CN113868690B - Trusted deposit certificate based privacy calculation method and system - Google Patents
Trusted deposit certificate based privacy calculation method and system Download PDFInfo
- Publication number
- CN113868690B CN113868690B CN202111456878.2A CN202111456878A CN113868690B CN 113868690 B CN113868690 B CN 113868690B CN 202111456878 A CN202111456878 A CN 202111456878A CN 113868690 B CN113868690 B CN 113868690B
- Authority
- CN
- China
- Prior art keywords
- pixel
- image
- face image
- value
- face
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The invention relates to the technical field of privacy calculation, and discloses a privacy calculation method based on trusted certificate storage, which comprises the following steps: acquiring a face image, carrying out gray processing on the face image, and carrying out binarization processing on the face gray image to obtain a normalized face image; generating a chaos sequence, and performing pixel-level chaos processing on the normalized human face image by using the chaos sequence; generating an encryption initial parameter, and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm; and when decryption is required, performing decryption processing according to the encrypted initial parameters and performing chaotic anti-confusion processing on the decrypted image. The invention conducts pixel confusion on the pixels of the face image by utilizing the chaotic sequence, so that the pixel value distribution of the face is uniformly distributed, the purpose of reducing differential attack is achieved, and the pixels are subjected to privacy encryption by utilizing a nonlinear equation set image replacement algorithm. The invention further provides a privacy computing system based on the trusted certificate.
Description
Technical Field
The invention relates to the technical field of privacy computation, in particular to a privacy computation method and system based on trusted evidence.
Background
In recent years, with the mature development of computer and network technologies, people's communication modes are changed, and the frequency of information transmission by using networks is higher and higher. Because the network has openness and sharing, hidden danger is caused to the security of multimedia communication, and the multi-purpose face recognition method is used for verification during identity verification, so that how to ensure the privacy of face images in the transmission process becomes a hot topic of current research.
Most of existing face image transmission methods are based on base64 and other simple methods, user privacy data are difficult to guarantee, pixel value distribution of encrypted data obtained by the method is uneven and is easy to be attacked differentially, and a privacy calculation method for face images is provided for solving the problem.
Disclosure of Invention
The invention provides a privacy calculation method based on trusted evidence, which aims to (1) utilize chaotic sequences to carry out pixel confusion on human face image pixels, so that the human face pixel value distribution is uniform, and the aim of reducing differential attack is fulfilled; (2) and performing replacement encryption on the pixels by using a nonlinear equation set image replacement algorithm.
The invention provides a privacy calculation method based on trusted certificate storage, which comprises the following steps:
s1: acquiring a face image, carrying out gray processing on the face image, and carrying out binarization processing on the face gray image to obtain a normalized face image;
s2: generating a chaos sequence, and performing pixel-level chaos processing on the normalized face image by using the chaos sequence to ensure that the distribution of face pixel values is uniformly distributed, thereby achieving the purpose of reducing differential attack;
s3: generating an encryption initial parameter, and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm;
s4: when decryption is needed, carrying out decryption processing according to the encrypted initial parameters and carrying out chaotic anti-confusion processing on the decrypted image to obtain an original face image;
determining the chaotic parameters of the chaotic sequence in the step S2 includes:
determining a chaotic sequence parameter updating model:
updating iteration chaotic sequence parameter updating modelThen, obtain the length ofChaotic sequence parameter of (1):
As a further improvement of the method of the invention:
the step S1 of collecting a face image and performing a graying process on the collected face image includes:
collecting a face image, cutting the collected face image, wherein the size of the cut face image is M multiplied by N pixels, and carrying out gray processing on the collected face image, and the gray processing flow of the face image is as follows:
converting the RGB color pixel value of each pixel point in the image into a gray value to obtain a face gray image, wherein the conversion formula of the RGB color pixel value is as follows:
wherein:
gray (i, j) is the Gray value of the pixel point (i, j), and (i, j) is expressed as the pixel of the ith row and the jth column in the face image;
r (i, j) is the red component value of the pixel (i, j), G (i, j) is the green component of the pixel (i, j), and B (i, j) is the blue component of the pixel (i, j).
In the step S1, the binarization processing is performed on the face grayscale image, and includes:
1) calculating the average gray level mu of the face gray level image:
wherein:
k represents a gray level;
2) taking the gray level m as a segmentation threshold, taking the threshold smaller than the segmentation threshold as a background, and taking the threshold larger than or equal to the segmentation threshold as a foreground, so as to divide the face gray image into the foreground and the background, wherein the background gray value is as follows:
the background number ratio is:
the foreground gray value is:
the foreground number ratio is:
3) calculate the variance of foreground and background:
and modifying the segmentation threshold value m to enable the variance between the foreground and the background to be maximum, wherein the segmentation threshold value at the moment is the optimal segmentation threshold value, carrying out binarization processing on the face gray level image by using the optimal segmentation threshold value, setting the gray level value of the pixel in the face gray level image, which is greater than the optimal segmentation threshold value, to be 1, and setting the gray level value of the pixel, which is smaller than the optimal segmentation threshold value, to be 0, so as to obtain the face image after binarization processing.
In the step S2, the chaos sequence is used to perform pixel-level chaos processing on the face image, including:
the face image pixel-level chaotic processing flow based on the chaotic sequence comprises the following steps:
1) the value of e is set in turn,m × N is the pixel size of the face image, exchangedE and p lines of the binary face imageeRow pixels, the peThe calculation formula of (2) is as follows:
2) the value of e is set in turn,m multiplied by N is the pixel size of the face image, and the e column and the q column of the binary face image are exchangedeColumn pixels, said qeThe calculation formula of (2) is as follows:
3) performing pixel diffusion on the binarized face image, wherein Q (i, j) represents pixels of the ith row and the jth column in the binarized face image after line and row exchange, and the pixel diffusion formula is as follows:
wherein:
4) scrambling any pixel point Q (i, j) of the image after pixel diffusion, wherein the index value of pixel scrambling isThe pixel coordinates (i ', j') after scrambling are:
5) pixel confusion is carried out on any pixel point after pixel scrambling, wherein a pixel confusion formula is as follows:
wherein:
the step S3 of generating the encrypted initial parameters of the image replacement algorithm of the nonlinear equation set includes:
randomly selecting a point of pixel Q from the face image after pixel-level chaos processingiAnd calculating to obtain a pixel QiPixel mean r of adjacent 8 pixels1And a pixel mean r of adjacent 16 pixels2;
Calculating a Hash value of the face image:
wherein:
calculating to obtain a control parameter and an encryption parameter in the encryption initial parameter:
wherein:
the updating process of setting the encryption parameters is as follows:
wherein:
in the step S3, the chaotically processed image is encrypted by using a nonlinear equation set image replacement algorithm, which includes:
performing pixel replacement on any pixel point v (i, j) of the image after the chaos processing:
wherein:indicating the pixel point at position (i, j) and positionReplacing the position of the pixel point;
repeating the pixel replacement operation until all the pixel points are subjected to position transformation; and obtaining the encrypted face image.
In the step S4, the decrypting process is performed on the encrypted image according to the encrypted initial parameter, and the chaotic anti-aliasing process is performed on the decrypted image, including:
determining the original position of each pixel point according to the encrypted initial parameters, and restoring the image to a face image subjected to pixel-level chaotic processing; and sequentially carrying out inverse operations of pixel confusion, pixel scrambling, pixel diffusion and pixel row-column transformation on the face image subjected to the pixel-level chaos processing to obtain an original face image.
The invention provides a privacy computing system based on trusted evidence, which comprises:
the face image acquisition device is used for acquiring a face image to be encrypted;
the image processor is used for carrying out gray processing on the face image and carrying out binarization processing on the face gray image;
the face image privacy encryption device is used for performing pixel-level chaos processing on the normalized face image by utilizing the chaos sequence and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm;
the method for determining the chaotic parameters of the chaotic sequence comprises the following steps:
determining a chaotic sequence parameter updating model:
updating iteration chaotic sequence parameter updating modelThen, obtain the length ofChaotic sequence parameter of (1):
Compared with the prior art, the invention provides a privacy calculation method based on the trusted certificate, and the technology has the following advantages:
firstly, the scheme provides a face image pixel-level chaos processing scheme, pixel diffusion and pixel confusion processing are carried out on the face image pixels, so that the pixel distribution in the face image is uniformly distributed, and the purpose of reducing differential attack is achieved, the face image pixel-level chaos processing scheme has the following flow, and firstly, a chaos sequence parameter updating model is determined:
wherein: the initial value of e is 0 and,has a value range of;Is a chaotic sequence parameter; updating an iterative chaotic sequence parameter updating model according to the determined chaotic sequence parameter updating modelThen, obtain the length ofChaotic sequence parameter of (1):
wherein:is the pixel size of the face image. For the face image to be processed, the e value is set in turn,,exchanging e-th line and e-th line of binary face image for pixel size of face imageRow pixels ofThe calculation formula of (2) is as follows:
the value of e is set in turn,,exchanging e column and e column of binary face image for pixel size of face imageColumn pixels ofThe calculation formula of (2) is as follows:
performing pixel diffusion on the binarized face image, whereinExpressing the pixel of the ith row and the jth column in the binarized face image after exchanging rows and columns, wherein the pixel diffusion formula is as follows:
wherein:representing the diffused pixels; the pixel value of the previous pixel point can be diffused to all the following pixel points through pixel diffusion, so that the pixel value distribution of the human face is uniformly distributed; by diffusing any pixel point of imagePerforming scrambling, wherein the index value of pixel scrambling isPixel coordinates after scramblingComprises the following steps:
pixel aliasing is carried out on any pixel point after pixel scrambling, wherein a pixel aliasing formula is as follows:
wherein:. The pixels of the face image are partially encrypted by using chaotic-level pixel aliasing and pixel scrambling.
Meanwhile, the scheme provides an image replacement algorithm of a nonlinear equation set, and a pixel Q is randomly selected from a human face image after pixel-level chaos processingiAnd calculating to obtain a pixel QiPixel mean r of adjacent 8 pixels1And a pixel mean r of adjacent 16 pixels2(ii) a Calculating a Hash value of the face image:
wherein:,an encryption key representing a face image;indicating that only the first 5 bits of Hash value are taken;indicating that hexadecimal is converted to decimal; calculating to obtain a control parameter and an encryption parameter in the encryption initial parameter:
wherein:representing an encryption parameter;is an encryption parameter with a value range of;Represents a control parameter; the updating process of setting the encryption parameters is as follows:
wherein:indicating the pixel point at position (i, j) and positionReplacing positions of the pixel points; repeating the pixel replacement operation until all the pixel points are subjected to position transformation; and obtaining the encrypted face image. Compared with the traditional scheme, the scheme provides the dynamically updated encryption parameters, so that the encryption parameters of each pixel are different, and the difficulty of decryption of the encrypted image is increased.
Drawings
Fig. 1 is a schematic flowchart of a privacy calculation method based on trusted certificate authority according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a trusted certificate authority-based privacy computing system according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
S1: the method comprises the steps of collecting a face image, carrying out gray processing on the face image, and carrying out binarization processing on the face gray image to obtain a normalized face image.
The step S1 of collecting a face image and performing a graying process on the collected face image includes:
collecting a face image, cutting the collected face image, wherein the size of the cut face image isThe pixel is used for carrying out gray processing on the collected face image, and the gray processing flow of the face image is as follows:
converting the RGB color pixel value of each pixel point in the image into a gray value to obtain a face gray image, wherein the conversion formula of the RGB color pixel value is as follows:
wherein:
gray (i, j) is the Gray value of the pixel point (i, j), and (i, j) is expressed as the pixel of the ith row and the jth column in the face image;
r (i, j) is the red component value of the pixel (i, j), G (i, j) is the green component of the pixel (i, j), and B (i, j) is the blue component of the pixel (i, j).
In the step S1, the binarization processing is performed on the face grayscale image, and includes:
1) calculating the average gray level mu of the face gray level image:
wherein:
k represents a gray level;
2) taking the gray level m as a segmentation threshold, taking the threshold smaller than the segmentation threshold as a background, and taking the threshold larger than or equal to the segmentation threshold as a foreground, so as to divide the face gray image into the foreground and the background, wherein the background gray value is as follows:
the background number ratio is:
the foreground gray value is:
the foreground number ratio is:
3) calculate the variance of foreground and background:
modifying the segmentation threshold value m to enable the variance between the foreground and the background to be maximum, wherein the segmentation threshold value at the moment is the optimal segmentation threshold value, performing binarization processing on the face gray level image by using the optimal segmentation threshold value, setting the pixel gray level value which is greater than the optimal segmentation threshold value in the face gray level image as 1, and setting the pixel gray level value which is less than the optimal segmentation threshold value as 0, and obtaining the face image after binarization processing.
S2: and generating a chaotic sequence, and performing pixel-level chaotic processing on the normalized face image by using the chaotic sequence to ensure that the distribution of face pixel values is uniformly distributed, thereby achieving the purpose of reducing differential attacks.
Determining the chaotic parameters of the chaotic sequence in the step S2 includes:
determining a chaotic sequence parameter updating model:
wherein:
heis a chaotic sequence parameter;
updating the iterative chaotic sequence parameter updating model M multiplied by N times to obtain chaotic sequence parameters with the length of M multiplied by N:
wherein:
m × N is the pixel size of the face image.
In the step S2, the chaos sequence is used to perform pixel-level chaos processing on the face image, including:
the face image pixel-level chaos processing flow based on the chaos sequence comprises the following steps:
1) the value of e is set in turn,m multiplied by N is the pixel size of the face image, and the e-th line and the p-th line of the binary face image are exchangedeRow pixels, the peThe calculation formula of (2) is as follows:
2) the value of e is set in turn,m multiplied by N is the pixel size of the face image, and the e column and the q column of the binary face image are exchangedeColumn pixels, the qeThe calculation formula of (2) is as follows:
3) performing pixel diffusion on the binarized face image, wherein Q (i, j) represents pixels of the ith row and the jth column in the binarized face image after line and row exchange, and the pixel diffusion formula is as follows:
wherein:
4) scrambling any pixel point Q (i, j) of the image after pixel diffusion, wherein the index value of pixel scrambling isScrambled pixel coordinatesComprises the following steps:
5) pixel aliasing is carried out on any pixel point after pixel scrambling, wherein a pixel aliasing formula is as follows:
wherein:
s3: generating an encryption initial parameter, and encrypting the chaotically processed image by using a nonlinear equation set image replacement algorithm.
The step S3 of generating the encrypted initial parameters of the image replacement algorithm of the nonlinear equation set includes:
randomly selecting a point of pixel Q from the face image after pixel-level chaos processingiAnd calculating to obtain a pixel QiPixel mean r of adjacent 8 pixels1And a pixel mean r of adjacent 16 pixels2;
Calculating a Hash value of the face image:
wherein:
calculating to obtain a control parameter and an encryption parameter in the encryption initial parameter:
wherein:
the updating process of setting the encryption parameters is as follows:
wherein:
in the step S3, the chaotically processed image is encrypted by using a nonlinear equation set image replacement algorithm, which includes:
performing pixel replacement on any pixel point v (i, j) of the image after the chaos processing:
wherein:
indicating the pixel point at position (i, j) and positionReplacing the position of the pixel point;
repeating the pixel replacement operation until all the pixel points are subjected to position transformation; and obtaining the encrypted face image.
S4: and when decryption is needed, carrying out decryption processing according to the encrypted initial parameters and carrying out chaotic anti-confusion processing on the decrypted image to obtain the original face image.
In the step S4, the decrypting the encrypted image according to the encrypted initial parameter and performing the chaos anti-aliasing process on the decrypted image include:
determining the original position of each pixel point according to the encrypted initial parameters, and restoring the image to a face image subjected to pixel-level chaotic processing; and sequentially carrying out inverse operations of pixel confusion, pixel scrambling, pixel diffusion and pixel row-column transformation on the face image subjected to the pixel-level chaos processing to obtain an original face image.
The invention also provides a privacy computing system based on the trusted deposit certificate. Referring to fig. 2, a schematic diagram of an internal structure of a privacy computing system based on trusted certificate authority according to an embodiment of the present invention is provided.
In the present embodiment, the trusted evidence based privacy computing system 1 at least comprises a face image acquisition device 11, an image processor 12, a face image privacy encryption device 13, a communication bus 14, and a network interface 15.
The face image acquiring apparatus 11 may be a PC (Personal Computer), or a terminal device such as a smart phone, a tablet Computer, or a portable Computer.
The face image privacy encryption device 13 may be, in some embodiments, a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip including a monitoring Unit for running program codes stored in the image processor 12 or Processing data, such as privacy calculation program instructions 01.
The communication bus 14 is used to enable connection communication between these components.
The network interface 15 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the system 1 and other electronic devices.
Optionally, the trusted credit based privacy computing system 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further comprise a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the trusted credit based privacy computing system 1 and for displaying a visual user interface.
While FIG. 2 shows only the trusted credit based privacy computing system 1 with components 11-15, those skilled in the art will appreciate that the configuration shown in FIG. 2 does not constitute a limitation of the trusted credit based privacy computing system 1, and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
In the trusted certificate authority based privacy computing system 1 embodiment shown in fig. 2, image processor 12 has stored therein privacy computing program instructions 01; the steps of the face image privacy encryption device 13 executing the privacy calculation program instructions 01 stored in the image processor 12 are the same as the method for implementing the privacy calculation based on the trusted authority, and are not described here.
Furthermore, an embodiment of the present invention also provides a computer-readable storage medium having stored thereon privacy computing program instructions executable by one or more processors to implement operations comprising:
acquiring a face image, carrying out gray processing on the face image, and carrying out binarization processing on the face gray image to obtain a normalized face image;
generating a chaos sequence, and performing pixel-level chaos processing on the normalized face image by using the chaos sequence to ensure that the distribution of face pixel values is uniformly distributed, thereby achieving the purpose of reducing differential attack;
generating an encryption initial parameter, and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm;
and when decryption is needed, carrying out decryption processing according to the encrypted initial parameters and carrying out chaotic anti-confusion processing on the decrypted image to obtain the original face image.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (7)
1. A privacy computing method based on trusted deposit certificate, the method comprising:
s1: acquiring a face image, carrying out gray processing on the face image, and carrying out binarization processing on the face gray image to obtain a normalized face image;
s2: generating a chaos sequence, and performing pixel-level chaos processing on the normalized face image by using the chaos sequence to ensure that the distribution of face pixel values is uniformly distributed, thereby achieving the purpose of reducing differential attack;
s3: generating an encryption initial parameter, and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm;
s4: during decryption, carrying out decryption processing according to the encrypted initial parameters and carrying out chaotic anti-confusion processing on the decrypted image to obtain an original face image;
determining the chaotic parameters of the chaotic sequence in the step S2 includes:
determining a chaotic sequence parameter updating model:
updating iteration chaotic sequence parameter updating modelThen, obtain the length ofChaotic sequence parameter of (1):
the face image pixel-level chaos processing flow based on the chaos sequence comprises the following steps:
1) the value of e is set in turn,,exchanging e-th line and e-th line of binary face image for pixel size of face imageRow pixels ofThe calculation formula of (2) is as follows:
2) the values of e are set in turn, and,,exchanging e column and e column of binary face image for pixel size of face imageColumn pixels ofThe calculation formula of (2) is as follows:
3) performing pixel diffusion on the binarized face image, whereinShowing the pixel of the ith row and the jth column in the binarized face image after exchanging rows and columns,the pixel diffusion formula is:
4) any pixel point of image after pixel diffusionPerforming scrambling, wherein the index value of pixel scrambling isScrambled pixel coordinatesComprises the following steps:
5) pixel aliasing is carried out on any pixel point after pixel scrambling, wherein a pixel aliasing formula is as follows:
the step S3 of generating the encrypted initial parameters of the image replacement algorithm of the nonlinear equation set includes:
randomly selecting a point of pixel from the face image after pixel-level chaos processingAnd calculating to obtain pixelsPixel mean of adjacent 8 pixelsAnd the mean of the pixels of the adjacent 16 pixels;
Calculating a Hash value of the face image:
wherein:
calculating to obtain a control parameter and an encryption parameter in the encryption initial parameter:
wherein:representing an encryption parameter;is an encryption parameter with a value range of;Represents a control parameter;
the updating process of setting the encryption parameters is as follows:
xi ’ = floor(x n+1×1014) mod M +1
2. The method according to claim 1, wherein the step S1 of collecting the face image and graying the collected face image includes:
converting the RGB color pixel value of each pixel point in the image into a gray value to obtain a face gray image, wherein the conversion formula of the RGB color pixel value is as follows:
wherein:
3. The privacy calculation method based on the trustable certificate as claimed in claim 2, wherein the step of S1 is to perform binarization processing on the face gray-scale image, and includes:
Wherein:
k represents a gray level;is the probability of the occurrence of a pixel with a gray level k;the number of pixels with k gray level;
2) taking the gray level m as a segmentation threshold, taking the threshold smaller than the segmentation threshold as a background, and taking the threshold larger than or equal to the segmentation threshold as a foreground, so as to divide the face gray image into the foreground and the background, wherein the background gray value is as follows:
the background number ratio is:
the foreground gray value is:
the foreground number ratio is:
3) calculate the variance of foreground and background:
modifying the segmentation threshold value m to enable the variance between the foreground and the background to be maximum, wherein the segmentation threshold value at the moment is the optimal segmentation threshold value, performing binarization processing on the face gray level image by using the optimal segmentation threshold value, setting the pixel gray level value which is greater than the optimal segmentation threshold value in the face gray level image as 1, and setting the pixel gray level value which is less than the optimal segmentation threshold value as 0, and obtaining the face image after binarization processing.
4. The privacy computation method based on the trustable certificate as claimed in claim 1, wherein the step of S3 is to encrypt the chaotically processed image by using a nonlinear equations set image replacement algorithm, and includes:
performing pixel replacement on any pixel point v (i, j) of the image after the chaos processing:
wherein:
indicating the pixel point at position (i, j) and positionThe position of the pixel point of (a) is replaced,expressing the mapped chaotic coordinate value;
repeating the pixel point replacement operation until all the pixel points are subjected to position transformation; and obtaining the encrypted face image.
5. The method according to claim 1, wherein the step S4 of decrypting the encrypted image according to the encrypted initial parameter and performing chaotic anti-aliasing on the decrypted image includes:
determining the original position of each pixel point according to the encrypted initial parameters, and restoring the image to a face image subjected to pixel-level chaotic processing; and sequentially carrying out inverse operations of pixel confusion, pixel scrambling, pixel diffusion and pixel row-column transformation on the face image subjected to the pixel-level chaos processing to obtain an original face image.
6. A trusted deposit certificate based private computing system, the system comprising:
the face image acquisition device is used for acquiring a face image to be encrypted;
the image processor is used for carrying out gray processing on the face image and carrying out binarization processing on the face gray image;
the face image privacy encryption device is used for performing pixel-level chaos processing on the normalized face image by utilizing the chaos sequence and encrypting the chaotically processed image by utilizing a nonlinear equation set image replacement algorithm;
the method for determining the chaotic parameters of the chaotic sequence comprises the following steps:
determining a chaotic sequence parameter updating model:
updating iteration chaotic sequence parameter updating modelThen, obtain the length ofChaotic sequence parameters of (1):
7. A computer-readable storage medium having stored thereon privacy computing program instructions executable by one or more processors to perform the steps of the trusted deposit based privacy computing method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111456878.2A CN113868690B (en) | 2021-12-02 | 2021-12-02 | Trusted deposit certificate based privacy calculation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111456878.2A CN113868690B (en) | 2021-12-02 | 2021-12-02 | Trusted deposit certificate based privacy calculation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113868690A CN113868690A (en) | 2021-12-31 |
CN113868690B true CN113868690B (en) | 2022-05-13 |
Family
ID=78985617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111456878.2A Active CN113868690B (en) | 2021-12-02 | 2021-12-02 | Trusted deposit certificate based privacy calculation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113868690B (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN108122188B (en) * | 2018-01-12 | 2021-08-31 | 哈尔滨工业大学深圳研究生院 | Image encryption method |
CN108737685B (en) * | 2018-05-15 | 2020-11-10 | 聊城大学 | Image encryption method based on chaotic self-adaptive mechanism |
CN110430435B (en) * | 2019-08-09 | 2022-04-19 | 广东工业大学 | Image encryption method and device, sensor and readable storage medium |
CN113470126A (en) * | 2021-04-16 | 2021-10-01 | 兰州现代职业学院 | Novel image encryption method based on hyperchaos for scrambling related to plaintext pixel dynamic |
-
2021
- 2021-12-02 CN CN202111456878.2A patent/CN113868690B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN113868690A (en) | 2021-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mansouri et al. | A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme | |
Han | An image encryption algorithm based on modified logistic chaotic map | |
Zhou et al. | A new 1D chaotic system for image encryption | |
Murillo-Escobar et al. | A RGB image encryption algorithm based on total plain image characteristics and chaos | |
Pujari et al. | A hybridized model for image encryption through genetic algorithm and DNA sequence | |
CN110430036B (en) | RGB (Red, Green and blue) color image encryption method based on inverse difference chaotic mapping | |
US10360406B2 (en) | Method of obfuscating data | |
CN109800585B (en) | Image interpolation space completely reversible separable ciphertext domain information hiding algorithm | |
Hu et al. | An improved piecewise linear chaotic map based image encryption algorithm | |
CN115102683A (en) | Method, system and equipment for encrypting and decrypting face image based on target detection technology | |
Wang et al. | A privacy encryption algorithm based on an improved chaotic system | |
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
Raghuvanshi et al. | A data encryption model based on intertwining logistic map | |
US20160020902A1 (en) | Key Generating Method and Apparatus | |
Khan et al. | A novel combination of information hiding and confidentiality scheme | |
CN111260532B (en) | Privacy image encryption method, device, electronic equipment and computer readable storage medium | |
CN116226891B (en) | Face image data encryption method | |
CN113868690B (en) | Trusted deposit certificate based privacy calculation method and system | |
CN111131657B (en) | Chaos medical image tamper-proof encryption method based on self-verification matrix | |
CN110149633B (en) | Safe multi-party authentication method and system supporting batch verification | |
CN111626393A (en) | Image encryption method and system based on QR (quick response) code and rotation transformation | |
CN113946858B (en) | Identity security authentication method and system based on data privacy calculation | |
CN111400731B (en) | Quantum image encryption method based on DNACNot | |
CN113079393A (en) | Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system | |
Shang et al. | Research on a double image security transmission algorithm of image encryption and hiding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |