CN104202412A - Image storage method and system based on multiple cloud terminals - Google Patents

Image storage method and system based on multiple cloud terminals Download PDF

Info

Publication number
CN104202412A
CN104202412A CN201410470192.2A CN201410470192A CN104202412A CN 104202412 A CN104202412 A CN 104202412A CN 201410470192 A CN201410470192 A CN 201410470192A CN 104202412 A CN104202412 A CN 104202412A
Authority
CN
China
Prior art keywords
subgraph
picture element
element matrix
flag
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410470192.2A
Other languages
Chinese (zh)
Other versions
CN104202412B (en
Inventor
张明武
陈泌文
王春枝
沈华
夏勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201410470192.2A priority Critical patent/CN104202412B/en
Publication of CN104202412A publication Critical patent/CN104202412A/en
Application granted granted Critical
Publication of CN104202412B publication Critical patent/CN104202412B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image storage method and system based on multiple cloud terminals. The method includes: interference transformation is performed on a to-be-stored original image to obtain a preliminarily-encrypted image, Godel coding is used to separate the encrypted image into a certain number of sub-images, and the sub-images are stored at the cloud terminals. The method has the advantages that method storing the original image at the cloud terminal is replaced, and potential safety hazard of cloud terminal storage is solved while user image privacy protection and safety storage are achieved.

Description

A kind of picture-storage method and system based on cloudy end
Technical field
The present invention relates to picture processing field, high in the clouds and secret protection field, high in the clouds, particularly a kind of picture-storage method and system based on cloudy end.
Background technology
Along with storage system is direct-connected towards networking and distributed future development by this locality, and shared by the numerous computers on network, storage system is become and be more vulnerable to attack, static storage system often becomes assailant's preferred object relatively, reaches the object of stealing, distorting or destroying data.
High in the clouds storage is the pattern of storing on a kind of grid line, data is left in many virtual servers of conventionally being managed on behalf of another by third party, and user is the file of online management oneself whenever and wherever possible, and terminal is not had to fixing restriction, convenient and swift.But for the preservation of the privacy file of individual subscriber, can high in the clouds accomplish safety or have dispute.
Through the research in high in the clouds is found, show that high in the clouds exists potential safety hazard.First be that individual privacy is revealed hidden danger, from the viewpoint of technology and cost two, high in the clouds user's picture is to be expressly kept on high in the clouds mostly, and the manager in high in the clouds can check the picture in high in the clouds easily, and this is that user is less desirable.The data security hidden danger of next, the mass data of high in the clouds storage, allows it become the target of hacker attacks, and hacker may steal or Update Table, causes irremediable loss.
The problem that safe storage will solve has two problems, does not how guaranteeing that file data is complete reliably divulge a secret? how to guarantee only having legal user, access relevant file? solving above the core methed that two problems use is data encryption and Certificate Authority management.Yet in current picture preservation scheme safely, the mode based on file encryption, is encrypted file mostly, then decruption key is decrypted.But image ciphering is relative complex, encrypt single file simultaneously and may cause key to be lost or file damage, finally cause File lose.The protection based on to high in the clouds self mostly of the scheme of current high in the clouds safe storage, emphasizes the fail safe in high in the clouds self, with this, guarantees the data security in high in the clouds.There is again this complexity and easy loss property in data self-encryption, therefore, the picture-storage scheme of the cloudy end of a kind of safety is necessary.
Summary of the invention
The technical problem to be solved in the present invention is: a kind of picture-storage method and system based on cloudy end has solved picture safety problem beyond the clouds, single point failure problem and privacy leakage problem.
The present invention, in order to solve above-mentioned technical problem, has proposed a kind of picture-storage method and system based on cloudy end.
Technical scheme of the present invention is: a kind of picture-storage method based on cloudy end, comprises the steps:
Step 1: picture-storage step;
Step 1.1: extract the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C;
Step 1.2: convert original image to N subgraph, and constructing variable T, wherein, and the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N;
Step 1.3: to the capable Godel coding that carries out of i of the picture element matrix B after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer;
Step 1.4: according to Gi and flag structure multinomial, the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Step 1.5: for every subgraph adds secondary mark,, then the good subgraph of mark is assigned at random uniformly among a plurality of high in the clouds;
Step 2: picture recovering step:
Step 2.1: select subgraph from a plurality of high in the clouds;
Step 2.2: the subgraph of selecting is carried out to secondary mark checking, if subpicture tag is verified, retains current subgraph and enter step 2.3, otherwise, return to step 2.1 after giving up this subgraph;
Step 2.3: judge whether subgraph quantity reaches T; Be to enter step 2.4, otherwise return to step 2.1;
Step 2.4: extract the picture element matrix (P that T opens subgraph 1, P 2..., P t), T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, t represents that t opens subgraph, t between 1 to T, S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into;
Step 2.5: the S obtaining according to step 2.4 i tutilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
Step 2.6: open the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtain polynomial constant term, utilize Lagrange's interpolation obtain flag ‵ to be matched;
Step 2.7: flag ‵ value to be matched and former figure flag value are compared, if flag ‵ and flag not etc. time, return to step 2.1; If flag ‵=flag determines B ‵=B, enter step 2.8;
Step 2.8: B ‵ is disturbed to reduction; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1b C -1=C -1cAC C -1, obtain original image.
Described step 1.4 comprises the steps:
Step 1.4.1: according to Gi structure conversion multinomial, wherein: mod p is to multinomial delivery, p is large prime number, and j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, calculate c group (Fi (1) ..., Fi (N)) value, convert again these Godel coded numbers to pixel value that i is capable, obtain the pixel that i is capable, and obtain N the picture element matrix (P that r * c is capable 1, P 2..., P n); Wherein, system (0, P) the random T-1 number (a that produces in scope 1, a 2..., a t-1), for creating multinomial, provide coefficient, the modulus that P is large prime number;
Step 1.4.2: according to flag structure mark multinomial j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, distributes to t using the H calculating (t) and opens subgraph and identify as additional identification, the value of t be (1,2 ..., N); The additional identification sign that the result of calculating is each subgraph.
N in described step 1.2 and the value of T are respectively N=5, T=3.
A picture-storage system based on cloudy end, is characterized in that, comprises that picture storage module and picture recover module;
Picture storage module comprises:
The first extraction module: for extracting the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C;
Parametric configuration module: for original image being converted to N subgraph, and constructing variable T, wherein, and the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N;
Coding module: for the capable Godel coding that carries out of i of the picture element matrix B to after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer;
Polynomial construction module: for constructing multinomial according to Gi and flag, the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Distribution module: be used to every subgraph to add secondary mark,, then the good subgraph of mark is assigned at random uniformly among a plurality of high in the clouds;
Picture recovers module and comprises:
Select module: for selecting subgraph from a plurality of high in the clouds,
Authentication module: the subgraph of selecting is carried out to secondary mark checking, if subpicture tag is verified, retains current subgraph and enter judge module, otherwise, return to selection module after giving up this subgraph;
Judge module: judge whether subgraph quantity reaches T; Be to enter the second extraction module, otherwise return to selection module;
The second extraction module: the picture element matrix (P that opens subgraph for extracting T 1, P 2..., P t), T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, and t represents that t opens subgraph, and t is between 1 to T, so S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into.
Recover module: for the Sit obtaining according to extraction module, utilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
Matching module: open the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtain polynomial constant term, utilize Lagrange's interpolation obtain flag ‵ to be matched;
Comparison module: for flag ‵ value to be matched and former figure flag value are compared, if flag ‵ and flag not etc. time, return to selection module; If flag ‵=flag determines B ‵=B, enter computing module;
Computing module: for B ‵ is disturbed to reduction; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1b C -1=C -1cAC C -1, obtain original image.
The invention has the beneficial effects as follows:
First; a kind of picture-storage method based on cloudy end is the picture safe storage scheme based on cloudy end; mainly by utilizing deposit thought dividing of picture, solved the safety problem that picture is stored beyond the clouds; prevented that high in the clouds picture privacy from being revealed and picture has been operated to the situation that picture causes single point failure of deleting accidentally; by a former figure is divided and deposits a plurality of high in the clouds, successfully protected the safety of picture.
Secondly, this method is the picture safe storage scheme based on cloudy end, has utilized elementary transformation and Godel coding to solve the inefficiency problem in picture processing, takes full advantage of the computing capability in high in the clouds, by simple conversion, solves challenge.Thereby the efficiency of scheme is improved greatly.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of picture-storage step;
Fig. 2 is the schematic flow sheet of picture recovering step;
Fig. 3 is schematic flow sheet of the present invention.
Embodiment
Below in conjunction with the accompanying drawing of this programme, this programme implementation process is known to complete description, obviously, described embodiment is Center for architecture process.Embodiment based in this programme, those skilled in the art are not making under the prerequisite of innovative labor, and all implementation steps are the protection range of this programme.
A picture-storage method based on cloudy end, is characterized in that, comprises the steps:
Step 1: picture-storage step;
Step 1.1. extracts the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C.
User logs in high in the clouds by networked devices such as mobile device or pc ends, and selects the picture P that will preserve 1, the picture element matrix A of extraction picture, system produces unique sign flag, using flag as additional information, adds in matrix A, and flag value can be random integers, obtains (A, flag), and system generates an elementary transformation Matrix C and inverse matrix C -1, the scale of elementary matrix and picture element matrix equal and opposite in direction.Original pixels matrix A is carried out to elementary transformation and obtain B, be about to A premultiplication C and carry out line translation, then the right side is taken advantage of C to carry out rank transformation and is obtained disturbing rear matrix (B, flag).In the present embodiment, model demonstration is 3 * 3 matrixes for establishing matrix A 7 8 9 4 5 6 1 2 3 , System generation random number 1 is flag=1 as the value of flag, and elementary transformation Matrix C is 3 * 3 matrixes 0 1 0 0 0 1 1 0 0 , Inverse matrix C-1 is 0 0 1 1 0 0 0 1 0 Start data and be ( 7 8 9 4 5 6 1 2 3 , 1), B=C * A * C after conversion. B = 0 1 0 0 0 1 1 0 0 × 7 8 9 4 5 6 1 2 3 × 0 1 0 0 0 1 1 0 0 , Through arriving of calculating B = 6 4 1 3 1 2 9 7 8 Can find out that interference effect is obvious, after this step, obtain data for (B, 1).
Step 1.2. converts original image to N subgraph, and constructing variable T, wherein, the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N.After step 1.1 finishes, scheme provides two data N, T.N, T is positive number and T<=N, and N represents that original image will convert the number of subgraph to, the minimum subgraph number that T representative can extensive restored map.Be respectively N=5, T=3, for subsequent step provides system parameters;
I capable the carry out Godel coding of step 1.3. to the picture element matrix B after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer.In the present embodiment, to disturbing rear picture element matrix B = 6 4 1 3 1 2 9 7 8 Carry out Godel conversion, B is by 1 generation.The first row G 1=2 6* 3 4* 5 1=64 * 81 * 5=25920.G 2=2 3* 3 1* 5 2=600, G 3=2 9* 3 7* 5 8=512 * 27 * 390625=5400000000,
Step 1.4. is according to Gi and flag structure multinomial, and the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Step 1.4.1: according to Gi structure conversion multinomial, wherein: mod P is to multinomial delivery, P is large prime number, and j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, calculate c group (Fi (1) ..., Fi (N)) value, convert again these Godel coded numbers to pixel value that i is capable, obtain the pixel that i is capable, and obtain N the picture element matrix (P that r * c is capable 1, P 2..., P n); Wherein, system (0, P) the random T-1 number (a that produces in scope 1, a 2..., a t-1), for creating multinomial, provide coefficient, the modulus that P is large prime number;
In the present embodiment, system produces T-1=3-1=2 random number (a 1, a 2), be divided into a 1=1, a 2=2. item can to construct three multinomials be F 1(x)=G 1+ x+2x 2, F 2(x)=G 2+ x+2x 2, F 3(x)=G 3+ x+2x 2, x is expressed as equation variable, calculate (Fi (1) Fi (2) ..., Fi (5)) and obtain three groups of data (F 1(1)=25923, F 1(2)=25930, F 1(3)=25941, F 1(4)=25956, F 1(5)=25975), (F 1(1)=603, F 2(2)=610, F 2(3)=618, F 2(4)=636, F 2(5)=655), (F 3(1)=5400000003, F 3(2)=5400000010, F 3(3)=5400000018, F 3(4)=5400000036, F 3(5)=5400000055), according to fundamental theorem of arithmetic, the unique decomposition theorem that is called again positive integer, each is greater than 1 natural number all can be written as the long-pending of prime number, and after these prime factors arrange by size, literary style only has a kind of mode, therefore each the Godel coded number calculating can convert one group of new number to, a line using this group number of conversion as subimage prime matrix, therefore realizes these conversion imaging prime matrix forms is obtained to five picture element matrixs, is respectively P 1, P 2, P 3, P 4, P 5.As P 1, it by F 1 ( 1 ) F 2 ( 1 ) F 3 ( 1 ) ? 25923 603 5400000003 , It is carried out to prime factorization, and conversion imaging prime matrix is 3 8641 0 3 3 67 2 2 &times; 3 17 257 . Other the like, every number is decomposed.
Step 1.4.2: according to flag structure mark multinomial j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, distributes to t using the H calculating (t) and opens subgraph and identify as additional identification, the value of t be (1,2 ..., N); The additional identification sign that the result of calculating is each subgraph.
In the present embodiment, flag=1, random number (a 1, a 2) structure H (x)=1+x+2x 2.Calculate (H (1)=4, H (2)=11, H (3)=19, H (4)=37, H (5)=56), through above not process can obtain five with the similar structure (P of former figure 1, 4) and (P 2, 11) and (P 3, 19) and (P 4, 37) and (P 5, 56).
Step 1.5. is that every subgraph adds mark, as digital signature etc., after the good subgraph of mark is assigned among a plurality of high in the clouds at random uniformly.For every subgraph adds mark, then the good subgraph of mark is assigned among a plurality of high in the clouds at random uniformly, avoid single high in the clouds storing excess subgraph.After mark, subgraph 1, subgraph 2, subgraph 3, subgraph 4, subgraph 5.Be stored in three high in the clouds, subgraph 1 and subgraph 2 are preserved in high in the clouds 1, and subgraph 3 is preserved in high in the clouds 2, subgraph 4, and subgraph 5. is preserved in high in the clouds 3
Be picture recovering step below:
Step 2.1. selects subgraph from a plurality of high in the clouds.Due in the present embodiment, T=3, so only need find 3 subgraphs to recover.
Step 2.2. carries out secondary mark checking to the subgraph of selecting, if subpicture tag is verified, retains current subgraph and enters step 2.3, otherwise, return to step 2.1 after giving up this subgraph;
Mark proof procedure, chooser Fig. 3 in 2 beyond the clouds, the mark of checking subgraph 3, retains subgraph 3 by checking, and current reservation subgraph number is 1, owing to being less than T, continues checking subgraph.From high in the clouds 2, select destroyed subgraph 1 ', checking subgraph, authentication failed, gives up.
Step 2.3. judges whether subgraph quantity reaches T; Be to enter step 2.4, otherwise return to step 2.1;
In the present embodiment, chooser Fig. 4 from high in the clouds 2, verification mark, retains subgraph 4 by checking, chooser Fig. 5 from high in the clouds 3, verification mark, retains subgraph 5 by checking, and current reservation subgraph number is 3 to equal T.
Step 2.4. extracts the picture element matrix that T opens subgraph, T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, and t represents that t opens subgraph, and t is between 1 to T, so S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into.
In the present embodiment, through step 2.3, obtain the picture element matrix P of subgraph 3 3, the picture element matrix P of subgraph 4 4, obtain subgraph 5 picture element matrix P 5, and, the additional information H of three subgraphs (3), H (4), H (5), is (P 3, 19), (P 4, 37), (P 5, 56).By subimage prime matrix P 3, P 4and P 5every a line convert Godel coded number to, because three matrixes are 3*3 square formation, so obtain three groups of group data, data one are ((3,25941), (3,618), (3,5400000018)), data two are ((4,25956), (4,636), (4,5400000036)), data three are ((5,25975), (5,655), (5,5400000055)).
The S that step 2.5. obtains according to step 2.4 i tutilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
In the present embodiment, the data that obtained by step 2.4, according to three points in the known known quadratic polynomial of Lagrange's interpolation, can obtain quadratic polynomial, because obtain three function F 1 (x) in step 3, F2 (x), F3 (x) according to three groups of data, then make x equal 0, obtain constant term.While asking three functions, the Lagrange's interpolation formula of application is calculate F1 (0)=25920, F2 (0)=600, F3 (0)=5400000000, then converts the Godel coded number obtaining to matrix the first behavior (6,4,1) the second behavior (3,1,2), the third line is that (9,8,7) can obtain picture element matrix B = 6 4 1 3 1 2 9 7 8 .
Step 2.6. opens the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtains polynomial constant term, utilizes Lagrange's interpolation obtain flag ‵ to be matched.
In the present embodiment, extract the additional identification (P of three subgraphs 3, 19), (P 4, 37), (P 5, 56), utilize this three data, according to Lagrangian difference, calculate flag to be matched ‵=1.
Step 2.7. compares flag ‵ value to be matched and former figure flag value, if flag ‵ and flag not etc. time, return to step 2.1; If flag ‵=flag determines B ‵=B, enter step 2.8;
In the present embodiment, flag to be matched ‵=1 equates with the flag preserving, and proves and recovers correct, if flag ‵ to be matched is not equal to flag, from new recovery.
Step 2.8. disturbs reduction by B ‵; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1b C -1=C -1cAC C -1, obtain original image.By the flag calculating, compare with the flag retaining in step 1, if flag, it is correct that=flag represents to recover, by the picture element matrix recovering B = 6 4 1 3 1 2 9 7 8 Carry out inverse transformation and obtain the picture element matrix A of former picture, system provides the inverse matrix of the elementary transformation of reservation C - 1 0 0 1 1 0 0 0 1 0 , A=C -1b ‵ C -1=C -1b C -1=C -1cAC C - 1 = 7 8 9 4 5 6 1 2 3 . So far obtain the picture element matrix of former figure, former figure has recovered.
A picture-storage system based on cloudy end, is characterized in that, comprises that picture storage module and picture recover module;
Picture storage module comprises:
The first extraction module: for extracting the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C;
Parametric configuration module: for original image being converted to N subgraph, and constructing variable T, wherein, and the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N;
Coding module: for the capable Godel coding that carries out of i of the picture element matrix B to after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer;
Polynomial construction module: for constructing multinomial according to Gi and flag, the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Distribution module: be used to every subgraph to add secondary mark,, then the good subgraph of mark is assigned at random uniformly among a plurality of high in the clouds;
Picture recovers module and comprises:
Select module: for selecting subgraph from a plurality of high in the clouds,
Authentication module: the subgraph of selecting is carried out to secondary mark checking, if subpicture tag is verified, retains current subgraph and enter judge module, otherwise, return to selection module after giving up this subgraph;
Judge module: judge whether subgraph quantity reaches T; Be to enter the second extraction module, otherwise return to selection module;
The second extraction module: the picture element matrix (P that opens subgraph for extracting T 1, P 2..., P t), T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, and t represents that t opens subgraph, and t is between 1 to T, so S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into.
Recover module: for the Sit obtaining according to extraction module, utilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
Matching module: open the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtain polynomial constant term, utilize Lagrange's interpolation obtain flag ‵ to be matched;
Comparison module: for flag ‵ value to be matched and former figure flag value are compared, if flag ‵ and flag not etc. time, return to selection module; If flag ‵=flag determines B ‵=B, enter computing module;
Computing module: for B ‵ is disturbed to reduction; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1b C -1=C -1cAC C -1, obtain original image.

Claims (4)

1. the picture-storage method based on cloudy end, is characterized in that, comprises the steps:
Step 1: picture-storage step;
Step 1.1: extract the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C;
Step 1.2: convert original image to N subgraph, and constructing variable T, wherein, and the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N;
Step 1.3: to the capable Godel coding that carries out of i of the picture element matrix B after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer;
Step 1.4: according to Gi and flag structure multinomial, the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Step 1.5: for every subgraph adds secondary mark,, then the good subgraph of mark is assigned at random uniformly among a plurality of high in the clouds;
Step 2: picture recovering step:
Step 2.1: select subgraph from a plurality of high in the clouds;
Step 2.2: the subgraph of selecting is carried out to secondary mark checking, if subpicture tag is verified, retains current subgraph and enter step 2.3, otherwise, return to step 2.1 after giving up this subgraph;
Step 2.3: judge whether subgraph quantity reaches T; Be to enter step 2.4, otherwise return to step 2.1;
Step 2.4: extract the picture element matrix (P that T opens subgraph 1, P 2..., P t), T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, t represents that t opens subgraph, t between 1 to T, S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into;
Step 2.5: the S obtaining according to step 2.4 i tutilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
Step 2.6: open the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtain polynomial constant term, utilize Lagrange's interpolation obtain flag ‵ to be matched;
Step 2.7: flag ‵ value to be matched and former figure flag value are compared, if flag ‵ and flag not etc. time, return to step 2.1; If flag ‵=flag determines B ‵=B, enter step 2.8;
Step 2.8: B ‵ is disturbed to reduction; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1b C -1=C -1cAC C -1, obtain original image.
2. a kind of picture-storage method based on cloudy end according to claim 1, is characterized in that, described step 1.4 comprises the steps:
Step 1.4.1: according to Gi structure conversion multinomial, wherein: mod p is to multinomial delivery, p is large prime number, and j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, calculate c group (Fi (1) ..., Fi (N)) value, convert again these Godel coded numbers to pixel value that i is capable, obtain the pixel that i is capable, and obtain N the picture element matrix (P that r * c is capable 1, P 2..., P n); Wherein, system (0, P) the random T-1 number (a that produces in scope 1, a 2..., a t-1), for creating multinomial, provide coefficient, the modulus that P is large prime number;
Step 1.4.2: according to flag structure mark multinomial j is a value from 1 to T-1 variable, a jrepresent (a 1, a 2..., a t-1), x jj the power that represents x, distributes to t using the H calculating (t) and opens subgraph and identify as additional identification, the value of t be (1,2 ..., N); The additional identification sign that the result of calculating is each subgraph.
3. a kind of picture-storage method based on cloudy end according to claim 1 and 2, is characterized in that: the N in described step 1.2 and the value of T are respectively N=5, T=3.
4. the picture-storage system based on cloudy end, is characterized in that, comprises that picture storage module and picture recover module;
Picture storage module comprises:
The first extraction module: for extracting the picture element matrix A of former figure, for picture element matrix adds unique identification flag, and the flag value of preserving picture; Calculate the picture element matrix B after disturbing, B=C * A * C, system is preserved C -1, wherein, Matrix C is the elementary transformation matrix of picture element matrix A formed objects, C -1inverse matrix for Matrix C;
Parametric configuration module: for original image being converted to N subgraph, and constructing variable T, wherein, and the minimum subgraph number that T representative can extensive restored map, N and T are positive number and T≤N;
Coding module: for the capable Godel coding that carries out of i of the picture element matrix B to after disturbing, the Godel coded number of changing out is Gi, every a line of traversal picture element matrix; Wherein: if picture picture element matrix size is r * c, the value of i be (1,2,3 ..., c), i, r and c are positive integer;
Polynomial construction module: for constructing multinomial according to Gi and flag, the multinomial of Gi structure obtains the picture element matrix (P that N opens subgraph 1, P 2..., P n), according to the picture element matrix (P producing 1, P 2..., P n) formation subgraph; Meanwhile, the multinomial of flag structure obtains additional identification sign, for subgraph adds additional identification identification information;
Distribution module: be used to every subgraph to add secondary mark,, then the good subgraph of mark is assigned at random uniformly among a plurality of high in the clouds;
Picture recovers module and comprises:
Select module: for selecting subgraph from a plurality of high in the clouds,
Authentication module: the subgraph of selecting is carried out to secondary mark checking, if subpicture tag is verified, retains current subgraph and enter judge module, otherwise, return to selection module after giving up this subgraph;
Judge module: judge whether subgraph quantity reaches T; Be to enter the second extraction module, otherwise return to selection module;
The second extraction module: the picture element matrix (P that opens subgraph for extracting T 1, P 2..., P t), T is opened to the capable Godel coded number S that converts to of i of picture element matrix i t, wherein i represents that the i of picture element matrix is capable, and t represents that t opens subgraph, and t is between 1 to T, so S i tbe expressed as the Godel coded number that the capable pixel of i that t opens the picture element matrix of subgraph changes into;
Recover module: for the S obtaining according to extraction module i tutilize Lagrange's interpolation simultaneously wherein: t is integer, represent t pictures, j is integer, represents to obtain j pictures in subgraph, and mod p is delivery p, and p is a large prime number; Godel coded number Gi ‵ to recovering to disturb picture element matrix B ‵, carries out Godel code conversion by the Gi ‵ obtaining and obtains the capable pixel of picture element matrix i, by T being opened to each row of subgraph, carries out above-mentioned computing, obtains complete recovery and disturbs picture element matrix B ‵;
Matching module: open the additional identification sign H (t) of subgraph according to t, obtain T (t, H (t)) coordinate points, obtain polynomial constant term, utilize Lagrange's interpolation obtain flag ‵ to be matched;
Comparison module: for flag ‵ value to be matched and former figure flag value are compared, if flag ‵ and flag not etc. time, return to selection module; If flag ‵=flag determines B ‵=B, enter computing module;
Computing module: for B ‵ is disturbed to reduction; Utilize C -1recover original image prime matrix A, wherein, C -1for the inverse matrix of the elementary transformation Matrix C of picture element matrix A, finally calculate A=C -1b ‵ C -1=C -1bC -1=C -1cAC C -1, obtain original image.
CN201410470192.2A 2014-09-15 2014-09-15 A kind of picture storage method and system based on more high in the clouds Active CN104202412B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410470192.2A CN104202412B (en) 2014-09-15 2014-09-15 A kind of picture storage method and system based on more high in the clouds

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410470192.2A CN104202412B (en) 2014-09-15 2014-09-15 A kind of picture storage method and system based on more high in the clouds

Publications (2)

Publication Number Publication Date
CN104202412A true CN104202412A (en) 2014-12-10
CN104202412B CN104202412B (en) 2018-01-23

Family

ID=52087637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410470192.2A Active CN104202412B (en) 2014-09-15 2014-09-15 A kind of picture storage method and system based on more high in the clouds

Country Status (1)

Country Link
CN (1) CN104202412B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719263A (en) * 2009-12-08 2010-06-02 清华大学 Image visual dividing storing method with least dividing storage and optimal comparison
CN101751416A (en) * 2008-11-28 2010-06-23 中国科学院计算技术研究所 Method for ordering and seeking character strings
CN103118135A (en) * 2013-02-28 2013-05-22 中国地质大学(武汉) Method and system for protecting user data privacy in cloud computing
US20130283061A1 (en) * 2012-04-23 2013-10-24 Electronics & Telecommunications Research Institute Image processing method and apparatus for privacy protection of captured image
CN103840946A (en) * 2014-03-25 2014-06-04 山东大学 Image classifying authentication method based on (t, n) threshold secret key sharing and phase retrieval algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751416A (en) * 2008-11-28 2010-06-23 中国科学院计算技术研究所 Method for ordering and seeking character strings
CN101719263A (en) * 2009-12-08 2010-06-02 清华大学 Image visual dividing storing method with least dividing storage and optimal comparison
US20130283061A1 (en) * 2012-04-23 2013-10-24 Electronics & Telecommunications Research Institute Image processing method and apparatus for privacy protection of captured image
CN103118135A (en) * 2013-02-28 2013-05-22 中国地质大学(武汉) Method and system for protecting user data privacy in cloud computing
CN103840946A (en) * 2014-03-25 2014-06-04 山东大学 Image classifying authentication method based on (t, n) threshold secret key sharing and phase retrieval algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张选评 等: ""应用细粒度分块重构的多信道图像信息分存算法"", 《西安交通大学学报》 *

Also Published As

Publication number Publication date
CN104202412B (en) 2018-01-23

Similar Documents

Publication Publication Date Title
Li et al. Research on AI security enhanced encryption algorithm of autonomous IoT systems
CN105791321A (en) Cloud storage data common auditing method possessing secret key leakage resistance characteristic
CN103544674B (en) A kind of based on several only gradual Secret Image encryption sharing method
EP3096488B1 (en) Hypersphere-based multivariable public key encryption/decryption system and method
CN109981921B (en) Mixed chaotic virtual optical image encryption method
Malik et al. Novel authentication system using visual cryptography
CN106611136A (en) Data tampering verification method in cloud storage
Gao et al. An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN106530197A (en) Image encryption method based on Kent mapping and generalized Gray codes
CN116383837A (en) Image hiding method, system and equipment
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
CN112330551B (en) Remote sensing image outsourcing noise reduction method based on secret sharing
Ouyang et al. Blockchain-assisted verifiable and secure remote sensing image retrieval in cloud environment
Lin et al. Natural language letter based visual cryptography scheme
CN117235342A (en) Dynamic cloud auditing method based on homomorphic hash function and virtual index
Ahmad et al. A pixel-based encryption method for privacy-preserving deep learning models
CN116821926A (en) Image encryption and distribution method based on China remainder theorem
CN109948353A (en) Asymmetric more image encryption methods, device and storage medium
Abboud Protecting documents using visual cryptography
CN104202412A (en) Image storage method and system based on multiple cloud terminals
CN109918927B (en) Image encryption method and device
Sarkar et al. Blockchain-based authenticable (k, n) multi-secret image sharing scheme
Li et al. A reversible and lossless secret image sharing scheme with authentication for color images
Wu et al. Single-Channel Color Image Encryption Using the Reality-Preserving Fractional Discrete Cosine Transform in YCbCr Space.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant