CN111597569A - Image data output method and system, computer equipment and storage medium - Google Patents
Image data output method and system, computer equipment and storage medium Download PDFInfo
- Publication number
- CN111597569A CN111597569A CN202010413204.3A CN202010413204A CN111597569A CN 111597569 A CN111597569 A CN 111597569A CN 202010413204 A CN202010413204 A CN 202010413204A CN 111597569 A CN111597569 A CN 111597569A
- Authority
- CN
- China
- Prior art keywords
- data
- storage medium
- control terminal
- image data
- disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000005540 biological transmission Effects 0.000 claims abstract description 31
- 238000000354 decomposition reaction Methods 0.000 claims description 8
- 230000002093 peripheral effect Effects 0.000 claims description 7
- 239000012634 fragment Substances 0.000 abstract 1
- 230000006835 compression Effects 0.000 description 7
- 238000007906 compression Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000017105 transposition Effects 0.000 description 3
- 241000255925 Diptera Species 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for outputting image data, computer equipment and a storage medium, belonging to the technical field of computers, wherein the method comprises the following steps: the method comprises the following steps: selecting image data through a control terminal; step two: decomposing the data of the selected image by the control terminal; step three: carrying out sectional encryption on the decomposed data through a control terminal; step four: transmitting the encrypted data to a storage medium through a control terminal; step five: the storage medium is synthesized after receiving the decomposed data, then the data are automatically encrypted, the data are decomposed and encrypted during data transmission, the data fragment type encryption performance is improved, the data are transmitted, the transmitted data are output to the storage medium, the data are synthesized, and then the whole data are encrypted.
Description
Technical Field
The invention relates to the technical field of computers, in particular to an image data output method and system, computer equipment and a storage medium.
Background
The image data output is a process of carrying out information source and channel processing and transmitting or storing image information in real time or in time according to certain requirements.
When image data is output, transmission and storage need to be carried out through media, and transmission is carried out based on a certain transmission method during transmission, but when the existing image data is output, the transmission is often carried out in a naked transmission channel, especially for some relatively confidential information, targeted data attack is easy to happen during transmission, data loss or stealing is easy to happen in serious cases, and when the existing image data is output, a plurality of transmission media or storage media cannot be simultaneously encrypted, a leak is easy to find out, and information loss is caused.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above and/or problems occurring in the conventional image output method and system, computer apparatus, and storage medium.
Therefore, an object of the present invention is to provide an image data output method and system, a computer device, and a storage medium, which can perform simultaneous encryption protection on the image data output method and system, the computer device, and the storage medium, reduce the occurrence of data loss caused by image data transmission, and improve the security of data transmission.
To solve the above technical problem, according to an aspect of the present invention, the present invention provides the following technical solutions:
an image data output method, the method comprising:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
As a preferable aspect of the image data output system of the present invention, wherein: the output system consists of a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all installed in the control terminal.
As a preferable aspect of the image data output computer apparatus of the present invention, wherein: the control terminal is computer equipment which comprises a peripheral, a host and a display end, wherein the peripheral is connected with the host, and the display end is connected with the host.
As a preferable aspect of the image data output computer apparatus of the present invention, wherein: the host computer is composed of a mainboard, a power supply, a memory and a storage medium, wherein a processing device and a transmission device are integrated on the mainboard, and the power supply, the memory and the storage medium are all connected with the mainboard.
As a preferable aspect of the storage medium for image data output according to the present invention, wherein: the storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, and the cloud disk is wirelessly connected with a processor on the mainboard.
Compared with the prior art: the existing image data output is usually carried out in a naked transmission channel, especially for some confidential information, the targeted data attack is easy to be suffered during transmission, the situation that data is lost or stolen is easy to happen seriously, and the existing image data can not be simultaneously encrypted on a plurality of transmission media or storage media during output, so that a leak is easy to find out, and the situation that the information is lost occurs.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the present invention will be described in detail with reference to the accompanying drawings and detailed embodiments, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise. Wherein:
fig. 1 is a schematic view of a flow structure of an image data output method and system, a computer device, and a storage medium according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described herein, and it will be apparent to those of ordinary skill in the art that the present invention may be practiced without departing from the spirit and scope of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Next, the present invention will be described in detail with reference to the drawings, wherein for convenience of illustration, the cross-sectional view of the device structure is not enlarged partially according to the general scale, and the drawings are only examples, which should not limit the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides an image data output method and system, a computer device and a storage medium, and please refer to fig. 1.
The method comprises the following steps:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
The output system comprises a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all arranged in a control terminal, in particular, the data decomposition unit is used for carrying out image compression transmission, the existing compression technology is basically the compression technology of Discrete Cosine Transform (DCT), an image is divided into 8x8 pixel small blocks to be processed, due to the limitation of quantization error of a low frequency band and the low frequency of an intra-block DCT transformation base, block effect and mosquito noise exist, the obtainment of a larger compression ratio is prevented, in many practical applications, particularly in the occasions with higher compression ratio requirements, the requirements on image quality are higher, therefore, a more advanced method, namely orthogonal wavelet transform is needed to carry out image decomposition to obtain the multi-resolution representation of an image, and thus the correlation among image pixels is removed from the more waiting degree, the neglect of the whole structure of image compression is overcome, the block effect caused by image compression is overcome while the high-frequency redundant signals insensitive to the visual effect of people are removed, and the block effect and the mosquito noise are effectively eliminated;
the specific method of segmented encryption includes transposition and permutation methods and symmetric algorithms, where transposition and permutation are the two main encoding methods, and constitute the simplest basis of a cipher, where transposition is much like a letter game, disordering the order of letters, and trying to make up a word with these disordering letters, where the data itself is not changed, but is arranged in another different format, there are many different permutation ciphers, and one that uses a Kaiser cipher, whose principle is that each letter is replaced by the third letter before it, and if the last letter is reached, the letter can be replaced by the nth letter before it, where n is 3;
the symmetric algorithm is that an encryption key can be deduced from a decryption key, and the reverse is also true, in too many symmetric algorithms, encryption and decryption keys are the same, the algorithms are also called secret key algorithms or single key algorithms, a sender and a receiver are required to agree a key before secure communication, the security of the algorithm depends on the key, the key must be kept secret as long as the communication needs to be kept secret, and the symmetric algorithms mainly comprise DES data encryption standard algorithms and IDEA international data encryption algorithms;
the data transmission unit is mainly used for cloud transmission and wired connection transmission of data, and encryption transmission can be carried out based on the cloud during cloud transmission.
The control terminal is computer equipment, the computer equipment comprises a peripheral, a host and a display end, the peripheral is connected with the host, the display end is connected with the host, specifically, the peripheral is matched with the display end, the host is controlled to perform data interaction processing, the purpose of man-machine interaction is achieved, the convenience of image transmission is improved, and the computer equipment further comprises image processing equipment for processing images.
The host computer is composed of a mainboard, a power supply, a memory and a storage medium, a processing device and a transmission device are integrated on the mainboard, the power supply, the memory and the storage medium are all connected with the mainboard, and specifically, the host computer is used for providing an operation platform for images and facilitating data arrangement.
The storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, the cloud disk is wirelessly connected with a processor on the mainboard, specifically, the cloud disk adopts a cloud storage system based on the MEGA technology, the principle is that a client password is encrypted by one key in a browser, a name AES128 advanced encryption algorithm is adopted, RSA key pairs are matched for simultaneous safe encryption, a specific use method is that when an account password is registered, an identity mark maserKey is randomly generated, a user stores the password for later modification and reset, an RSA public key and a private key pair are simultaneously generated, when the registration is clicked, js operation encryption starts, the password is used for removing the encrypted maserKey (identity mark), the plaintext key is used for removing the encrypted, the encrypted maserKey, the encrypted privateKey and the plaintext publicity Key are transmitted to a server, storing the data into a server database; the effect of this is that the server does not store the password, the server does not know the user password, and only the encrypted privateKey is received, so that there is no risk of data leakage.
During login, the encrypted master key, the encrypted private key and the access _ token after the public key is encrypted are taken, then decryption is carried out, the master key is decrypted through a password, the decrypted master key decrypts the private key, the decrypted private key decrypts the public key and the public key decryption public key are taken to the plaintext access _ token, and the transmission server logs in. So that the server is not exposed to the three keys in the clear.
And another fileKey is used for file encryption when uploading files, a random fileKey is generated for each uploaded file, a master key is used for encrypting the fileKey when uploading files, the filename and the content are encrypted by the fileKey, and the encrypted fileKey, the encrypted filename and the encrypted content are received by the server. Therefore, each uploaded file cannot be analyzed and read even if data leaks.
During downloading, the decryption process is that the master key decrypts the fileKey, and the fileKey decrypts the file name and the content and then downloads the file.
The RSA algorithm can be used to operate at the same time:
the algorithm is a public key algorithm supporting variable-length keys, the length of a file block to be encrypted is also variable, and the algorithm is asymmetric; the algorithm is as follows:
first, find three numbers, p, q, r,
wherein p, q are two different prime numbers, and r is a number which is prime to (p-1) (q-1).
The three numbers p, q, r are private keys.
Then, m is found such that rm is 1mod (p-1) (q-1).
This m must be present because r is relatively prime to (p-1) (q-1) and can be obtained by cycloning.
Then, n is calculated pq..
The two numbers m, n are public keys.
While the invention has been described above with reference to an embodiment, various modifications may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In particular, the various features of the disclosed embodiments of the invention may be used in any combination, provided that no structural conflict exists, and the combinations are not exhaustively described in this specification merely for the sake of brevity and resource conservation. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
Claims (5)
1. An image data output method characterized by: the method comprises the following steps:
the method comprises the following steps: selecting image data through a control terminal;
step two: decomposing the data of the selected image by the control terminal;
step three: carrying out sectional encryption on the decomposed data through a control terminal;
step four: transmitting the encrypted data to a storage medium through a control terminal;
step five: and after receiving the decomposed data, the storage medium synthesizes the data and then automatically encrypts the data.
2. An image data output system according to claim 1, characterized in that: the output system consists of a data decomposition unit, a data encryption unit and a data transmission unit, wherein the data decomposition unit, the data encryption unit and the data transmission unit are all installed in the control terminal.
3. An image data output computer apparatus according to claim 1, characterized in that: the control terminal is computer equipment which comprises a peripheral, a host and a display end, wherein the peripheral is connected with the host, and the display end is connected with the host.
4. An image data output computer apparatus according to claim 1, characterized in that: the host computer is composed of a mainboard, a power supply, a memory and a storage medium, wherein a processing device and a transmission device are integrated on the mainboard, and the power supply, the memory and the storage medium are all connected with the mainboard.
5. The storage medium for image data output according to claim 4, characterized in that: the storage medium comprises a hard disk, a U disk, a flash disk and a cloud disk, wherein the hard disk, the U disk and the flash disk are all connected with a mainboard, and the cloud disk is wirelessly connected with a processor on the mainboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010413204.3A CN111597569A (en) | 2020-05-15 | 2020-05-15 | Image data output method and system, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010413204.3A CN111597569A (en) | 2020-05-15 | 2020-05-15 | Image data output method and system, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111597569A true CN111597569A (en) | 2020-08-28 |
Family
ID=72187308
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010413204.3A Pending CN111597569A (en) | 2020-05-15 | 2020-05-15 | Image data output method and system, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111597569A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111984631A (en) * | 2020-09-02 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Production data migration method and device, computer equipment and storage medium |
CN116418566A (en) * | 2023-03-15 | 2023-07-11 | 北京拙河科技有限公司 | SM encryption algorithm-based image data storage method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104680073A (en) * | 2013-11-29 | 2015-06-03 | 联芯科技有限公司 | Security method and device for data in mobile communication terminal |
CN109981282A (en) * | 2019-01-28 | 2019-07-05 | 平安科技(深圳)有限公司 | Improve method, apparatus, system and the storage medium of image data transmission safety |
-
2020
- 2020-05-15 CN CN202010413204.3A patent/CN111597569A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104680073A (en) * | 2013-11-29 | 2015-06-03 | 联芯科技有限公司 | Security method and device for data in mobile communication terminal |
CN109981282A (en) * | 2019-01-28 | 2019-07-05 | 平安科技(深圳)有限公司 | Improve method, apparatus, system and the storage medium of image data transmission safety |
Non-Patent Citations (1)
Title |
---|
陈文等: "基于数据分割的网络数字图像安全传输方法", 《计算机工程与设计》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111984631A (en) * | 2020-09-02 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Production data migration method and device, computer equipment and storage medium |
CN116418566A (en) * | 2023-03-15 | 2023-07-11 | 北京拙河科技有限公司 | SM encryption algorithm-based image data storage method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kannammal et al. | Two level security for medical images using watermarking/encryption algorithms | |
US9436815B2 (en) | Block management unification system and method | |
Ghebleh et al. | A novel secret image sharing scheme using large primes | |
Parah et al. | A new secure and robust watermarking technique based on logistic map and modification of DC coefficient | |
Anwar et al. | Improving the security of images transmission | |
CN111597569A (en) | Image data output method and system, computer equipment and storage medium | |
Li et al. | Joint image compression and encryption based on order-8 alternating transforms | |
Umamageswari et al. | Security in medical image communication with arnold's cat map method and reversible watermarking | |
Farschi et al. | A novel chaotic approach for information hiding in image | |
CN112233007A (en) | Encrypted image watermark embedding method in cloud computing environment | |
Ajili et al. | Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image | |
Islam et al. | Denoising and error correction in noisy AES-encrypted images using statistical measures | |
Malalla et al. | Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography | |
Kalita et al. | A comparative study of steganography algorithms of spatial and transform domain | |
Siddiqui et al. | Chaos-based video steganography method in discrete cosine transform domain | |
Kumar et al. | A new steganography technique using snake scan ordering strategy | |
Bhattacharjee et al. | An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking | |
Kumar et al. | An efficient and effective lossless symmetric key cryptography algorithm for an image | |
Alawsi et al. | A Novel image encryption approach for IoT applications | |
Guhan et al. | A Trio Approach Satisfying CIA Triad for Medical Image Security | |
Priyanka et al. | A steganographic system for embedding image and encrypted text | |
Alarood | Improve the efficiency for embedding in LSB method based digital image watermarking | |
Susanto et al. | A combination of Hill Cipher and LSB for image security | |
Bindu Madavi et al. | Security and Privacy Issues in Cloud and IoT Technology and Their Countermeasures | |
Susanto et al. | A combination of hill cipher and LSB for image security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200828 |