CN112613055A - Image processing system and method based on distributed cloud server and digital-image conversion - Google Patents
Image processing system and method based on distributed cloud server and digital-image conversion Download PDFInfo
- Publication number
- CN112613055A CN112613055A CN202011573062.3A CN202011573062A CN112613055A CN 112613055 A CN112613055 A CN 112613055A CN 202011573062 A CN202011573062 A CN 202011573062A CN 112613055 A CN112613055 A CN 112613055A
- Authority
- CN
- China
- Prior art keywords
- image
- matrix
- numerical
- sub
- string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000006243 chemical reaction Methods 0.000 title claims abstract description 44
- 238000012545 processing Methods 0.000 title claims abstract description 19
- 239000011159 matrix material Substances 0.000 claims abstract description 90
- 230000008569 process Effects 0.000 claims abstract description 28
- 238000007781 pre-processing Methods 0.000 claims abstract description 7
- 230000011218 segmentation Effects 0.000 claims description 64
- 230000009466 transformation Effects 0.000 claims description 15
- 239000002131 composite material Substances 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 7
- 230000003044 adaptive effect Effects 0.000 claims description 6
- 238000003672 processing method Methods 0.000 claims description 5
- 238000000844 transformation Methods 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 6
- 238000005336 cracking Methods 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 4
- 230000035515 penetration Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000003709 image segmentation Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20048—Transform domain processing
- G06T2207/20056—Discrete and fast Fourier transform, [DFT, FFT]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Image Processing (AREA)
Abstract
The invention belongs to the technical field of cloud computing, and particularly relates to an image processing system and method based on a distributed cloud server and digital-to-image conversion. The system comprises: the image preprocessing unit is configured for carrying out image binarization on the image to be processed to obtain a binarized image; and the digital conversion module is configured to convert the image to be binarized into a corresponding numerical matrix and then convert the numerical matrix into a continuous numerical string. The image encryption method has the advantages that the image data are converted into numerical data to complete the encryption of the image, and the image encryption method is completely different from the image encryption technology in the prior art, and has the advantages of difficult cracking and high safety; meanwhile, in the encryption process, the segmented numerical data is encrypted by using a distributed cloud server group consisting of a plurality of cloud servers, so that the encryption efficiency is higher.
Description
Technical Field
The invention belongs to the technical field of cloud computing, and particularly relates to an image processing system and method based on a distributed cloud server and digital-to-image conversion.
Background
In computer science, Distributed computing (english) is translated into Distributed computing. This field of research is mainly concerned with how Distributed systems (Distributed systems) perform calculations. A distributed system is a system of computers interconnected via a network to communicate messages and communications and coordinate their activities. The components interact with each other to achieve a common goal. The engineering data which needs to be calculated in large quantity is divided into small blocks, a plurality of computers calculate the small blocks respectively, and after the calculation results are uploaded, the results are unified and combined to obtain the science of data conclusion. Examples of distributed systems come from different service-oriented architectures, massively multiplayer online games, peer-to-peer network applications.
Digital images are one of the most popular forms of multimedia and have wide application in politics, economy, national defense, education, and the like. Digital images also have high security requirements for certain specialized fields, such as military, commercial, and medical.
In order to realize the security of digital images, in actual operation, a two-dimensional image is generally converted into one-dimensional data, and then encrypted by adopting a traditional encryption algorithm. Unlike ordinary text information, images and videos have temporal, spatial, visual perceptibility and lossy compression properties, and these properties make it possible to design more efficient and secure encryption algorithms for images. Since the last 90 s, researchers have proposed various image encryption algorithms using these characteristics. To summarize, the concept of image encryption technology is: a technique for improving the security and the operation efficiency of encryption by using the characteristics of digital images to design an encryption algorithm.
Patent No. CN2007800531085A discloses an image encryption apparatus, an image decryption apparatus, and a method; input data is converted into an image, and an encrypted area, which is an area where the image is encrypted, is specified for the input image. Then, encryption key related information, which is information related to the encryption key, is generated from the encryption key, and the encryption key related information is embedded in the image of the encryption area, thereby generating the 1 st intermediate image. Then, the 1 st intermediate image is transformed according to the encryption key to generate a 2 nd intermediate image. Then, the pixel values of the 2 nd intermediate image are transformed in such a manner that the position of the encryption area can be determined. As a result of the conversion, an encrypted image in which a part of the encrypted area within the input image is encrypted is generated.
Although the encryption of the image is realized, the encryption process and the encryption means still follow the traditional mode of encrypting the original image, and the encryption security and the decryption rate are still high.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide an image processing system and method based on a distributed cloud server and digital-to-image conversion, which utilize conversion of image data into numerical data to complete encryption of an image, and the image processing system and method are completely different from the image encryption technology in the prior art, and have the advantages of being difficult to crack and high in security; meanwhile, in the encryption process, the segmented numerical data is encrypted by using a distributed cloud server group consisting of a plurality of cloud servers, so that the encryption efficiency is higher.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
an image processing system based on distributed cloud servers and map conversion, the system comprising: the image preprocessing unit is configured for carrying out image binarization on the image to be processed to obtain a binarized image; the digital conversion module is configured to convert the image to be binarized into a corresponding numerical matrix and then convert the numerical matrix into a continuous numerical string; the numerical value segmentation module is configured to perform characteristic analysis on the numerical value string, determine segmentation nodes in numerical value penetration, and segment the numerical value string according to the determined segmentation nodes to obtain a plurality of segmentation substrings; the distributed cloud server group comprises a plurality of cloud servers, wherein each cloud server is configured to randomly obtain a sub-character string from a plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result; and the image restoration unit is configured to acquire the sub-encryption results from the cloud servers, decrypt the sub-encryption results to obtain sub-character strings, splice the sub-character strings to obtain numerical value strings, perform an inverse process of converting the numerical value strings into the numerical value strings by using the numerical value strings to obtain the numerical value matrixes, and finally perform an inverse process of converting the binary images into the numerical value matrixes to obtain the binary images.
Further, the image preprocessing unit performing image binarization includes: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
Further, the step of converting the image to be binarized into the corresponding numerical matrix by the digital conversion module includes: taking the binarized image as a parameter A, randomly generating a matrix B, and then constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X:and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
Further, each of the distributed cloud servers includes: an acquisition unit configured to randomly acquire one sub-character string from a plurality of divided sub-character strings obtained after division; and the encryption unit is configured to digitally encrypt the obtained sub-character string to obtain a sub-encryption result.
Further, the digitally encrypting the obtained sub-character string by the encryption unit includes: randomly generating a value m as a first key, and performing Fourier transform of m degrees on the sub-character string by using the following formula:wherein: x (t) denotes a substring, Xm(u) denotes the converted substring, Km(t, u) is a transformation kernel; said Km(t, u) is expressed using the following formula:wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier transformed Xm(u) as an encrypted substring.
Further, if the image to be processed is a color image, the color image is converted into a gray scale image to obtain the gray scale image data.
An image processing method based on a distributed cloud server and a number map conversion, the method comprising the steps of:
step 1: carrying out image binarization on an image to be processed to obtain a binarized image;
step 2: converting an image to be binarized into a corresponding numerical matrix, and converting the numerical matrix into a continuous numerical string;
and step 3: performing characteristic analysis on the numerical string, determining segmentation nodes in numerical penetration, and segmenting the numerical string according to the determined segmentation nodes to obtain a plurality of segmentation substrings;
and 4, step 4: the cloud servers respectively randomly obtain a sub-character string from the plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result;
and 5: and acquiring a sub-encryption result from each cloud server, decrypting the sub-encryption result to obtain a sub-character string, splicing the sub-character strings to obtain a numerical value string, performing an inverse process of converting the numerical value string into the numerical value string by using the numerical value string to obtain a numerical value matrix, and finally performing an inverse process of converting the binary image into the numerical value matrix to obtain the binary image.
Further, the image binarization in the step 1 includes: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
Further, the step 2 of converting the image to be binarized into a corresponding numerical matrix, and then converting the numerical matrix into a continuous numerical string includes: taking the binarized image as a parameter A, randomly generating a matrix B, and then constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X:and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
Further, if the image to be processed is a color image, the color image is converted into a gray scale image to obtain the gray scale image data.
The image processing system and method based on the distributed cloud server and the digital-image conversion have the following beneficial effects: the image encryption method has the advantages that the image data are converted into numerical data to complete the encryption of the image, and the image encryption method is completely different from the image encryption technology in the prior art, and has the advantages of difficult cracking and high safety; meanwhile, in the encryption process, a distributed cloud server group consisting of a plurality of cloud servers is used for encrypting the segmented numerical data, so that the encryption efficiency is higher; the method is mainly realized by the following steps: 1. conversion of numbers and images: according to the method, the image to be processed is firstly binarized, then the binarized image is converted into the corresponding numerical value matrix, then the numerical value matrix is converted into the continuous numerical value string, and then the image encryption is carried out on the converted numerical value string, so that compared with the traditional encryption mode, the encryption mode is not easy to crack, and the safety is higher; 2. dividing the numerical string: the method and the system have the advantages that the numerical string is segmented to obtain the sub-character strings, and then the sub-character strings are encrypted by the aid of the cloud servers, so that the encryption efficiency is higher; 3. constructing a numerical matrix: according to the invention, the image data is converted into the numerical data in a manner of constructing the numerical matrix, and compared with a conversion manner in the prior art, the conversion process is simpler and the conversion efficiency is higher; 4. and (3) encryption algorithm: the encryption algorithm is different from the traditional numerical encryption, the numerical value is encrypted in a transformation mode based on Fourier transformation, and the encrypted result is lower in decryption rate due to the fact that the encryption algorithm is different from the prior art.
Drawings
Fig. 1 is a schematic system structure diagram of an image processing system based on a distributed cloud server and digital-to-image conversion according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method of an image processing method based on a distributed cloud server and a digital-to-image conversion according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of an experimental curve of which the cracking rate changes with the cracking times according to the image processing method based on the distributed cloud server and the digital-to-graphic conversion provided by the embodiment of the present invention, and a schematic diagram of a comparative experimental effect in the prior art.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
As shown in fig. 1, an image processing system based on distributed cloud servers and map conversion, the system comprising: the image preprocessing unit is configured for carrying out image binarization on the image to be processed to obtain a binarized image; the digital conversion module is configured to convert the image to be binarized into a corresponding numerical matrix and then convert the numerical matrix into a continuous numerical string; the numerical value segmentation module is configured to perform characteristic analysis on the numerical value string, determine segmentation nodes in numerical value penetration, and segment the numerical value string according to the determined segmentation nodes to obtain a plurality of segmentation substrings; the distributed cloud server group comprises a plurality of cloud servers, wherein each cloud server is configured to randomly obtain a sub-character string from a plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result; and the image restoration unit is configured to acquire the sub-encryption results from the cloud servers, decrypt the sub-encryption results to obtain sub-character strings, splice the sub-character strings to obtain numerical value strings, perform an inverse process of converting the numerical value strings into the numerical value strings by using the numerical value strings to obtain the numerical value matrixes, and finally perform an inverse process of converting the binary images into the numerical value matrixes to obtain the binary images.
By adopting the technical scheme, the image encryption is completed by converting the image data into numerical data, and the image encryption method is completely different from the image encryption technology in the prior art, and has the advantages of difficult cracking and high safety; meanwhile, in the encryption process, a distributed cloud server group consisting of a plurality of cloud servers is used for encrypting the segmented numerical data, so that the encryption efficiency is higher; the method is mainly realized by the following steps: 1. conversion of numbers and images: according to the method, the image to be processed is firstly binarized, then the binarized image is converted into the corresponding numerical value matrix, then the numerical value matrix is converted into the continuous numerical value string, and then the image encryption is carried out on the converted numerical value string, so that compared with the traditional encryption mode, the encryption mode is not easy to crack, and the safety is higher; 2. dividing the numerical string: the method and the system have the advantages that the numerical string is segmented to obtain the sub-character strings, and then the sub-character strings are encrypted by the aid of the cloud servers, so that the encryption efficiency is higher; 3. constructing a numerical matrix: according to the invention, the image data is converted into the numerical data in a manner of constructing the numerical matrix, and compared with a conversion manner in the prior art, the conversion process is simpler and the conversion efficiency is higher; 4. and (3) encryption algorithm: the encryption algorithm is different from the traditional numerical encryption, the numerical value is encrypted in a transformation mode based on Fourier transformation, and the encrypted result is lower in decryption rate due to the fact that the encryption algorithm is different from the prior art.
Example 2
On the basis of the above embodiment, the image preprocessing unit performing image binarization includes: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
Specifically, the binarization processing of the image is to set the gray value of a point on the image to be 0 or 255, that is, to make the whole image exhibit a distinct black-and-white effect. That is, a gray scale image with 256 brightness levels is selected by a proper threshold value to obtain a binary image which can still reflect the whole and local features of the image. In digital image processing, binary images are very important, and particularly in practical image processing, many systems are configured by binary image processing, and in order to perform processing and analysis of binary images, a grayscale image is first binarized to obtain a binarized image, which is advantageous in that when an image is further processed, the collective property of the image is only related to the positions of points with pixel values of 0 or 255, and the multi-level values of the pixels are not related, so that the processing is simplified, and the processing and compression amount of data is small. In order to obtain an ideal binary image, a non-overlapping region is generally defined by closed and connected boundaries. All pixels with the gray levels larger than or equal to the threshold are judged to belong to the specific object, the gray level of the pixels is 255 for representation, otherwise the pixels are excluded from the object area, the gray level is 0, and the pixels represent the background or the exceptional object area.
If a particular object has a uniform gray level inside it and is in a uniform background with gray levels of other levels, a comparable segmentation effect can be obtained using thresholding. If the difference between the object and the background is not represented in gray scale values (e.g., different textures), the difference feature can be converted into a gray scale difference, and then the image can be segmented using a threshold selection technique. The threshold value is dynamically adjusted to realize the binarization of the image, and the specific result of the image segmentation can be dynamically observed.
Example 3
On the basis of the above embodiment, the converting the image to be binarized into the corresponding numerical matrix by the digital conversion module includes: taking the binarized image as a parameter A, randomly generating a matrix B, and then constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X:and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
Specifically, the image data is converted into the numerical data in a numerical matrix constructing mode, and compared with the conversion mode in the prior art, the conversion process is simpler and the conversion efficiency is higher; 4. and (3) encryption algorithm: the encryption algorithm is different from the traditional numerical encryption, the numerical value is encrypted in a transformation mode based on Fourier transformation, and the encrypted result is lower in decryption rate due to the fact that the encryption algorithm is different from the prior art.
Example 4
On the basis of the above embodiment, each of the distributed cloud servers includes: an acquisition unit configured to randomly acquire one sub-character string from a plurality of divided sub-character strings obtained after division; and the encryption unit is configured to digitally encrypt the obtained sub-character string to obtain a sub-encryption result.
Specifically, the industry name of a cloud server is actually a computing unit. The computing unit means that the server can only count the brains of one person, and is equivalent to the CPU of a common computer, and the resources in the server are limited. And if you need to obtain better performance, the solution is to upgrade the cloud server and to deploy other software which consumes the resources of the computing unit on the corresponding cloud service. For example, databases have special cloud database services, static web pages and pictures have special file storage services.
Moreover, cloud servers are not so cheap, but rather are more expensive than a typical VPS. Why? Because it is relatively easy to expand. The cloud server is a good choice when the website is large and has high income.
The cloud server is an important component of cloud computing service and is a service platform for providing comprehensive business capability for various internet users. The platform integrates three core elements of internet application in the traditional sense: computing, storage, network, and providing a user with a public internet infrastructure service.
Example 5
On the basis of the above embodiment, the digitally encrypting the acquired sub-string by the encryption unit includes: randomly generating a value m as a first key, and performing Fourier transform of m degrees on the sub-character string by using the following formula:wherein: x (t) denotes a substring, Xm(u) denotes the converted substring, Km(t, u) is a transformation kernel; said Km(t, u is expressed using the following formula:
wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier transformed Xm(u) as an encrypted substring.
Example 6
On the basis of the above embodiment, if the image to be processed is a color image, it is converted into a grayscale image to obtain the grayscale image data.
Example 7
As shown in fig. 2, the image processing method based on distributed cloud server and map conversion performs the following steps:
step 1: carrying out image binarization on an image to be processed to obtain a binarized image;
step 2: converting an image to be binarized into a corresponding numerical matrix, and converting the numerical matrix into a continuous numerical string;
and step 3: performing characteristic analysis on the numerical string, determining segmentation nodes in numerical penetration, and segmenting the numerical string according to the determined segmentation nodes to obtain a plurality of segmentation substrings;
and 4, step 4: the cloud servers respectively randomly obtain a sub-character string from the plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result;
and 5: and acquiring a sub-encryption result from each cloud server, decrypting the sub-encryption result to obtain a sub-character string, splicing the sub-character strings to obtain a numerical value string, performing an inverse process of converting the numerical value string into the numerical value string by using the numerical value string to obtain a numerical value matrix, and finally performing an inverse process of converting the binary image into the numerical value matrix to obtain the binary image.
Specifically, referring to fig. 3, the present invention completes the encryption of the image by converting the image data into numerical data, which is completely different from the image encryption technology in the prior art, and has the advantages of difficult decryption and high security; meanwhile, in the encryption process, a distributed cloud server group consisting of a plurality of cloud servers is used for encrypting the segmented numerical data, so that the encryption efficiency is higher; the method is mainly realized by the following steps: 1. conversion of numbers and images: according to the method, the image to be processed is firstly binarized, then the binarized image is converted into the corresponding numerical value matrix, then the numerical value matrix is converted into the continuous numerical value string, and then the image encryption is carried out on the converted numerical value string, so that compared with the traditional encryption mode, the encryption mode is not easy to crack, and the safety is higher; 2. dividing the numerical string: the method and the system have the advantages that the numerical string is segmented to obtain the sub-character strings, and then the sub-character strings are encrypted by the aid of the cloud servers, so that the encryption efficiency is higher; 3. constructing a numerical matrix: according to the invention, the image data is converted into the numerical data in a manner of constructing the numerical matrix, and compared with a conversion manner in the prior art, the conversion process is simpler and the conversion efficiency is higher; 4. and (3) encryption algorithm: the encryption algorithm is different from the traditional numerical encryption, the numerical value is encrypted in a transformation mode based on Fourier transformation, and the encrypted result is lower in decryption rate due to the fact that the encryption algorithm is different from the prior art.
Example 8
On the basis of the above embodiment, the performing image binarization in step 1 includes: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
Example 9
On the basis of the previous embodiment, the step 2 of converting the image to be binarized into the corresponding numerical matrix, and then converting the numerical matrix into the continuous numerical string includes: taking the binarized image as a parameter A, randomly generating a matrix B, and then constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X: and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
Example 10
On the basis of the above embodiment, if the image to be processed is a color image, it is converted into a grayscale image to obtain the grayscale image data.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional units, and in practical applications, the functions may be distributed by different functional units according to needs, that is, the units or steps in the embodiments of the present invention are further decomposed or combined, for example, the units in the foregoing embodiment may be combined into one unit, or may be further decomposed into multiple sub-units, so as to complete all or the functions of the units described above. The names of the units and steps involved in the embodiments of the present invention are only for distinguishing the units or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative elements, method steps, described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the elements, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or unit/apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or unit/apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent modifications or substitutions of the related art marks may be made by those skilled in the art without departing from the principle of the present invention, and the technical solutions after such modifications or substitutions will fall within the protective scope of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (10)
1. An image processing system based on a distributed cloud server and a digital graph conversion, the system comprising: the image preprocessing unit is configured for carrying out image binarization on the image to be processed to obtain a binarized image; the digital conversion module is configured to convert the image to be binarized into a corresponding numerical matrix and then convert the numerical matrix into a continuous numerical string; the numerical value segmentation module is configured to perform characteristic analysis on the numerical value string, determine segmentation nodes in the numerical value string, and segment the numerical value string in the numerical value string according to the determined segmentation nodes to obtain a plurality of segmentation substrings; the distributed cloud server group comprises a plurality of cloud servers, wherein each cloud server is configured to randomly obtain a sub-character string from a plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result; and the image restoration unit is configured to acquire the sub-encryption results from the cloud servers, decrypt the sub-encryption results to obtain sub-character strings, splice the sub-character strings to obtain numerical value strings, perform an inverse process of converting the numerical value strings into the numerical value strings by using the numerical value strings to obtain the numerical value matrixes, and finally perform an inverse process of converting the binary images into the numerical value matrixes to obtain the binary images.
2. The system of claim 1, wherein the image pre-processing unit to perform image binarization comprises: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
3. The system of claim 2, wherein the digital conversion module converting the image to be binarized into a corresponding matrix of values comprises: will be two-valuedTaking the image as a parameter A, randomly generating a matrix B, and then jointly constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X:and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
4. The system of claim 3, wherein each of the distributed cloud servers comprises: an acquisition unit configured to randomly acquire one sub-character string from a plurality of divided sub-character strings obtained after division; and the encryption unit is configured to digitally encrypt the obtained sub-character string to obtain a sub-encryption result.
5. The system of claim 4, wherein the encryption unit digitally encrypting the obtained substring comprises: randomly generating a value m as a first key, and performing Fourier transform of m degrees on the sub-character string by using the following formula:wherein: x (t) denotes a substring, Xm(u) denotes the converted substring, Km(t, u) is a transformation kernel; said Km(t, u) is expressed using the following formula:wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier transformed Xm(u) as an encrypted substring.
6. The system of claim 5, wherein if the image to be processed is a color image, it is converted into a grayscale image to obtain the grayscale image data.
7. Image processing method based on distributed cloud servers and map transformations based on the system according to one of claims 1 to 6, characterized in that it performs the following steps:
step 1: carrying out image binarization on an image to be processed to obtain a binarized image;
step 2: converting an image to be binarized into a corresponding numerical matrix, and converting the numerical matrix into a continuous numerical string;
and step 3: performing characteristic analysis on the numerical string, determining segmentation nodes in the numerical string, and segmenting the numerical string in the numerical string according to the determined segmentation nodes to obtain a plurality of segmentation substrings;
and 4, step 4: the cloud servers respectively randomly obtain a sub-character string from the plurality of segmented sub-character strings obtained after segmentation, and digitally encrypt the obtained sub-character string to obtain a sub-encryption result;
and 5: and acquiring a sub-encryption result from each cloud server, decrypting the sub-encryption result to obtain a sub-character string, splicing the sub-character strings to obtain a numerical value string, performing an inverse process of converting the numerical value string into the numerical value string by using the numerical value string to obtain a numerical value matrix, and finally performing an inverse process of converting the binary image into the numerical value matrix to obtain the binary image.
8. The method as claimed in claim 7, wherein the binarizing of the image in step 1 comprises: calculating the image dimensionality of the image to be processed aiming at the gray level image data of the image to be processed, and dividing the image to be processed into low dimensionality or high dimensionality according to the calculated image dimensionality; binarizing the grayscale image data by an integral segmentation method when the image to be processed is of low dimensionality, and binarizing the grayscale image data by a composite segmentation method when the image to be processed is of high dimensionality, thereby generating binarized image data, wherein binarizing the grayscale image data by the composite segmentation method comprises the steps of: by the integral segmentation method, each pixel in the grayscale image data is classified into 3 types: black, white and undetermined; an optimal segmentation threshold is calculated for each pixel belonging to an undetermined class by a local adaptive segmentation method, thereby binarizing the pixel.
9. The method as claimed in claim 8, wherein the step 2 of converting the image to be binarized into the corresponding numerical matrix and then converting the numerical matrix into the continuous numerical string comprises: taking the binarized image as a parameter A, randomly generating a matrix B, and then constructing a conversion matrix based on the parameter A and the matrix B:and recording a known conversion factor matrix:converting matrix and conversion factor matrixMultiplying to obtain a converted numerical matrix X: and connecting P and Q in the numerical matrix, and converting into a continuous numerical string.
10. The method according to claim 9, wherein if the image to be processed is a color image, it is converted into a grayscale image to obtain the grayscale image data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011573062.3A CN112613055A (en) | 2020-12-24 | 2020-12-24 | Image processing system and method based on distributed cloud server and digital-image conversion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011573062.3A CN112613055A (en) | 2020-12-24 | 2020-12-24 | Image processing system and method based on distributed cloud server and digital-image conversion |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112613055A true CN112613055A (en) | 2021-04-06 |
Family
ID=75248069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011573062.3A Pending CN112613055A (en) | 2020-12-24 | 2020-12-24 | Image processing system and method based on distributed cloud server and digital-image conversion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613055A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117354064A (en) * | 2023-12-05 | 2024-01-05 | 深圳市一航网络信息技术有限公司 | Distributed multi-party privacy processing method and system based on blockchain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635573A (en) * | 2018-11-12 | 2019-04-16 | 北京海泰方圆科技股份有限公司 | System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption |
CN111030983A (en) * | 2019-10-15 | 2020-04-17 | 深圳壹账通智能科技有限公司 | Data processing method and device based on distributed distribution and related equipment |
CN111050022A (en) * | 2020-01-13 | 2020-04-21 | 杭州勒格网络科技有限公司 | High-security image transmission system and method |
CN111083306A (en) * | 2019-12-20 | 2020-04-28 | 湖南匡楚科技有限公司 | Data transmission method and device based on image encryption |
CN111737214A (en) * | 2020-06-29 | 2020-10-02 | 莱芜职业技术学院 | Data optimization processing system and method for computer redundant data |
CN113793245A (en) * | 2021-09-29 | 2021-12-14 | 中国电信股份有限公司 | Image encryption method, image decryption device, electronic device, and medium |
-
2020
- 2020-12-24 CN CN202011573062.3A patent/CN112613055A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635573A (en) * | 2018-11-12 | 2019-04-16 | 北京海泰方圆科技股份有限公司 | System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption |
CN111030983A (en) * | 2019-10-15 | 2020-04-17 | 深圳壹账通智能科技有限公司 | Data processing method and device based on distributed distribution and related equipment |
CN111083306A (en) * | 2019-12-20 | 2020-04-28 | 湖南匡楚科技有限公司 | Data transmission method and device based on image encryption |
CN111050022A (en) * | 2020-01-13 | 2020-04-21 | 杭州勒格网络科技有限公司 | High-security image transmission system and method |
CN111737214A (en) * | 2020-06-29 | 2020-10-02 | 莱芜职业技术学院 | Data optimization processing system and method for computer redundant data |
CN113793245A (en) * | 2021-09-29 | 2021-12-14 | 中国电信股份有限公司 | Image encryption method, image decryption device, electronic device, and medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117354064A (en) * | 2023-12-05 | 2024-01-05 | 深圳市一航网络信息技术有限公司 | Distributed multi-party privacy processing method and system based on blockchain |
CN117354064B (en) * | 2023-12-05 | 2024-02-02 | 深圳市一航网络信息技术有限公司 | Distributed multi-party privacy processing method and system based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dhawan et al. | Analysis of various data security techniques of steganography: A survey | |
Qin et al. | Coverless image steganography: a survey | |
Joseph et al. | Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment | |
Zheng et al. | Coverless information hiding based on robust image hashing | |
Younus et al. | Video steganography using knight tour algorithm and LSB method for encrypted data | |
CN113066034B (en) | Face image restoration method and device, restoration model, medium and equipment | |
Ghadi et al. | A novel zero‐watermarking approach of medical images based on Jacobian matrix model | |
Liu et al. | A digital data hiding scheme based on pixel-value differencing and side match method | |
Hosny et al. | Robust image hashing using exact Gaussian–Hermite moments | |
Thanikaiselvan et al. | A graph theory practice on transformed image: A random image steganography | |
Gong et al. | [Retracted] Robust and Secure Zero‐Watermarking Algorithm for Medical Images Based on Harris‐SURF‐DCT and Chaotic Map | |
Alkhowaiter et al. | Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms | |
CN112613055A (en) | Image processing system and method based on distributed cloud server and digital-image conversion | |
Khosravi et al. | A novel joint secret image sharing and robust steganography method using wavelet | |
CN114362988A (en) | Network traffic identification method and device | |
Ansari et al. | Quality assured and optimized image watermarking using artificial bee colony | |
Li et al. | A game-theoretic method for designing distortion function in spatial steganography | |
Jaya Prakash et al. | Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer | |
Davidson et al. | Locating secret messages in images | |
Ansari et al. | PSO optimized multipurpose image watermarking using SVD and chaotic sequence | |
Ejaz et al. | Adaptive image data hiding using transformation and error replacement | |
Bansal et al. | Securing fingerprint images using PSO-based wavelet domain watermarking | |
CN112184841B (en) | Block replacement generation type information hiding and recovering method, equipment and medium | |
Zhang et al. | Pixel-Stega: Generative image steganography based on autoregressive models | |
Srinivasu et al. | Covert and Secure Communication Using Multiple Invisible Stego Images by Split-Logical Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210406 |