CN111597569A - Image data output method and system, computer equipment and storage medium - Google Patents

Image data output method and system, computer equipment and storage medium Download PDF

Info

Publication number
CN111597569A
CN111597569A CN202010413204.3A CN202010413204A CN111597569A CN 111597569 A CN111597569 A CN 111597569A CN 202010413204 A CN202010413204 A CN 202010413204A CN 111597569 A CN111597569 A CN 111597569A
Authority
CN
China
Prior art keywords
data
storage medium
control terminal
image data
disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010413204.3A
Other languages
Chinese (zh)
Inventor
胡雪明
李涛
张力
荣鹏辉
王学谦
陈丽
曹金荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Air Force Service College of PLA
Original Assignee
Air Force Service College of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Air Force Service College of PLA filed Critical Air Force Service College of PLA
Priority to CN202010413204.3A priority Critical patent/CN111597569A/en
Publication of CN111597569A publication Critical patent/CN111597569A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for outputting image data, computer equipment and a storage medium, belonging to the technical field of computers, wherein the method comprises the following steps: the method comprises the following steps: selecting image data through a control terminal; step two: decomposing the data of the selected image by the control terminal; step three: carrying out sectional encryption on the decomposed data through a control terminal; step four: transmitting the encrypted data to a storage medium through a control terminal; step five: the storage medium is synthesized after receiving the decomposed data, then the data are automatically encrypted, the data are decomposed and encrypted during data transmission, the data fragment type encryption performance is improved, the data are transmitted, the transmitted data are output to the storage medium, the data are synthesized, and then the whole data are encrypted.

Description

Image data output method and system, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to an image data output method and system, computer equipment and a storage medium.
Background
The image data output is a process of carrying out information source and channel processing and transmitting or storing image information in real time or in time according to certain requirements.
When image data is output, transmission and storage need to be carried out through media, and transmission is carried out based on a certain transmission method during transmission, but when the existing image data is output, the transmission is often carried out in a naked transmission channel, especially for some relatively confidential information, targeted data attack is easy to happen during transmission, data loss or stealing is easy to happen in serious cases, and when the existing image data is output, a plurality of transmission media or storage media cannot be simultaneously encrypted, a leak is easy to find out, and information loss is caused.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above and/or problems occurring in the conventional image output method and system, computer apparatus, and storage medium.
Therefore, an object of the present invention is to provide an image data output method and system, a computer device, and a storage medium, which can perform simultaneous encryption protection on the image data output method and system, the computer device, and the storage medium, reduce the occurrence of data loss caused by image data transmission, and improve the security of data transmission.
To solve the above technical problem, according to an aspect of the present invention, the present invention provides the following technical solutions:
an image data output method, the method comprising:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
As a preferable aspect of the image data output system of the present invention, wherein: the output system consists of a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all installed in the control terminal.
As a preferable aspect of the image data output computer apparatus of the present invention, wherein: the control terminal is computer equipment which comprises a peripheral, a host and a display end, wherein the peripheral is connected with the host, and the display end is connected with the host.
As a preferable aspect of the image data output computer apparatus of the present invention, wherein: the host computer is composed of a mainboard, a power supply, a memory and a storage medium, wherein a processing device and a transmission device are integrated on the mainboard, and the power supply, the memory and the storage medium are all connected with the mainboard.
As a preferable aspect of the storage medium for image data output according to the present invention, wherein: the storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, and the cloud disk is wirelessly connected with a processor on the mainboard.
Compared with the prior art: the existing image data output is usually carried out in a naked transmission channel, especially for some confidential information, the targeted data attack is easy to be suffered during transmission, the situation that data is lost or stolen is easy to happen seriously, and the existing image data can not be simultaneously encrypted on a plurality of transmission media or storage media during output, so that a leak is easy to find out, and the situation that the information is lost occurs.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the present invention will be described in detail with reference to the accompanying drawings and detailed embodiments, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise. Wherein:
fig. 1 is a schematic view of a flow structure of an image data output method and system, a computer device, and a storage medium according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described herein, and it will be apparent to those of ordinary skill in the art that the present invention may be practiced without departing from the spirit and scope of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Next, the present invention will be described in detail with reference to the drawings, wherein for convenience of illustration, the cross-sectional view of the device structure is not enlarged partially according to the general scale, and the drawings are only examples, which should not limit the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides an image data output method and system, a computer device and a storage medium, and please refer to fig. 1.
The method comprises the following steps:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
The output system comprises a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all arranged in a control terminal, in particular, the data decomposition unit is used for carrying out image compression transmission, the existing compression technology is basically the compression technology of Discrete Cosine Transform (DCT), an image is divided into 8x8 pixel small blocks to be processed, due to the limitation of quantization error of a low frequency band and the low frequency of an intra-block DCT transformation base, block effect and mosquito noise exist, the obtainment of a larger compression ratio is prevented, in many practical applications, particularly in the occasions with higher compression ratio requirements, the requirements on image quality are higher, therefore, a more advanced method, namely orthogonal wavelet transform is needed to carry out image decomposition to obtain the multi-resolution representation of an image, and thus the correlation among image pixels is removed from the more waiting degree, the neglect of the whole structure of image compression is overcome, the block effect caused by image compression is overcome while the high-frequency redundant signals insensitive to the visual effect of people are removed, and the block effect and the mosquito noise are effectively eliminated;
the specific method of segmented encryption includes transposition and permutation methods and symmetric algorithms, where transposition and permutation are the two main encoding methods, and constitute the simplest basis of a cipher, where transposition is much like a letter game, disordering the order of letters, and trying to make up a word with these disordering letters, where the data itself is not changed, but is arranged in another different format, there are many different permutation ciphers, and one that uses a Kaiser cipher, whose principle is that each letter is replaced by the third letter before it, and if the last letter is reached, the letter can be replaced by the nth letter before it, where n is 3;
the symmetric algorithm is that an encryption key can be deduced from a decryption key, and the reverse is also true, in too many symmetric algorithms, encryption and decryption keys are the same, the algorithms are also called secret key algorithms or single key algorithms, a sender and a receiver are required to agree a key before secure communication, the security of the algorithm depends on the key, the key must be kept secret as long as the communication needs to be kept secret, and the symmetric algorithms mainly comprise DES data encryption standard algorithms and IDEA international data encryption algorithms;
the data transmission unit is mainly used for cloud transmission and wired connection transmission of data, and encryption transmission can be carried out based on the cloud during cloud transmission.
The control terminal is computer equipment, the computer equipment comprises a peripheral, a host and a display end, the peripheral is connected with the host, the display end is connected with the host, specifically, the peripheral is matched with the display end, the host is controlled to perform data interaction processing, the purpose of man-machine interaction is achieved, the convenience of image transmission is improved, and the computer equipment further comprises image processing equipment for processing images.
The host computer is composed of a mainboard, a power supply, a memory and a storage medium, a processing device and a transmission device are integrated on the mainboard, the power supply, the memory and the storage medium are all connected with the mainboard, and specifically, the host computer is used for providing an operation platform for images and facilitating data arrangement.
The storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, the cloud disk is wirelessly connected with a processor on the mainboard, specifically, the cloud disk adopts a cloud storage system based on the MEGA technology, the principle is that a client password is encrypted by one key in a browser, a name AES128 advanced encryption algorithm is adopted, RSA key pairs are matched for simultaneous safe encryption, a specific use method is that when an account password is registered, an identity mark maserKey is randomly generated, a user stores the password for later modification and reset, an RSA public key and a private key pair are simultaneously generated, when the registration is clicked, js operation encryption starts, the password is used for removing the encrypted maserKey (identity mark), the plaintext key is used for removing the encrypted, the encrypted maserKey, the encrypted privateKey and the plaintext publicity Key are transmitted to a server, storing the data into a server database; the effect of this is that the server does not store the password, the server does not know the user password, and only the encrypted privateKey is received, so that there is no risk of data leakage.
During login, the encrypted master key, the encrypted private key and the access _ token after the public key is encrypted are taken, then decryption is carried out, the master key is decrypted through a password, the decrypted master key decrypts the private key, the decrypted private key decrypts the public key and the public key decryption public key are taken to the plaintext access _ token, and the transmission server logs in. So that the server is not exposed to the three keys in the clear.
And another fileKey is used for file encryption when uploading files, a random fileKey is generated for each uploaded file, a master key is used for encrypting the fileKey when uploading files, the filename and the content are encrypted by the fileKey, and the encrypted fileKey, the encrypted filename and the encrypted content are received by the server. Therefore, each uploaded file cannot be analyzed and read even if data leaks.
During downloading, the decryption process is that the master key decrypts the fileKey, and the fileKey decrypts the file name and the content and then downloads the file.
The RSA algorithm can be used to operate at the same time:
the algorithm is a public key algorithm supporting variable-length keys, the length of a file block to be encrypted is also variable, and the algorithm is asymmetric; the algorithm is as follows:
first, find three numbers, p, q, r,
wherein p, q are two different prime numbers, and r is a number which is prime to (p-1) (q-1).
The three numbers p, q, r are private keys.
Then, m is found such that rm is 1mod (p-1) (q-1).
This m must be present because r is relatively prime to (p-1) (q-1) and can be obtained by cycloning.
Then, n is calculated pq..
The two numbers m, n are public keys.
While the invention has been described above with reference to an embodiment, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In particular, the various features of the disclosed embodiments of the invention may be used in any combination, provided that no structural conflict exists, and the combinations are not exhaustively described in this specification merely for the sake of brevity and resource conservation. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.

Claims (5)

1. An image data output method characterized by: the method comprises the following steps:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
2. An image data output system according to claim 1, characterized in that: the output system consists of a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all installed in the control terminal.
3. An image data output computer apparatus according to claim 1, characterized in that: the control terminal is computer equipment which comprises a peripheral, a host and a display end, wherein the peripheral is connected with the host, and the display end is connected with the host.
4. An image data output computer apparatus according to claim 1, characterized in that: the host computer is composed of a mainboard, a power supply, a memory and a storage medium, wherein a processing device and a transmission device are integrated on the mainboard, and the power supply, the memory and the storage medium are all connected with the mainboard.
5. The storage medium for image data output according to claim 4, characterized in that: the storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, and the cloud disk is wirelessly connected with a processor on the mainboard.
CN202010413204.3A 2020-05-15 2020-05-15 Image data output method and system, computer equipment and storage medium Pending CN111597569A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010413204.3A CN111597569A (en) 2020-05-15 2020-05-15 Image data output method and system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010413204.3A CN111597569A (en) 2020-05-15 2020-05-15 Image data output method and system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111597569A true CN111597569A (en) 2020-08-28

Family

ID=72187308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010413204.3A Pending CN111597569A (en) 2020-05-15 2020-05-15 Image data output method and system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111597569A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984631A (en) * 2020-09-02 2020-11-24 深圳壹账通智能科技有限公司 Production data migration method and device, computer equipment and storage medium
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680073A (en) * 2013-11-29 2015-06-03 联芯科技有限公司 Security method and device for data in mobile communication terminal
CN109981282A (en) * 2019-01-28 2019-07-05 平安科技(深圳)有限公司 Improve method, apparatus, system and the storage medium of image data transmission safety

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680073A (en) * 2013-11-29 2015-06-03 联芯科技有限公司 Security method and device for data in mobile communication terminal
CN109981282A (en) * 2019-01-28 2019-07-05 平安科技(深圳)有限公司 Improve method, apparatus, system and the storage medium of image data transmission safety

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈文等: "基于数据分割的网络数字图像安全传输方法", 《计算机工程与设计》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984631A (en) * 2020-09-02 2020-11-24 深圳壹账通智能科技有限公司 Production data migration method and device, computer equipment and storage medium
CN116418566A (en) * 2023-03-15 2023-07-11 北京拙河科技有限公司 SM encryption algorithm-based image data storage method and device

Similar Documents

Publication Publication Date Title
Kannammal et al. Two level security for medical images using watermarking/encryption algorithms
US9436815B2 (en) Block management unification system and method
Ghebleh et al. A novel secret image sharing scheme using large primes
Parah et al. A new secure and robust watermarking technique based on logistic map and modification of DC coefficient
Anwar et al. Improving the security of images transmission
CN111597569A (en) Image data output method and system, computer equipment and storage medium
Li et al. Joint image compression and encryption based on order-8 alternating transforms
Umamageswari et al. Security in medical image communication with arnold's cat map method and reversible watermarking
Farschi et al. A novel chaotic approach for information hiding in image
CN112233007A (en) Encrypted image watermark embedding method in cloud computing environment
Ajili et al. Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
Malalla et al. Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography
Kalita et al. A comparative study of steganography algorithms of spatial and transform domain
Siddiqui et al. Chaos-based video steganography method in discrete cosine transform domain
Kumar et al. A new steganography technique using snake scan ordering strategy
Bhattacharjee et al. An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking
Kumar et al. An efficient and effective lossless symmetric key cryptography algorithm for an image
Alawsi et al. A Novel image encryption approach for IoT applications
Guhan et al. A Trio Approach Satisfying CIA Triad for Medical Image Security
Priyanka et al. A steganographic system for embedding image and encrypted text
Alarood Improve the efficiency for embedding in LSB method based digital image watermarking
Susanto et al. A combination of Hill Cipher and LSB for image security
Bindu Madavi et al. Security and Privacy Issues in Cloud and IoT Technology and Their Countermeasures
Susanto et al. A combination of hill cipher and LSB for image security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200828