CN115150818A - Communication transmission encryption method based on artificial intelligence - Google Patents

Communication transmission encryption method based on artificial intelligence Download PDF

Info

Publication number
CN115150818A
CN115150818A CN202211078209.0A CN202211078209A CN115150818A CN 115150818 A CN115150818 A CN 115150818A CN 202211078209 A CN202211078209 A CN 202211078209A CN 115150818 A CN115150818 A CN 115150818A
Authority
CN
China
Prior art keywords
binary image
initial
structural element
data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211078209.0A
Other languages
Chinese (zh)
Other versions
CN115150818B (en
Inventor
严可达
涂旭
肖江领
陈晶
郭天阳
郭楚豪
许大为
陈文文
刘驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Optical Valley Technology Co ltd
Original Assignee
Optical Valley Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Optical Valley Technology Co ltd filed Critical Optical Valley Technology Co ltd
Priority to CN202211078209.0A priority Critical patent/CN115150818B/en
Publication of CN115150818A publication Critical patent/CN115150818A/en
Application granted granted Critical
Publication of CN115150818B publication Critical patent/CN115150818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/20Image enhancement or restoration using local operators
    • G06T5/30Erosion or dilatation, e.g. thinning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0006Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
    • H04L1/0007Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20036Morphological image processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention relates to a communication transmission encryption method based on artificial intelligence, belonging to the technical field of data transmission; the method comprises the following steps: acquiring a data sequence to be transmitted, dividing Huffman coded data obtained by converting the data sequence to be transmitted, arranging the divided data to obtain an initial two-dimensional data matrix, and representing different numerical values in the initial two-dimensional data matrix by using black points and white points respectively to obtain an initial binary image; randomly selecting a rectangular structural element when the morphological operation is carried out on the initial binary image; and encrypting the initial binary image by using the target structural element to obtain an encrypted binary image, and decrypting the encrypted binary image according to the target structural element to obtain a decrypted data sequence to be transmitted. The invention uses the randomly selected structural elements as the key to carry out corrosion and expansion operation on the binary image, thereby realizing encryption and decryption of data and ensuring the security of data transmission.

Description

Communication transmission encryption method based on artificial intelligence
Technical Field
The invention belongs to the technical field of data transmission, and particularly relates to a communication transmission encryption method based on artificial intelligence.
Background
In the wireless communication, a radio signal is used as an information carrier, so that the restriction of wired communication on the position of a communication terminal is eliminated, and the flexibility and the portability of the wireless communication are rapidly concentrated, and the wireless communication is rapidly developed in the last decade. However, as wireless communication technology develops and is more and more widely applied, security problems in wireless communication become more and more exposed. While wireless communication brings convenience to people, the openness of wireless channels makes security of wireless communication face a serious challenge.
At present, the most common encryption mode is HTTPS, and the HTTPS protocol is an HTTP channel with security as a target, and the security of a transmission process is ensured by transmission encryption and identity authentication on the basis of HTTP. Although the HTTPS protocol is widely used, the HTTPS protocol has a high cost, and meanwhile, the HTTPS protocol has a small security defect, and hardly plays a role in hacking, denial of service attack, server hijacking, and the like, so that it is necessary to provide a new communication transmission encryption method.
Disclosure of Invention
The invention provides a communication transmission encryption method based on artificial intelligence, which is characterized in that a two-dimensional data matrix is obtained by reconstructing data, the two-dimensional data matrix is converted into a binary image, and the binary image is corroded and expanded by using a randomly selected structural element as a key, so that the encryption and decryption of the data are realized, and the safety of data transmission can be ensured.
The invention relates to a communication transmission encryption method based on artificial intelligence, which adopts the following technical scheme: the method comprises the following steps:
acquiring a data sequence to be transmitted, and performing Huffman coding on the data sequence to be transmitted to obtain Huffman coded data;
dividing the Huffman coded data into a plurality of character strings with equal length, arranging the character strings according to a dividing sequence to obtain an initial two-dimensional data matrix, and respectively representing different numerical values in the initial two-dimensional data matrix by using black points and white points to convert the numerical values into an initial binary image;
randomly selecting rectangular structural elements when morphological operation is carried out on the initial binary image, and recording the selected rectangular structural elements as target structural elements;
performing sliding window traversal on the initial binary image by using the target structure element, and marking the position, corresponding to the central point of the target structure element, on the initial binary image as a core node when all black points in the target structure element are completely matched with the black points on the initial binary image; replacing black points matched with the target structural elements except the core nodes on the initial binary image with white points, and marking the black points which are not matched with the initial binary image as mask points;
reconstructing by using the obtained core node and the mask point to obtain an encrypted binary image, and transmitting the encrypted binary image;
and after receiving the encrypted binary image, the receiving end decrypts the encrypted binary image by using the target structural element to obtain a decrypted binary image, and performs inverse transformation on the decrypted binary image to obtain a decrypted data sequence to be transmitted.
Further, the transmitting the encrypted binary image includes:
acquiring core node position data and mask point position data in the encrypted binary image;
and transmitting the encrypted binary image, the core node position data in the encrypted binary image and the mask point position data in the encrypted binary image together.
Further, the decrypting the encrypted binary image by using the target structural element to obtain a decrypted binary image includes:
after receiving the encrypted binary image at the receiving end, acquiring core node position data and mask point position data at the same time;
performing sliding window expansion operation on the position of each core node in the encrypted binary image by using the target structural element;
and during each sliding window expansion operation, replacing the position corresponding to the target structural element in the encrypted binary image with the target structural element, and reserving the mask point during replacement to obtain the decrypted binary image.
Further, the inverse transforming the decrypted binary image to obtain a decrypted data sequence to be transmitted includes:
replacing black points and white points in the decrypted binary image with numerical values to obtain a decrypted two-dimensional data matrix;
splicing the decrypted two-dimensional data matrix according to the arrangement sequence to obtain decrypted Huffman coded data;
and carrying out inverse Huffman transform on the decrypted Huffman coded data to obtain a decrypted data sequence to be transmitted.
Further, the performing sliding window traversal on the initial binary image by using the target structural element, and when all black points in the target structural element are completely matched with black points on the initial binary image, marking a position on the initial binary image corresponding to a central point of the target structural element as a core node, includes:
matching the center point of the target structural element with a first point in the initial binary image, and traversing all points in the initial binary image by the target structural element in a sliding mode in sequence;
calculating the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image once every sliding of the target structural element, and considering that the target structural element is matched with the initial binary image when the matching degree is equal to 1;
and when the target structure element is matched with the initial binary image, marking the position corresponding to the central point of the target structure element on the initial binary image as a core node.
Further, a calculation formula of the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image is shown as follows:
Figure 656597DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 972040DEST_PATH_IMAGE002
representing the number of black points of the target structural element on the matching of the current position and the overlapping region in the binary image;
Figure 602873DEST_PATH_IMAGE003
representing the number of black points in the target structural element;
Figure 588671DEST_PATH_IMAGE004
and representing the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image.
Further, the randomly selecting a rectangular structural element when the morphological operation is performed on the initial binary image includes:
determining a rectangular structural element with the shape of the structural element being the minimum size when the initial binary image is subjected to morphological operation according to the characteristics of the initial binary image;
acquiring a connected domain formed by all black points in the initial binary image by adopting a region growing method;
calculating the dispersion degree of the distribution of the black points in the binary image by utilizing the number of the black points contained in the maximum area covered by the rectangular structural element with the minimum size in the connected domain in a sliding manner;
and randomly selecting a rectangular structural element when the morphological operation is carried out on the initial binary image according to the discrete degree.
The invention has the beneficial effects that:
the invention provides a communication transmission encryption method based on artificial intelligence, which is characterized in that a two-dimensional data matrix is obtained by reconstructing data, the two-dimensional data matrix is converted into a binary image, the binary image is corroded by using a randomly selected structural element as a key to encrypt the data, the binary image is expanded by using the randomly selected structural element as the key to decrypt the data, and the structural element conforming to the two-dimensional data matrix can be selected as the key according to the characteristics of the two-dimensional data matrix, so that different keys corresponding to different transmission data are different, the randomness of an encryption process is realized, and the safety of the data transmission process can be ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart illustrating the general steps of an embodiment of an artificial intelligence based encryption method for communication transmission according to the present invention;
FIG. 2 is a schematic diagram of an initial two-dimensional data matrix according to the present invention;
FIG. 3 is a schematic diagram of an initial binary image according to the present invention;
FIG. 4 is a schematic diagram of one type of rectangular structural element in accordance with the present invention;
FIG. 5 is a schematic diagram of one type of rectangular structural element in accordance with the present invention;
FIG. 6 is a schematic diagram of one type of rectangular structural element in the present invention;
FIG. 7 is a schematic diagram of one type of rectangular structural element in the present invention;
FIG. 8 is a schematic diagram of one type of rectangular structural element in the present invention;
FIG. 9 is a schematic diagram of any connected domain;
FIG. 10 is a schematic diagram of the process of the present invention for performing dilation recovery using a target structural element;
fig. 11 is a schematic diagram of the whole process of data encryption and decryption in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the communication transmission encryption method based on artificial intelligence of the present invention is shown in fig. 1, and the method includes:
s1, acquiring a data sequence to be transmitted, and performing Huffman coding on the data sequence to be transmitted to obtain Huffman coded data.
The method compresses the collected data sequence to be transmitted, generally, the most common data compression algorithm is Huffman coding, only two values of 0 and 1 exist in data subjected to Huffman coding, the data structure performance after the Huffman coding is greatly improved, and as communication data are various and structured data and unstructured data, different types of data need to be unified in order to process different types of data, the communication data are subjected to Huffman coding compression before being encrypted, and the Huffman coding compression is lossless compression, so that original data cannot be lost.
S2, dividing the Huffman coded data into a plurality of character strings with equal length, arranging the character strings according to a dividing sequence to obtain an initial two-dimensional data matrix, and respectively representing different numerical values in the initial two-dimensional data matrix by using black points and white points to convert the numerical values into an initial binary image.
The data processed by the Huffman coding is a one-dimensional Huffman coding data sequence, and because the associated characters of a certain character of the one-dimensional Huffman coding data sequence are only related to the characters on the left and the right, the association of the data is not strong, and the data is easy to break when being encrypted, in order to increase the association between the data and increase the safety of data transmission, the one-dimensional Huffman coding data sequence is arranged, combined and spliced, and is converted into a two-dimensional data matrix form. A certain number of one-dimensional HoffmanThe encoded data is divided into M binary character strings of length N, the divided M binary character strings of length N are arranged in the order of division, and if the number of characters contained in the binary character string of length N in the last division is less than M, the binary character strings of length N are padded with 0. Dividing one-dimensional Huffman coding data sequence, and arranging according to the dividing sequence to obtain the size of
Figure 263235DEST_PATH_IMAGE005
The initial two-dimensional data matrix of (2) is the resulting initial two-dimensional data matrix as shown in fig. 2. And converting the initial two-dimensional data matrix into an initial binary image, wherein a number 1 in the initial two-dimensional data matrix is represented by a black dot, and a number 0 in the matrix is represented by a white dot, as shown in fig. 3, which is a schematic diagram of the obtained initial binary image.
And S3, randomly selecting the rectangular structural elements when the morphological operation is carried out on the initial binary image, and recording the selected rectangular structural elements as target structural elements.
The initial binary image has a plurality of black points with the value of 1, the distribution of the black points is different, the distribution of the black points in the binary image obtained by partial data is more concentrated, and the distribution of the black points in the binary image obtained by partial data is more dispersed. And randomly selecting different target structural elements according to the distribution condition of the black points in the binary image, wherein the target structural elements are keys. If the distribution concentration and the distribution dispersion of the black points in the initial binary image all select the same key, the encryption process is single, and the confidentiality is poor. Therefore, more choices can be provided for the binary image with concentrated black point distribution so as to improve the randomness of encryption, and the improvement of the randomness is also improved along with the improvement of the confidentiality. Because the initial binary image consists of black points and white points, the shape of the structural element is as follows when the initial binary image is subjected to morphological operation
Figure 331554DEST_PATH_IMAGE006
A rectangular structural element of size. Commonly used
Figure 766077DEST_PATH_IMAGE006
The kinds of the large rectangular structural elements are many, and five different types of rectangular structural elements are shown in fig. 4, 5, 6, 7 and 8.
And if the binary images corresponding to different data are different, selecting a structural element for performing morphological operation on the initial binary image from the five different types of rectangular structural elements as a target structural element according to the characteristics of the initial binary image. Specifically, randomly selecting a rectangular structural element when morphological operation is performed on the initial binary image includes: determining a rectangular structural element with the shape of the structural element being the minimum size when the initial binary image is subjected to morphological operation according to the characteristics of the initial binary image; acquiring a connected domain formed by all black points in the initial binary image by adopting a region growing method; calculating the discrete degree of the distribution of the black points in the binary image by utilizing the number of the black points contained in the maximum area covered by the rectangular structural element with the minimum size in the connected domain in a sliding manner; and randomly selecting a rectangular structural element when the morphological operation is carried out on the initial binary image according to the discrete degree.
Calculating the dispersion degree of the black point distribution in the binary image: because the target structural elements are all selected in the invention
Figure 337873DEST_PATH_IMAGE006
The size of the rectangular structural element is larger than that of the rectangular structural element, so that the connected domain formed by the black points in the binary image can be completely satisfied with the condition that the size is larger than or equal to that of the rectangular structural element
Figure 451847DEST_PATH_IMAGE006
The more connected domains of the rectangular structural elements with the same size, the more concentrated the distribution of the black points in the binary image is, and the more discrete the black points are. Therefore, the connected domain formed by all black points in the binary image is obtained by adopting a region growing method, and the dispersion degree is as follows:
Figure 476304DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure 714518DEST_PATH_IMAGE008
representing the discrete degree of the distribution of the black points in the binary image; k denotes coincidence with full coverage
Figure 671979DEST_PATH_IMAGE006
The number of connected domains of the large rectangular structural element; s represents the total number of black points in the binary image;
Figure 953924DEST_PATH_IMAGE009
representing connected domains
Figure 456888DEST_PATH_IMAGE006
The number of black dots contained in the largest area covered by the sliding of the large rectangular structural element. As shown in FIG. 9, if the number of black dots in a certain communication area is 17, then
Figure 216902DEST_PATH_IMAGE006
The number of black points contained in the maximum area covered by the sliding of the large rectangular structural element is 12, then
Figure 45181DEST_PATH_IMAGE009
Is 12.
After the dispersion degree of the black point distribution in the binary image is calculated, if the dispersion degree of the black point distribution in the binary image is large, the dispersion degree of the black point distribution in the rectangular structural element when the initial binary image is morphologically operated is selected to be larger, and if the dispersion degree of the black point distribution in the binary image is small, the dispersion degree of the black point distribution in the rectangular structural element when the initial binary image is morphologically operated is selected to be smaller.
S4, performing sliding window traversal on the initial binary image by using the target structure element, and marking the position, corresponding to the center point of the target structure element, on the initial binary image as a core node when all black points in the target structure element are completely matched with the black points on the initial binary image; and replacing black points matched with the target structural element except the core node on the initial binary image with white points, and marking the black points which are not matched with the initial binary image as mask points.
The method comprises the following steps of performing sliding window traversal on an initial binary image by using a target structure element, and marking a position corresponding to a central point of the target structure element on the initial binary image as a core node when all black points in the target structure element are completely matched with black points on the initial binary image, wherein the method comprises the following steps: matching the central point of the target structural element with a first point in the initial binary image, and traversing all points in the initial binary image by the target structural element in a sliding manner in sequence; calculating the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image once every sliding of the target structural element, and considering that the target structural element is matched with the initial binary image when the matching degree is equal to 1; and when the target structure element is matched with the initial binary image, marking the position on the initial binary image, which corresponds to the center point of the target structure element, as a core node.
The calculation formula of the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image is shown as the following formula:
Figure 763607DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 28235DEST_PATH_IMAGE002
representing the number of black points of the target structural element on the matching of the current position and the overlapping region in the binary image;
Figure 608253DEST_PATH_IMAGE003
representing the number of black points in the target structural element;
Figure 543235DEST_PATH_IMAGE004
and representing the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image. When the temperature is higher than the set temperature
Figure 448874DEST_PATH_IMAGE004
When the number of the target structure element is 1, the target structure element is matched with the initial binary image at the position, and at this time, the position corresponding to the central point of the target structure element on the initial binary image is marked as a core node. Traversing all points in binary image by using target structure element sliding windowN core nodes are obtained.
All core nodes in the initial binary image have been acquired in this step. And performing sliding window corrosion operation on the initial binary image by using the target structural element, only preserving core nodes in the initial binary image, and replacing all the other black points with white points. When the target structural element is adopted to perform expansion recovery on the corroded image, it can be found that part of black spots in the recovered initial binary image are lost and cannot be recovered, and data loss is caused by part of loss at the moment, so that in order to ensure the integrity of original data, a mask needs to be added to the original data, and the problem that the binary image cannot be recovered when the selected target structural element is adopted to perform sliding window corrosion operation on the binary image is solved.
Through analysis, the expansion recovery is carried out based on the core node when the target structural element is adopted for expansion recovery, namely when the core node is taken as a central point,
Figure 466378DEST_PATH_IMAGE006
the addition of black dots to the window of the large and small target structural elements, as shown in fig. 10, is a process of expansion recovery using the target structural elements. As shown in fig. 11, the whole process of encrypting and decrypting data is completed. The method comprises the steps that core node data are obtained after an initial binary image is subjected to target structure element corrosion operation, expansion operation is carried out after the core node and a target structure element act to obtain a decrypted binary image, at the moment, it is found that black points of gray parts in the decrypted image are lost, data identical to original data cannot be obtained after data are restored, and therefore the fact that encryption of the black points of the gray positions is damaged during encryption needs to be achieved, the positions of the points need to be obtained first, a mask needs to be produced, the points need not be processed during encryption, therefore, superposition operation needs to be carried out on the initial binary image according to the generated mask, namely, the positions corresponding to the mask points are marked, the structure element does not process when the mask points are covered by the initial binary image during encryption, and the mask points serve as white points to be processed.
The specific mask point acquisition process comprises the following steps: matching the central point of the target structural element with a first point in the initial binary image to carry out corrosion operation on the initial binary image; when each black point in the target structural element and the corresponding position on the initial binary image are all black points, namely the target structural element is matched with the initial binary image, and the points on the initial binary image corresponding to each black point in the target structural element are replaced by white points; when the corresponding positions of each black point in the target structural element and the initial binary image are not the black points, namely the target structural element is not matched with the initial binary image, the corrosion operation is not performed on the initial binary image; according to the step of carrying out corrosion operation on the first point in the initial binary image by using the target structural element, carrying out sliding window corrosion operation on each point in the initial binary image by using the target structural element to obtain a corroded binary image, marking the residual black points in the corroded binary image as mask points, namely replacing the black points matched with the interior of the target structural element on the initial binary image with white points, and marking the black points which are not matched with the interior of the initial binary image as mask points.
And S5, reconstructing by using the obtained core node and the mask point to obtain an encrypted binary image, and transmitting the encrypted binary image.
The transmission of the encrypted binary image includes: acquiring core node position data and mask point position data in the encrypted binary image; and transmitting the encrypted binary image, the core node position data in the encrypted binary image and the mask point position data in the encrypted binary image together.
The core node and the mask point are obtained through the step S4, the obtained core node and the mask point are used for reconstruction to obtain the encrypted binary image, and the encrypted binary image is transmitted.
And S6, after receiving the encrypted binary image, the receiving end decrypts the encrypted binary image by using the target structural element to obtain a decrypted binary image, and performs inverse transformation on the decrypted binary image to obtain a decrypted data sequence to be transmitted.
The method for decrypting the encrypted binary image by using the target structural element to obtain the decrypted binary image comprises the following steps: after receiving the encrypted binary image at the receiving end, acquiring the position data of the core node and the position data of the mask point at the same time; performing sliding window expansion operation on the position of each core node in the encrypted binary image by using the target structural element; and during each sliding window expansion operation, replacing the position corresponding to the target structural element in the encrypted binary image with the target structural element, and reserving the mask point during replacement to obtain the decrypted binary image.
The inverse transformation of the decrypted binary image to obtain a decrypted data sequence to be transmitted includes: replacing black points and white points in the decrypted binary image with numerical values to obtain a decrypted two-dimensional data matrix; splicing the decrypted two-dimensional data matrix according to the arrangement sequence to obtain decrypted Huffman encoded data; and carrying out inverse Huffman transform on the decrypted Huffman coded data to obtain a decrypted data sequence to be transmitted.
In summary, the present invention provides an artificial intelligence based communication transmission encryption method, which reconstructs data to obtain a two-dimensional data matrix, converts the two-dimensional data matrix into a binary image, and performs erosion and expansion operations on the binary image by using a randomly selected structural element as a key, thereby implementing encryption and decryption of data and ensuring security of data transmission.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (7)

1. A communication transmission encryption method based on artificial intelligence is characterized by comprising the following steps:
acquiring a data sequence to be transmitted, and performing Huffman coding on the data sequence to be transmitted to obtain Huffman coded data;
dividing the Huffman coded data into a plurality of character strings with equal length, arranging the character strings according to a dividing sequence to obtain an initial two-dimensional data matrix, and respectively representing different numerical values in the initial two-dimensional data matrix by using black points and white points to convert the numerical values into an initial binary image;
randomly selecting rectangular structural elements when morphological operation is carried out on the initial binary image, and recording the selected rectangular structural elements as target structural elements;
performing sliding window traversal on the initial binary image by using the target structure element, and marking the position, corresponding to the central point of the target structure element, on the initial binary image as a core node when all black points in the target structure element are completely matched with the black points on the initial binary image; replacing black points matched with the target structural elements except the core nodes on the initial binary image with white points, and marking the black points which are not matched with the initial binary image as mask points;
reconstructing by using the obtained core node and the mask point to obtain an encrypted binary image, and transmitting the encrypted binary image;
and after receiving the encrypted binary image, the receiving end decrypts the encrypted binary image by using the target structural element to obtain a decrypted binary image, and performs inverse transformation on the decrypted binary image to obtain a decrypted data sequence to be transmitted.
2. The artificial intelligence based communication transmission encryption method according to claim 1, wherein the transmitting the encrypted binary image comprises:
acquiring core node position data and mask point position data in the encrypted binary image;
and transmitting the encrypted binary image, the core node position data in the encrypted binary image and the mask point position data in the encrypted binary image together.
3. The artificial intelligence based communication transmission encryption method according to claim 2, wherein the decrypting the encrypted binary image with the target structural element to obtain the decrypted binary image includes:
after receiving the encrypted binary image at the receiving end, acquiring core node position data and mask point position data at the same time;
performing sliding window expansion operation on the position of each core node in the encrypted binary image by using the target structural element;
and during each sliding window expansion operation, replacing the position corresponding to the target structural element in the encrypted binary image with the target structural element, and reserving the mask point during replacement to obtain the decrypted binary image.
4. The artificial intelligence based communication transmission encryption method according to claim 3, wherein the inverse transformation of the decrypted binary image to obtain the decrypted data sequence to be transmitted includes:
replacing black points and white points in the decrypted binary image with numerical values to obtain a decrypted two-dimensional data matrix;
splicing the decrypted two-dimensional data matrix according to the arrangement sequence to obtain decrypted Huffman encoded data;
and carrying out Huffman inverse transformation on the decrypted Huffman coding data to obtain a decrypted data sequence to be transmitted.
5. The method according to claim 1, wherein the performing a sliding window traversal on the initial binary image by using the target structure element, and when all black points in the target structure element are completely matched with black points on the initial binary image, marking a position on the initial binary image corresponding to a center point of the target structure element as a core node comprises:
matching the center point of the target structural element with a first point in the initial binary image, and traversing all points in the initial binary image by the target structural element in a sliding mode in sequence;
calculating the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image once every sliding of the target structural element, and considering that the target structural element is matched with the initial binary image when the matching degree is equal to 1;
and when the target structure element is matched with the initial binary image, marking the position corresponding to the central point of the target structure element on the initial binary image as a core node.
6. The artificial intelligence based communication transmission encryption method according to claim 5, wherein the calculation formula of the matching degree of the black point position in the target structure element and the corresponding position on the initial binary image is as follows:
Figure 831151DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 721616DEST_PATH_IMAGE002
representing the number of black points of the target structural element on the matching of the current position and the overlapping region in the binary image;
Figure 79916DEST_PATH_IMAGE003
representing the number of black points in the target structural element;
Figure 473857DEST_PATH_IMAGE004
and representing the matching degree of the black point position in the target structural element and the corresponding position on the initial binary image.
7. The artificial intelligence based communication transmission encryption method according to claim 1, wherein the randomly selecting rectangular structural elements for morphological operations on the initial binary image comprises:
determining a rectangular structural element with the shape of the structural element being the minimum size when the initial binary image is subjected to morphological operation according to the characteristics of the initial binary image;
acquiring a connected domain formed by all black points in the initial binary image by adopting a region growing method;
calculating the discrete degree of the distribution of the black points in the binary image by utilizing the number of the black points contained in the maximum area covered by the rectangular structural element with the minimum size in the connected domain in a sliding manner;
and randomly selecting a rectangular structural element when the morphological operation is carried out on the initial binary image according to the discrete degree.
CN202211078209.0A 2022-09-05 2022-09-05 Communication transmission encryption method based on artificial intelligence Active CN115150818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211078209.0A CN115150818B (en) 2022-09-05 2022-09-05 Communication transmission encryption method based on artificial intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211078209.0A CN115150818B (en) 2022-09-05 2022-09-05 Communication transmission encryption method based on artificial intelligence

Publications (2)

Publication Number Publication Date
CN115150818A true CN115150818A (en) 2022-10-04
CN115150818B CN115150818B (en) 2022-11-04

Family

ID=83415317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211078209.0A Active CN115150818B (en) 2022-09-05 2022-09-05 Communication transmission encryption method based on artificial intelligence

Country Status (1)

Country Link
CN (1) CN115150818B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115580865A (en) * 2022-11-22 2023-01-06 南京智轩诚网络科技有限公司 Artificial intelligence-based 5G communication transmission encryption system and method
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN115879138A (en) * 2023-02-27 2023-03-31 北京厚方科技有限公司 Lightweight data encryption method for chip

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006333140A (en) * 2005-05-26 2006-12-07 Canon Inc Image processing apparatus and image processing method
EP2106119A2 (en) * 2008-03-25 2009-09-30 Fujitsu Limited Image encryption apparatus and image decryption apparatus
WO2010046104A2 (en) * 2008-10-23 2010-04-29 University Of Ulster An encryption method
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
WO2020029334A1 (en) * 2018-08-08 2020-02-13 山东科技大学 Visual encryption method for grayscale image
WO2021066163A1 (en) * 2019-10-04 2021-04-08 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Three-dimensional data encoding method, three-dimensional data decoding method, three-dimensional data encoding device, and three-dimensional data decoding device
CN114863352A (en) * 2022-07-07 2022-08-05 光谷技术有限公司 Personnel group behavior monitoring method based on video analysis

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006333140A (en) * 2005-05-26 2006-12-07 Canon Inc Image processing apparatus and image processing method
EP2106119A2 (en) * 2008-03-25 2009-09-30 Fujitsu Limited Image encryption apparatus and image decryption apparatus
WO2010046104A2 (en) * 2008-10-23 2010-04-29 University Of Ulster An encryption method
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
WO2020029334A1 (en) * 2018-08-08 2020-02-13 山东科技大学 Visual encryption method for grayscale image
WO2021066163A1 (en) * 2019-10-04 2021-04-08 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Three-dimensional data encoding method, three-dimensional data decoding method, three-dimensional data encoding device, and three-dimensional data decoding device
CN114863352A (en) * 2022-07-07 2022-08-05 光谷技术有限公司 Personnel group behavior monitoring method based on video analysis

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115580865A (en) * 2022-11-22 2023-01-06 南京智轩诚网络科技有限公司 Artificial intelligence-based 5G communication transmission encryption system and method
CN115580865B (en) * 2022-11-22 2023-03-10 南京智轩诚网络科技有限公司 Artificial intelligence-based 5G communication transmission encryption system and method
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN115879138A (en) * 2023-02-27 2023-03-31 北京厚方科技有限公司 Lightweight data encryption method for chip
CN115879138B (en) * 2023-02-27 2023-06-27 北京厚方科技有限公司 Lightweight data encryption method for chip

Also Published As

Publication number Publication date
CN115150818B (en) 2022-11-04

Similar Documents

Publication Publication Date Title
CN115150818B (en) Communication transmission encryption method based on artificial intelligence
CN112202984B (en) Ciphertext domain reversible information hiding method based on error correction redundancy
CN116032474B (en) Safety protection system based on big data computer network
CN113194213B (en) PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN115694784B (en) Data security storage method
CN116471007B (en) Network information encryption transmission method based on cloud platform
CN115865431A (en) Network security sharing method for private data
CN113852822A (en) Encrypted domain image steganography method and system based on Huffman coding
CN113114869A (en) Ciphertext domain high-capacity image reversible data hiding method based on MSB prediction
Xu et al. Reversible data hiding with hierarchical block variable length coding for cloud security
CN117596346B (en) Cloud data encryption transmission method and device
Ren et al. Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering
Raghuvanshi et al. Investigation of piecewise linear chaotic map as a diffusion model for image encryption
CN114697671B (en) Building engineering quality management system
CN115103080B (en) Image encryption method and system based on DNA triploid variation
CN113079274B (en) Encryption image reversible information hiding method of adaptive parameter binary tree mark
Li et al. High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
CN114239779A (en) Data transmission method, transmission system, acquisition equipment and receiving equipment
Bartwal et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography.
Chavali et al. Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics
Krishna et al. Concealment of Data using RSA Cryptography and Steganography Techniques
CN116722991B (en) Data transmission system used in physical isolation environment
KR960006386A (en) Encryption and Decryption Method of Digital Information
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant