CN104794406B - A kind of private data guard method based on data camouflage color model - Google Patents

A kind of private data guard method based on data camouflage color model Download PDF

Info

Publication number
CN104794406B
CN104794406B CN201510119589.1A CN201510119589A CN104794406B CN 104794406 B CN104794406 B CN 104794406B CN 201510119589 A CN201510119589 A CN 201510119589A CN 104794406 B CN104794406 B CN 104794406B
Authority
CN
China
Prior art keywords
data
feature
private data
mapping
distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510119589.1A
Other languages
Chinese (zh)
Other versions
CN104794406A (en
Inventor
张德刚
吴毅
张少泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of Yunnan Power System Ltd
Original Assignee
Electric Power Research Institute of Yunnan Power System Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of Yunnan Power System Ltd filed Critical Electric Power Research Institute of Yunnan Power System Ltd
Priority to CN201510119589.1A priority Critical patent/CN104794406B/en
Publication of CN104794406A publication Critical patent/CN104794406A/en
Application granted granted Critical
Publication of CN104794406B publication Critical patent/CN104794406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of private data guard method based on data camouflage color model; the feature of analyze data storage environment first; including file title, document creation people, file size; file format; file type, date created, finally change the statistical information of date and data in itself; feature of these information as storage environment is extracted, and assigns different weights.Then descending arrangement is carried out according to the conspicuousness of these features, selects feature of the maximum of which top n feature as data storage environment.The distance between characteristic vector of private data and storage environment is calculated, the mapping established between minimum N number of environmental characteristic and the private data feature of distance, and be deposited into mapping database;User's private data is converted into the data of environmental characteristic expression according to mapping.When user needs to access the data, data are recovered by the mapping table in mapping database.It is of the invention easily to realize, it is easy to spread.

Description

A kind of private data guard method based on data camouflage color model
Technical field
The present invention proposes a kind of private data guard method based on data camouflage color model, and this method is related to internet The fields such as data safety, image watermarking, big data safety storage.
Background technology
With the development of internet and cloud computing technology, personal lifestyle and various social networks are closely connected one Rise, the information and data being closely related with personal identification are more and more spread on internet.The private data of these magnanimity For the very great value that has of some enterprises or organization, such as they are by excavating and analyzing these data Crowd is classified, huge interests are obtained by precision marketing.The privacy of people is in the case where knowing nothing by seriously Invade.How to be effectively protected personal private data becomes the most concerned problem of people.
In reality, soldier can be hidden in oneself in natural environment [1] by camouflage, and general principle is exactly handle Significant pattern or characteristic change, using some combined materials, are coloured or illuminated to be hidden into phase into irregular part As in background so that they are difficult to be found.Thus gain enlightenment, we have proposed a kind of private based on data camouflage color model Ciphertext data guard method, this method are similar to the same mode of military camouflage painting come hiding data, realization by establishing one The safety storage of personal private data.This method can significantly improve the safety of personal private information, while eliminate people To the misgivings of social networks.
The content of the invention
It is an object of the invention to provide a kind of private data guard method based on data camouflage color model, this method is by building Vertical one is similar to the same mode of military camouflage painting and carrys out hiding data, realizes the safety storage of personal private data, simultaneously Eliminate people using internet and interactive on social networks when to the worry of personal private information security.
To achieve the above object, the technical scheme is that:
The present invention proposes a kind of private data guard method based on data camouflage color model, this method analysis user's secret The feature of data, and data are represented using M feature of maximum.When user needs to store private data, number is analyzed first According to the feature of storage environment, including file title, document creation people, file size, file format, file type, date created, The statistical information of date and data in itself is finally changed, extracts feature of these information as storage environment, and assign difference Weight;Then descending arrangement is carried out according to value, selects feature of the maximum of which top n feature as data storage environment. The distance between characteristic vector of private data and storage environment is calculated, establishes the minimum N number of environmental characteristic of distance and secret number According to the mapping between feature, and it is deposited into mapping database;User's private data is converted into by environmental characteristic table according to mapping The data shown.When user needs to access the data, initial data is recovered by the mapping table in mapping database.
The personal private data conversion of the present invention is as shown in Figure 1 with hiding schematic flow sheet;
Personal private data conversion is with hiding flow chart as shown in Fig. 2 it is comprised the following steps that in the present invention:
1) personal private data feature description
The present invention includes some statistical informations of title, author, and data in itself as data by extract data Feature, these features are defined as Fp={ Fp1, Fp2, Fp3...Fpm, wherein, m is characteristic dimension;In view of different characteristic Significance level is different, and each feature is endowed different weights:And using M of maximum weight Feature represents data;
2) storage environment feature is extracted
The feature of analyze data storage environment of the present invention, including file title, document creation people, file size, tray Formula, file type, date created, the statistical information of date and data in itself is finally changed, extract these information as storage The feature of environment, the feature of environmental characteristic are defined as Fe={ Fe1, Fe2, Fe3...Fen, the wherein dimension of n characterizations, and n Much larger than m.Different in view of the significance degree of different characteristic, each feature is endowed different weights:Then descending arrangement is carried out according to the conspicuousness of these features, before selection wherein conspicuousness is maximum Feature of N number of feature as data storage environment;
3) personal private data conversion is with hiding
The present invention is represented according to the characterization of the personal private data obtained by step 1 and 2 and the spy of data storage environment Signization represents, the distance between characteristic vector of private data and storage environment is calculated, for every a pair of (Fe, Fp), calculate it Distance, (Fe, Fp) distance calculation formula is as follows:
Dis(Fe, Fp)=| | α Fe-αFp||
The distance of gained is arranged according to according to ascending order, selected distance minimum a pair as personal private data features with The distance of storage environment feature, and establish mapping ruler [Fe→Fp], it is final to establish the minimum N number of environmental characteristic of distance and secret Mapping between data characteristics, and be deposited into mapping rules database;Then user's private data is converted into according to mapping The data that environmental characteristic represents;
4) personal private data recovers
When user needs to access the data, according to the environmental characteristic for representing the data, from mapping rules database Original data characteristics is extracted, with original data characteristics table registration evidence, so as to recover data, and returns to user.
Personal private data is hidden the invention has the advantages that can be automatically performed according to environment, to different Data environment well adapts to ability.The present invention is hidden using data camouflage to data, adds personal secret The difficulty that data are excavated and found by unauthorized organizations and individuals, the security of personal private data can be significantly improved, simultaneously Eliminate when people use public network to the worry of safety problem, and the present invention easily realization, it is easy to spread.
Brief description of the drawings
Fig. 1 is the personal private data conversion of the present invention with hiding schematic flow sheet schematic diagram.
Fig. 2 is personal private data conversion in the present invention with hiding flow chart.
Embodiment
The present invention is further illustrated with reference to specific embodiment.
A kind of private data guard method based on data camouflage color model, the invention is characterised in that:Analyze user's secret number Data are represented according to the M feature using maximum;Wherein, when user needs to store private data, analyze data stores first The feature of environment, including file title, document creation people, file size, file format, file type, date created, are finally repaiied The statistical information of phase on some other day and data in itself, feature of these information as storage environment is extracted, and assign different weights; Then descending arrangement is carried out according to the conspicuousness of these features, selects maximum of which top n feature as data storage environment Feature;Calculate the distance between characteristic vector of private data and storage environment, establish the minimum N number of environmental characteristic of distance with Mapping between private data feature, and be deposited into mapping rules database;User's private data is turned according to mapping ruler Change the data of environmental characteristic expression into;When user needs to access the data, pass through the mapping in mapping rules database Table recovers initial data.
1) personal private data feature description
The present invention includes some statistical informations of title, author, and data in itself as data by extract data Feature, these features are defined as Fp={ Fp1, Fp2, Fp3...Fpm, wherein, m is characteristic dimension;In view of different characteristic Significance level is different, and each feature is endowed different weights:And using M of maximum weight Feature represents data;
2) storage environment feature is extracted
The feature of analyze data storage environment of the present invention, including file title, document creation people, file size, tray Formula, file type, date created, the statistical information of date and data in itself is finally changed, extract these information as storage The feature of environment, the feature of environmental characteristic are defined as Fe={ Fe1, Fe2, Fe3...Fen, the wherein dimension of n characterizations, and n Much larger than m.Different in view of the significance degree of different characteristic, each feature is endowed different weights:Then descending arrangement is carried out according to the conspicuousness of these features, selection wherein conspicuousness maximum Feature of the top n feature as data storage environment;
3) personal private data conversion is with hiding
The present invention is represented according to the characterization of the personal private data obtained by step 1 and 2 and the spy of data storage environment Signization represents, the distance between characteristic vector of private data and storage environment is calculated, for every a pair of (Fe, Fp), calculate it Distance, (Fe, Fp) distance calculation formula is as follows:
Dis(Fe, Fp)=| | α Fe-αFp||
The distance of gained is arranged according to according to ascending order, selected distance minimum a pair as personal private data features with The distance of storage environment feature, and establish mapping ruler [Fe→Fp], it is final to establish the minimum N number of environmental characteristic of distance and secret Mapping between data characteristics, and be deposited into mapping rules database;Then user's private data is converted into according to mapping The data that environmental characteristic represents;
4) personal private data recovers
When user needs to access the data, according to the environmental characteristic for representing the data, from mapping rules database Original data characteristics is extracted, with original data characteristics table registration evidence, so as to recover data, and returns to user.

Claims (2)

  1. A kind of 1. private data guard method based on data camouflage color model, it is characterised in that:User's private data is analyzed to use M maximum feature of weight represents data;Wherein, when user needs to store private data, analyze data storage ring first The feature in border, including file title, document creation people, file size, file format, file type, date created, are finally changed The statistical information of date and data in itself, feature of these information as storage environment is extracted, and assign different weights;So Descending arrangement is carried out according to the conspicuousness of these features afterwards, the maximum top n feature of selection wherein weight is as data storage ring The feature in border;The distance between characteristic vector of private data and storage environment is calculated, establishes the minimum N number of environmental characteristic of distance With the mapping between private data feature, and it is deposited into mapping rules database;According to mapping ruler by user's private data It is converted into the data of environmental characteristic expression;When user needs to access the data, pass through reflecting in mapping rules database Firing table recovers initial data.
  2. A kind of 2. private data guard method based on data camouflage color model according to claim 1, it is characterised in that:With The step of family private data conversion is:
    1) personal private data feature description
    The present invention includes spy of some statistical informations as data of title, author, and data in itself by extract data Sign, these features are defined as Fp={ Fp1, Fp2, Fp3...Fpm, wherein, m is characteristic dimension;In view of the important of different characteristic Degree is different, and each feature is endowed different weights:And using M maximum feature of weight To represent data;
    2) storage environment feature is extracted
    The feature of analyze data storage environment, including file title, document creation people, file size, file format, files classes Type, date created, the statistical information of date and data in itself is finally changed, extracts spy of these information as storage environment Sign, the feature of storage environment are defined as Fe={ Fe1, Fe2, Fe3...Fen, wherein n represents the dimension of feature, and n is more than m; Different in view of the significance degree of different characteristic, each feature is endowed different weights:So Descending arrangement is carried out according to the conspicuousness of these features afterwards, the maximum top n feature of selection wherein conspicuousness is as data storage The feature of environment;
    3) personal private data conversion is with hiding
    According to step 1) and 2) obtained by personal private data characterization represent and data storage environment characterization represent, The distance between characteristic vector of private data and storage environment is calculated, for every a pair of (Fe, Fp), their distance is calculated, (Fe, Fp) distance calculation formula is as follows:
    Dis(Fe, Fp)=| | aFe-αFp||
    The distance of gained is arranged according to according to ascending order, a pair of selected distance minimum are used as personal private data feature and storage The distance of environmental characteristic, and establish mapping ruler [Fe→Fp], it is final to establish distance minimum N number of environmental characteristic and private data Mapping between feature, and be deposited into mapping rules database;Then user's private data is converted into by environment according to mapping The data of character representation;
    4) personal private data recovers
    When user needs to access the data, according to the environmental characteristic for representing the data, extracted from mapping rules database Data characteristics originally, with original data characteristics table registration evidence, so as to recover data, and return to user.
CN201510119589.1A 2015-03-18 2015-03-18 A kind of private data guard method based on data camouflage color model Active CN104794406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510119589.1A CN104794406B (en) 2015-03-18 2015-03-18 A kind of private data guard method based on data camouflage color model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510119589.1A CN104794406B (en) 2015-03-18 2015-03-18 A kind of private data guard method based on data camouflage color model

Publications (2)

Publication Number Publication Date
CN104794406A CN104794406A (en) 2015-07-22
CN104794406B true CN104794406B (en) 2018-03-27

Family

ID=53559195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510119589.1A Active CN104794406B (en) 2015-03-18 2015-03-18 A kind of private data guard method based on data camouflage color model

Country Status (1)

Country Link
CN (1) CN104794406B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778295B (en) * 2016-11-30 2020-04-10 Oppo广东移动通信有限公司 File storage method, file display method, file storage device, file display device and terminal
CN108133294B (en) * 2018-01-10 2020-12-04 阳光财产保险股份有限公司 Prediction method and device based on information sharing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
CN103106635A (en) * 2012-12-26 2013-05-15 浙江大学 Hiding method and device for digital camouflage information
CN104200171A (en) * 2014-08-20 2014-12-10 中国科学技术大学先进技术研究院 Virtual file system based on information hiding

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090132419A1 (en) * 2007-11-15 2009-05-21 Garland Grammer Obfuscating sensitive data while preserving data usability

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
CN103106635A (en) * 2012-12-26 2013-05-15 浙江大学 Hiding method and device for digital camouflage information
CN104200171A (en) * 2014-08-20 2014-12-10 中国科学技术大学先进技术研究院 Virtual file system based on information hiding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"数码迷彩的信息隐藏技术研究";涂植跑;《中国优秀硕士学位论文全文数据库信息科技辑》;20121015;第2.2节 *

Also Published As

Publication number Publication date
CN104794406A (en) 2015-07-22

Similar Documents

Publication Publication Date Title
Goetz et al. The evolution of geo-crowdsourcing: bringing volunteered geographic information to the third dimension
Ahmed et al. Solving visual pollution with deep learning: A new nexus in environmental management
CN104504335B (en) Fishing APP detection methods and system based on page feature and URL features
CN104794406B (en) A kind of private data guard method based on data camouflage color model
Kozubaev Stop nigmas: Experimental speculative design through pragmatic aesthetics and public art
WO2022134782A1 (en) Method, apparatus and device for processing text to be obfuscated, and storage medium
Presa Reyes et al. Multimedia data management for disaster situation awareness
Tang RETRACTED: Application of internet thinking in the teaching of environmental art design
Tenzer Tweets in the Peak: Twitter Analysis—The impact of COVID-19 on cultural landscapes
Dentoni et al. Visual impact evaluation of mines and quarries: the updated Lvi method
Fritsch Profiling and location-based services (lbs)
Muhammad et al. Ontology-based secure retrieval of semantically significant visual contents
Morris et al. Deriving privacy and security considerations for core: An indoor iot adaptive context environment
Vasquez Toral Queer Fiesta: Hybridity, drag and performance in Bolivian folklore
NAEEM et al. WSN based sensing model for smart crowd movement with identification: An extended study
KR101741943B1 (en) Apparatus and method for visualizing 3d cadastral objects
Ihsan et al. ULIN-D: Web-based GIS supporting new habits in the tourism sector in Bandung city
CN104580234B (en) The guard method of behavioural characteristic in a kind of social networks
Pansoni et al. Artificial intelligence and cultural heritage: Design and assessment of an ethical framework
Oliver et al. Hip-hop urbanism, placemaking and community-building among Black LGBT youth in Rio de Janeiro, Brazil
Pendergrass The intersection of human trafficking and technology
CN101009023A (en) Network information release terminal
Ozimek et al. Viewshed analyses as support for objective landscape assessment
Dremlyuga Virtual reality: Common problems of legal regulation
Sedano 'Sensor'ship and spatial data quality

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant