CN114697463B - Encryption transmission method and image sensor - Google Patents

Encryption transmission method and image sensor Download PDF

Info

Publication number
CN114697463B
CN114697463B CN202011641109.5A CN202011641109A CN114697463B CN 114697463 B CN114697463 B CN 114697463B CN 202011641109 A CN202011641109 A CN 202011641109A CN 114697463 B CN114697463 B CN 114697463B
Authority
CN
China
Prior art keywords
counting
key
information
module
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011641109.5A
Other languages
Chinese (zh)
Other versions
CN114697463A (en
Inventor
邵科
徐辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SmartSens Technology Shanghai Co Ltd
Original Assignee
SmartSens Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SmartSens Technology Shanghai Co Ltd filed Critical SmartSens Technology Shanghai Co Ltd
Priority to CN202011641109.5A priority Critical patent/CN114697463B/en
Publication of CN114697463A publication Critical patent/CN114697463A/en
Application granted granted Critical
Publication of CN114697463B publication Critical patent/CN114697463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Abstract

The application belongs to the technical field of data encryption, and relates to an encryption transmission method and an image sensor, wherein the encryption transmission method is applied to the image sensor and comprises the following steps: performing count control in the image sensing process to acquire count information, wherein the count information comprises row count information and/or frame count information; acquiring key information according to the counting information and the key generation parameters; and performing encryption control according to the image data obtained by image sensing and the key information to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames. Therefore, the application can enable the image sensor to have an image data encryption function, and can enable the encrypted image data to be obtained after encryption to change the key according to the line and/or change the key according to the frame so as to increase the cracking difficulty of the encrypted image data, and further the application can realize the purpose of improving the safety of the image data transmission.

Description

Encryption transmission method and image sensor
Technical Field
The present application relates to the field of data encryption technologies, and in particular, to an encryption transmission method and an image sensor.
Background
At present, the image recognition technology is widely integrated into various safety protection scenes in our lives, such as the integration of the image recognition technology (such as face recognition, fingerprint recognition and the like) in payment scenes, the integration of the image recognition technology in vehicle-mounted ADAS application scenes, the integration of the image recognition technology in an access control system and the like.
However, when the image recognition technology is applied to the security scene, there may be a case that the image sensor steals the image data in the process of transmitting the image data, or a case that an illegal person transmits the forged image data to other control systems, so how to improve the security of the image data transmission based on the above-mentioned case is considered by those skilled in the art.
In view of the above problems, those skilled in the art have sought solutions.
The foregoing description is provided for general background information and does not necessarily constitute prior art.
Disclosure of Invention
The application aims to overcome the defects of the prior art, and provides an encryption transmission method and an image sensor so as to achieve the aim of improving the safety of image data transmission.
The application is realized in the following way:
the application provides an encryption transmission method, which is applied to an image sensor and comprises the following steps: performing count control in the image sensing process to acquire count information, wherein the count information comprises row count information and/or frame count information; acquiring key information according to the counting information and the key generation parameters; and performing encryption control according to the image data obtained by image sensing and the key information to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames.
Optionally, the step of performing counting control in the image sensing process to acquire counting information includes: in the image sensing process, a row pulse signal and/or a frame pulse signal are received through a counting module, wherein the row pulse signal is a primary pulse signal generated after each row of data is sensed, and the frame pulse signal is a primary pulse signal generated after each frame of data is sensed; and counting the line pulse signals and/or the frame pulse signals by a counting module according to a preset counting rule so as to obtain counting information.
Optionally, the step of counting the line pulse signal and/or the frame pulse signal by the counting module according to a preset counting rule to obtain counting information includes: pulse signal selection control is carried out through a signal register in the counting module so as to determine a counting target, wherein the counting target is a row pulse signal or a frame pulse signal; acquiring a counting system configured by a counting register in a counting module; counting the counting targets according to a counting system and a preset counting rule to obtain counting information.
Optionally, wherein the count scale ranges from 8 to 255.
Optionally, the step of acquiring the key information according to the count information and the key generation parameter includes: receiving counting information through a key module; configuring key generation parameters of preset standards through a key register in a key module; and acquiring key information by a key module according to the counting information and key generation parameters of preset standards.
Optionally, the preset counting rule is set according to a key generation parameter of a preset standard configured by a key register.
Optionally, when the key generation parameter of the preset standard configured by the key register is the key generation parameter of the 8-bit data standard, the preset counting rule is set to count by adopting 4-bit 8-bit data; or when the key generation parameter of the preset standard configured by the key register is the key generation parameter of the 10-bit data standard, the preset counting rule is set to count by adopting the 5-bit 10-bit data.
Optionally, the count information includes 4-bit 8-bit count data, and the key generation parameter is a key generation parameter of an 8-bit data standard; the step of obtaining the key information according to the count information and the key generation parameter comprises the following steps: dividing the key generation parameters into 4 groups of 2bit key data; and performing exclusive OR operation according to the 4 groups of 2-bit key data and the 4-bit 8-bit count data to acquire key information.
Optionally, the step of performing encryption control according to the image data and the key information obtained by image sensing to obtain and transmit the encrypted image data to the back-end master control includes: acquiring each line of image data obtained by image sensing through an encryption module; controlling each row of image data and the key information to carry out exclusive OR operation by taking 4 bytes as a group through an encryption register in the encryption module so as to obtain encrypted image data; and transmitting the encrypted image data to the back-end master control so that the back-end master control performs reverse decryption control.
The application also provides an image sensor, which comprises an image sensing module, a counting module, a key module and an encryption module; the image sensing module is used for performing image sensing so as to transmit image data obtained by the image sensing to the encryption module; the counting module is used for performing counting control in the image sensing process of the image sensing module so as to acquire counting information, wherein the counting information comprises row counting information and/or frame counting information; the key module is used for acquiring key information according to the counting information and the key generation parameters after acquiring the counting information transmitted by the counting module; the encryption module is used for carrying out encryption control according to the image data and the key information after obtaining the key information transmitted by the key module so as to obtain and transmit the encrypted image data to the back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames.
Optionally, the counting module is used for receiving the row pulse signal and/or the frame pulse signal transmitted by the image sensing module in the process of image sensing by the image sensing module; the line pulse signal is a primary pulse signal generated after the image sensing module senses each line of data, and the frame pulse signal is a primary pulse signal generated after the image sensing module senses each frame of data.
Optionally, the counting module comprises a signal register and a counting register; the signal register is used for carrying out pulse signal selection control so as to determine a counting target, wherein the counting target is a row pulse signal or a frame pulse signal; the counting register is used for configuring a counting system so that the counting module counts the counting targets according to the counting system and a preset counting rule to obtain counting information.
Optionally, the key module includes a key register, where the key register is used to configure key generation parameters of a preset standard; the encryption module comprises an encryption register which is used for controlling the encryption module to carry out encryption control according to the image data and the key information.
Optionally, the signal register, the count register, the key register, and the encryption register are write-only registers.
The application provides an encryption transmission method and an image sensor, wherein the encryption transmission method is applied to the image sensor and comprises the following steps: performing count control in the image sensing process to acquire count information, wherein the count information comprises row count information and/or frame count information; acquiring key information according to the counting information and the key generation parameters; and performing encryption control according to the image data obtained by image sensing and the key information to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames. Therefore, the image sensor has an image data encryption function, and can obtain encrypted image data after encryption, change a key according to rows and/or change the key according to frames, so that the cracking difficulty of the encrypted image data is increased, and therefore, even if a lawless person knows a key generation rule, the lawless person cannot determine which row or which frame is currently cracked. In summary, the present application can achieve the purpose of improving the security of image data transmission.
The foregoing and other objects, features and advantages of the application will be apparent from the following more particular description of preferred embodiments, as illustrated in the accompanying drawings.
Drawings
Fig. 1 is a flow chart of an encryption transmission method according to a first embodiment of the present application;
fig. 2 is a schematic structural diagram of an image sensor according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a first data control provided by a first embodiment of the present application;
FIG. 4 is a schematic diagram of a first key calculation relationship provided by the first embodiment of the present application;
FIG. 5 is a schematic diagram of a second data control provided by the first embodiment of the present application;
fig. 6 is a schematic diagram of a second key calculation relationship provided in the first embodiment of the present application.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
First embodiment:
for a clear description of the encrypted transmission method according to the first embodiment of the present application, please refer to fig. 1 to 6.
The encryption transmission method provided by the first embodiment of the application is applied to an image sensor and comprises the following steps:
and S11, performing counting control in the image sensing process to acquire counting information, wherein the counting information comprises row counting information and/or frame counting information.
In an alternative embodiment, in step S11, the counting control is performed during the image sensing process to obtain the counting information, which may include: in the image sensing process, receiving a row pulse signal and/or a frame pulse signal; and counting the row pulse signals and/or the frame pulse signals according to a preset counting rule to obtain counting information. For example, referring to fig. 2, a counting module A2 may be included in the image sensor, so that during image sensing, a line pulse signal and/or a frame pulse signal is received through the counting module A2, and counted according to a preset counting rule through the counting module A2 to obtain counting information.
In an alternative embodiment, the row pulse signal may be a primary pulse signal generated after sensing each row of data, and the frame pulse signal may be a primary pulse signal generated after sensing each frame of data.
In an alternative embodiment, the step of counting the row pulse signal and/or the frame pulse signal according to a preset counting rule to obtain counting information may include: performing pulse signal selection control to determine a counting target, wherein the counting target is a row pulse signal or a frame pulse signal; acquiring a configured counting system; counting the counting targets according to a counting system and a preset counting rule to obtain counting information. For example, referring to fig. 2, the counting module A2 in the image sensor may be built in or externally connected with two read-only registers (a signal register a201 and a counting register a 202), and preferably, pulse signal selection control is performed by the signal register a201 in the counting module A2 to determine a counting target, wherein the counting target is a line pulse signal or a frame pulse signal; acquiring a counting system configured by a counting register A202 in a counting module A2; counting the counting targets by a counting module A2 according to a counting system and a preset counting rule to obtain counting information.
In an alternative embodiment, the count scale may range from 8 to 255.
In an alternative embodiment, the preset counting rule may include counting with data of N bits 2Nbit, where N is not less than 4. For example, the preset count rules may include, but are not limited to, counting with 4 bits of 8 bits of data or counting with 5 bits of 10 bits of data.
In an alternative embodiment, the preset counting rule is to count with data of N bits 2 Nbit. The step of counting the counting targets according to the counting system and a preset counting rule to obtain counting information may include: when the N-bit count is all maximum, the method automatically clears.
In an alternative embodiment, the preset counting rule may be set according to a preset standard corresponding to the key generation parameter that needs to be used subsequently.
And S12, acquiring key information according to the count information and the key generation parameters.
In an alternative embodiment, the step of obtaining the key information according to the count information and the key generation parameter in step S12 may include: configuring key generation parameters of preset standards; and acquiring the key information according to the count information and the key generation parameters of the preset standard. For example, referring to fig. 2, the image sensor may include a key module A3, and a key register a301 may be built in or externally connected to the key module A3, and preferably, the count information is received through the key module A3; configuring key generation parameters of preset standards through a key register A301 in a key module A3; and acquiring key information by the key module A3 according to the counting information and key generation parameters of preset standards.
In an alternative embodiment, counting the counting targets according to a counting system and a preset counting rule to obtain counting information, wherein the preset counting rule is set according to a key generation parameter of a preset standard configured by a key register.
In an alternative embodiment, when the key generation parameter of the preset standard configured by the key register is the key generation parameter of the 8-bit data standard (for example, see the key generation parameter in fig. 3), the preset counting rule is set to count with 4-bit 8-bit data (so that 4-bit 8-bit count data can be obtained, for example, see the count data in fig. 3); or, when the key generation parameter of the preset standard of the key register configuration is the key generation parameter of the 10-bit data standard (see, for example, the key generation parameter in fig. 5), the preset count rule is set to count with the 5-bit 10-bit data (so that the 10-bit count data can be obtained, for example, see the count data in fig. 5).
In an alternative embodiment, referring to fig. 3 and 4, the count information may include 4 bits of 8 bits of count data, and the key generation parameter may be a key generation parameter of an 8bit data standard. In the step of acquiring key information according to the count information and the key generation parameter, the step of acquiring key information may include: dividing the key generation parameters into 4 groups of 2bit key data; and performing exclusive OR operation according to the 4 groups of 2-bit key data and the 4-bit 8-bit count data to acquire key information, wherein the key information comprises a 4-byte key.
In an alternative embodiment, the step of performing an exclusive-or operation according to the 4 sets of 2bit key data and the 4 bit 8bit count data to obtain key information, for example, referring to fig. 4, the 4 bit 8bit count data is divided into 4 count values (A, B, C, D, where a is the most significant bit and D is the least significant bit), and the 4 sets of 2bit key data respectively correspond to the 4 count values from high to low (for example, the low value key data bit1 and bit0 correspond to the count value D of the least significant bit); carrying out exclusive OR operation on count values corresponding to each group of 2bit key data in 4 groups of 2bit key data for 4 times according to 2 bits (for example, 8bit data in count value D is divided into 4 groups of 2bit data so as to carry out exclusive OR operation on the count values and the corresponding low-value key data bit1 and bit0 respectively); and taking the exclusive OR operation result as a key value, and acquiring key information according to the key value.
In other alternative embodiments, referring to fig. 5 and 6, the count information may include 5 bits of 10 bits of count data, and the key generation parameter may be a key generation parameter of a10 bit data standard. In the step of acquiring key information according to the count information and the key generation parameter, the step of acquiring key information may include: dividing the key generation parameters into 5 groups of 2bit key data; and performing exclusive OR operation according to the 5 groups of 2-bit key data and the 5-bit 10-bit count data to obtain key information, wherein the key information comprises a 5-byte key.
In other alternative embodiments, the step of performing an exclusive-or operation according to the 5 sets of 2bit key data and the 5 bit 10bit count data to obtain key information, for example, referring to fig. 6, the 5 bit 10bit count data is divided into 5 count values (A, B, C, D, E, where a is the most significant bit and E is the least significant bit), and the 5 sets of 2bit key data correspond to the 5 count values from high to low (for example, the key data bit3 and bit2 correspond to the count value D); 5 exclusive-or operations are carried out on count values corresponding to each group of 2bit key data in the 5 groups of 2bit key data according to 2 bits (for example, 10bit data in the count value D is divided into 5 groups of 2bit data so as to carry out exclusive-or operations with corresponding key data bit3 and bit2 respectively); taking the exclusive OR operation result as a key value; and acquiring the key information according to the key value.
And S13, performing encryption control according to the image data and the key information obtained by image sensing to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames.
In an optional embodiment, in step S13, performing encryption control according to the image data and the key information obtained by image sensing to obtain and transmit the encrypted image data to the back-end master control may include: and carrying out encryption control according to a preset encryption rule according to the image data and the key information obtained by image sensing.
In an alternative embodiment, the step of performing encryption control according to a preset encryption rule based on the principle that the image data obtained by image sensing is read out in rows according to the image data obtained by image sensing and the key information may include: acquiring each line of image data obtained by image sensing; controlling each row of image data and the key information to carry out exclusive OR operation by taking N bytes (for example, 4 bytes) as a group so as to obtain encrypted image data; and transmitting the encrypted image data to the back-end master control so that the back-end master control performs reverse decryption control according to an encryption mode corresponding to the encrypted image data. Therefore, in this embodiment, when the line pulse signal is selected as the counting target, the obtained encrypted image data changes the key according to the line (preferably, the key of each line of image data changes), and when the frame pulse signal is selected as the counting target, the obtained encrypted image data changes the key according to the frame (preferably, the key of each frame of image data changes), so that the cracking difficulty can be increased, and it is not clear when the cracking is performed, which line or which frame is currently cracked, so that the cracking cannot be performed even if the illegal personnel knows the encryption mode corresponding to the encrypted image data.
In an alternative embodiment, referring to fig. 2, an encryption module A4 may be included in the image sensor, and the encryption module A4 may be externally connected or internally provided with a read-only register (encryption register a 401). The step of performing encryption control according to a preset encryption rule according to the image data and the key information obtained by image sensing may include: the encryption module A4 is controlled by the encryption register a401 to perform encryption control according to a preset encryption rule based on the image data and key information obtained by image sensing. The encryption register a401 may provide a preset encryption rule to the encryption module A4, so that the encryption module A4 performs encryption control according to the image data and the key information obtained by image sensing according to the preset encryption rule, or may provide a trigger signal to trigger the encryption module A4 to perform encryption control according to the image data and the key information obtained by image sensing according to the preset encryption rule.
In an alternative embodiment, the encryption register a401 provides a predetermined encryption rule, for example, the above-mentioned exclusive-or operation rule, and/or the value of the exclusive-or operation parameter N.
In an alternative embodiment, each line of image data obtained by image sensing is acquired; controlling each row of image data and the key information to carry out exclusive OR operation by taking N bytes as a group so as to obtain encrypted image data; and transmitting the encrypted image data to the back-end master control so that the back-end master control performs reverse decryption control according to an encryption mode corresponding to the encrypted image data. For example, after the value of the xor operation parameter N configured by the encryption register a401 is 4, the encryption module obtains each line of image data obtained by image sensing, and then controls each line of image data and the key information to perform xor operation with 4 bytes as a group, so as to obtain encrypted image data; and transmitting the encrypted image data to the back-end master control so that the back-end master control performs reverse decryption control.
In an alternative embodiment, the signal register a201, the count register a202, the key register a301, and the encryption register a401 in the image sensor in this embodiment may be write-only registers. Therefore, the present embodiment achieves the purpose that the configured register value (the register is a write-only register) cannot be read even if the encryption method corresponding to the encrypted image data is known, and further achieves the purpose that the difficulty of generating the key by an illegal person can be increased.
In an alternative embodiment, the back-end master performs reverse decryption control according to an encryption mode corresponding to the encrypted image data, for example, the back-end master configures a required encryption rule through four registers (such as a signal register, a count register, a key register and an encryption register), calculates and generates a corresponding key according to the same rule, and performs an exclusive-or operation on each line of image data of the encrypted image data with a group of N bytes to obtain the original image data after receiving the encrypted image data.
The encryption transmission method provided by the first embodiment of the application is applied to an image sensor and comprises the following steps: s11, performing counting control in the image sensing process to acquire counting information, wherein the counting information comprises row counting information and/or frame counting information; s12, acquiring key information according to the counting information and the key generation parameters; and S13, performing encryption control according to the image data and the key information obtained by image sensing to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames. Therefore, the encryption transmission method provided by the first embodiment of the application can enable the image sensor to have an image data encryption function, and can enable encrypted image data to be obtained after encryption to change a key row by row and/or change the key frame by frame, so that the cracking difficulty of the encrypted image data is increased, and therefore, even if an illegal person knows a key generation rule, the illegal person cannot determine which row or which frame is currently cracked, in addition, under the condition that the illegal person does not know the key generation rule, the encrypted image data cannot be cracked by reading a frame through the interface, so that the image data cannot be prevented from being leaked (i.e. reading is prevented), and further, under the condition that the illegal person does not know the key generation rule, when the back-end master is used for inputting a frame of false image data through the interface, the back-end master cannot be normally used, and further, the back-end master can be prevented from being attacked by malicious data (i.e. input is prevented). In summary, the encryption transmission method provided in the first embodiment of the present application can achieve the purpose of improving the security of image data transmission.
Second embodiment:
for a clear description of the image sensor provided in the second embodiment of the present application, please refer to fig. 2.
The image sensor provided by the second embodiment of the application comprises an image sensing module A1, a counting module A2, a key module A3 and an encryption module A4.
The image sensing module A1 is configured to perform image sensing to transmit image data obtained by the image sensing to the encryption module.
The counting module A2 is configured to perform counting control in the image sensing process of the image sensing module A1 to obtain counting information, where the counting information includes row counting information and/or frame counting information.
In an alternative embodiment, the counting module A2 is configured to receive the line pulse signal and/or the frame pulse signal transmitted by the image sensing module A1 during the image sensing process of the image sensing module A1; the line pulse signal is a primary pulse signal generated after the image sensing module A1 senses each line of data, and the frame pulse signal is a primary pulse signal generated after the image sensing module A1 senses each frame of data.
In an alternative embodiment, the counting module A2 includes a signal register a201 and a signal register a202; the signal register a201 is used for performing pulse signal selection control to determine a counting target, wherein the counting target is a row pulse signal or a frame pulse signal; the signal register a202 is configured to configure a counting system, so that the counting module A2 counts the counting targets according to the counting system and a preset counting rule to obtain counting information.
The key module A3 is configured to obtain the key information according to the count information and the key generation parameter after obtaining the count information transmitted by the count module A2.
In an alternative embodiment, the key module A3 includes a key register a301, where the key register a301 is used to configure key generation parameters of a preset standard.
The encryption module A4 is configured to perform encryption control according to the image data and the key information after obtaining the key information transmitted by the key module A3, so as to obtain and transmit encrypted image data to the back-end master control B1, where the encrypted image data changes the key by row and/or changes the key by frame.
In an alternative embodiment, the encryption module A4 includes an encryption register a401, and the encryption register a401 is used to control the encryption module A4 to perform encryption control according to the image data and the key information.
In an alternative embodiment, the signal register a201, the signal register a202, the key register a301 and the encryption register a401 are all write-only registers (i.e. the data written in the registers cannot be read from the outside).
In an alternative embodiment, the back-end master B1 connected to the image sensor performs inverse decryption control according to an encryption manner corresponding to the encrypted image data, for example, the back-end master B1 configures a required encryption rule through four registers (such as a signal register, a key register and an encryption register), and also calculates and generates a corresponding key according to the same rule, and when the encrypted image data is received, performs an exclusive-or operation on each line of sub-image data of the encrypted image data with N bytes as a group to obtain original image data, or performs an exclusive-or operation on each frame of sub-image data with N bytes as a group to obtain original image data; wherein N may be associated with a preset count rule.
In an alternative implementation manner, the technical features of the image sensor provided in this embodiment and the technical features of the encryption transmission method provided in the first embodiment may be arbitrarily combined on the premise of not contradicting, and will not be described herein again.
The image sensor provided by the second embodiment of the application comprises an image sensing module A1, a counting module A2, a key module A3 and an encryption module A4; the image sensing module A1 is used for performing image sensing so as to transmit image data obtained by the image sensing to the encryption module; the counting module A2 is used for performing counting control in the image sensing process of the image sensing module A1 so as to acquire counting information, wherein the counting information comprises row counting information and/or frame counting information; the key module A3 is used for acquiring key information according to the counting information and the key generation parameters after acquiring the counting information transmitted by the counting module A2; the encryption module A4 is configured to perform encryption control according to the image data and the key information after obtaining the key information transmitted by the key module A3, so as to obtain and transmit encrypted image data to the back-end master control B1, where the encrypted image data changes the key by row and/or changes the key by frame. Therefore, the image sensor provided by the second embodiment of the application has an image data encryption function, and can enable encrypted image data to be obtained after encryption, a key is changed according to rows and/or a key is changed according to frames, so that the cracking difficulty of the encrypted image data is increased, and therefore, even if a lawless person knows a key generation rule, the lawless person cannot determine which row or which frame is currently cracked, in addition, under the condition that the lawless person does not know the key generation rule, the image data cannot be cracked by reading one frame of encrypted image data through the interface, so that the image data cannot be leaked (i.e. prevented from being read), and further, under the condition that the lawless person does not know the key generation rule, when the back-end master is used for inputting one frame of false image data through the interface, the back-end master cannot be normally used, and further, the back-end master can be prevented from being attacked by malicious data (i.e. prevented from being input). In summary, the image sensor provided in the second embodiment of the present application can achieve the purpose of improving the security of image data transmission.
Third embodiment:
an image sensor provided in a third embodiment of the present application includes: a processor and a memory, wherein the processor is configured to execute a computer program stored in the memory to implement the steps of the encrypted transmission method as described in the first embodiment.
In an embodiment, the image sensor provided in this embodiment may include at least one processor and at least one memory. Wherein the at least one processor may be referred to as a processing unit and the at least one memory may be referred to as a storage unit. Specifically, the storage unit stores a computer program which, when executed by the processing unit, causes the image sensor provided by the present embodiment to implement the steps of the encrypted transmission method as described above, for example, step S11 shown in fig. 1, performs count control during image sensing to acquire count information including line count information and/or frame count information; step S12, obtaining key information according to the counting information and the key generation parameters; and step S13, performing encryption control according to the image data and the key information obtained by image sensing to obtain and transmit the encrypted image data to a back-end main control, wherein the encrypted image data changes the key according to rows and/or changes the key according to frames.
In an implementation manner, the image sensor provided in this embodiment may include a plurality of memories (simply referred to as storage units).
The memory unit may be a volatile memory or a nonvolatile memory, and may include both volatile and nonvolatile memories. Wherein the nonvolatile Memory may be Read Only Memory (ROM), programmable Read Only Memory (PROM, programmable Read-Only Memory), erasable programmable Read Only Memory (EPROM, erasable Programmable Read-Only Memory), electrically erasable programmable Read Only Memory (EEPROM, electrically Erasable Programmable Read-Only Memory), magnetic random access Memory (FRAM, ferromagnetic random access Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk Read Only Memory (CD-ROM, compact Disc Read-Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile memory may be random access memory (RAM, random Access Memory), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronous Dynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr SDRAM, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory units described in embodiments of the application are intended to comprise, without being limited to, these and any other suitable types of memory.
In one embodiment, the image sensor further includes a bus connecting the different components (e.g., processor and memory, etc.).
In an implementation manner, the image sensor in this embodiment may further include a communication interface (for example, an I/O interface), and the communication interface may be used to communicate with an external device (for example, a back-end master).
In an implementation manner, the image sensor provided in this embodiment may further include a communication device A5.
The image sensor provided by the third embodiment of the present application includes a memory and a processor, and the processor is configured to execute a computer program stored in the memory to implement the steps of the encryption transmission method as described in the first embodiment, so that the image sensor provided by the present embodiment achieves the purpose of improving the security of image data transmission.
The third embodiment of the present application also provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements steps of the encrypted transmission method as in the first embodiment, such as steps S11 to S13 shown in fig. 1.
In an implementation, the computer readable storage medium provided by the present embodiment may include any entity or device capable of carrying computer program code, a recording medium, e.g., ROM, RAM, magnetic discs, optical discs, flash memories, etc.
The third embodiment of the present application provides a computer program A6 stored in a computer-readable storage medium, which when executed by a processor a101, achieves the object of improving the security of image data transmission.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element, and furthermore, elements having the same name in different embodiments of the application may have the same meaning or may have different meanings, the particular meaning of which is to be determined by its interpretation in this particular embodiment or by further combining the context of this particular embodiment.
It will be appreciated that, depending on the context, the word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination". Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or" and/or "as used herein are to be construed as inclusive, or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; A. b and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, or alternatives falling within the spirit and principles of the application.

Claims (13)

1. An encrypted transmission method, applied to an image sensor, comprising:
performing count control in an image sensing process to acquire count information including row count information and/or frame count information;
acquiring key information according to the counting information and the key generation parameters;
performing encryption control according to the image data obtained by image sensing and the key information to obtain and transmit encrypted image data to a back-end main control, wherein the encrypted image data changes a key according to rows and/or changes the key according to frames;
the step of performing encryption control according to the image data obtained by image sensing and the key information to obtain and transmit the encrypted image data to the back-end main control comprises the following steps:
acquiring each line of image data obtained by image sensing through an encryption module;
controlling each row of image data and the key information to carry out exclusive OR operation by taking 4 bytes as a group through an encryption register in an encryption module so as to obtain the encrypted image data;
and transmitting the encrypted image data to the back-end master control so that the back-end master control performs reverse decryption control.
2. The encrypted transmission method according to claim 1, wherein the step of performing count control in the image sensing process to acquire count information comprises:
in the image sensing process, a row pulse signal and/or a frame pulse signal are received through a counting module, wherein the row pulse signal is a primary pulse signal generated after each row of data is sensed, and the frame pulse signal is a primary pulse signal generated after each frame of data is sensed;
and counting the row pulse signals and/or the frame pulse signals by the counting module according to a preset counting rule so as to obtain the counting information.
3. The encrypted transmission method according to claim 2, wherein the step of counting the line pulse signal and/or the frame pulse signal by the counting module according to a preset counting rule to obtain the count information comprises:
pulse signal selection control is carried out through a signal register in the counting module so as to determine a counting target, wherein the counting target is the row pulse signal or the frame pulse signal;
acquiring a counting system configured by a counting register in the counting module;
and counting the counting targets according to the counting system and the preset counting rule to obtain the counting information.
4. A method of encrypted transmission according to claim 3, wherein the counter is in the range of 8 to 255.
5. The encrypted transmission method according to claim 3, wherein the step of acquiring key information based on the count information and the key generation parameter comprises:
receiving the counting information through a key module;
configuring key generation parameters of preset standards through a key register in the key module;
and acquiring the key information by the key module according to the counting information and the key generation parameters of the preset standard.
6. The encrypted transmission method according to claim 5, wherein the preset count rule is set in accordance with a key generation parameter of the preset standard of the key register configuration.
7. The encrypted transmission method according to claim 6, wherein when the key generation parameter of the preset standard configured by the key register is a key generation parameter of an 8-bit data standard, the preset counting rule is set to count with 4-bit 8-bit data; or alternatively, the first and second heat exchangers may be,
when the key generation parameter of the preset standard configured by the key register is the key generation parameter of the 10-bit data standard, the preset counting rule is set to count by adopting 5-bit 10-bit data.
8. The encrypted transmission method according to any one of claims 1 to 7, wherein the count information includes 4-bit 8-bit count data, and the key generation parameter is a key generation parameter of an 8-bit data standard;
the step of obtaining the key information according to the count information and the key generation parameter includes:
dividing the key generation parameters into 4 groups of 2bit key data;
and carrying out exclusive OR operation according to the 4 groups of 2bit key data and the 4 bit 8bit count data to acquire the key information.
9. The image sensor is characterized by comprising an image sensing module, a counting module, a key module and an encryption module;
the image sensing module is used for performing image sensing so as to transmit image data obtained by the image sensing to the encryption module;
the counting module is used for performing counting control in the image sensing process of the image sensing module so as to acquire counting information, wherein the counting information comprises row counting information and/or frame counting information;
the key module is used for acquiring key information according to the counting information and the key generation parameters after acquiring the counting information transmitted by the counting module;
the encryption module is used for carrying out encryption control according to the image data and the key information after obtaining the key information transmitted by the key module so as to obtain and transmit encrypted image data to a back-end main control, wherein the encrypted image data changes a key according to rows and/or changes a key according to frames;
the encryption module is further used for obtaining each line of image data obtained through image sensing, controlling each line of image data and the key information to be subjected to exclusive OR operation by taking 4 bytes as a group through an encryption register in the encryption module so as to obtain the encrypted image data, and transmitting the encrypted image data to the back-end master control so that the back-end master control can perform reverse decryption control.
10. The image sensor of claim 9, wherein the counting module is configured to receive a line pulse signal and/or a frame pulse signal transmitted by the image sensing module during image sensing by the image sensing module;
the line pulse signal is a primary pulse signal generated after the image sensing module senses each line of data, and the frame pulse signal is a primary pulse signal generated after the image sensing module senses each frame of data.
11. The image sensor of claim 10, wherein the counting module comprises a signal register and a count register;
the signal register is used for performing pulse signal selection control to determine a counting target, wherein the counting target is the row pulse signal or the frame pulse signal;
the counting register is used for configuring a counting system so that the counting module counts the counting targets according to the counting system and a preset counting rule to obtain the counting information.
12. The image sensor of claim 11, wherein the key module comprises a key register for configuring key generation parameters of a preset standard;
the encryption module comprises an encryption register, and the encryption register is used for controlling the encryption module to carry out encryption control according to the image data and the key information.
13. The image sensor of claim 12, wherein the signal register, the count register, the key register, and the encryption register are write-only registers.
CN202011641109.5A 2020-12-31 2020-12-31 Encryption transmission method and image sensor Active CN114697463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011641109.5A CN114697463B (en) 2020-12-31 2020-12-31 Encryption transmission method and image sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011641109.5A CN114697463B (en) 2020-12-31 2020-12-31 Encryption transmission method and image sensor

Publications (2)

Publication Number Publication Date
CN114697463A CN114697463A (en) 2022-07-01
CN114697463B true CN114697463B (en) 2023-11-21

Family

ID=82136414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011641109.5A Active CN114697463B (en) 2020-12-31 2020-12-31 Encryption transmission method and image sensor

Country Status (1)

Country Link
CN (1) CN114697463B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09284743A (en) * 1996-04-11 1997-10-31 Sony Corp Transmitter, receiver, transmission method and reception method
CN1692649A (en) * 2002-12-13 2005-11-02 索尼株式会社 Video signal processing system, video signal processing apparatus and method, recording medium, and program
CN1823356A (en) * 2003-07-14 2006-08-23 索尼株式会社 Encryption/decryption device and method
JP2006279488A (en) * 2005-03-29 2006-10-12 Toshiba Information Systems (Japan) Corp Cipher text generation device, cipher text deciphering device, cipher text generation program, and cipher text deciphering program
CN111555875A (en) * 2020-05-14 2020-08-18 杭州海兴电力科技股份有限公司 Key synchronization method, device, equipment and medium for centralized meter reading system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101369748B1 (en) * 2006-12-04 2014-03-06 삼성전자주식회사 Method for encrypting datas and appatus therefor
JP5316217B2 (en) * 2009-05-19 2013-10-16 ソニー株式会社 Data transmission method and apparatus, data communication method and apparatus
US10104047B2 (en) * 2015-04-08 2018-10-16 Microsemi Solutions (U.S.), Inc. Method and system for encrypting/decrypting payload content of an OTN frame

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09284743A (en) * 1996-04-11 1997-10-31 Sony Corp Transmitter, receiver, transmission method and reception method
CN1692649A (en) * 2002-12-13 2005-11-02 索尼株式会社 Video signal processing system, video signal processing apparatus and method, recording medium, and program
CN1823356A (en) * 2003-07-14 2006-08-23 索尼株式会社 Encryption/decryption device and method
JP2006279488A (en) * 2005-03-29 2006-10-12 Toshiba Information Systems (Japan) Corp Cipher text generation device, cipher text deciphering device, cipher text generation program, and cipher text deciphering program
CN111555875A (en) * 2020-05-14 2020-08-18 杭州海兴电力科技股份有限公司 Key synchronization method, device, equipment and medium for centralized meter reading system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
适用于CCSDS的"一帧一密"加/解密方案的FPGA实现;刘兰;姚行中;王振宇;杨晓非;;计算机工程与应用(第10期);全文 *

Also Published As

Publication number Publication date
CN114697463A (en) 2022-07-01

Similar Documents

Publication Publication Date Title
KR101834969B1 (en) Secure data storage based on physically unclonable functions
US20160197899A1 (en) Method of Dynamically Encrypting Fingerprint Data and Related Fingerprint Sensor
JP4974613B2 (en) IC memory, access device for IC memory, and validity verification method
US20090033464A1 (en) Transponder with access protection and method for access to the transponder
CN111866024B (en) Network encryption traffic identification method and device
US10701074B2 (en) Internet-of-things reading device, method of secure access, and control center apparatus
CN107852329B (en) Device for achieving uniqueness by utilizing spontaneous decay of radioisotopes
EP2779520A1 (en) A process for obtaining candidate data from a remote storage server for comparison to a data to be identified
CN114697463B (en) Encryption transmission method and image sensor
CN106980800A (en) A kind of measure and system for encrypting solid state hard disc certification subregion
CN106576040B (en) Error rate control method for device-specific information
CN116566585B (en) Informationized intelligent storage method
CN113632413A (en) Using memory as a block in a block chain
KR102360189B1 (en) Secured memory and method of executing data scrubbing inside a smart storage device
US10277283B2 (en) NFC device, reader/writer device and methods for authorizing and performing an update
EP3518190A1 (en) Method and device for multi-factor authentication
US11195582B2 (en) Non-volatile memory device and method of writing to non-volatile memory device
CN112329076B (en) Storage area protection method and device based on data temperature
TW202211062A (en) A system and method for improving measurements of an intrusion detection system by transforming one dimensional measurements into multi-dimensional images
JP6937288B2 (en) Non-volatile memory device and challenge-response method
CN114365135A (en) Device intrusion detection via variable code comparison
Noprianto et al. Smart card security mechanism with dynamic key
US11310028B2 (en) Tamper resistant counters
CN111581669B (en) Variable factor adjusted block chain lightweight node privacy protection method
CN111132127B (en) Smart card and management method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant