CN109819138B - Method and system for monitoring field sampling - Google Patents

Method and system for monitoring field sampling Download PDF

Info

Publication number
CN109819138B
CN109819138B CN201910082251.1A CN201910082251A CN109819138B CN 109819138 B CN109819138 B CN 109819138B CN 201910082251 A CN201910082251 A CN 201910082251A CN 109819138 B CN109819138 B CN 109819138B
Authority
CN
China
Prior art keywords
information
data
executor
extracted
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910082251.1A
Other languages
Chinese (zh)
Other versions
CN109819138A (en
Inventor
解鑫
李文攀
陈鑫
许秀艳
白雪
嵇晓燕
王妍
杨凯
孙宗光
王正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA NATIONAL ENVIRONMENTAL MONITORING CENTRE
Original Assignee
CHINA NATIONAL ENVIRONMENTAL MONITORING CENTRE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA NATIONAL ENVIRONMENTAL MONITORING CENTRE filed Critical CHINA NATIONAL ENVIRONMENTAL MONITORING CENTRE
Priority to CN201910082251.1A priority Critical patent/CN109819138B/en
Publication of CN109819138A publication Critical patent/CN109819138A/en
Application granted granted Critical
Publication of CN109819138B publication Critical patent/CN109819138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses a method and a system for monitoring field sampling, relates to the technical field of environmental monitoring, and solves the technical problem of data false caused by GPS position counterfeiting in the prior art. The method for monitoring field sampling comprises the following steps: receiving field data; analyzing the field data to obtain positioning information; judging whether the executor is on site or not according to the positioning information; and receiving the sampling data returned by the executor in response to the executor being on site. The method and the device are mainly used for monitoring and sampling.

Description

Method and system for monitoring field sampling
Technical Field
The application relates to the technical field of environmental monitoring, in particular to a method and a system for monitoring field sampling.
Background
In the prior art, a common method for recording the location of field data is to record the longitude and latitude of the current location to judge whether the specified location is reached. However, the longitude and latitude of the location can set false GPS information through the simulated location function of the mobile phone, and the false GPS information is fed back to the system, so that the location is false. The data is false due to the false position, the technical work on the site cannot be guaranteed, and the benefit of a client is damaged.
Disclosure of Invention
The application aims to provide a method and a system for monitoring field sampling, which are used for solving the technical problem of data false caused by GPS position false making in the prior art.
The method for monitoring field sampling comprises the following steps: receiving field data; analyzing the field data to obtain positioning information; judging whether the executor is on site or not according to the positioning information; and receiving the sampling data returned by the executor in response to the executor being on site.
Optionally, the positioning information includes latitude and longitude in the GPS information, latitude and longitude in the image information, time for obtaining the positioning information, a photographing timestamp of the image information, and a ciphertext of the image information after the encryption is converted.
Preferably, the method for judging whether the executor is on site according to the positioning information comprises the steps of extracting the position information and the time information in the positioning information; judging the data accuracy of the extracted information; in response to the accurate data of the extracted information, carrying out conversion encryption on the image information to obtain a ciphertext; comparing the obtained ciphertext with a ciphertext in the field data; responding to the fact that the obtained ciphertext is consistent with the ciphertext in the field data, and enabling the data of the image information to be accurate; and judging that the executor is on site in response to the accurate data of the image information.
Preferably, the method for judging the data accuracy of the extracted information comprises the following steps: comparing the extracted position information and the extracted time information with the pre-stored corresponding information respectively; comparing whether the difference value between the extracted position information and the pre-stored position information and the difference value between the extracted time information and the pre-stored time information are within a threshold value range; and in response to the fact that the difference value of the extracted position information and the extracted time information is within the threshold range, the data of the extracted information is accurate.
Preferably, the method for performing transform encryption on the image information to obtain the ciphertext comprises: extracting longitude and latitude and a photographing timestamp of the live image, and converting the live image into a matrix; respectively converting the longitude and latitude, the photographing timestamp and the matrix of the live image into information streams; and converting the information flow into a ciphertext through an encryption algorithm.
Optionally, in response to that any difference of the extracted difference values of the position information and the time information is outside the threshold range, it is determined that the executor is not present, and an instruction that the executor is not present is sent to the client.
Optionally, in response to that the obtained ciphertext is inconsistent with the ciphertext in the field data and the data of the image information is inaccurate, the fact that the executor is not in the field is judged, and an instruction that the executor is not in the field is sent to the client.
Optionally, the image information is an RGB image.
According to the method for monitoring the field sampling, on one hand, the position information and the time information in the positioning information are respectively compared with the prestored position information, so that the accuracy of the position information is verified; on one hand, the image information in the field data is encrypted and verified, so that the image information is prevented from being tampered in the transmission process, and the accuracy of the data is ensured.
The present application further provides a system for monitoring field sampling, which is suitable for the method for monitoring field sampling, and comprises:
the first receiving module is used for receiving field data;
the analysis module is used for analyzing the field data to obtain positioning information;
the judging module is used for judging whether the executor is on site or not according to the positioning information;
and the second receiving module is used for responding to the situation that the executor is on the spot and receiving the sampling data returned by the executor.
The system for monitoring field sampling and the method for monitoring field sampling have the same technical effects, and are not repeated herein.
The present application further proposes a client, comprising:
the position acquisition unit is used for acquiring on-site positioning information and image information;
the encryption unit is used for converting the encrypted image information to obtain a ciphertext of the image information;
the input unit is used for inputting sampling data on site;
and a transmitting unit for transmitting data.
The client side encrypts the image information in the field data, avoids falsification of the image information in the transmission process, and ensures the accuracy of the data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a flow chart of a method of monitoring in-situ sampling of the present application;
FIG. 2 is a flow chart of a method of determining whether an actor is present;
FIG. 3 is a flow chart of determining data accuracy of location information;
FIG. 4 is a flowchart illustrating a process of transforming and encrypting image information to obtain a ciphertext according to the present application;
FIG. 5 is a flow chart of the present application for converting a message stream through an encryption algorithm to ciphertext;
FIG. 6 is a block diagram of a system for monitoring in-situ sampling of the present application;
fig. 7 is a block diagram of a client of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
FIG. 1 is a flow chart of a method of monitoring in-situ sampling of the present application. As shown in fig. 1, the method for monitoring field sampling of the present application includes:
receiving field data (110);
specifically, field data returned by the client is received. The field data includes GPS information indicating the location of the client in the field, and also includes image information and a ciphertext for converting the encrypted image information. The image information is, for example, an RGB image.
Analyzing the field data to obtain positioning information (120);
furthermore, the obtained positioning information comprises latitude and longitude in the GPS information, latitude and longitude in the image information, time for obtaining the positioning information, a photographing time stamp of the image information, a ciphertext for converting the encrypted image information and the like.
It should be noted that, when an image is taken, shooting parameter information is generated and written into the header of the picture file, and the shooting parameter information of the image includes, but is not limited to, a shooting time stamp, color coding, picture width, picture resolution, shooting position, and the like.
The latitude-oriented extraction method in the image information comprises the following steps: and extracting the shooting parameter information of the picture from the head of the picture file, and further extracting the shooting position of the picture, namely the longitude and latitude of the picture from the shooting parameter information. In one embodiment, the shooting parameter information of the picture is EXIF (Exchangeable Image File) information of the picture.
Judging whether the executor is on site or not according to the positioning information (130);
specifically, fig. 2 is a flowchart of a method for determining whether an executor is present according to positioning information, and as shown in fig. 2, the method for determining whether an executor is present according to positioning information includes:
extracting position information and time information in the positioning information (210);
in one embodiment, the extracted position information is longitude and latitude in the GPS information and longitude and latitude in the image information; the extracted time information is the photographing time stamp of the image information and the time for obtaining the positioning information.
Judging (220) the data accuracy of the extracted information;
more specifically, fig. 3 is a flowchart of determining the data accuracy of the extracted information, and as shown in fig. 3, the method of determining the data accuracy of the extracted information includes:
comparing (310) the extracted location information and time information with pre-stored corresponding information, respectively;
the pre-stored location information is illustratively information obtained by the base station and stored in a database. The pre-stored location information includes the latitude and longitude of the pre-stored sampling location. The time to be sampled, i.e. the pre-stored time information, is also pre-stored in the database.
In one embodiment, the extracted location information and time information are weighted and summed respectively, and the formula of calculation is:
P=P1×A+P2x B formula (1)
T=T1×A+T2X B formula (2)
Where P is the extracted location information, P1As latitude and longitude, P, in GPS information2The longitude and latitude in the image information; t is extracted time information, T1Time to obtain positioning information, T2Is a photographing time stamp in the image information. A and B are parameters given in advance, and the sum of A and B is equal to 1.
Comparing whether the difference between the extracted location information and the pre-stored location information and the extracted time information and the pre-stored time information is within a threshold range (320);
illustratively, for the comparison of longitude and latitude, the unit is degree, and the threshold is accurate to 5 bits after decimal point, such as 0.00001-0.00009; for the comparison of time, in days, the threshold is less than or equal to 2.
It should be noted that, in response to any difference between the extracted position information and the extracted time information being outside the threshold range, it is determined that the executor is not present, and an instruction that the executor is not present is sent to the client.
And in response to the difference value of the extracted position information and the extracted time information being within the threshold value range, the data of the extracted information is accurate (330).
In response to the accuracy of the data of the extracted information, performing conversion encryption on the image information to obtain a ciphertext (230);
specifically, fig. 4 is a flowchart of the present application for performing transform encryption on image information to obtain a ciphertext, and as shown in fig. 4, the method for obtaining the ciphertext includes:
extracting longitude and latitude and a photographing timestamp of the live image, and converting the live image into a matrix (410);
preferably, the RGB images are stored in a three-dimensional array. The three-dimensional array has three surfaces, which correspond to three colors of Red (Red), Green (Green) and Blue (Blue) in sequence, data in the surfaces are intensity values of the three colors respectively, and elements in the surfaces correspond to pixel points in the image. The pixels in the image form a matrix.
Respectively converting the longitude and latitude, the photographing time stamp and the matrix of the live image into information streams (420);
the information stream is represented in the form of a string of characters. Converting the longitude and latitude of the live image into a first character string and a second character string; converting the photographing timestamp into a third string; the matrix is converted to a fourth string. The first, second, third and fourth character strings constitute an information stream.
The information stream is converted to ciphertext (430) by an encryption algorithm.
Specifically, fig. 5 is a flowchart of the present application for converting an information stream into a ciphertext through an encryption algorithm, and as shown in fig. 5, the method for converting an information stream into a ciphertext through an encryption algorithm includes:
calculating the data length (510) of the information flow needing to be filled;
the information stream refers to a character string. Each character string needs to be padded, so that the length of the message is modulo M by N, the length of the message is W, that is, W mod M is equal to N, and the length of data to be padded is calculated according to the formula. Illustratively, W, M, N are all natural numbers.
Padding the information stream to obtain an information stream of final length (520);
the padding method is to perform padding after the information stream, the first bit of padding is 1, and the rest is 0. Storage that added information flow length can be used forThe storage length is Q bits. If the length of the added message is larger than 2QThen only the value of its low Q bits, i.e. the added message length pair 2, is usedQAnd (6) taking a mold. After this step is completed, the final information flow length is an integral multiple of M. Illustratively, Q is a natural number.
The final length information stream is data processed to obtain a final cryptographic value (530).
Preparing data to be used:
4 constants: 0x67452301 for a, 0x0EFCDAB89 for B, 0x98BADCFE for C,
D=0x10325476;
4 functions: f (X, Y, Z) ═ X & Y) | ((-X) & Z); g (X, Y, Z) ═ X & Z | (Y & (∼ Z)); h (X, Y, Z) ═ X ^ Y ^ Z; i (X, Y, Z) ═ Y ^ (X | (-Z));
processing the information flow with the final length by taking M bits as a group, performing 4 rounds of transformation on each group, performing calculation by taking the 4 constants as initial variables, outputting 4 variables again, performing operation of the next group by taking the output 4 variables, and if the group is the last group, taking the 4 variables as the final result, namely the encrypted value.
Comparing the obtained ciphertext with a ciphertext in the field data (240);
and responding to the fact that the obtained ciphertext is inconsistent with the ciphertext in the field data and the data of the image information is inaccurate, judging that the executor is not in the field, and sending an instruction that the executor is not in the field to the client.
The data of the image information is accurate (250) in response to the obtained ciphertext corresponding to the ciphertext in the live data.
In response to the data of the image information being accurate, the practitioner is determined to be present (260).
Sample data returned by the practitioner is received (140) in response to the practitioner being present.
According to the method for monitoring the field sampling, on one hand, the position information and the time information in the positioning information are respectively compared with the prestored position information, so that the accuracy of the position information is verified; on one hand, the image information in the field data is encrypted and verified, so that the image information is prevented from being tampered in the transmission process, and the accuracy of the data is ensured.
Example two
The application also provides a system for monitoring field sampling, which is suitable for the method for monitoring field sampling in the embodiment I. Fig. 6 is a block diagram of the system for monitoring field sampling of the present application, and as shown in fig. 6, the system for monitoring field sampling of the present application includes:
a first receiving module 61, configured to receive field data;
the analysis module 62 is used for analyzing the field data to obtain positioning information;
the judging module 63 is used for judging whether the executor is on site or not according to the positioning information;
and a second receiving module 64, configured to receive the sample data returned by the performer in response to the performer being present.
It should be noted that the system for monitoring field sampling also includes a database, and all data in the system is stored in the database.
The system for monitoring field sampling and the method for monitoring field sampling have the same technical effects, and are not repeated herein.
EXAMPLE III
The application also provides a client for providing data to the system for monitoring the field sampling and receiving data returned by the system. Fig. 7 is a block diagram of a client according to the present application, and as shown in fig. 7, the client according to the present application includes:
the position acquisition unit 71 is used for acquiring positioning information and image information of a site;
an encryption unit 72 for converting the encrypted image information to obtain a ciphertext of the image information;
an input unit 73 for inputting sampling data on site;
a sending unit 74, configured to send data.
Specifically, the method for converting and encrypting the encrypted image information to obtain the ciphertext of the image information by the encryption unit 72 is the same as the method for converting and encrypting the image information to obtain the ciphertext in the first embodiment of the present application. The sending unit 74 is used for sending the data of the position acquisition unit, the encryption unit and the input unit to the system.
The client side encrypts the image information in the field data, so that the image information is prevented from being tampered in the transmission process, and the accuracy of the data is guaranteed.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (3)

1. A method of monitoring in situ sampling, comprising the steps of:
receiving field data;
analyzing the field data to obtain positioning information;
judging whether the executor is on site or not according to the positioning information;
receiving sampling data returned by the executor in response to the fact that the executor is on the spot;
the positioning information comprises longitude and latitude in the GPS information, longitude and latitude in the image information, time for obtaining the positioning information, a photographing time stamp of the image information and a ciphertext of the image information after encryption is converted;
the method for judging whether the executor is on site or not according to the positioning information comprises the following steps:
extracting position information and time information in the positioning information;
judging the data accuracy of the extracted information;
in response to the accurate data of the extracted information, carrying out conversion encryption on the image information to obtain a ciphertext;
comparing the obtained ciphertext with a ciphertext in the field data;
responding to the fact that the obtained ciphertext is consistent with the ciphertext in the field data, and enabling the data of the image information to be accurate;
judging that the executor is on site in response to the accurate data of the image information;
the method for judging the data accuracy of the extracted information comprises the following steps:
comparing the extracted position information and the extracted time information with the pre-stored corresponding information respectively;
comparing whether the difference value between the extracted position information and the pre-stored position information and the difference value between the extracted time information and the pre-stored time information are within a threshold value range;
in response to the fact that the difference value of the extracted position information and the extracted time information is within the threshold range, the data of the extracted information is accurate;
and respectively carrying out weighted summation on the extracted position information and the extracted time information, wherein the calculation formula is as follows:
p1 × a + P2 × B formula (1)
T1 × a + T2 × B formula (2)
Wherein, P is the extracted position information, P1 is the longitude and latitude in the GPS information, and P2 is the longitude and latitude in the image information; t is the extracted time information, T1 is the time for obtaining the positioning information, and T2 is a photographing time stamp in the image information; a and B are parameters given in advance, and the sum of A and B is equal to 1;
in response to any difference value of the extracted difference values of the position information and the time information being out of the threshold range, judging that the executor is not on site, and sending an instruction that the executor is not on site to the client;
the method for carrying out conversion encryption on the image information to obtain the ciphertext comprises the following steps:
extracting longitude and latitude and a photographing timestamp of the live image, and converting the live image into a matrix;
respectively converting the longitude and latitude, the photographing timestamp and the matrix of the live image into information streams;
converting the information flow into a ciphertext through an encryption algorithm;
and responding to the fact that the obtained ciphertext is inconsistent with the ciphertext in the field data and the data of the image information is inaccurate, judging that the executor is not in the field, and sending an instruction that the executor is not in the field to the client.
2. The method of claim 1, wherein the image information is an RGB image.
3. A system for monitoring field sampling, wherein the method of any of claims 1-2 is applied, the system comprising:
the first receiving module is used for receiving field data;
the analysis module is used for analyzing the field data to obtain positioning information;
the judging module is used for judging whether the executor is on site or not according to the positioning information;
and the second receiving module is used for responding to the situation that the executor is on the spot and receiving the sampling data returned by the executor.
CN201910082251.1A 2019-01-28 2019-01-28 Method and system for monitoring field sampling Active CN109819138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910082251.1A CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910082251.1A CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Publications (2)

Publication Number Publication Date
CN109819138A CN109819138A (en) 2019-05-28
CN109819138B true CN109819138B (en) 2020-11-06

Family

ID=66605621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910082251.1A Active CN109819138B (en) 2019-01-28 2019-01-28 Method and system for monitoring field sampling

Country Status (1)

Country Link
CN (1) CN109819138B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112529489A (en) * 2019-09-19 2021-03-19 阿里巴巴集团控股有限公司 Task state processing method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898214A (en) * 2016-03-24 2016-08-24 北京农业信息技术研究中心 Site surveying device, site surveying confirmation method, and server
CN106549757A (en) * 2015-09-21 2017-03-29 北大方正集团有限公司 The data authenticity identification method of WEB service, service end and client
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102393711B (en) * 2011-10-28 2013-03-13 中国长江三峡集团公司 Method and system for monitoring grouting process on site
US9992030B2 (en) * 2015-05-11 2018-06-05 George Ernest Bester Method and a system for authenticating and identifying the location of a smartphone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549757A (en) * 2015-09-21 2017-03-29 北大方正集团有限公司 The data authenticity identification method of WEB service, service end and client
CN105898214A (en) * 2016-03-24 2016-08-24 北京农业信息技术研究中心 Site surveying device, site surveying confirmation method, and server
CN108737326A (en) * 2017-04-14 2018-11-02 北京京东尚科信息技术有限公司 Method, system, device and electronic equipment for carrying out token authentication

Also Published As

Publication number Publication date
CN109819138A (en) 2019-05-28

Similar Documents

Publication Publication Date Title
US11010855B2 (en) Method and apparatus for protecting digital photos from alteration
JP3142833B2 (en) Image capture system and method
Thai et al. Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
CN108933935B (en) Detection method and device of video communication system, storage medium and computer equipment
CN110942021B (en) Environment monitoring method, device, equipment and storage medium
US20040095600A1 (en) Image processing system, image capturing device, image processing terminal, image processing data storage terminal, program for the device, program for the terminal, data structure of image data, method of processing image, and method of generating image data
US6961441B1 (en) Method and apparatus for steganographic embedding of meta-data
CN106686333A (en) Method for producing video added watermarks for Android equipment
KR20040028766A (en) Embedding color profiles in raster image data using data hiding techniques
CN109348230A (en) A kind of ciphertext domain high capacity image reversible data concealing method
US20210357533A1 (en) Runtime Signature Integrity
CN109819138B (en) Method and system for monitoring field sampling
CN111862063A (en) Video quality evaluation method and device, computer equipment and storage medium
JP4804556B2 (en) Tamper detection digital watermark embedding method and apparatus, program, falsification detection method and apparatus using digital watermark, and program
CN115426627B (en) Industrial Internet of things data acquisition box based on 5G network
Arun et al. High security cryptographic technique using steganography and chaotic image encryption
CN106713297A (en) Electronic data fixing platform based on cloud service
CN109657487A (en) Image processing method, image authentication method and its device
CN111353133B (en) Image processing method, device and readable storage medium
Cahyono et al. Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4
CN116245962B (en) Data extraction system and method for wireless transmission to blockchain server
CN117216039B (en) Method for constructing three-dimensional base of building based on three-dimensional cadastral database
CN117579896B (en) Unmanned aerial vehicle video transmission processing method, device, equipment and storage medium
JP4410257B2 (en) Data conversion apparatus, data conversion method, and data conversion system
CN110636016B (en) Data transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant