acquisition is compared with the ciphertext in field data;
Consistent with the ciphertext in field data in response to the ciphertext of acquisition, the data of image information are accurate;
It is accurate in response to the data of image information, judge executor at the scene.
4. method as claimed in claim 3, which is characterized in that the method packet judged the data accuracy of Extracting Information It includes:
The location information of extraction and temporal information are compared with the corresponding informance prestored respectively;
The difference for comparing the location information and the location information prestored, the temporal information and the temporal information prestored of extraction of extraction is It is no in threshold range;
In response to the location information of extraction, temporal information difference in threshold range, the data of Extracting Information are accurate.
5. method as claimed in claim 3, which is characterized in that carry out conversion encryption to image information, the method for obtaining ciphertext Include:
Longitude and latitude, the photo opporunity stamp of live image are extracted, and live image is converted into matrix;
The longitude and latitude of live image, photo opporunity stamp and matrix are converted into information flow respectively;
Information flow is converted into ciphertext by Encryption Algorithm.
6. method as claimed in claim 3, which is characterized in that
In response to the location information of extraction, the difference of temporal information any difference outside threshold range, judge that executor does not exist Scene sends executor to client and does not instruct at the scene.
7. method as claimed in claim 3, which is characterized in that different in response to the ciphertext in the ciphertext and field data of acquisition It causes, the data inaccuracy of image information, judges that executor at the scene, does not send executor to client and do not instruct at the scene.
8. method according to claim 2, which is characterized in that image information is RGB image.
9. a kind of system of monitoring field sampling characterized by comprising
First receiving module, for receiving field data;
Parsing module obtains location information for parsing field data;
Judgment module, for judging executor whether at the scene according to location information;
Second receiving module, at the scene, receiving the sampled data that executor returns in response to executor.
10. a kind of client characterized by comprising
Station acquisition unit, location information and image information for collection site;
Encryption unit obtains the ciphertext of image information for converting encrypted image information;
Input unit, for inputting the sampled data at scene;
Transmission unit, for sending data.
CN201910082251.1A 2019-01-28 2019-01-28 Method and system for monitoring field sampling Active CN109819138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910082251.1A CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910082251.1A CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Publications (2)

Publication Number Publication Date
CN109819138A true CN109819138A (en) 2019-05-28
CN109819138B CN109819138B (en) 2020-11-06

Family

ID=66605621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910082251.1A Active CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Country Status (1)

Country Link
CN (1) CN109819138B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112529489A (en) * 2019-09-19 2021-03-19 阿里巴巴集团控股有限公司 Task state processing method, device and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102393711A (en) * 2011-10-28 2012-03-28 中国长江三峡集团公司 Method and system for monitoring grouting process on site
CN105898214A (en) * 2016-03-24 2016-08-24 北京农业信息技术研究中心 Site surveying device, site surveying confirmation method, and server
US20160337136A1 (en) * 2015-05-11 2016-11-17 George Ernest Bester Method and a system for authenticating and identifying the location of a smartphone
CN106549757A (en) * 2015-09-21 2017-03-29 北大方正集团有限公司 The data authenticity identification method of WEB service, service end and client
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102393711A (en) * 2011-10-28 2012-03-28 中国长江三峡集团公司 Method and system for monitoring grouting process on site
US20160337136A1 (en) * 2015-05-11 2016-11-17 George Ernest Bester Method and a system for authenticating and identifying the location of a smartphone
CN106549757A (en) * 2015-09-21 2017-03-29 北大方正集团有限公司 The data authenticity identification method of WEB service, service end and client
CN105898214A (en) * 2016-03-24 2016-08-24 北京农业信息技术研究中心 Site surveying device, site surveying confirmation method, and server
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112529489A (en) * 2019-09-19 2021-03-19 阿里巴巴集团控股有限公司 Task state processing method, device and system

Also Published As

Publication number Publication date
CN109819138B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
US11010855B2 (en) Method and apparatus for protecting digital photos from alteration
JP3142833B2 (en) Image capture system and method
US8224041B2 (en) Media data processing apparatus and media data processing method
US7984300B2 (en) System and method of authenicating a digitally captured image
CN105719120A (en) Method for encrypting privacy information on express waybills
US20160182237A1 (en) Method and system for providing a way to verify the integrity of a document
JP2001517383A (en) In-camera image marking and authentication
CN104079830B (en) Private mark adding method and device, private mark photo processing method and device
Sugathan An improved LSB embedding technique for image steganography
US20090190189A1 (en) Information processing apparatus, control method therefor, information processing system, and program
CN104301387B (en) A kind of engineering digital photograph anti-counterfeit method and device
JP4261724B2 (en) Signature data generation apparatus and image verification apparatus
US20210357533A1 (en) Runtime Signature Integrity
CN104636764A (en) Image steganography analysis method and device
KR101919061B1 (en) Recording and Verification System of ID(Identification Information)to Prevent Tampering of Video and Method thereof
CN109819138A (en) A kind of method and system of monitoring field sampling
CN112134687B (en) Information encryption and decryption method based on two-dimensional code
EP4024372A1 (en) Information processing device, information processing method, and program
US20160189015A1 (en) Data exchange methods, systems and apparatus using color images
CN109657487A (en) Image processing method, image authentication method and its device
Sreesubha et al. An efficient data hiding approach on digital color image
CN114997884A (en) Dual anti-counterfeiting authentication system based on tea cake image and information code
CN106657083A (en) Secure data transmission method based on machine vision
CN117216039B (en) Method for constructing three-dimensional base of building based on three-dimensional cadastral database
Viral et al. A real time approach for secure text transmission using video cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant