CN114143410B - Electric power monitoring image encryption transmission method based on Internet of things - Google Patents

Electric power monitoring image encryption transmission method based on Internet of things Download PDF

Info

Publication number
CN114143410B
CN114143410B CN202111353509.0A CN202111353509A CN114143410B CN 114143410 B CN114143410 B CN 114143410B CN 202111353509 A CN202111353509 A CN 202111353509A CN 114143410 B CN114143410 B CN 114143410B
Authority
CN
China
Prior art keywords
image
foreground
electric power
vector
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111353509.0A
Other languages
Chinese (zh)
Other versions
CN114143410A (en
Inventor
王鹏飞
汤铭
邹昊东
陈咏秋
袁杰
杨巧德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center, Jiangsu Electric Power Information Technology Co Ltd, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
Priority to CN202111353509.0A priority Critical patent/CN114143410B/en
Publication of CN114143410A publication Critical patent/CN114143410A/en
Application granted granted Critical
Publication of CN114143410B publication Critical patent/CN114143410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses an electric power monitoring image encryption transmission method based on the Internet of things, which comprises the steps of separating the foreground and the background of a video frame, encrypting a foreground area, utilizing an encrypted training frame to help conceal contour information, introducing an image key into an improved monitoring video encryption algorithm besides using a digital key, and ensuring the encryption safety by improving the encryption algorithm. The invention makes full use of the characteristics of the monitoring video shot by the still camera, constructs the electric power monitoring image encryption transmission system based on the Internet of things, and has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like.

Description

Electric power monitoring image encryption transmission method based on Internet of things
Technical Field
The invention relates to an electric power monitoring image encryption transmission method based on the Internet of things.
Background
With the construction of smart power grids, the power grids in China are developing to large-scale, large-capacity, high-voltage level, informatization, intellectualization and the like. The online monitoring system mainly comprises a sensor, a communication network, a server and a database. It can monitor all links of the transmission line in real time and recognize and diagnose faults in time. The special natural environment of the high-voltage transmission line enables the traditional online monitoring system to focus on monitoring of single parameters such as temperature, humidity and the like. The transmitted monitoring data quantity is small, and the requirement of on-line patrol is far from being met. Therefore, there is an urgent need to introduce a practically effective means to expand the functionality of the online monitoring system to make it more intelligent.
Disclosure of Invention
Aiming at the problems, the invention aims to provide an electric power monitoring image encryption transmission method based on the Internet of things, and an image encryption transmission method capable of being used for electric power monitoring is constructed by combining the Internet of things technology, so that an intelligent electric power system monitoring system based on the Internet of things is obtained, related data is encrypted, and the electric power monitoring image encryption transmission method has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like.
The aim of the invention is achieved by the following technical scheme:
the electric power monitoring image encryption transmission method based on the Internet of things is characterized in that firstly, the foreground and the background of a video frame are separated, then the foreground area is encrypted, the encrypted training frame is utilized to help conceal contour information, and finally, an image key is introduced into an improved monitoring video encryption algorithm except for a digital key, so that the encryption security is ensured by improving the encryption algorithm. The method comprises the following specific steps:
step one, combining the image variance with the absolute gradient mean to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form.
Secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector. "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector. The matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]
and step three, after the foreground region information is encrypted, the foreground contour information still exists. The encrypted training framework is then utilized to help conceal the profile information. Since the number of training frames selected is much smaller than the number of video frames, a one-to-one correspondence between the two is not possible. Therefore, a sequence must be specified for the training frame so that the foreground of the training frame can be used to hide the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
and fifthly, encrypting the foreground image, and storing the digital key and the image key.
The beneficial effects are that: the present invention is different from the common video encryption method, and fully digs the characteristics of the monitoring video shot by the static camera and separates the foreground and the background of the video frame. In addition, it only encrypts the foreground area, reduces the video encryption rate, greatly increases the encryption speed, and ensures the encryption security by improving the encryption algorithm.
Drawings
FIG. 1 is a flow chart of an encryption method of the present invention;
FIG. 2 is a statistical graph of the image encryption transmission effect;
Detailed Description
The technical scheme of the invention is further described in detail below with reference to the accompanying drawings:
as shown in fig. 1, the implementation of the electric power monitoring image encryption transmission technology based on the internet of things comprises the following steps:
step one, combining the image variance with the absolute gradient mean to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form.
Secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector. "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector. The matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]。
and step three, after the foreground region information is encrypted, the foreground contour information still exists. The encrypted training framework is then utilized to help conceal the profile information. Since the number of training frames selected is much smaller than the number of video frames, a one-to-one correspondence between the two is not possible. Therefore, a sequence must be specified for the training frame so that the foreground of the training frame can be used to hide the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
and fifthly, encrypting the foreground image, and storing the digital key and the image key.
To further illustrate the method, the following simulations and experiments were performed. After the electric power monitoring image encryption transmission system based on the Internet of things is constructed, the electric power monitoring image processing effect, the image encryption effect and the image transmission effect of the system are detected by collecting images on site. The results obtained are shown in Table 1 and FIG. 2. Table 1 is performance parameters of an internet of things-based power monitoring image encryption transmission system.
Table 1 performance parameters of internet of things based power monitoring image encryption transmission system
According to simulation results, the electric power monitoring image encryption transmission system based on the Internet of things has good performances in the aspects of electric power monitoring image processing, image encryption, image transmission and the like. Therefore, the method provided by the invention has good practical effect.

Claims (1)

1. The electric power monitoring image encryption transmission method based on the Internet of things is characterized by comprising the following specific steps of:
combining the image variance with the absolute gradient mean value to obtain a weight coefficient, and smoothing pixels around the edge by adopting a multiple decomposition form to realize separation of the image foreground and the background;
secondly, encrypting the foreground region of the image by using a single-quantum bit gate circuit;
step three, after the foreground region information is encrypted, foreground contour information still exists; utilizing an encrypted training framework to help conceal profile information; since the number of selected training frames is far less than the number of video frames, a one-to-one correspondence between the two is not possible; thus, a sequence is assigned to the training frame such that the foreground of the training frame is used to conceal the contour information in the sequence;
encrypting the background image by using the background coverage coefficient, calculating a digital key, randomly selecting a picture, and constructing the picture into a required image key;
step five, the encryption of the foreground image is completed, and the digital key and the image key are saved, so that the image encryption transmission is realized;
the second step is as follows:
the single qubit gate I unitary gate used does not change the state of the qubit, and its model is as follows:
in the above equation, "| >" is referred to as a dirac symbol, also referred to as a right vector, which represents a column vector; "<|" is the dual vector of the right vector, called the left vector, which represents a row vector, also the conjugate conversion of the right vector; the matrix of two ground states of 0> and 1> is:
the matrix of <0| and <1| is:
<0|=[1 0],<1|=[0 1]。
CN202111353509.0A 2021-11-16 2021-11-16 Electric power monitoring image encryption transmission method based on Internet of things Active CN114143410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111353509.0A CN114143410B (en) 2021-11-16 2021-11-16 Electric power monitoring image encryption transmission method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111353509.0A CN114143410B (en) 2021-11-16 2021-11-16 Electric power monitoring image encryption transmission method based on Internet of things

Publications (2)

Publication Number Publication Date
CN114143410A CN114143410A (en) 2022-03-04
CN114143410B true CN114143410B (en) 2023-09-01

Family

ID=80393411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111353509.0A Active CN114143410B (en) 2021-11-16 2021-11-16 Electric power monitoring image encryption transmission method based on Internet of things

Country Status (1)

Country Link
CN (1) CN114143410B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115633193B (en) * 2022-12-19 2023-04-18 吉林省信息技术研究所 Monitoring video encryption method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2008053576A1 (en) * 2006-10-31 2010-02-25 富士通株式会社 Image encryption / decryption device, method and program
JP2011130120A (en) * 2009-12-16 2011-06-30 Sony Corp Quantum public key cryptosystem, key generation device, encryption device, decoder, key generating method, encryption method, and decoding method
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods
KR20160118117A (en) * 2015-04-01 2016-10-11 세종대학교산학협력단 Apparatus and method for secure transmission of video data
CN106875323A (en) * 2017-01-18 2017-06-20 中国人民武装警察部队工程大学 A kind of information concealing method and its device based on image encryption
CN110474769A (en) * 2019-08-23 2019-11-19 上海海事大学 A kind of quantum color image encrypting method based on modification direction
CN110996132A (en) * 2019-12-26 2020-04-10 合肥道正企智大数据有限公司 Video image splitting, encrypting and transmitting method, device and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008053576A (en) * 2006-08-28 2008-03-06 Matsushita Electric Ind Co Ltd Mounting head and electronic component mounting apparatus
CN100464584C (en) * 2006-11-21 2009-02-25 北京中星微电子有限公司 Video monitoring system and method for implementing signal encription
FR2932046B1 (en) * 2008-06-03 2010-08-20 Thales Sa METHOD AND SYSTEM FOR VISUALLY CRYPTING MOBILE OBJECTS WITHIN A COMPRESSED VIDEO STREAM

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2008053576A1 (en) * 2006-10-31 2010-02-25 富士通株式会社 Image encryption / decryption device, method and program
JP2011130120A (en) * 2009-12-16 2011-06-30 Sony Corp Quantum public key cryptosystem, key generation device, encryption device, decoder, key generating method, encryption method, and decoding method
KR20160118117A (en) * 2015-04-01 2016-10-11 세종대학교산학협력단 Apparatus and method for secure transmission of video data
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods
CN106875323A (en) * 2017-01-18 2017-06-20 中国人民武装警察部队工程大学 A kind of information concealing method and its device based on image encryption
CN110474769A (en) * 2019-08-23 2019-11-19 上海海事大学 A kind of quantum color image encrypting method based on modification direction
CN110996132A (en) * 2019-12-26 2020-04-10 合肥道正企智大数据有限公司 Video image splitting, encrypting and transmitting method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Quantum Image Encryption Algorithm Based on Image Correlation Decomposition;Tianxiang Hua等;International Journal of Theoretical Physics;全文 *

Also Published As

Publication number Publication date
CN114143410A (en) 2022-03-04

Similar Documents

Publication Publication Date Title
Chen et al. Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption
CN109104544B (en) Chaotic image encryption method based on complex network synchronization
CN111951149B (en) Image information steganography method based on neural network
Lin et al. Vision transformers are parameter-efficient audio-visual learners
CN114143410B (en) Electric power monitoring image encryption transmission method based on Internet of things
CN112995715B (en) Video frame insertion processing method and device, electronic equipment and storage medium
CN111130748A (en) Quantum chaotic parallel image encryption method
CN109062811B (en) Test case generation method based on neural style migration
CN114239737A (en) Encrypted malicious flow detection method based on space-time characteristics and double-layer attention
Jeong et al. Visual comfort assessment of stereoscopic images using deep visual and disparity features based on human attention
CN113987255B (en) Multi-source ciphertext image retrieval method based on federal learning and secret sharing
Liu et al. Towards better 3d knowledge transfer via masked image modeling for multi-view 3d understanding
CN112184555B (en) Stereo image super-resolution reconstruction method based on deep interactive learning
Song et al. TUSR-Net: triple unfolding single image dehazing with self-regularization and dual feature to pixel attention
CN110312138A (en) A kind of high embedding capacity video steganography method and system based on the modeling of time series error convolution
CN103903240B (en) Image super-resolution method based on multi output Least square support vector regression
Beguier et al. Efficient sparse secure aggregation for federated learning
CN113674230B (en) Method and device for detecting key points of indoor backlight face
Liu et al. Geomim: Towards better 3d knowledge transfer via masked image modeling for multi-view 3d understanding
CN111581663A (en) Federal deep learning method for protecting privacy and facing irregular users
CN113989115B (en) Global mosaic removing method based on contrast learning
CN113674371B (en) Three-dimensional element image array coding method based on five-dimensional quadratic kernel modeling
Lu et al. BH-VQA: Blind High Frame Rate Video Quality Assessment
CN117494793A (en) Privacy protection federal learning method based on consensus extraction and diversity propagation
Huang et al. A Novel Federated Learning Framework Based on Conditional Generative Adversarial Networks for Privacy Preserving in 6G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant