CN112669068A - Market research data transmission method and system based on big data - Google Patents
Market research data transmission method and system based on big data Download PDFInfo
- Publication number
- CN112669068A CN112669068A CN202011584114.7A CN202011584114A CN112669068A CN 112669068 A CN112669068 A CN 112669068A CN 202011584114 A CN202011584114 A CN 202011584114A CN 112669068 A CN112669068 A CN 112669068A
- Authority
- CN
- China
- Prior art keywords
- image
- plaintext
- data
- ciphertext
- market research
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011160 research Methods 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000005540 biological transmission Effects 0.000 title claims abstract description 20
- 238000012545 processing Methods 0.000 claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 10
- 239000000284 extract Substances 0.000 claims abstract description 7
- 230000006870 function Effects 0.000 claims description 48
- 238000010606 normalization Methods 0.000 claims description 20
- 238000003491 array Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 12
- 239000011159 matrix material Substances 0.000 claims description 7
- 230000002123 temporal effect Effects 0.000 claims description 2
- 238000004806 packaging method and process Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 8
- 238000004458 analytical method Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 4
- 238000007405 data analysis Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012351 Integrated analysis Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000007621 cluster analysis Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000611 regression analysis Methods 0.000 description 1
Images
Abstract
The invention relates to a market research data transmission method and system based on big data, which comprises the steps of classifying the market research data according to attributes, classifying the classified data into [0,255] by utilizing a standardization coefficient, and obtaining a first image and a first ciphertext; processing the first image by using a set rule to obtain a second image and a second ciphertext; setting serial numbers for different groups of images, and performing inter-group replacement on pixel points in image areas of adjacent groups to obtain a third image; packaging the first ciphertext, the second image and the third image and sending the first ciphertext, the second image and the third image to a receiving party; the receiver decrypts the second ciphertext to obtain a second plaintext, extracts corresponding image area characteristics through the second plaintext and a second image, and obtains fourth image data according to the image area characteristics and the third step; and comparing the third image with the fourth image, if the third image and the fourth image are consistent, passing the verification, decrypting the first ciphertext to obtain a first plaintext, and restoring the data after the decryption is finished. Namely, the invention improves the safety of data transmission by increasing the complexity of data transmission.
Description
Technical Field
The invention relates to a market research data analysis method and system based on big data, and belongs to the technical field of market research data transmission.
Background
With the development of science and technology, networks become an essential part of people's life, and great convenience is provided for people's daily life and work. However, while the network provides convenience for people, the risk of leakage or tampering of user data during storage, access control and transmission processes exists, and particularly, market research data about commercial confidentiality is once stolen, so that the development of the whole enterprise is affected. Therefore, a secure box of data also becomes important.
In order to provide data security, the existing technology generally increases the data security by means of data encryption. When data is encrypted, the data is encrypted by adopting an encryption algorithm and a secret key, so that the risk of leakage or tampering in the storage, access control and storage processes of the data is avoided, and the safety of the data is improved.
However, the existing method only uses a symmetric encryption or asymmetric encryption mode to encrypt data, and the encryption mode is simple and has the problem of low security.
Disclosure of Invention
The invention aims to provide a market research data analysis method and system based on big data, which are used for solving the problems of simple data encryption mode and low safety in the prior art.
In order to solve the problems, the invention adopts the following technical scheme:
a market research data transmission method based on big data comprises the following steps:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
Further, the discrete logarithm encryption method adopted in step 1 is used to encrypt the first plaintext data.
Further, the market research data comprises market sales, potential demand, market share and commodity price floating condition; the attributes include temporal, spatial, or functional.
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyAnd (4) taking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down.
Further, before replacing the pixel points between different groups in step 3, a step of rotating the image area is further included.
Further, the consistency of the third image and the fourth image is judged by calculating the similarity by using the Euclidean distance, and when the similarity is 1, the verification is passed.
The invention also provides a market research data transmission system based on big data, which comprises a memory and a processor, wherein the memory is used for storing computer program instructions, and the computer program instructions realize the following steps when being executed by the processor:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
The invention has the beneficial effects that:
according to the method, after the market research data are classified, the first ciphertext data and the first image are acquired through standardized processing, the market research data are replaced by the first image, and the first image is processed according to the set rule to acquire the second image, so that the transmitted image data are more complex, and the encrypted data of the second ciphertext is added, so that the data are more safely encrypted; then, pixel points of image areas in different groups of second images are exchanged to form a third image, the third image is used as a part of encryption processing, and the first ciphertext and the second ciphertext are combined, so that transmitted data are more complex and the security of the transmitted data is higher.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
FIG. 1 is a schematic flow chart of an embodiment of a big data-based market research data transmission method according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention. In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that the specific scenarios targeted by the present invention are as follows: according to the market research data analysis scene of a certain enterprise, the collected data are market research data which comprise market sales volume, potential demand volume, market share, commodity price floating condition and the like, and the market research data can be divided into different groups of data according to the different types of data, so that the data are convenient to store and read.
The invention provides a market research data analysis method and system based on big data, as shown in figure 1, comprising the following steps:
the method comprises the following steps: classifying the market research data according to attributes, wherein the classified data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as first plaintext data, encrypt the first plaintext data and obtain a first ciphertext;
the market research data in the embodiment comprises market sales volume, potential demand volume, market share and price floating condition of each commodity; the attributes of the market research data comprise time, space or function and the like; such as sorting the data according to different times; of course, the data can be classified according to actual conditions.
In the embodiment, in order to reduce the complexity of data and reduce the amount of calculation, the specific standardization process is to put the classified data into the range of [0,255] through the set standardization coefficient, so as to satisfy the pixel interval of the image, for example, by multiplying each data value by the standardization coefficient, different groups of data all correspond to respective standardization coefficients; according to the actual situation of the original data, only one normalization coefficient can be set as long as the data is classified into the range of [0,255], and it should be noted that the normalization coefficient is used as the first plaintext data and is encrypted by adopting a discrete logarithm encryption mode in the invention.
The specific encryption mode is as follows:
setting the first plaintext data as m, the receiver and the sender agree on a prime number p larger than m, the sender selects a random number c as a sender key, the receiver selects a random integer d as a receiver key, and the initial sender sends x-mcmod p to the receiver, which sends y ═ xdmod p to the sender, which generatescc-1≡ 1(mod p-1), recipient calculationThe first plaintext m can be obtained, saidThe first ciphertext data is obtained;
in the embodiment, the plaintext is formed by adopting the standardized coefficient of each dimension, the data length is small, and the discrete logarithm encryption method is utilized, so that the processing speed is high, and the calculation is convenient.
In this embodiment, each group of classified data is constructed into two-dimensional data, and the two-dimensional data is combined into a first image in a matrix form, where each group of data corresponds to one image, that is, a multi-channel first image is finally obtained.
In the above embodiment, the data is represented in the form of an image, so that the disordered data can be further ordered when performing the subsequent processing.
Step two: processing the first image by using a set rule to obtain a second image; the set rule is as follows: 1) randomly selecting a pixel point p (i, j) in a first image, and determining an image area of the pixel point p (i, j) by taking the pixel point p (i, j) as a center;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyTaking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the Gaussian template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the values to obtain a second image;
and the template is used as second plaintext data, and the second plaintext data is encrypted to obtain a second ciphertext.
The gaussian template in this embodiment is determined according to the size of the selected image area, and of course, in order to ensure the security of the subsequent data, the most preferable mode is as follows: the size of the selected image area is the same as the size of the first image.
It should be noted that, in the above steps, a pixel point is randomly selected from the first image as a central point, and a local image area in the first image is selected according to a set radius and processed, so as to increase the complexity of image data, protect the security of image data, prevent malicious theft, and only select a part of the image for processing, so that the calculation amount is small; of course, in the most preferred embodiment, the entire first image may be processed to improve the security of the image.
In this embodiment, for a selected image region, the pixel values in the image region in the first image are replaced point by the generated values by multiplying the selected image region by the obtained gaussian template point by point, and the multiplied values of the pixel points are used as the generated values of the pixel points, where the replaced image is the second image; on the contrary, when the second image needs to be restored to the first image, the method is that for the pixel points in the special point neighborhood, the values in the Gaussian template are divided point by point, if the values obtained by all the points are integers, the pixel values of the pixel points in the special point neighborhood are replaced point by the obtained values, and the first image is restored.
After the gaussian template in this embodiment is used as second plaintext data to perform encryption, second ciphertext data is obtained, the encryption mode may adopt a symmetric encryption mode, so as to increase the speed of encryption and decryption, and the lost security is compensated by other encryption links.
Step three: setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
in this embodiment, let Ci be an image region in the second image (i represents the number of groups, i is 2,3 …), and take three groups of second images as an example, where the image regions in the three groups of second images are C1, C2, and C3, the size of the image region is 5 × 5, and the process of replacing the pixels listed between the groups by the pixels is specifically described:
let image area C1 be (a1, a2, a3, a4, a5), image area C2 be (b1, b2, b3, b4, b5), and image area C3 be (d1, d2, d3, d4, d5), where the 2 nd column of image area C1 is replaced with the 2 nd column of image area C2, and image area C2 is replaced with the 3 rd column of image area C2, resulting in image area C2 being (a 2, b2, a2, a2, image area C2 being (b 2, a2, d2, b2, d 2).
The specific alternative means is not limited herein, and may be set according to actual conditions, but the final purpose is to increase the complexity of data and further ensure the security of data.
As another embodiment, in this embodiment, before replacing the pixels between different groups, an operation of processing an image region in the image is further included, and if the image region in the image Ci is km, an operation of rotating the image region km is performed.
Step four: the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to a receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts the image area through the second plaintext and the second image, and obtains fourth image data according to the image area by combining the third step;
in this embodiment, the second ciphertext is decrypted by the symmetric encrypted key to obtain a second plaintext, that is, the extracted gaussian template data (obtained by combining a gaussian kernel function with pixel points in an image region in the data encryption process); and traversing and extracting the second images according to the template, extracting image areas corresponding to the second images of each group, and restoring the second images into the first images.
Step five: and judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext after decryption, and after the receiver completes decryption, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
In this embodiment, the consistency between the third image and the fourth image is determined by calculating the similarity using the euclidean distance, and when the similarity is 1, the verification is passed, and the first ciphertext data is obtained.
In the invention, the data transmission and encryption mode is usually used in the process of uploading the local end server to the central server, so as to avoid data leakage, improve the speed of encryption and decryption, improve the transmission efficiency, and the subsequent central server performs integrated analysis on the received data of different local end servers, and an implementer can analyze the market research data by adopting a plurality of analysis methods such as frequency analysis, description analysis, IPA analysis, difference analysis, pareto chart method, cluster analysis, corresponding analysis, regression analysis and the like.
Based on the same inventive concept as the method, the invention also provides a market research data transmission system based on big data, which comprises a memory and a processor, wherein the memory is used for storing computer program instructions, and the computer program instructions realize the following steps when being executed by the processor:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (modules, systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
Claims (7)
1. A market research data transmission method based on big data is characterized by comprising the following steps:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
2. The big data based market research data transmission method according to claim 1, wherein the first plaintext data is encrypted by discrete logarithm encryption in step 1.
3. The big data based market research data transmission method of claim 1, wherein the market research data comprises market sales, potential demand, market share, commodity price float; the attributes include temporal, spatial, or functional.
4. The big data based market research data transmission method of claim 1, wherein the Gaussian kernel function is
Wherein (I, J) is the coordinate of pixel point in image region, (I, J) is the coordinate of pixel point p, sigmaxAnd σyAnd (4) taking the width parameter of the kernel function, wherein A is a scaling coefficient and takes the value of 10, and f is rounding-down.
5. The big data based market research data transmission method according to claim 1, further comprising a step of rotating the image area before replacing the pixels between different groups in step 3.
6. The big data based market research data transmission method according to claim 5, wherein the consistency between the third image and the fourth image is determined by calculating the similarity using Euclidean distance, and when the similarity is 1, the verification is passed.
7. A big data based market research data transmission system comprising a memory and a processor, wherein the memory is configured to store computer program instructions that when executed by the processor implement the steps of:
step 1, classifying market research data according to attributes, wherein the classified market research data comprises at least two groups of data; standardizing the data of different groups, constructing each group of standardized data into two-dimensional arrays, and acquiring a first image corresponding to each group according to the two-dimensional arrays of each group; the normalization processing is to utilize a normalization coefficient to classify the data into a range of [0,255], use the normalization coefficient as a first plaintext, encrypt the first plaintext and obtain a first ciphertext;
step 2, processing the first image by using a set rule to obtain a second image;
the set rule is as follows:
1) randomly selecting a pixel point p in a first image, and determining an image area of the pixel point p by taking the pixel point p as a center according to a set radius;
2) constructing a Gaussian kernel function;
3) calculating function values corresponding to all pixel points in the image area by using the constructed Gaussian function, and forming a template by the function values according to a matrix form, wherein the function values of the template are in one-to-one correspondence with the pixel points in the image area;
4) multiplying the pixel points of the image area by the function values of the template in a one-to-one correspondence manner to obtain corresponding values, and replacing the pixel points of the image area with the corresponding values to obtain a second image;
the template is used as a second plaintext, and the second plaintext is encrypted to obtain a second ciphertext;
step 3, setting numbers for different groups of images, and replacing pixel points of rows or columns in the image area in the second images of adjacent groups with different groups according to the number sequence to obtain a third image;
step 4, the sender packs the first ciphertext, the second image and the third image and sends the first ciphertext, the second image and the third image to the receiver; the receiver firstly needs to decrypt the second ciphertext to obtain a second plaintext, extracts corresponding image region characteristics through the second plaintext and the second image, and obtains a fourth image according to the image region characteristics and the third step;
and 5, judging whether the third image is consistent with the fourth image, if so, passing the verification, acquiring a first ciphertext, decrypting the first ciphertext to acquire a first plaintext, and after the decryption is finished, restoring a second image by using the first plaintext and the second plaintext to acquire the different sets of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011584114.7A CN112669068A (en) | 2020-12-28 | 2020-12-28 | Market research data transmission method and system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011584114.7A CN112669068A (en) | 2020-12-28 | 2020-12-28 | Market research data transmission method and system based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112669068A true CN112669068A (en) | 2021-04-16 |
Family
ID=75411313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011584114.7A Pending CN112669068A (en) | 2020-12-28 | 2020-12-28 | Market research data transmission method and system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112669068A (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020072478A (en) * | 2001-03-10 | 2002-09-16 | 블럭엠 주식회사 | Streaming method by moving picture compression method using SPEG |
CN103248791A (en) * | 2013-05-16 | 2013-08-14 | 东南大学 | Secrete fax method and device based on information hiding technology |
CN105678678A (en) * | 2016-01-20 | 2016-06-15 | 同济大学 | Group related video encryption method based on Bayesian inference |
CN105763762A (en) * | 2014-12-17 | 2016-07-13 | 青岛海信电器股份有限公司 | Image encryption and decryption method and apparatus |
CN106227850A (en) * | 2016-07-28 | 2016-12-14 | 苏维娜 | A kind of medical test monitoring control system based on mobile terminal and control method |
CN106407824A (en) * | 2016-09-28 | 2017-02-15 | 重庆第二师范学院 | Image encryption method and device |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
CN108521326A (en) * | 2018-04-10 | 2018-09-11 | 电子科技大学 | A kind of Linear SVM model training algorithm of the secret protection based on vectorial homomorphic cryptography |
US20180270054A1 (en) * | 2017-03-15 | 2018-09-20 | Macau University Of Science And Technology | Methods and Apparatus for Encrypting Multimedia Information |
CN109040138A (en) * | 2018-10-11 | 2018-12-18 | 南方电网科学研究院有限责任公司 | A kind of encryption Science Report information sharing system |
WO2019196684A1 (en) * | 2018-04-12 | 2019-10-17 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal |
CN111241554A (en) * | 2018-11-28 | 2020-06-05 | 中国科学院大学 | Digital image encryption and decryption system based on visual password |
US20200202566A1 (en) * | 2018-12-20 | 2020-06-25 | Here Global B.V. | Method, apparatus, and system for aligning a vehicle-mounted device |
CN111651782A (en) * | 2020-06-10 | 2020-09-11 | 莱芜职业技术学院 | Computer encryption system and method based on neural network |
CN111783116A (en) * | 2020-06-29 | 2020-10-16 | 南通职业大学 | Lightweight hyperchaotic rapid image encryption algorithm |
CN112100638A (en) * | 2020-11-03 | 2020-12-18 | 北京微智信业科技有限公司 | Image data processing method, device and equipment based on hardware security isolation area |
-
2020
- 2020-12-28 CN CN202011584114.7A patent/CN112669068A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020072478A (en) * | 2001-03-10 | 2002-09-16 | 블럭엠 주식회사 | Streaming method by moving picture compression method using SPEG |
CN103248791A (en) * | 2013-05-16 | 2013-08-14 | 东南大学 | Secrete fax method and device based on information hiding technology |
CN105763762A (en) * | 2014-12-17 | 2016-07-13 | 青岛海信电器股份有限公司 | Image encryption and decryption method and apparatus |
CN105678678A (en) * | 2016-01-20 | 2016-06-15 | 同济大学 | Group related video encryption method based on Bayesian inference |
CN106227850A (en) * | 2016-07-28 | 2016-12-14 | 苏维娜 | A kind of medical test monitoring control system based on mobile terminal and control method |
CN106407824A (en) * | 2016-09-28 | 2017-02-15 | 重庆第二师范学院 | Image encryption method and device |
US20180270054A1 (en) * | 2017-03-15 | 2018-09-20 | Macau University Of Science And Technology | Methods and Apparatus for Encrypting Multimedia Information |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
CN108521326A (en) * | 2018-04-10 | 2018-09-11 | 电子科技大学 | A kind of Linear SVM model training algorithm of the secret protection based on vectorial homomorphic cryptography |
WO2019196684A1 (en) * | 2018-04-12 | 2019-10-17 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal |
CN109040138A (en) * | 2018-10-11 | 2018-12-18 | 南方电网科学研究院有限责任公司 | A kind of encryption Science Report information sharing system |
CN111241554A (en) * | 2018-11-28 | 2020-06-05 | 中国科学院大学 | Digital image encryption and decryption system based on visual password |
US20200202566A1 (en) * | 2018-12-20 | 2020-06-25 | Here Global B.V. | Method, apparatus, and system for aligning a vehicle-mounted device |
CN111651782A (en) * | 2020-06-10 | 2020-09-11 | 莱芜职业技术学院 | Computer encryption system and method based on neural network |
CN111783116A (en) * | 2020-06-29 | 2020-10-16 | 南通职业大学 | Lightweight hyperchaotic rapid image encryption algorithm |
CN112100638A (en) * | 2020-11-03 | 2020-12-18 | 北京微智信业科技有限公司 | Image data processing method, device and equipment based on hardware security isolation area |
Non-Patent Citations (5)
Title |
---|
"基于频谱融合和柱面衍射的双图像非对称加密", 光子学报, vol. 48, no. 06, 30 June 2019 (2019-06-30), pages 169 - 178 * |
TONG, XJ: "Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation", SCIENCE CHINA-INFORMATION SCIENCES, vol. 53, no. 1, 31 January 2010 (2010-01-31), pages 191 - 202 * |
丁义涛;杨海滨;杨晓元;周潭平;: "一种同态密文域可逆隐藏方案", 山东大学学报(理学版), no. 07, 31 July 2017 (2017-07-31), pages 108 - 114 * |
朱淑芹;李俊青;葛广英;: "基于一个新的五维离散混沌的快速图像加密算法", 计算机科学, vol. 43, no. 2, 15 November 2016 (2016-11-15), pages 411 - 416 * |
陈帆;: "量化SIFT和同态加密的隐私保护图像检索方法", 传感器与微系统, vol. 36, no. 05, 31 May 2017 (2017-05-31), pages 83 - 87 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mandal et al. | Symmetric key image encryption using chaotic Rossler system | |
CN110659379B (en) | Searchable encrypted image retrieval method based on deep convolution network characteristics | |
Liu et al. | Intelligent and secure content-based image retrieval for mobile users | |
CN111401572B (en) | Supervision characteristic box dividing method and device based on privacy protection | |
CN112100679B (en) | Data processing method and device based on privacy protection and server | |
CN112788195B (en) | Image processing method, device and equipment | |
CN111539009A (en) | Supervised feature binning method and device for protecting private data | |
CN115065555B (en) | Information security processing method and system | |
CN111832035A (en) | Image encryption storage method and device | |
CN110032877A (en) | Image access method and its system | |
CN111291781B (en) | Encrypted image classification method based on support vector machine | |
CN111988144A (en) | DNA one-time pad image encryption method based on multiple keys | |
CN113472537B (en) | Data encryption method, system and computer readable storage medium | |
Singh et al. | An efficient chaos-based image encryption algorithm using real-time object detection for smart city applications | |
CN112380404B (en) | Data filtering method, device and system | |
CN110611568B (en) | Dynamic encryption and decryption method, device and equipment based on multiple encryption and decryption algorithms | |
CN110245965B (en) | Safety method for ice cream stick data processing system and ice cream stick with two-dimensional code | |
CN107590843A (en) | The image encryption method of two-dimentional reversible cellular automata based on construction | |
CN112669068A (en) | Market research data transmission method and system based on big data | |
CN114419719B (en) | Biological characteristic processing method and device | |
CN109635905A (en) | Two-dimensional code generation method, apparatus and system | |
CN109919109A (en) | Image-recognizing method, device and equipment | |
CN114374518A (en) | PSI intersection information acquisition method and device with intersection counting function | |
Maulana et al. | Analysis of multiple data hiding combined coloured visual cryptography and lsb | |
WO2020169996A1 (en) | Matrix-based cryptographic methods and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |