CN114143410B - Electric power monitoring image encryption transmission method based on Internet of things - Google Patents
Electric power monitoring image encryption transmission method based on Internet of things Download PDFInfo
- Publication number
- CN114143410B CN114143410B CN202111353509.0A CN202111353509A CN114143410B CN 114143410 B CN114143410 B CN 114143410B CN 202111353509 A CN202111353509 A CN 202111353509A CN 114143410 B CN114143410 B CN 114143410B
- Authority
- CN
- China
- Prior art keywords
- image
- foreground
- electric power
- vector
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The invention discloses an electric power monitoring image encryption transmission method based on the Internet of things, which comprises the steps of separating the foreground and the background of a video frame, encrypting a foreground area, utilizing an encrypted training frame to help conceal contour information, introducing an image key into an improved monitoring video encryption algorithm besides using a digital key, and ensuring the encryption safety by improving the encryption algorithm. The invention makes full use of the characteristics of the monitoring video shot by the still camera, constructs the electric power monitoring image encryption transmission system based on the Internet of things, and has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like.
Description
Technical Field
The invention relates to an electric power monitoring image encryption transmission method based on the Internet of things.
Background
With the construction of smart power grids, the power grids in China are developing to large-scale, large-capacity, high-voltage level, informatization, intellectualization and the like. The online monitoring system mainly comprises a sensor, a communication network, a server and a database. It can monitor all links of the transmission line in real time and recognize and diagnose faults in time. The special natural environment of the high-voltage transmission line enables the traditional online monitoring system to focus on monitoring of single parameters such as temperature, humidity and the like. The transmitted monitoring data quantity is small, and the requirement of on-line patrol is far from being met. Therefore, there is an urgent need to introduce a practically effective means to expand the functionality of the online monitoring system to make it more intelligent.
Disclosure of Invention
Aiming at the problems, the invention aims to provide an electric power monitoring image encryption transmission method based on the Internet of things, and an image encryption transmission method capable of being used for electric power monitoring is constructed by combining the Internet of things technology, so that an intelligent electric power system monitoring system based on the Internet of things is obtained, related data is encrypted, and the electric power monitoring image encryption transmission method has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like.
The aim of the invention is achieved by the following technical scheme:
the electric power monitoring image encryption transmission method based on the Internet of things is characterized in that firstly, the foreground and the background of a video frame are separated, then the foreground area is encrypted, the encrypted training frame is utilized to help conceal contour information, and finally, an image key is introduced into an improved monitoring video encryption algorithm except for a digital key, so that the encryption security is ensured by improving the encryption algorithm. The method comprises the following specific steps:
step one, combining the image variance with the absolute gradient mean to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form.
Secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector. "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector. The matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]
and step three, after the foreground region information is encrypted, the foreground contour information still exists. The encrypted training framework is then utilized to help conceal the profile information. Since the number of training frames selected is much smaller than the number of video frames, a one-to-one correspondence between the two is not possible. Therefore, a sequence must be specified for the training frame so that the foreground of the training frame can be used to hide the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
and fifthly, encrypting the foreground image, and storing the digital key and the image key.
The beneficial effects are that: the present invention is different from the common video encryption method, and fully digs the characteristics of the monitoring video shot by the static camera and separates the foreground and the background of the video frame. In addition, it only encrypts the foreground area, reduces the video encryption rate, greatly increases the encryption speed, and ensures the encryption security by improving the encryption algorithm.
Drawings
FIG. 1 is a flow chart of an encryption method of the present invention;
FIG. 2 is a statistical graph of the image encryption transmission effect;
Detailed Description
The technical scheme of the invention is further described in detail below with reference to the accompanying drawings:
as shown in fig. 1, the implementation of the electric power monitoring image encryption transmission technology based on the internet of things comprises the following steps:
step one, combining the image variance with the absolute gradient mean to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form.
Secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector. "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector. The matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]。
and step three, after the foreground region information is encrypted, the foreground contour information still exists. The encrypted training framework is then utilized to help conceal the profile information. Since the number of training frames selected is much smaller than the number of video frames, a one-to-one correspondence between the two is not possible. Therefore, a sequence must be specified for the training frame so that the foreground of the training frame can be used to hide the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
and fifthly, encrypting the foreground image, and storing the digital key and the image key.
To further illustrate the method, the following simulations and experiments were performed. After the electric power monitoring image encryption transmission system based on the Internet of things is constructed, the electric power monitoring image processing effect, the image encryption effect and the image transmission effect of the system are detected by collecting images on site. The results obtained are shown in Table 1 and FIG. 2. Table 1 is performance parameters of an internet of things-based power monitoring image encryption transmission system.
Table 1 performance parameters of internet of things based power monitoring image encryption transmission system
According to simulation results, the electric power monitoring image encryption transmission system based on the Internet of things has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like. Therefore, the method provided by the invention has good practical effect.
Claims (1)
1. The electric power monitoring image encryption transmission method based on the Internet of things is characterized by comprising the following specific steps of:
combining the image variance with the absolute gradient mean value to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form to realize separation of the image foreground and the background;
secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
step three, after the foreground region information is encrypted, foreground contour information still exists; utilizing an encrypted training framework to help conceal profile information; since the number of selected training frames is far less than the number of video frames, a one-to-one correspondence between the two is not possible; thus, a sequence is assigned to the training frame such that the foreground of the training frame is used to conceal the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
step five, the encryption of the foreground image is completed, and the digital key and the image key are saved, so that the image encryption transmission is realized;
the second step is as follows:
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector; "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector; the matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111353509.0A CN114143410B (en) | 2021-11-16 | 2021-11-16 | Electric power monitoring image encryption transmission method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111353509.0A CN114143410B (en) | 2021-11-16 | 2021-11-16 | Electric power monitoring image encryption transmission method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114143410A CN114143410A (en) | 2022-03-04 |
CN114143410B true CN114143410B (en) | 2023-09-01 |
Family
ID=80393411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111353509.0A Active CN114143410B (en) | 2021-11-16 | 2021-11-16 | Electric power monitoring image encryption transmission method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114143410B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115633193B (en) * | 2022-12-19 | 2023-04-18 | 吉林省信息技术研究所 | Monitoring video encryption method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2008053576A1 (en) * | 2006-10-31 | 2010-02-25 | 富士通株式会社 | Image encryption / decryption device, method and program |
JP2011130120A (en) * | 2009-12-16 | 2011-06-30 | Sony Corp | Quantum public key cryptosystem, key generation device, encryption device, decoder, key generating method, encryption method, and decoding method |
CN104851070A (en) * | 2015-05-08 | 2015-08-19 | 陕西师范大学 | Foreground and background separation-based image encryption and decryption methods |
KR20160118117A (en) * | 2015-04-01 | 2016-10-11 | 세종대학교산학협력단 | Apparatus and method for secure transmission of video data |
CN106875323A (en) * | 2017-01-18 | 2017-06-20 | 中国人民武装警察部队工程大学 | A kind of information concealing method and its device based on image encryption |
CN110474769A (en) * | 2019-08-23 | 2019-11-19 | 上海海事大学 | A kind of quantum color image encrypting method based on modification direction |
CN110996132A (en) * | 2019-12-26 | 2020-04-10 | 合肥道正企智大数据有限公司 | Video image splitting, encrypting and transmitting method, device and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008053576A (en) * | 2006-08-28 | 2008-03-06 | Matsushita Electric Ind Co Ltd | Mounting head and electronic component mounting apparatus |
CN100464584C (en) * | 2006-11-21 | 2009-02-25 | 北京中星微电子有限公司 | Video monitoring system and method for implementing signal encription |
FR2932046B1 (en) * | 2008-06-03 | 2010-08-20 | Thales Sa | METHOD AND SYSTEM FOR VISUALLY CRYPTING MOBILE OBJECTS WITHIN A COMPRESSED VIDEO STREAM |
-
2021
- 2021-11-16 CN CN202111353509.0A patent/CN114143410B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2008053576A1 (en) * | 2006-10-31 | 2010-02-25 | 富士通株式会社 | Image encryption / decryption device, method and program |
JP2011130120A (en) * | 2009-12-16 | 2011-06-30 | Sony Corp | Quantum public key cryptosystem, key generation device, encryption device, decoder, key generating method, encryption method, and decoding method |
KR20160118117A (en) * | 2015-04-01 | 2016-10-11 | 세종대학교산학협력단 | Apparatus and method for secure transmission of video data |
CN104851070A (en) * | 2015-05-08 | 2015-08-19 | 陕西师范大学 | Foreground and background separation-based image encryption and decryption methods |
CN106875323A (en) * | 2017-01-18 | 2017-06-20 | 中国人民武装警察部队工程大学 | A kind of information concealing method and its device based on image encryption |
CN110474769A (en) * | 2019-08-23 | 2019-11-19 | 上海海事大学 | A kind of quantum color image encrypting method based on modification direction |
CN110996132A (en) * | 2019-12-26 | 2020-04-10 | 合肥道正企智大数据有限公司 | Video image splitting, encrypting and transmitting method, device and system |
Non-Patent Citations (1)
Title |
---|
Quantum Image Encryption Algorithm Based on Image Correlation Decomposition;Tianxiang Hua等;International Journal of Theoretical Physics;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114143410A (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption | |
CN109104544B (en) | Chaotic image encryption method based on complex network synchronization | |
CN111951149B (en) | Image information steganography method based on neural network | |
Lin et al. | Vision transformers are parameter-efficient audio-visual learners | |
CN114143410B (en) | Electric power monitoring image encryption transmission method based on Internet of things | |
CN112995715B (en) | Video frame insertion processing method and device, electronic equipment and storage medium | |
CN111130748A (en) | Quantum chaotic parallel image encryption method | |
CN109062811B (en) | Test case generation method based on neural style migration | |
CN114239737A (en) | Encrypted malicious flow detection method based on space-time characteristics and double-layer attention | |
Jeong et al. | Visual comfort assessment of stereoscopic images using deep visual and disparity features based on human attention | |
CN113987255B (en) | Multi-source ciphertext image retrieval method based on federal learning and secret sharing | |
Liu et al. | Towards better 3d knowledge transfer via masked image modeling for multi-view 3d understanding | |
CN112184555B (en) | Stereo image super-resolution reconstruction method based on deep interactive learning | |
Song et al. | TUSR-Net: triple unfolding single image dehazing with self-regularization and dual feature to pixel attention | |
CN110312138A (en) | A kind of high embedding capacity video steganography method and system based on the modeling of time series error convolution | |
CN103903240B (en) | Image super-resolution method based on multi output Least square support vector regression | |
Beguier et al. | Efficient sparse secure aggregation for federated learning | |
CN113674230B (en) | Method and device for detecting key points of indoor backlight face | |
Liu et al. | Geomim: Towards better 3d knowledge transfer via masked image modeling for multi-view 3d understanding | |
CN111581663A (en) | Federal deep learning method for protecting privacy and facing irregular users | |
CN113989115B (en) | Global mosaic removing method based on contrast learning | |
CN113674371B (en) | Three-dimensional element image array coding method based on five-dimensional quadratic kernel modeling | |
Lu et al. | BH-VQA: Blind High Frame Rate Video Quality Assessment | |
CN117494793A (en) | Privacy protection federal learning method based on consensus extraction and diversity propagation | |
Huang et al. | A Novel Federated Learning Framework Based on Conditional Generative Adversarial Networks for Privacy Preserving in 6G |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |