CN112669068A - Market research data transmission method and system based on big data - Google Patents

Market research data transmission method and system based on big data Download PDF

Info

Publication number
CN112669068A
CN112669068A CN202011584114.7A CN202011584114A CN112669068A CN 112669068 A CN112669068 A CN 112669068A CN 202011584114 A CN202011584114 A CN 202011584114A CN 112669068 A CN112669068 A CN 112669068A
Authority
CN
China
Prior art keywords
image
plaintext
data
ciphertext
market research
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011584114.7A
Other languages
Chinese (zh)
Inventor
崔智恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Qiyan Science And Technology Evaluation Institute Co ltd
Original Assignee
Henan Qiyan Science And Technology Evaluation Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Qiyan Science And Technology Evaluation Institute Co ltd filed Critical Henan Qiyan Science And Technology Evaluation Institute Co ltd
Priority to CN202011584114.7A priority Critical patent/CN112669068A/en
Publication of CN112669068A publication Critical patent/CN112669068A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a market research data transmission method and system based on big data, which comprises the steps of classifying the market research data according to attributes, classifying the classified data into [0,255] by utilizing a standardization coefficient, and obtaining a first image and a first ciphertext; processing the first image by using a set rule to obtain a second image and a second ciphertext; setting serial numbers for different groups of images, and performing inter-group replacement on pixel points in image areas of adjacent groups to obtain a third image; packaging the first ciphertext, the second image and the third image and sending the first ciphertext, the second image and the third image to a receiving party; the receiver decrypts the second ciphertext to obtain a second plaintext, extracts corresponding image area characteristics through the second plaintext and a second image, and obtains fourth image data according to the image area characteristics and the third step; and comparing the third image with the fourth image, if the third image and the fourth image are consistent, passing the verification, decrypting the first ciphertext to obtain a first plaintext, and restoring the data after the decryption is finished. Namely, the invention improves the safety of data transmission by increasing the complexity of data transmission.

Description

Market research data transmission method and system based on big data
Technical Field
The invention relates to a market research data analysis method and system based on big data, and belongs to the technical field of market research data transmission.
Background
With the development of science and technology, networks become an essential part of people's life, and great convenience is provided for people's daily life and work. However, while the network provides convenience for people, the risk of leakage or tampering of user data during storage, access control and transmission processes exists, and particularly, market research data about commercial confidentiality is once stolen, so that the development of the whole enterprise is affected. Therefore, a secure box of data also becomes important.
In order to provide data security, the existing technology generally increases the data security by means of data encryption. When data is encrypted, the data is encrypted by adopting an encryption algorithm and a secret key, so that the risk of leakage or tampering in the storage, access control and storage processes of the data is avoided, and the safety of the data is improved.
However, the existing method only uses a symmetric encryption or asymmetric encryption mode to encrypt data, and the encryption mode is simple and has the problem of low security.
Disclosure of Invention
The invention aims to provide a market research data analysis method and system based on big data, which are used for solving the problems of simple data encryption mode and low safety in the prior art.
In order to solve the problems, the invention adopts the following technical scheme:
a market research data transmission method based on big data comprises the following steps:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
Further, the discrete logarithm encryption method adopted in step 1 is used to encrypt the first plaintext data.
Further, the market research data comprises market sales, potential demand, market share and commodity price floating condition; the attributes include temporal, spatial, or functional.
Further, the Gaussian kernel function is
Figure BDA0002865058410000031
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyAnd (4) taking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down.
Further, before replacing the pixel points between different groups in step 3, a step of rotating the image area is further included.
Further, the consistency of the third image and the fourth image is judged by calculating the similarity by using the Euclidean distance, and when the similarity is 1, the verification is passed.
The invention also provides a market research data transmission system based on big data, which comprises a memory and a processor, wherein the memory is used for storing computer program instructions, and the computer program instructions realize the following steps when being executed by the processor:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
The invention has the beneficial effects that:
according to the method, after the market research data are classified, the first ciphertext data and the first image are acquired through standardized processing, the market research data are replaced by the first image, and the first image is processed according to the set rule to acquire the second image, so that the transmitted image data are more complex, and the encrypted data of the second ciphertext is added, so that the data are more safely encrypted; then, pixel points of image areas in different groups of second images are exchanged to form a third image, the third image is used as a part of encryption processing, and the first ciphertext and the second ciphertext are combined, so that transmitted data are more complex and the security of the transmitted data is higher.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
FIG. 1 is a schematic flow chart of an embodiment of a big data-based market research data transmission method according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention. In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that the specific scenarios targeted by the present invention are as follows: according to the market research data analysis scene of a certain enterprise, the collected data are market research data which comprise market sales volume, potential demand volume, market share, commodity price floating condition and the like, and the market research data can be divided into different groups of data according to the different types of data, so that the data are convenient to store and read.
The invention provides a market research data analysis method and system based on big data, as shown in figure 1, comprising the following steps:
the method comprises the following steps: classifying the market research data according to attributes, wherein the classified data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as first plaintext data, encrypt the first plaintext data and obtain a first ciphertext;
the market research data in the embodiment comprises market sales volume, potential demand volume, market share and price floating condition of each commodity; the attributes of the market research data comprise time, space or function and the like; such as sorting the data according to different times; of course, the data can be classified according to actual conditions.
In the embodiment, in order to reduce the complexity of data and reduce the amount of calculation, the specific standardization process is to put the classified data into the range of [0,255] through the set standardization coefficient, so as to satisfy the pixel interval of the image, for example, by multiplying each data value by the standardization coefficient, different groups of data all correspond to respective standardization coefficients; according to the actual situation of the original data, only one normalization coefficient can be set as long as the data is classified into the range of [0,255], and it should be noted that the normalization coefficient is used as the first plaintext data and is encrypted by adopting a discrete logarithm encryption mode in the invention.
The specific encryption mode is as follows:
setting the first plaintext data as m, the receiver and the sender agree on a prime number p larger than m, the sender selects a random number c as a sender key, the receiver selects a random integer d as a receiver key, and the initial sender sends x-mcmod p to the receiver, which sends y ═ xdmod p to the sender, which generates
Figure BDA0002865058410000061
cc-1≡ 1(mod p-1), recipient calculation
Figure BDA0002865058410000062
The first plaintext m can be obtained, said
Figure BDA0002865058410000063
The first ciphertext data is obtained;
in the embodiment, the plaintext is formed by adopting the standardized coefficient of each dimension, the data length is small, and the discrete logarithm encryption method is utilized, so that the processing speed is high, and the calculation is convenient.
In this embodiment, each group of classified data is constructed into two-dimensional data, and the two-dimensional data is combined into a first image in a matrix form, where each group of data corresponds to one image, that is, a multi-channel first image is finally obtained.
In the above embodiment, the data is represented in the form of an image, so that the disordered data can be further ordered when performing the subsequent processing.
Step two: processing the first image by using a set rule to obtain a second image; the set rule is as follows: 1) randomly selecting a pixel point p (i, j) in a first image, and determining an image area of the pixel point p (i, j) by taking the pixel point p (i, j) as a center;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
the Gaussian kernel function is
Figure BDA0002865058410000064
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyTaking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the Gaussian template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the values to obtain a second image;
and the template is used as second plaintext data, and the second plaintext data is encrypted to obtain a second ciphertext.
The gaussian template in this embodiment is determined according to the size of the selected image area, and of course, in order to ensure the security of the subsequent data, the most preferable mode is as follows: the size of the selected image area is the same as the size of the first image.
It should be noted that, in the above steps, a pixel point is randomly selected from the first image as a central point, and a local image area in the first image is selected according to a set radius and processed, so as to increase the complexity of image data, protect the security of image data, prevent malicious theft, and only select a part of the image for processing, so that the calculation amount is small; of course, in the most preferred embodiment, the entire first image may be processed to improve the security of the image.
In this embodiment, for a selected image region, the pixel values in the image region in the first image are replaced point by the generated values by multiplying the selected image region by the obtained gaussian template point by point, and the multiplied values of the pixel points are used as the generated values of the pixel points, where the replaced image is the second image; on the contrary, when the second image needs to be restored to the first image, the method is that for the pixel points in the special point neighborhood, the values in the Gaussian template are divided point by point, if the values obtained by all the points are integers, the pixel values of the pixel points in the special point neighborhood are replaced point by the obtained values, and the first image is restored.
After the gaussian template in this embodiment is used as second plaintext data to perform encryption, second ciphertext data is obtained, the encryption mode may adopt a symmetric encryption mode, so as to increase the speed of encryption and decryption, and the lost security is compensated by other encryption links.
Step three: setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
in this embodiment, let Ci be an image region in the second image (i represents the number of groups, i is 2,3 …), and take three groups of second images as an example, where the image regions in the three groups of second images are C1, C2, and C3, the size of the image region is 5 × 5, and the process of replacing the pixels listed between the groups by the pixels is specifically described:
let image area C1 be (a1, a2, a3, a4, a5), image area C2 be (b1, b2, b3, b4, b5), and image area C3 be (d1, d2, d3, d4, d5), where the 2 nd column of image area C1 is replaced with the 2 nd column of image area C2, and image area C2 is replaced with the 3 rd column of image area C2, resulting in image area C2 being (a 2, b2, a2, a2, image area C2 being (b 2, a2, d2, b2, d 2).
The specific alternative means is not limited herein, and may be set according to actual conditions, but the final purpose is to increase the complexity of data and further ensure the security of data.
As another embodiment, in this embodiment, before replacing the pixels between different groups, an operation of processing an image region in the image is further included, and if the image region in the image Ci is km, an operation of rotating the image region km is performed.
Step four: the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to a receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts the image area through the second plaintext and the second image, and obtains fourth image data according to the image area by combining the third step;
in this embodiment, the second ciphertext is decrypted by the symmetric encrypted key to obtain a second plaintext, that is, the extracted gaussian template data (obtained by combining a gaussian kernel function with pixel points in an image region in the data encryption process); and traversing and extracting the second images according to the template, extracting image areas corresponding to the second images of each group, and restoring the second images into the first images.
Step five: and judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext after decryption, and after the receiver completes decryption, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
In this embodiment, the consistency between the third image and the fourth image is determined by calculating the similarity using the euclidean distance, and when the similarity is 1, the verification is passed, and the first ciphertext data is obtained.
In the invention, the data transmission and encryption mode is usually used in the process of uploading the local end server to the central server, so as to avoid data leakage, improve the speed of encryption and decryption, improve the transmission efficiency, and the subsequent central server performs integrated analysis on the received data of different local end servers, and an implementer can analyze the market research data by adopting a plurality of analysis methods such as frequency analysis, description analysis, IPA analysis, difference analysis, pareto chart method, cluster analysis, corresponding analysis, regression analysis and the like.
Based on the same inventive concept as the method, the invention also provides a market research data transmission system based on big data, which comprises a memory and a processor, wherein the memory is used for storing computer program instructions, and the computer program instructions realize the following steps when being executed by the processor:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (modules, systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.

Claims (7)

1. A market research data transmission method based on big data is characterized by comprising the following steps:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
2. The big data based market research data transmission method according to claim 1, wherein the first plaintext data is encrypted by discrete logarithm encryption in step 1.
3. The big data based market research data transmission method of claim 1, wherein the market research data comprises market sales, potential demand, market share, commodity price float; the attributes include temporal, spatial, or functional.
4. The big data based market research data transmission method of claim 1, wherein the Gaussian kernel function is
Figure FDA0002865058400000021
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyAnd (4) taking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down.
5. The big data based market research data transmission method according to claim 1, further comprising a step of rotating the image area before replacing the pixels between different groups in step 3.
6. The big data based market research data transmission method according to claim 5, wherein the consistency between the third image and the fourth image is determined by calculating the similarity using Euclidean distance, and when the similarity is 1, the verification is passed.
7. A big data based market research data transmission system comprising a memory and a processor, wherein the memory is configured to store computer program instructions that when executed by the processor implement the steps of:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
CN202011584114.7A 2020-12-28 2020-12-28 Market research data transmission method and system based on big data Pending CN112669068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011584114.7A CN112669068A (en) 2020-12-28 2020-12-28 Market research data transmission method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011584114.7A CN112669068A (en) 2020-12-28 2020-12-28 Market research data transmission method and system based on big data

Publications (1)

Publication Number Publication Date
CN112669068A true CN112669068A (en) 2021-04-16

Family

ID=75411313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011584114.7A Pending CN112669068A (en) 2020-12-28 2020-12-28 Market research data transmission method and system based on big data

Country Status (1)

Country Link
CN (1) CN112669068A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020072478A (en) * 2001-03-10 2002-09-16 블럭엠 주식회사 Streaming method by moving picture compression method using SPEG
CN103248791A (en) * 2013-05-16 2013-08-14 东南大学 Secrete fax method and device based on information hiding technology
CN105678678A (en) * 2016-01-20 2016-06-15 同济大学 Group related video encryption method based on Bayesian inference
CN105763762A (en) * 2014-12-17 2016-07-13 青岛海信电器股份有限公司 Image encryption and decryption method and apparatus
CN106227850A (en) * 2016-07-28 2016-12-14 苏维娜 A kind of medical test monitoring control system based on mobile terminal and control method
CN106407824A (en) * 2016-09-28 2017-02-15 重庆第二师范学院 Image encryption method and device
CN108270944A (en) * 2018-01-02 2018-07-10 北京邮电大学 A kind of method and device of the digital image encryption based on fractional order transformation
CN108521326A (en) * 2018-04-10 2018-09-11 电子科技大学 A kind of Linear SVM model training algorithm of the secret protection based on vectorial homomorphic cryptography
US20180270054A1 (en) * 2017-03-15 2018-09-20 Macau University Of Science And Technology Methods and Apparatus for Encrypting Multimedia Information
CN109040138A (en) * 2018-10-11 2018-12-18 南方电网科学研究院有限责任公司 A kind of encryption Science Report information sharing system
WO2019196684A1 (en) * 2018-04-12 2019-10-17 Oppo广东移动通信有限公司 Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal
CN111241554A (en) * 2018-11-28 2020-06-05 中国科学院大学 Digital image encryption and decryption system based on visual password
US20200202566A1 (en) * 2018-12-20 2020-06-25 Here Global B.V. Method, apparatus, and system for aligning a vehicle-mounted device
CN111651782A (en) * 2020-06-10 2020-09-11 莱芜职业技术学院 Computer encryption system and method based on neural network
CN111783116A (en) * 2020-06-29 2020-10-16 南通职业大学 Lightweight hyperchaotic rapid image encryption algorithm
CN112100638A (en) * 2020-11-03 2020-12-18 北京微智信业科技有限公司 Image data processing method, device and equipment based on hardware security isolation area

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020072478A (en) * 2001-03-10 2002-09-16 블럭엠 주식회사 Streaming method by moving picture compression method using SPEG
CN103248791A (en) * 2013-05-16 2013-08-14 东南大学 Secrete fax method and device based on information hiding technology
CN105763762A (en) * 2014-12-17 2016-07-13 青岛海信电器股份有限公司 Image encryption and decryption method and apparatus
CN105678678A (en) * 2016-01-20 2016-06-15 同济大学 Group related video encryption method based on Bayesian inference
CN106227850A (en) * 2016-07-28 2016-12-14 苏维娜 A kind of medical test monitoring control system based on mobile terminal and control method
CN106407824A (en) * 2016-09-28 2017-02-15 重庆第二师范学院 Image encryption method and device
US20180270054A1 (en) * 2017-03-15 2018-09-20 Macau University Of Science And Technology Methods and Apparatus for Encrypting Multimedia Information
CN108270944A (en) * 2018-01-02 2018-07-10 北京邮电大学 A kind of method and device of the digital image encryption based on fractional order transformation
CN108521326A (en) * 2018-04-10 2018-09-11 电子科技大学 A kind of Linear SVM model training algorithm of the secret protection based on vectorial homomorphic cryptography
WO2019196684A1 (en) * 2018-04-12 2019-10-17 Oppo广东移动通信有限公司 Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal
CN109040138A (en) * 2018-10-11 2018-12-18 南方电网科学研究院有限责任公司 A kind of encryption Science Report information sharing system
CN111241554A (en) * 2018-11-28 2020-06-05 中国科学院大学 Digital image encryption and decryption system based on visual password
US20200202566A1 (en) * 2018-12-20 2020-06-25 Here Global B.V. Method, apparatus, and system for aligning a vehicle-mounted device
CN111651782A (en) * 2020-06-10 2020-09-11 莱芜职业技术学院 Computer encryption system and method based on neural network
CN111783116A (en) * 2020-06-29 2020-10-16 南通职业大学 Lightweight hyperchaotic rapid image encryption algorithm
CN112100638A (en) * 2020-11-03 2020-12-18 北京微智信业科技有限公司 Image data processing method, device and equipment based on hardware security isolation area

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"基于频谱融合和柱面衍射的双图像非对称加密", 光子学报, vol. 48, no. 06, 30 June 2019 (2019-06-30), pages 169 - 178 *
TONG, XJ: "Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation", SCIENCE CHINA-INFORMATION SCIENCES, vol. 53, no. 1, 31 January 2010 (2010-01-31), pages 191 - 202 *
丁义涛;杨海滨;杨晓元;周潭平;: "一种同态密文域可逆隐藏方案", 山东大学学报(理学版), no. 07, 31 July 2017 (2017-07-31), pages 108 - 114 *
朱淑芹;李俊青;葛广英;: "基于一个新的五维离散混沌的快速图像加密算法", 计算机科学, vol. 43, no. 2, 15 November 2016 (2016-11-15), pages 411 - 416 *
陈帆;: "量化SIFT和同态加密的隐私保护图像检索方法", 传感器与微系统, vol. 36, no. 05, 31 May 2017 (2017-05-31), pages 83 - 87 *

Similar Documents

Publication Publication Date Title
Mandal et al. Symmetric key image encryption using chaotic Rossler system
CN110659379B (en) Searchable encrypted image retrieval method based on deep convolution network characteristics
Liu et al. Intelligent and secure content-based image retrieval for mobile users
CN111401572B (en) Supervision characteristic box dividing method and device based on privacy protection
CN112100679B (en) Data processing method and device based on privacy protection and server
CN112788195B (en) Image processing method, device and equipment
CN111539009A (en) Supervised feature binning method and device for protecting private data
CN115065555B (en) Information security processing method and system
CN111832035A (en) Image encryption storage method and device
CN110032877A (en) Image access method and its system
CN111291781B (en) Encrypted image classification method based on support vector machine
CN111988144A (en) DNA one-time pad image encryption method based on multiple keys
CN113472537B (en) Data encryption method, system and computer readable storage medium
Singh et al. An efficient chaos-based image encryption algorithm using real-time object detection for smart city applications
CN112380404B (en) Data filtering method, device and system
CN110611568B (en) Dynamic encryption and decryption method, device and equipment based on multiple encryption and decryption algorithms
CN110245965B (en) Safety method for ice cream stick data processing system and ice cream stick with two-dimensional code
CN107590843A (en) The image encryption method of two-dimentional reversible cellular automata based on construction
CN112669068A (en) Market research data transmission method and system based on big data
CN114419719B (en) Biological characteristic processing method and device
CN109635905A (en) Two-dimensional code generation method, apparatus and system
CN109919109A (en) Image-recognizing method, device and equipment
CN114374518A (en) PSI intersection information acquisition method and device with intersection counting function
Maulana et al. Analysis of multiple data hiding combined coloured visual cryptography and lsb
WO2020169996A1 (en) Matrix-based cryptographic methods and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination