CN108712400B - Data transmission method and device, computer readable storage medium and electronic equipment - Google Patents

Data transmission method and device, computer readable storage medium and electronic equipment Download PDF

Info

Publication number
CN108712400B
CN108712400B CN201810403819.0A CN201810403819A CN108712400B CN 108712400 B CN108712400 B CN 108712400B CN 201810403819 A CN201810403819 A CN 201810403819A CN 108712400 B CN108712400 B CN 108712400B
Authority
CN
China
Prior art keywords
data
speckle image
image
speckle
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810403819.0A
Other languages
Chinese (zh)
Other versions
CN108712400A (en
Inventor
周海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810403819.0A priority Critical patent/CN108712400B/en
Publication of CN108712400A publication Critical patent/CN108712400A/en
Priority to PCT/CN2019/080470 priority patent/WO2019196684A1/en
Application granted granted Critical
Publication of CN108712400B publication Critical patent/CN108712400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The application relates to a data transmission method, a data transmission device, a computer readable storage medium and an electronic device. The method comprises the following steps: acquiring data to be transmitted; acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera; encrypting the data to be transmitted according to the first speckle image to obtain encrypted data; and sending the encrypted data to a data receiving end. The data transmission method, the data transmission device, the computer readable storage medium and the electronic equipment can improve the safety of data transmission.

Description

Data transmission method and device, computer readable storage medium and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data transmission method and apparatus, a computer-readable storage medium, and an electronic device.
Background
In the internet era, data needs to be transmitted to realize communication and sharing of information, so that the data is transmitted very frequently and importantly. However, data is usually transmitted through a common data transmission channel, so that the data is extremely easy to intercept during transmission. Once the data is revealed, a great safety hazard exists.
Disclosure of Invention
The embodiment of the application provides a data transmission method, a data transmission device, a computer readable storage medium and electronic equipment, which can improve the security of data transmission.
A method of data transmission, the method comprising:
acquiring data to be transmitted;
acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
and sending the encrypted data to a data receiving end.
A data transmission apparatus, the apparatus comprising:
the data acquisition module is used for acquiring data to be transmitted;
the device comprises a first image acquisition module, a second image acquisition module and a control module, wherein the first image acquisition module is used for acquiring a first speckle image, and the first speckle image is an image formed by irradiating laser speckles acquired by a laser camera on an object;
the encryption processing module is used for encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
and the data sending module is used for sending the encrypted data to a data receiving end.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring data to be transmitted;
acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
and sending the encrypted data to a data receiving end.
An electronic device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, cause the processor to perform the steps of:
acquiring data to be transmitted;
acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
and sending the encrypted data to a data receiving end.
A method of data transmission, the method comprising:
receiving encrypted data sent by a data sending end, wherein the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image;
acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
and carrying out decryption processing on the encrypted data according to the second speckle image.
A data transmission apparatus, the apparatus comprising:
the data receiving module is used for receiving encrypted data sent by a data sending end, and the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image;
the second image acquisition module is used for acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
and the decryption processing module is used for decrypting the encrypted data according to the second speckle image.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving encrypted data sent by a data sending end, wherein the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image;
acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
and carrying out decryption processing on the encrypted data according to the second speckle image.
An electronic device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, cause the processor to perform the steps of:
receiving encrypted data sent by a data sending end, wherein the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image;
acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
and carrying out decryption processing on the encrypted data according to the second speckle image.
According to the data transmission method, the data transmission device, the computer readable storage medium and the electronic equipment, the speckle images can be obtained when the data sending end sends data, the data are encrypted through the obtained speckle images, and then the encrypted data are sent to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of an exemplary data transmission method;
FIG. 2 is a schematic diagram showing an internal configuration of an electronic apparatus according to an embodiment;
FIG. 3 is a flow diagram of a method for data transmission in one embodiment;
FIG. 4 is a flow chart of a method of data transmission in another embodiment;
FIG. 5 is a flow chart of a data transmission method in yet another embodiment;
FIG. 6 is a flow chart of a method of data transmission in yet another embodiment;
FIG. 7 is a flow chart of a data transmission method in yet another embodiment;
FIG. 8 is a timing diagram illustrating interaction between a data sender and a data receiver according to an embodiment;
FIG. 9 is a schematic diagram showing an internal configuration of an electronic apparatus according to an embodiment;
FIG. 10 is a diagram of a software architecture for implementing a data transfer method according to one embodiment;
FIG. 11 is a schematic diagram of the structure of a data transmission apparatus according to an embodiment;
FIG. 12 is a schematic structural diagram of a data transmission device according to another embodiment;
FIG. 13 is a schematic diagram of an image processing circuit in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first client may be referred to as a second client, and similarly, a second client may be referred to as a first client, without departing from the scope of the present application. Both the first client and the second client are clients, but they are not the same client.
Fig. 1 is a diagram of an application environment of a data transmission method in one embodiment. As shown in fig. 1, the application environment includes a terminal 102 and a terminal 104. Terminal 102 serves as a data transmitting end and terminal 104 serves as a data receiving end. The terminal 102 may obtain the data to be transmitted and the first speckle image, and encrypt the data to be transmitted through the first speckle image to obtain encrypted data. The encrypted data is then transmitted to the terminal 104. After receiving the encrypted data, the terminal 104 acquires a second speckle image, and decrypts the encrypted data by using the second speckle image. The terminals 102 and 104 are electronic devices located at the outermost periphery of the computer network and mainly used for inputting user information and outputting processing results, and may be, for example, personal computers, mobile terminals, personal digital assistants, wearable electronic devices, and the like. The application environment of the data transmission method may only include the terminal 102 or the terminal 104, that is, the terminal 102 or the terminal 104 may implement internal data transmission, and may be used as both a data sending end and a data receiving end. In other embodiments provided by the present application, the data transmission method is also applicable to a process in which a terminal sends data to a server, or a server sends data to a terminal, and the specific data transmission process is not described in detail. A server is a device for responding to service requests while providing computing services. The server may be a cluster of servers, i.e., a server may comprise one or more computers.
Fig. 2 is a schematic diagram of an internal structure of an electronic device in one embodiment. As shown in fig. 2, the electronic device 202 includes a processor, memory, and a network interface connected by a system bus. Wherein the processor is configured to provide computing and control capabilities to support the operation of the entire electronic device 202. The memory is used for storing data, programs and the like, and the memory stores at least one computer program which can be executed by the processor to realize the wireless network communication method suitable for the electronic device 202 provided in the embodiment of the present application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program can be executed by a processor for implementing a data transmission method provided in the following embodiments. The internal memory provides a cached execution environment for the operating system computer programs in the non-volatile storage medium. The network interface may be an ethernet card or a wireless network card, etc. for communicating with the external electronic device 202. The electronic device 202 may be a mobile phone, a tablet computer, or a personal digital assistant or a wearable device, etc.
Fig. 3 is a flow chart of a data transmission method in one embodiment. As shown in fig. 3, the data transmission method includes steps 302 to 308. Wherein:
step 302, obtain data to be transmitted.
Specifically, the electronic device continuously generates data during the operation process, so as to continuously receive and send the data, thereby implementing data transmission between different electronic devices, or implementing data transmission inside the electronic device. In the process of data transmission, a data transmitting end and a data receiving end exist, the data transmitting end is the end for transmitting data, and the data receiving end is the end for receiving data. The data sending end and the data receiving end can be different electronic devices respectively, and can also be different modules of the same electronic device. For example, when a mobile phone a and a mobile phone B are talking, the mobile phone a will send voice data to the mobile phone B, and the mobile phone B will also send voice data to the mobile phone a. In the process of speaking of the user of the mobile phone A, the mobile phone A firstly acquires voice data through the voice acquisition module, and then sends the acquired voice data to the mobile phone B through the communication module, so that the transmission process of the voice data from the voice acquisition module to the communication module needs to be realized inside the mobile phone A.
It will be appreciated that there are different types of data that are transmitted in electronic devices. For example, image data is generated at the time of photographing, and voice data is generated at the time of talking. When data is transmitted, the transmitted data generally also includes information such as a sending end identifier, a receiving end identifier, sending time, a data format, a data size and the like, the electronic device can search the electronic device or module which correspondingly receives the data through the receiving end identifier, the data receiving end can judge the data sending end which sends the data according to the sending end identifier, and acquire related information of the data according to the information such as the data format, the data size and the like.
And 304, acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating the laser speckle collected by the laser camera to an object.
In one embodiment, the speckle image refers to an image formed by irradiating laser speckles collected by a laser camera onto an object. When laser irradiates on the optical rough surface with the average fluctuation larger than the wavelength order, wavelets scattered by surface elements randomly distributed on the surface are mutually superposed to enable the reflected light field to have random space light intensity distribution, and a granular structure is presented, namely laser speckle. The laser speckles formed are highly random, and therefore, the laser speckles generated by the laser emitted by different laser emitters are different. When the resulting laser speckle is projected onto objects of different depths and shapes, the resulting speckle images are not identical. Generally, laser speckles can be generated by a laser transmitter, and after the laser speckles are irradiated on an object, a formed speckle image can be collected by a laser camera. The laser speckles formed by different laser emitters are unique, and therefore the speckle images obtained are also unique.
In the process of encrypting the speckle images, the acquired speckle images can be pre-stored speckle images or real-time acquired speckle images. Specifically, the data sending end and the data receiving end can store the same speckle images, after the data sending end encrypts the data through the pre-stored speckle images, the encrypted data are sent to the data receiving end, and then the data receiving end decrypts the data through the stored speckle images. If the data sending end encrypts the speckle images acquired in real time, the acquired speckle images and the encrypted data can be sent to the data receiving end together. Because the speckle images acquired by the electronic equipment have uniqueness and the speckle images acquired by different electronic equipment are different, the encryption results of the data encrypted by different electronic equipment are also different, and the data security is higher.
Specifically, step 304 may include: and acquiring a first speckle image prestored in the data sending end. The stored first speckle image can be a first speckle image collected when the electronic device performs camera calibration, and the collected first speckle image is stored in a trusted operating environment to ensure the safety of data operation. It can be understood that different speckle images can be set for decryption according to different data receiving ends. The data sending end can set corresponding speckle images according to different data receiving ends for receiving data, and establishes the corresponding relation between the image identification of the speckle images and the identification of the receiving ends. When data is transmitted, the corresponding speckle images can be obtained according to the receiving end identification of the data receiving end, and encryption processing is carried out according to the obtained speckle images.
Acquiring the speckle image may specifically include: and acquiring a target receiving end identifier of the data receiving end, and acquiring a first speckle image corresponding to the target receiving end identifier pre-stored in the data sending end. The receiving end identifier is a unique identifier used for distinguishing different data receiving ends, for example, when one electronic device sends data to another electronic device, the receiving end identifier may be a device label of the electronic device receiving the data. If data is transmitted between different modules in an electronic device, the receiving end identifier may be a module identifier of the data receiving module. For example, an application program may be installed in the electronic device, the application program may call the camera to obtain the depth image, and after the camera acquires the depth image, the depth image may be encrypted according to speckle images corresponding to different application programs, and the encrypted depth image is transmitted to the corresponding application program.
In an embodiment, if the data sending end needs to acquire the speckle image in real time to encrypt the data, acquiring the first speckle image may specifically include: and opening the laser camera and the laser emitter, and collecting a first speckle image formed by irradiating laser speckles on an object through the laser camera, wherein the laser speckles are emitted by the laser emitter. That is, when it is detected that data to be transmitted needs to be transmitted, the laser camera and the laser transmitter can be immediately turned on. The laser emitter can emit laser speckles, and collects a first speckle image formed by irradiating the laser speckles on an object through the laser camera. It is to be understood that, if the data is encrypted according to the first speckle image acquired in real time, acquiring the first speckle image further includes: and sending the collected first speckle image to a data receiving end. Therefore, the data receiving end can perform decryption processing according to the received first speckle image.
And step 306, encrypting the data to be transmitted according to the first speckle image to obtain encrypted data.
It is understood that the acquired first speckle image is formed by a two-dimensional pixel matrix, and each pixel has a corresponding pixel value. Because the first speckle image acquired by the electronic device has uniqueness, the first speckle image can be used as an encryption key for encrypting data to be transmitted. And encrypting the data to be transmitted according to the first speckle image to obtain encrypted data. For example, if the data to be transmitted may be an image to be transmitted, the first speckle image may be directly superimposed with the image to be transmitted, so as to obtain an encrypted image. Or performing product operation on the pixel matrix corresponding to the image to be transmitted and the pixel matrix corresponding to the first speckle image to obtain an encrypted image. The pixel values corresponding to one or more pixel points in the first speckle image may also be used as an encryption key to encrypt the data to be transmitted, and a specific encryption algorithm is not limited in this embodiment.
Step 308, sending the encrypted data to the data receiving end.
And after the encryption processing, the encrypted data is obtained, and the data sending end can send the encrypted data to the data receiving end. If the data sending end encrypts according to the pre-stored speckle images, the data receiving end also pre-stores a same speckle image, and the data receiving end can decrypt according to the pre-stored speckle images after receiving the large encrypted data. If the data sending end carries out encryption processing according to the speckle images acquired in real time, the data sending end can send the acquired speckle images to the data receiving end together when sending the encrypted data, and the data receiving end can carry out decryption processing according to the received speckle images after receiving the encrypted data. In order to improve the security of the data, the data sending end can send the speckle images and the encrypted data in a time-sharing manner, so that the data leakage caused by the fact that the speckle images and the encrypted data are simultaneously intercepted is avoided.
In one embodiment, when the data sending end performs encryption processing according to the pre-stored speckle images, the data receiving end needs to store the same speckle images to decrypt the encrypted data. The data sending end can record the data receiving end which receives the speckle images through the receiving list, and when the encrypted data is sent, the target receiving end identification can be compared with the receiving end identification in the receiving list. If the target receiving end identification is matched with the receiving end identification in the receiving list, it is indicated that the data receiving end corresponding to the target receiving end identification receives the speckle image, and the speckle image does not need to be sent to the data receiving end. On the contrary, it is indicated that the data receiving end corresponding to the target receiving end identifier has not received the speckle image, and when sending the encrypted data, the speckle image needs to be sent to the data receiving end together. The method specifically comprises the following steps:
step 402, acquiring a target receiving end identifier of a data receiving end.
And step 404, if the target receiving end identification is matched with the receiving end identification in the receiving list, sending the encrypted data to a data receiving end, wherein the receiving end identification in the receiving list is used for uniquely marking one data receiving end storing the speckle image.
And step 406, if the target receiving end identifier does not match the receiving end identifiers in the receiving list, sending the encrypted data and the first speckle image to a data receiving end.
In the embodiment provided by the application, if the target receiving end identifier is not matched with the receiving end identifier in the receiving list, it is indicated that the speckle image for decryption is not stored in the data receiving end corresponding to the target receiving end identifier, and the data sending end can acquire the speckle image in real time when encrypting, and can also acquire the pre-stored speckle image. Specifically, whether to acquire the speckle image in real time or to acquire the speckle image stored in advance may be decided according to the remaining power of the electronic device. And acquiring the residual electric quantity of the electronic equipment where the data sending end is positioned, and acquiring the speckle image according to the residual electric quantity. When the residual electric quantity is higher, encryption processing can be carried out according to the speckle images acquired in real time; when the residual electric quantity is lower, the speckle images do not need to be acquired in real time, and encryption processing is directly carried out according to the pre-stored speckle images, so that the electric quantity of the electronic equipment is saved. Specifically, if the residual electric quantity is larger than the electric quantity threshold value, a laser camera and a laser transmitter are turned on, and a speckle image formed by irradiating laser speckles on an object is collected through the laser camera; and if the residual electric quantity is less than or equal to the electric quantity threshold value, acquiring a speckle image prestored in the electronic equipment.
In other embodiments provided by the present application, the method for performing encryption processing according to the first speckle image specifically may include:
step 502, a pixel matrix corresponding to the first speckle image is obtained, and an encryption key is obtained according to the pixel matrix.
Specifically, the image is composed of a plurality of pixel points distributed according to a certain rule, each pixel point corresponds to a pixel value, and the pixel values can form a pixel matrix. Since the acquired speckle images are unique, the corresponding pixel matrix of the speckle images is also unique. The pixel matrix itself can be used as an encryption key to encrypt data to be transmitted, or the pixel matrix can be converted to obtain an encryption key, and the encryption key obtained by conversion is used to encrypt the data to be transmitted. For example, the pixel matrix is a two-dimensional matrix formed by a plurality of pixel values, and the position of each pixel value in the pixel matrix can be represented by a two-dimensional coordinate, so that the corresponding pixel value can be obtained by one or more position coordinates, and the obtained one or more pixel values are combined into an encryption key.
And step 504, encrypting the data to be transmitted according to the encryption key to obtain encrypted data.
After the encryption key is obtained, the data to be transmitted may be encrypted according to the encryption key, and specifically, the encryption algorithm is not limited in this embodiment. For example, the encryption key may be directly superimposed or multiplied with the data to be transmitted, or the encryption key may be inserted as a value into the data to be transmitted, so as to obtain the final encrypted data.
In an embodiment, the method for obtaining an encryption key may specifically include:
step 602, obtaining data attribute parameters of the data to be transmitted, and obtaining a key algorithm according to the data attribute parameters.
When the data to be transmitted is encrypted, different data can be encrypted differently. Specifically, the data attribute parameter is a related parameter used for representing an attribute of the data to be transmitted, and may be, but is not limited to, information such as a data format, a data size, a receiving end identifier, and sending time of the data to be transmitted. The electronic equipment can preset the corresponding relation between the data attribute parameters and the key algorithm, when the data sending end sends the data to be transmitted, the corresponding key algorithm can be obtained according to the data attribute parameters, and then the encryption key corresponding to the pixel matrix is calculated according to the key algorithm.
For example, different encryption processing can be performed on data to be transmitted in different formats, and when the image is encrypted, a pixel matrix corresponding to the speckle image can be converted into a pixel matrix with the same dimension as that of the image to be transmitted, and the pixel matrix is used as an encryption key. When the character data is encrypted, one or more pixel values in the pixel matrix can be directly taken as an encryption key. For example, the pixel matrix corresponding to the speckle image is 3 × 3, and the image to be transmitted is 2 × 2, then any 2 × 2 dimensional sub-matrix in the pixel matrix corresponding to the speckle image may be directly taken as the encryption key, and then the obtained encryption key and the image to be transmitted are directly superimposed or multiplied, so as to obtain the encrypted image.
Step 604, calculating an encryption key corresponding to the pixel matrix according to a key algorithm.
The data transmission method provided by the embodiment can acquire the speckle images when the data transmitting end transmits data, encrypt the data through the acquired speckle images, and then transmit the encrypted data to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
Fig. 7 is a flowchart of a data transmission method in yet another embodiment. As shown in fig. 7, the data transmission method includes steps 702 to 706. Wherein:
step 702, receiving encrypted data sent by a data sending end, wherein the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image.
And step 704, acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating the object with laser speckles collected by a laser camera.
Specifically, the data sending end encrypts data to be transmitted to generate encrypted data, and then sends the encrypted data to the data receiving end. And the data receiving end acquires a second speckle image after receiving the encrypted data. The first speckle image and the second speckle image are the same speckle image, and the data receiving end can decrypt the encrypted data according to the second speckle image. For example, if the data to be transmitted is "123456", the encryption key is "234", and the encryption key is inserted into the last bit of the data to be transmitted, the encrypted data obtained after the encryption process is "123456234". After receiving the encrypted data "123456234", the data receiving end performs decryption processing, so that the three-digit number "234" of the last digit can be directly removed, and the original data "123456" to be transmitted is obtained.
In one embodiment, the second speckle image may be pre-stored at the data receiving end, or may be transmitted by the receiving data transmitting end. Acquiring the second speckle image specifically includes: acquiring a second speckle image prestored in a data receiving end; or receiving the first speckle image sent by the data sending end, and taking the received first speckle image as a second speckle image.
And step 706, decrypting the encrypted data according to the second speckle image.
In the embodiment provided by the application, a pixel matrix corresponding to the second speckle image is obtained, and an encryption key is obtained according to the pixel matrix; and decrypting the encrypted data according to the encryption key. Further, receiving data attribute parameters of data to be transmitted, which are sent by a data sending end, and acquiring a key algorithm according to the data attribute parameters; and calculating an encryption key corresponding to the pixel matrix according to a key algorithm.
The data transmission method provided by the embodiment can acquire the speckle images when the data transmitting end transmits data, encrypt the data through the acquired speckle images, and then transmit the encrypted data to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
Fig. 8 is a timing diagram illustrating interaction between a data sender and a data receiver according to an embodiment. As shown in fig. 8, the data transmission method includes steps 802 to 810. Wherein:
step 802, a data sending end obtains data to be transmitted and obtains a first speckle image.
And step 804, the data sending end encrypts the data to be transmitted according to the first speckle image to obtain encrypted data.
In step 806, the data sending end sends the encrypted data to the data receiving end.
Step 808, the data receiving end receives the encrypted data sent by the data sending end.
And step 810, the data receiving end acquires the second speckle image and decrypts the encrypted data according to the second speckle image.
The data transmission method provided by the embodiment can acquire the speckle images when the data transmitting end transmits data, encrypt the data through the acquired speckle images, and then transmit the encrypted data to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
It should be understood that, although the respective steps in the flowcharts of fig. 3 to 8 are sequentially shown as indicated by arrows, the steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 3-8 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
Fig. 9 is a hardware configuration diagram for implementing an image processing method in one embodiment. As shown in fig. 9, the electronic device may include a camera module 910, a Central Processing Unit (CPU)920 and a first processing unit 930, wherein the camera module 910 includes a laser camera 912, a floodlight 914, an RGB (Red/Green/Blue, Red/Green/Blue color mode) camera 916 and a laser light 918. The first processing unit 930 includes a PWM (Pulse Width Modulation) module 932, an SPI/I2C (Serial Peripheral Interface/Inter-Integrated Circuit) module 934, a RAM (Random Access Memory) module 936, and a Depth Engine module 938. The second processing unit 922 may be a CPU core in a TEE (Trusted execution environment), and the first processing unit 930 may be an MCU (micro control unit) processor. It is understood that the central processing unit 920 may be in a multi-core operation mode, and a CPU core in the central processing unit 920 may operate in a TEE or REE (Rich Execution Environment). Both the TEE and the REE are running modes of an ARM module (Advanced RISC Machines). Generally, the operation behavior with higher security in the electronic device needs to be executed under the TEE, and other operation behaviors can be executed under the REE. In the embodiment of the application, when the central processing unit 920 receives an image acquisition instruction with a higher security requirement initiated by a target application program, for example, when the target application program needs to unlock face information and the target application program needs to pay face information, the CPU core running under the TEE, i.e., the second processing unit 922, sends the image acquisition instruction to the SPI/I2C module 934 in the MCU930 through the SECURE SPI/I2C, the first processing unit 930 sends a pulse wave through the PWM module 932 to control the opening of the floodlight 914 in the camera module 910 to acquire an infrared image, and controls the opening of the laser lamp 918 in the camera module 910 to acquire a speckle pattern. The camera module 910 may transmit the collected speckle pattern to a Depth Engine module 938 in the first processing unit 930, where the Depth Engine module 938 may calculate an infrared parallax image according to the infrared image, calculate a speckle parallax image according to the speckle image, and transmit the infrared image, the infrared parallax image, the speckle image, and the speckle parallax image to the second processing unit 922. The second processing unit 922 corrects the infrared image according to the infrared parallax image to obtain a corrected infrared image, and corrects the speckle image according to the speckle parallax image to obtain a corrected speckle image. Then, the second processing unit 922 may calculate to obtain a depth image according to the corrected speckle image, perform face recognition according to the corrected infrared image, and detect whether a face exists in the corrected infrared image and whether the detected face matches a stored face; and if the human face passes the identification, performing living body detection according to the corrected infrared image and the depth image, and detecting whether the human face is a living body human face. In one embodiment, after acquiring the corrected infrared image and the depth image, the living body detection and then the face recognition may be performed, or the face recognition and the living body detection may be performed simultaneously. After the face recognition passes and the detected face is a living face, the second processing unit 922 may send one or more of the above-mentioned corrected infrared image, corrected speckle image, depth image, and face recognition result to the target application program.
FIG. 10 is a diagram illustrating a software architecture for implementing an image processing method according to an embodiment. As shown in fig. 10, the software architecture includes an application layer 1010, an operating system 1020, and a secure runtime environment 1030. The modules in the secure operating environment 1030 include a first processing unit 1031, a camera module 1032, a second processing unit 1033, an encryption module 1034, and the like; the operating system 1030 comprises a security management module 1021, a face management module 1022, a camera driver 1023 and a camera frame 1024; the application layer 1010 includes an application 1011. The application 1011 may initiate an image capture instruction and send the image capture instruction to the first processing unit 1031 for processing. For example, when operations such as payment, unlocking, beautifying, Augmented Reality (AR) and the like are performed by acquiring a human face, the application program may initiate an image acquisition instruction for acquiring a human face image. It will be appreciated that image instructions initiated by the application 1011 may be sent first to the second processing unit 1033 and then by the second processing unit 1033 to the first processing unit 1031.
After the first processing unit 1031 receives the image acquisition instruction, if it is determined that the application operation corresponding to the image acquisition instruction is a security operation (e.g., payment or unlocking operation), the camera module 1032 is controlled according to the image acquisition instruction to acquire an infrared image and a speckle image, and the infrared image and the speckle image acquired by the camera module 1032 are transmitted to the first processing unit 1031. The first processing unit 1031 calculates a depth image including depth information according to the speckle image, calculates a depth parallax image according to the depth image, and calculates an infrared parallax image according to the infrared image. The depth parallax image and the infrared parallax image are then transmitted to the second processing unit 1033 through a secure transmission channel. The second processing unit 1033 corrects the infrared parallax image to obtain a corrected infrared image, and corrects the corrected infrared image according to the depth parallax image to obtain a corrected depth image. Then, carrying out face authentication according to the corrected infrared image, and detecting whether a face exists in the corrected infrared image and whether the detected face is matched with the stored face; and if the human face passes the authentication, performing living body detection according to the corrected infrared image and the corrected depth image, and judging whether the human face is a living body human face. The face recognition result obtained by the second processing unit 1033 may be sent to the encryption module 1034, and after being encrypted by the encryption module 1034, the encrypted face recognition result is sent to the security management module 1021. Generally, different applications 1011 have corresponding security management modules 1021, and the security management modules 1021 decrypt the encrypted face recognition result and send the face recognition result obtained after decryption to the corresponding face management modules 1022. The face management module 1022 sends the face recognition result to the upper application 1011, and the application 1011 performs corresponding operations according to the face recognition result.
If the application operation corresponding to the image capture instruction received by the first processing unit 1031 is a non-secure operation (such as a beauty operation or an AR operation), the first processing unit 1031 may control the camera module 1032 to capture a speckle image, calculate a depth image according to the speckle image, and then obtain a depth parallax image according to the depth image. The first processing unit 1031 sends the depth parallax image to the camera driver 1023 through the non-secure transmission channel, and the camera driver 1023 performs correction processing according to the depth parallax image to obtain a corrected depth image, and then sends the corrected depth image to the camera frame 1024, and then sends the corrected depth image to the face management module 1022 or the application 1011 through the camera frame 1024.
Fig. 11 is a schematic structural diagram of a data transmission device according to an embodiment. As shown in fig. 11, the data transmission apparatus 1100 includes a data acquisition module 1102, a first image acquisition module 1104, an encryption processing module 1106, and a data transmission module 1108. Wherein:
the data obtaining module 1102 is configured to obtain data to be transmitted.
The first image acquiring module 1104 is configured to acquire a first speckle image, where the first speckle image is an image formed by irradiating laser speckles collected by a laser camera onto an object.
An encryption processing module 1106, configured to encrypt the data to be transmitted according to the first speckle image to obtain encrypted data.
A data sending module 1108, configured to send the encrypted data to a data receiving end.
The data transmission device provided by the embodiment can acquire the speckle images when the data transmitting end transmits data, encrypt the data through the acquired speckle images, and then transmit the encrypted data to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
In one embodiment, the first image obtaining module 1104 is further configured to obtain a first speckle image pre-stored in the data sending end.
In an embodiment, the first image obtaining module 1104 is further configured to obtain a target receiving end identifier of the data receiving end, and obtain a first speckle image corresponding to the target receiving end identifier stored in the data sending end in advance.
In one embodiment, the first image obtaining module 1104 is further configured to turn on a laser camera and a laser emitter, and collect a first speckle image formed by irradiating laser speckles onto an object through the laser camera, where the laser speckles are emitted by the laser emitter; and sending the collected first speckle image to a data receiving end.
In one embodiment, the encryption processing module 1106 is further configured to obtain a pixel matrix corresponding to the first speckle image, and obtain an encryption key according to the pixel matrix; and encrypting the data to be transmitted according to the encryption key to obtain encrypted data.
In one embodiment, the encryption processing module 1106 is further configured to obtain a data attribute parameter of the data to be transmitted, and obtain a key algorithm according to the data attribute parameter; and calculating an encryption key corresponding to the pixel matrix according to the key algorithm.
In one embodiment, the data sending module 1108 is further configured to obtain a target receiving end identifier of the data receiving end; if the target receiving end identification is matched with the receiving end identification in the receiving list, the encrypted data is sent to the data receiving end, and the receiving end identification in the receiving list is used for uniquely marking one data receiving end storing the speckle images; and if the target receiving end identification is not matched with the receiving end identification in the receiving list, sending the encrypted data and the first speckle image to the data receiving end.
Fig. 12 is a schematic structural diagram of a data transmission device in another embodiment. As shown in fig. 12, the data transmission apparatus 1200 includes a data reception module 1202, a second image acquisition module 1204, and a decryption processing module 1206. Wherein:
the data receiving module 1202 is configured to receive encrypted data sent by a data sending end, where the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image.
And a second image obtaining module 1204, configured to obtain a second speckle image, where the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating the object with laser speckles collected by the laser camera.
And the decryption processing module 1206 is configured to decrypt the encrypted data according to the second speckle image.
The data transmission device provided by the embodiment can acquire the speckle images when the data transmitting end transmits data, encrypt the data through the acquired speckle images, and then transmit the encrypted data to the data receiving end. When the data receiving end receives the data, the data can be decrypted according to the speckle images. Because the speckle images generated by different electronic devices are different, different electronic devices can perform encryption processing through different speckle images, and the security of data transmission is improved.
In one embodiment, the second image obtaining module 1204 is further configured to obtain a second speckle image pre-stored in the data receiving end; or receiving the first speckle image sent by the data sending end, and taking the received first speckle image as a second speckle image.
In one embodiment, the decryption processing module 1206 is further configured to obtain a pixel matrix corresponding to the second speckle image, and obtain an encryption key according to the pixel matrix; and decrypting the encrypted data according to the encryption key.
In an embodiment, the decryption processing module 1206 is further configured to receive a data attribute parameter of the to-be-transmitted data sent by the data sending end, and obtain a key algorithm according to the data attribute parameter; and calculating an encryption key corresponding to the pixel matrix according to the key algorithm.
The division of the modules in the data transmission device is only for illustration, and in other embodiments, the data transmission device may be divided into different modules as needed to complete all or part of the functions of the data transmission device.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the data transfer methods provided by the above-described embodiments.
A computer program product containing instructions which, when run on a computer, cause the computer to perform the data transmission method provided by the above embodiments.
The embodiment of the application also provides the mobile terminal. The mobile terminal includes an Image Processing circuit, which may be implemented using hardware and/or software components, and may include various Processing units defining an ISP (Image Signal Processing) pipeline. FIG. 13 is a schematic diagram of an image processing circuit in one embodiment. As shown in fig. 13, for convenience of explanation, only aspects of the image processing technique related to the embodiment of the present application are shown.
As shown in fig. 13, the image processing circuit includes an ISP processor 1340 and a control logic 1350. The image data captured by the imaging device 1310 is first processed by the ISP processor 1340, and the ISP processor 1340 analyzes the image data to capture image statistics that may be used to determine and/or control one or more parameters of the imaging device 1310. The imaging device 1310 may include a camera with one or more lenses 1312 and an image sensor 1314. The image sensor 1314 may include an array of color filters (e.g., Bayer filters), and the image sensor 1314 may acquire light intensity and wavelength information captured with each imaging pixel of the image sensor 1314 and provide a set of raw image data that may be processed by the ISP processor 1340. The sensor 1320 (e.g., a gyroscope) may provide parameters of the acquired image processing (e.g., anti-shake parameters) to the ISP processor 1340 based on the type of interface of the sensor 1320. The sensor 1320 interface may utilize a SMIA (Standard Mobile Imaging Architecture) interface, other serial or parallel camera interfaces, or a combination of the above.
In addition, the image sensor 1314 may also send raw image data to the sensor 1320, the sensor 1320 may provide the raw image data to the ISP processor 1340 based on the sensor 1320 interface type, or the sensor 1320 may store the raw image data in the image memory 1330.
ISP processor 1340 processes the raw image data pixel by pixel in a variety of formats. For example, each image pixel may have a bit depth of 8, 10, 12, or 14 bits, and ISP processor 1340 may perform one or more image processing operations on the raw image data, collecting statistics about the image data. Wherein the image processing operations may be performed with the same or different bit depth precision.
ISP processor 1340 may also receive image data from image memory 1330. For example, the sensor 1320 interface sends raw image data to the image memory 1330, and the raw image data in the image memory 1330 is then provided to the ISP processor 1340 for processing. The image Memory 1330 may be a portion of a Memory device, a storage device, or a separate dedicated Memory within the mobile terminal, and may include a DMA (Direct Memory Access) feature.
Upon receiving raw image data from image sensor 1314 interface or from sensor 1320 interface or from image memory 1330, ISP processor 1340 may perform one or more image processing operations, such as temporal filtering. The processed image data may be sent to an image memory 1330 for additional processing before being displayed. ISP processor 1340 receives the processed data from image memory 1330 and performs image data processing on the processed data in the raw domain and in the RGB and YCbCr color spaces. The image data processed by ISP processor 1340 may be output to display 1370 for viewing by a user and/or further processed by a Graphics Processing Unit (GPU). Further, the output of the ISP processor 1340 may also be sent to an image memory 1330, and a display 1370 may read image data from the image memory 1330. In one embodiment, image memory 1330 may be configured to implement one or more frame buffers. In addition, the output of the ISP processor 1340 may be transmitted to an encoder/decoder 1360 for encoding/decoding image data. The encoded image data may be saved and decompressed before being displayed on the display 1370 device. The encoder/decoder 1360 may be implemented by a CPU or GPU or coprocessor.
The statistics determined by ISP processor 1340 may be transmitted to control logic 1350 unit. For example, the statistical data may include image sensor 1314 statistics such as auto-exposure, auto-white balance, auto-focus, flicker detection, black level compensation, lens 1312 shading correction, and the like. The control logic 1350 may comprise a processor and/or microcontroller executing one or more routines (e.g., firmware) that determine control parameters of the imaging device 1310 and control parameters of the ISP processor 1340 based on the received statistical data. For example, the control parameters of imaging device 1310 may include sensor 1320 control parameters (e.g., gain, integration time for exposure control, anti-shake parameters, etc.), camera flash control parameters, lens 1312 control parameters (e.g., focal length for focusing or zooming), or a combination of these parameters. The ISP control parameters may include gain levels and color correction matrices for automatic white balance and color adjustment (e.g., during RGB processing), as well as lens 1312 shading correction parameters.
In the embodiment of the present application, the steps of the data transmission method in the embodiment of the present application are implemented when the mobile terminal executes the computer program stored on the memory.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A method of data transmission, the method comprising:
acquiring data to be transmitted;
acquiring a first speckle image, wherein the first speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
sending the encrypted data to a data receiving end;
the encrypting the data to be transmitted according to the collected first speckle image to obtain encrypted data comprises:
acquiring a pixel matrix corresponding to the first speckle image, and acquiring an encryption key according to the pixel matrix, or taking the first speckle image as the encryption key;
encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
the obtaining an encryption key according to the pixel matrix comprises:
acquiring data attribute parameters of the data to be transmitted, and acquiring a key algorithm according to the data attribute parameters;
calculating an encryption key corresponding to the pixel matrix according to the key algorithm;
further comprising: acquiring the residual electric quantity of the electronic equipment where the data sending end is located, and acquiring a speckle image according to the residual electric quantity; when the residual electric quantity is higher, carrying out encryption processing according to the speckle images acquired in real time; when the residual electric quantity is lower, the speckle images do not need to be acquired in real time, and encryption processing is directly carried out according to the pre-stored speckle images;
the acquiring a first speckle image includes:
acquiring a first speckle image prestored in a data sending end;
the acquiring of the first speckle image prestored in the data sending end includes:
acquiring a target receiving end identifier of a data receiving end, and acquiring a first speckle image corresponding to the target receiving end identifier stored in the data sending end in advance;
the method further comprises the following steps:
and sending the collected first speckle image to a data receiving end.
2. The method of claim 1, further comprising:
acquiring a target receiving end identification of a data receiving end;
sending the encrypted data to a data receiving end comprises:
if the target receiving end identification is matched with the receiving end identification in the receiving list, the encrypted data is sent to the data receiving end, and the receiving end identification in the receiving list is used for uniquely marking one data receiving end storing the speckle images;
and if the target receiving end identification is not matched with the receiving end identification in the receiving list, sending the encrypted data and the first speckle image to the data receiving end.
3. The method of claim 1, wherein the acquiring the first speckle image comprises:
the method comprises the steps of opening a laser camera and a laser emitter, and collecting a first speckle image formed by irradiating laser speckles on an object through the laser camera, wherein the laser speckles are emitted by the laser emitter.
4. A method of data transmission, the method comprising:
receiving encrypted data sent by a data sending end, wherein the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image;
acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
decrypting the encrypted data according to the second speckle image;
the decrypting the encrypted data according to the second speckle image includes:
acquiring a pixel matrix corresponding to the second speckle image, and acquiring an encryption key according to the pixel matrix, or taking the first speckle image as the encryption key;
decrypting the encrypted data according to the encryption key;
the obtaining an encryption key according to the pixel matrix comprises:
receiving data attribute parameters of the data to be transmitted sent by the data sending end, and acquiring a key algorithm according to the data attribute parameters;
calculating an encryption key corresponding to the pixel matrix according to the key algorithm;
further comprising: acquiring the residual electric quantity of the electronic equipment where the data sending end is located, and acquiring a speckle image according to the residual electric quantity; when the residual electric quantity is higher, carrying out encryption processing according to the speckle images acquired in real time; when the residual electric quantity is lower, the speckle images do not need to be acquired in real time, and encryption processing is directly carried out according to the pre-stored speckle images;
acquiring the first speckle image includes:
acquiring a first speckle image prestored in a data sending end;
the acquiring of the first speckle image prestored in the data sending end includes:
acquiring a target receiving end identifier of a data receiving end, and acquiring a first speckle image corresponding to the target receiving end identifier stored in the data sending end in advance;
the method further comprises the following steps:
and sending the collected first speckle image to a data receiving end.
5. The method of claim 4, wherein the acquiring the second speckle image comprises:
acquiring a second speckle image prestored in a data receiving end; or
And receiving the first speckle image sent by the data sending end, and taking the received first speckle image as a second speckle image.
6. A data transmission apparatus, characterized in that the apparatus comprises:
the data acquisition module is used for acquiring data to be transmitted;
the device comprises a first image acquisition module, a second image acquisition module and a control module, wherein the first image acquisition module is used for acquiring a first speckle image, and the first speckle image is an image formed by irradiating laser speckles acquired by a laser camera on an object;
the encryption processing module is used for encrypting the data to be transmitted according to the first speckle image to obtain encrypted data;
the data sending module is used for sending the encrypted data to a data receiving end; the data sending module is further used for sending the first speckle image acquired by the first image acquisition module to a data receiving end;
the encryption processing module is further configured to obtain a pixel matrix corresponding to the first speckle image, and obtain an encryption key according to the pixel matrix, or use the first speckle image as the encryption key; encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
the encryption processing module is further used for acquiring data attribute parameters of the data to be transmitted and acquiring a key algorithm according to the data attribute parameters; calculating an encryption key corresponding to the pixel matrix according to the key algorithm;
the data transmission device acquires the residual electric quantity of the electronic equipment where the data sending end is located, and acquires the speckle image according to the residual electric quantity; when the residual electric quantity is higher, carrying out encryption processing according to the speckle images acquired in real time; when the residual electric quantity is lower, the speckle images do not need to be acquired in real time, and encryption processing is directly carried out according to the pre-stored speckle images;
the first image acquisition module is also used for acquiring a first speckle image pre-stored in the data sending end;
the first image acquisition module is further configured to acquire a target receiving end identifier of a data receiving end, and acquire a first speckle image corresponding to the target receiving end identifier, where the first speckle image is pre-stored in the data sending end.
7. A data transmission apparatus, characterized in that the apparatus comprises:
the data receiving module is used for receiving encrypted data sent by a data sending end, and the encrypted data is obtained by encrypting data to be transmitted by the data sending end according to a first speckle image; the data receiving end also receives the collected first speckle image;
the second image acquisition module is used for acquiring a second speckle image, wherein the first speckle image and the second speckle image are the same speckle image, and the speckle image is an image formed by irradiating an object with laser speckles collected by a laser camera;
the decryption processing module is used for decrypting the encrypted data according to the second speckle image;
the decryption processing module is further configured to obtain a pixel matrix corresponding to the second speckle image, and obtain an encryption key according to the pixel matrix, or use the first speckle image as the encryption key; decrypting the encrypted data according to the encryption key;
the decryption processing module is further configured to receive a data attribute parameter of the data to be transmitted, which is sent by the data sending end, and obtain a key algorithm according to the data attribute parameter; calculating an encryption key corresponding to the pixel matrix according to the key algorithm;
the data sending end obtains the residual electric quantity of the electronic equipment where the data sending end is located, and obtains the speckle image according to the residual electric quantity; when the residual electric quantity is higher, carrying out encryption processing according to the speckle images acquired in real time; when the residual electric quantity is lower, the speckle images do not need to be acquired in real time, and encryption processing is directly carried out according to the pre-stored speckle images;
acquiring the first speckle image includes:
acquiring a first speckle image prestored in a data sending end;
the acquiring of the first speckle image prestored in the data sending end includes:
the method comprises the steps of obtaining a target receiving end identification of a data receiving end, and obtaining a first speckle image corresponding to the target receiving end identification stored in the data sending end in advance.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
9. An electronic device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, cause the processor to perform the steps of the method of any of claims 1 to 5.
CN201810403819.0A 2018-04-12 2018-04-28 Data transmission method and device, computer readable storage medium and electronic equipment Active CN108712400B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810403819.0A CN108712400B (en) 2018-04-28 2018-04-28 Data transmission method and device, computer readable storage medium and electronic equipment
PCT/CN2019/080470 WO2019196684A1 (en) 2018-04-12 2019-03-29 Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810403819.0A CN108712400B (en) 2018-04-28 2018-04-28 Data transmission method and device, computer readable storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108712400A CN108712400A (en) 2018-10-26
CN108712400B true CN108712400B (en) 2020-01-17

Family

ID=63867560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810403819.0A Active CN108712400B (en) 2018-04-12 2018-04-28 Data transmission method and device, computer readable storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108712400B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019196684A1 (en) * 2018-04-12 2019-10-17 Oppo广东移动通信有限公司 Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal
CN113282911A (en) * 2021-05-12 2021-08-20 捷德(中国)科技有限公司 Identity authentication method, device, equipment and computer storage medium
CN113873233A (en) * 2021-10-14 2021-12-31 维沃移动通信有限公司 Lens module detection method and device and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2614370Y (en) * 2003-04-30 2004-05-05 四川大学 False proof apparatus with multiple image concealing
US9054871B2 (en) * 2012-02-21 2015-06-09 California Institute Of Technology Physical key-protected one time pad
CN108614971A (en) * 2018-04-12 2018-10-02 Oppo广东移动通信有限公司 Encryption and decryption processing method and apparatus

Also Published As

Publication number Publication date
CN108712400A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN108764052B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment
CN108805024B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment
CN108804895B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment
CN108549867B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment
US11275927B2 (en) Method and device for processing image, computer readable storage medium and electronic device
WO2019196684A1 (en) Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal
US11256903B2 (en) Image processing method, image processing device, computer readable storage medium and electronic device
CN111225157B (en) Focus tracking method and related equipment
CN108712400B (en) Data transmission method and device, computer readable storage medium and electronic equipment
CN108711054B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment
CN108769665B (en) Data transmission method and device, electronic equipment and computer readable storage medium
CN108924426B (en) Image processing method and device, electronic equipment and computer readable storage medium
CN111523499B (en) Image processing method, apparatus, electronic device, and computer-readable storage medium
CN109213610B (en) Data processing method and device, computer readable storage medium and electronic equipment
CN113726526A (en) Method, device and system for acquiring and verifying face data
WO2020024576A1 (en) Camera calibration method and apparatus, electronic device, and computer-readable storage medium
WO2019205777A1 (en) Data processing method, apparatus, computer-readable storage medium, and electronic device
CN108830141A (en) Image processing method, device, computer readable storage medium and electronic equipment
TWI708192B (en) Image processing method, electronic device, and computer-readable storage medium
CN109963081B (en) Video processing method and device, electronic equipment and computer readable storage medium
WO2019196669A1 (en) Laser-based security verification method and apparatus, and terminal device
WO2020015403A1 (en) Method and device for image processing, computer readable storage medium and electronic device
US11308636B2 (en) Method, apparatus, and computer-readable storage medium for obtaining a target image
US20210273795A1 (en) Trusted imaging
CN108881712B (en) Image processing method, image processing device, computer-readable storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant