CN115238290A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN115238290A
CN115238290A CN202210891066.9A CN202210891066A CN115238290A CN 115238290 A CN115238290 A CN 115238290A CN 202210891066 A CN202210891066 A CN 202210891066A CN 115238290 A CN115238290 A CN 115238290A
Authority
CN
China
Prior art keywords
data
equipment
image
encrypted
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210891066.9A
Other languages
Chinese (zh)
Inventor
洪宇坤
付昕
文国军
丁一斐
张浩瑀
黄雅男
田心茹
王子琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210891066.9A priority Critical patent/CN115238290A/en
Publication of CN115238290A publication Critical patent/CN115238290A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention provides a data processing method and device, which are applied to the field of big data or the field of finance. The method comprises the steps that target data are obtained by first equipment; the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data; the first equipment generates image data according to original data of a preset image and the encrypted data; and the first equipment sends the image data to the second equipment so that the second equipment analyzes the image data to obtain encrypted data, and decrypts the encrypted data to obtain target data. Therefore, the method carries out secondary encryption on the target data and carries out information transmission through the image data, so that the safety of the target data is greatly enhanced.

Description

Data processing method and device
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to a data processing method and device.
Background
With the advent of the data age, the problem of secure access to information resources has become increasingly prominent. The security awareness and the security requirements of users on information are higher and higher, and in order to ensure the information security, the encryption and decryption processing of the information becomes a key direction of attention in the field.
At present, sensitive information is often transmitted after being simply encrypted in a bank system, but certain potential safety hazards are caused.
Disclosure of Invention
In view of this, the present invention provides a data processing method and apparatus for transmitting information through image data to improve the security of target data.
In order to achieve the above purpose, the embodiment of the invention discloses the following technical scheme:
in a first aspect, the present invention provides a data processing method, including:
the method comprises the steps that target data are obtained by first equipment;
the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data;
the first equipment generates image data according to original data of a preset image and the encrypted data;
and the first equipment sends the image data to second equipment so that the second equipment analyzes the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
Optionally, the generating, by the first device, image data according to original data of a preset image and the encrypted data includes:
the first equipment converts the encrypted data into binary data to obtain binary data;
and replacing the pixel value included in the original data of the preset image by the binary data by the first equipment to obtain the image data.
Optionally, the pixel value included in the original data of the preset image is an eight-bit value, and the replacing, by the first device, the pixel value included in the original data of the preset image with the binary data includes:
the first device replaces the last four bits of pixel values included in the original data of the preset image with the binary data.
Optionally, the method further includes:
the first equipment processes the target data by utilizing a Hash algorithm to obtain a first Hash value;
the first device sends the first hash value to the second device, so that the second device processes the target data by using the hash algorithm to obtain a second hash value, and the target data is verified based on the first hash value and the second hash value.
Optionally, the preset encryption algorithm includes one of a data encryption standard DES, an advanced encryption standard AES, and an RSA encryption algorithm.
In a second aspect, the present invention provides another data processing method, including:
the method comprises the steps that second equipment receives image data sent by first equipment, wherein the image data are generated by the first equipment according to original data and encrypted data of a preset image, and the encrypted data are generated by the first equipment through encrypting target data according to a preset encryption algorithm;
the second equipment analyzes the image data to obtain the encrypted data;
and the second equipment decrypts the encrypted data to obtain the target data.
Optionally, the analyzing, by the second device, the image data to obtain the encrypted data includes:
the second equipment extracts pixel values included in the image data to obtain binary data;
and the second equipment converts the binary data to obtain the encrypted data.
Optionally, the second device extracts pixel values included in the image data to obtain binary data, including:
and the second equipment extracts the last four bits of the pixel value of each pixel point included in the image data to obtain the binary data.
Optionally, the method further includes:
the second device receives a first hash value sent by the first device, wherein the first hash value is obtained by processing the target data by the first device through a hash algorithm;
the second equipment processes the target data by utilizing the hash algorithm to obtain a second hash value;
the second device verifies the target data based on the first hash value and the second hash value.
Optionally, the preset encryption algorithm includes one of a data encryption standard DES, an advanced encryption standard AES, and an RSA encryption algorithm.
In a third aspect, the present invention provides a data processing apparatus, comprising: an acquisition unit configured to acquire target data;
the encryption unit is used for encrypting the target data according to a preset encryption algorithm to obtain encrypted data;
the generating unit is used for generating image data according to original data of a preset image and the encrypted data;
and the first sending unit is used for sending the image data to second equipment so that the second equipment analyzes the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
In a fourth aspect, the present invention provides another data processing apparatus comprising: a first receiving unit, configured to receive image data sent by a first device, where the image data is generated by the first device according to original data of a preset image and encrypted data, and the encrypted data is generated by the first device by encrypting target data according to a preset encryption algorithm;
the analysis unit is used for analyzing the image data to obtain the encrypted data;
and the decryption unit is used for decrypting the encrypted data to obtain the target data.
Therefore, according to the data processing method and device disclosed by the embodiment of the invention, the first equipment acquires the target data; the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data; the first equipment generates image data according to original data of a preset image and the encrypted data; and the first equipment sends the image data to the second equipment so that the second equipment analyzes the image data to obtain encrypted data, and decrypts the encrypted data to obtain target data. Therefore, the method carries out secondary encryption on the target data and carries out information transmission through the image data, thereby greatly enhancing the safety of the target data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data processing method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another data processing method provided by the embodiment of the invention;
FIG. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to facilitate understanding of the technical solutions provided by the present invention, the background art related to the present invention will be described below.
The inventor finds that sensitive information is often simply encrypted and then transmitted in the bank system at present, but the sensitive information causes certain potential safety hazard. For example, a hacker can find that meaningless information is transmitted on a channel all the time by monitoring the channel, and the hacker reasonably speculates that the information is encrypted, so that the information can be intercepted or damaged, and the encrypted information passing through a simple encryption algorithm is easy to be cracked reversely after being acquired, so that sensitive information is leaked, and the security of the sensitive information is seriously influenced.
Based on this, in the data processing method and apparatus provided by the embodiment of the present invention, the first device obtains the target data; the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data; the first equipment generates image data according to original data and encrypted data of a preset image; the first equipment sends the image data to the second equipment, so that the second equipment analyzes the image data to obtain encrypted data, and the encrypted data is decrypted to obtain target data. Therefore, the method carries out secondary encryption on the target data and carries out information transmission through the image data, so that the safety of the target data is greatly enhanced.
In order to facilitate understanding of the technical solutions provided by the present invention, a data processing method provided by the present invention will be described below with reference to the accompanying drawings. It should be noted that the data processing method provided by the invention can be used in the field of big data or the financial field. The foregoing is merely an example, and does not limit the application field of the data processing method provided by the present invention.
Referring to fig. 1, which is a schematic flowchart of a data processing method according to an embodiment of the present invention, as shown in fig. 1, the method includes S101-S104.
S101: the first device acquires target data.
In the embodiment of the invention, the first device acquires the target data. It will be appreciated that the target data is data that needs to be sent by the first device to the second device and is data that has a higher security requirement and needs to be transmitted encrypted.
As an example, the target data may be sensitive information of a bank, such as that each website or branch submits some important information to the head office server periodically. The target data may be total loan amount, present day/month loan amount, bad account rate, etc., and the present invention does not limit the specific content of the target data.
S102: and the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data.
After the target data is obtained, the first device may encrypt the target data according to a preset encryption algorithm to obtain encrypted data. It will be appreciated that the target data is initially encrypted such that the originally disclosed target data becomes the encrypted ciphertext.
As a possible implementation method, the preset Encryption algorithm includes one of Data Encryption Standard (DES), advanced Encryption Standard (AES), or RSA Encryption algorithm.
And S103, the first equipment generates image data according to the original data of the preset image and the encrypted data.
After obtaining the encrypted data, the first device further generates image data according to the original data and the encrypted data of the preset image. It is understood that the preset image may be a picture irrelevant to the target data to be transmitted, such as a landscape picture, an animal picture, a person picture, or the like. Image data is generated by presetting original data and encrypted data of an image. The target data may be hidden on the image data, and the target data may be transmitted by transmitting the image data.
As a possible implementation manner, the generating, by the first device, image data according to original data of a preset image and the encrypted data includes: the first equipment converts the encrypted data into binary data to obtain binary data; and replacing the pixel values included in the original data of the preset image by the binary data by the first equipment to obtain the image data.
It can be understood that an image is composed of pixel points, an image can be represented by a pixel value of each pixel point, and the pixel value of each pixel point can also be represented by a binary value.
The first device may first convert the encrypted data into a binary system, resulting in binary data, which is the encrypted data represented by the binary system. The image data with the hidden target data can be obtained by replacing the pixel values included in the original data in the preset image with the encrypted data and converting the encrypted data into binary data after binary system.
As a possible implementation manner, the original data of the preset image includes a pixel value that is an eight-bit value, and the replacing, by the first device, the pixel value included in the original data of the preset image with the binary data includes: the first device replaces the last four bits of pixel values included in the original data of the preset image with the binary data.
It will be appreciated that typically each pixel has a value between 0 and 255. 0-255 may be represented by eight bits of binary data, with the raw data of the pre-set image including pixel values of eight bits. And, of the eight-bit binary data, the values of the last four bits change little to the overall value. Replacing the last four bits of the pixel values included in the original data of the preset image with binary data can make the pixel values included in the original data change very little, so that the image has little difference in visual change. Hackers can be better prevented from finding that the image data is modified, thereby better protecting the security of the target data.
S104: and the first equipment sends the image data to second equipment so that the second equipment analyzes the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
In the embodiment of the invention, the first device sends the image data to the second device, so that the second device can analyze the image data after receiving the image data to obtain the encrypted data, and then decrypt the encrypted data to obtain the target data required by the second device.
The method comprises the steps that a first device obtains target data, and the first device encrypts the target data according to a preset encryption algorithm to obtain encrypted data; the first equipment generates image data according to original data and encrypted data of a preset image; the first equipment sends the image data to the second equipment, so that the second equipment analyzes the image data to obtain encrypted data, and the encrypted data is decrypted to obtain target data. Therefore, the method carries out secondary encryption on the target data and carries out information transmission through the image data, so that the safety of the target data is greatly enhanced.
As a possible implementation method, the data processing method provided by the present invention further includes the following steps:
the first equipment processes the target data by using a hash algorithm to obtain a first hash value; the first device sends the first hash value to the second device, so that the second device processes the target data by using the hash algorithm to obtain a second hash value, and the target data is verified based on the first hash value and the second hash value.
It will be appreciated that a hashing algorithm is the transformation of an input of arbitrary length by a hashing algorithm into a fixed length output, which is the hash value. In the embodiment of the present invention, the first device processes the target data by using a hash algorithm to obtain a first hash value, and sends the first hash value to the second device. The second device processes the target data obtained in S104 by using the same hash algorithm, so as to obtain a second hash value. Based on the first hash value and the second hash value, the target data can be verified. It can be understood that, if the first hash value is the same as the second hash value, it indicates that the target data has not been tampered. If the first hash value is different from the second hash value, it indicates that the target data has been tampered and is not trusted. By verifying the target data, the target data can be ensured to be not tampered, and the safety of the target data can be further improved.
An embodiment of the present invention further provides a data processing method, referring to fig. 2, which is a schematic flow chart of the data processing method provided in the embodiment of the present invention, and as shown in fig. 2, the method includes S201 to S203.
S201: the method comprises the steps that second equipment receives image data sent by first equipment, the image data are generated by the first equipment according to original data and encrypted data of a preset image, and the encrypted data are generated by the first equipment through encrypting target data according to a preset encryption algorithm.
In the embodiment of the present invention, the second device receives image data sent by the first device, where the image data is generated by the first device according to original data and encrypted data of a preset image, and the encrypted data is generated by encrypting target data by the first device according to a preset encryption algorithm.
As a possible implementation method, the preset encryption algorithm includes one of a data encryption standard DES, an advanced encryption standard AES, or an RSA encryption algorithm.
S202: and the second equipment analyzes the image data to obtain the encrypted data.
After receiving the image data, the second device analyzes the image data to obtain encrypted data.
As a possible implementation, the binary data may be obtained by extracting pixel values included in the image data, and the binary data may be converted to obtain the encrypted data. It is understood that the pixel values of the image data are represented by using binary, and the binary data can be obtained by extracting the pixel values included in the image data. The binary data is obtained by the first device converting the encrypted data. The binary data is converted in the second device to obtain encrypted data. The specific conversion method may be obtained according to a conversion manner of the first device for the encrypted data, for example, decimal data is generated after the first device encrypts the target data through a preset encryption algorithm. The conversion method is a method of converting binary data into decimal data, the above method of converting binary data is only an example, and the present invention is not limited to a specific method of converting binary data into encrypted data.
As a possible implementation manner, the second device extracts pixel values included in the image data to obtain binary data, including: and the second equipment extracts the last four bits of the pixel value of each pixel point in the image data to obtain the binary data.
It will be appreciated that the value of each pixel point is between 0 and 255. 0-255 may be represented by eight bits of binary data, with the raw data of the pre-set image including pixel values of eight bits. And, of the eight-bit binary data, the values of the last four bits change little to the overall value. The first device replaces the encrypted data for the last four bits of the pixel value of each pixel point in the original data of the image, which can make the pixel value included in the original data change little, so that the difference of the change in vision is small. Hackers can be better prevented from finding that the image data has been modified, thereby better protecting the security of the target data. Therefore, the second device can obtain the binary data after the encrypted data conversion by extracting the last four bits of the pixel value of each pixel point included in the image data.
S203: and the second equipment decrypts the encrypted data to obtain the target data.
It is understood that the encrypted data is obtained by the first device encrypting the target data according to a preset encryption algorithm. Therefore, after the second device acquires the encrypted data, the second device can decrypt the encrypted data through the same preset encryption algorithm, and the target data required by the second device can be acquired.
The method comprises the steps that image data sent by first equipment are received by the second equipment, the image data are generated by the first equipment according to original data and encrypted data of a preset image, and the encrypted data are generated by the first equipment through encryption on target data according to a preset encryption algorithm; the second equipment analyzes the image data to obtain encrypted data; and the second equipment decrypts the encrypted data to obtain the target data. By the method, the second device can acquire the required target data by receiving the image data, and hide the target data in the image data for transmission, so that the security of the target data is greatly enhanced.
As a possible implementation method, the data processing method provided by the present invention further includes the following steps:
the second equipment receives a first hash value sent by the first equipment, wherein the first hash value is obtained by processing the target data by the first equipment by using a hash algorithm; the second equipment processes the target data by utilizing the hash algorithm to obtain a second hash value; the second device verifies the target data based on the first hash value and the second hash value.
It is understood that the second device receives the first hash value sent by the first device, and the first hash value is processed by the first device by using a hash algorithm. The first device processes the target data by using a hash algorithm to obtain a first hash value, and sends the first hash value to the second device. The second device processes the target data obtained in S203 by using the same hash algorithm, so as to obtain a second hash value. Based on the first hash value and the second hash value, the target data can be verified. It is understood that if the first hash value is the same as the second hash value, it indicates that the target data has not been tampered. If the first hash value is different from the second hash value, it indicates that the target data has been tampered and is not trusted. By verifying the target data, the target data can be ensured not to be tampered, and the safety of the target data is further improved.
In the following, a data processing apparatus according to an embodiment of the present invention is introduced, and the apparatus described below and the data processing method described above are referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention, where the apparatus includes an obtaining unit 301, an encrypting unit 302, a generating unit 303, and a first sending unit 304.
An acquiring unit 301 for acquiring target data.
An encrypting unit 302, configured to encrypt the target data according to a preset encryption algorithm to obtain encrypted data.
A generating unit 303, configured to generate image data according to original data of a preset image and the encrypted data.
A first sending unit 304, configured to send the image data to a second device, so that the second device parses the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
Encrypting the target data according to a preset encryption algorithm by acquiring the target data to obtain encrypted data; generating image data according to original data and encrypted data of a preset image; and sending the image data to the second equipment so that the second equipment analyzes the image data to obtain encrypted data, and decrypting the encrypted data to obtain target data. Therefore, the device carries out secondary encryption on the target data and carries out information transmission through the image data, so that the safety of the target data is greatly enhanced.
As a possible implementation manner, the encryption unit is specifically configured to convert the encrypted data into a binary system to obtain binary data; and replacing the pixel values included in the original data of the preset image with the binary data to obtain the image data.
As a possible implementation, the raw data of the preset image comprises pixel values of eight-bit values.
The encryption unit is configured to replace a pixel value included in original data of the preset image with the binary data to obtain the image data, and includes:
the encryption unit is configured to replace the last four bits of the pixel value included in the original data of the preset image with the binary data.
As a possible implementation manner, the apparatus further includes:
and the first hash processing unit is used for processing the target data by using a hash algorithm to obtain a first hash value.
And the second sending unit is used for sending the first hash value to the second equipment so as to enable the second equipment to process the target data by utilizing the hash algorithm to obtain a second hash value, and verifying the target data based on the first hash value and the second hash value.
As a possible implementation manner, the preset encryption algorithm includes one of a data encryption standard DES, an advanced encryption standard AES, or an RSA encryption algorithm.
The embodiment of the invention also provides another data processing device. Referring to fig. 4, fig. 4 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention, where the apparatus includes: a first receiving unit 401, a parsing unit 402 and a decryption unit 403.
A first receiving unit 401, configured to receive image data sent by a first device, where the image data is generated by the first device according to original data of a preset image and encrypted data, and the encrypted data is generated by the first device encrypting target data according to a preset encryption algorithm.
An analyzing unit 402, configured to analyze the image data to obtain the encrypted data.
A decryption unit 403, configured to decrypt the encrypted data to obtain the target data.
As a possible implementation manner, the parsing unit is specifically configured to extract pixel values included in the image data to obtain binary data; and converting the binary data to obtain the encrypted data.
As a possible implementation manner, the parsing unit is configured to extract pixel values included in the image data to obtain binary data, and includes:
the analysis unit is used for extracting the last four bits of the pixel value of each pixel point included in the image data to obtain the binary data.
As a possible implementation manner, the apparatus further includes:
a second receiving unit, configured to receive a first hash value sent by the first device, where the first hash value is obtained by processing the target data by using a hash algorithm by the first device.
And the second hash processing unit is used for processing the target data by utilizing the hash algorithm to obtain a second hash value.
A verification unit configured to verify the target data based on the first hash value and the second hash value.
As a possible implementation manner, the preset encryption algorithm includes one of a data encryption standard DES, an advanced encryption standard AES, or an RSA encryption algorithm.
The present invention also provides a device, which may include a memory and a processor, where the memory stores a computer program, and the processor may implement the steps provided in the foregoing embodiments when calling the computer program in the memory. Of course, the terminal may also include various network interfaces, power supplies, and the like.
It should be noted that, the terminal provided in the embodiment of the present invention has the technical effects as any one of the above embodiments, and details of the embodiment of the present invention are not described herein.
The present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed, implements the steps provided by the above embodiments. The storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that the computer-readable storage medium provided in the embodiment of the present invention has the technical effects of any one of the above embodiments, and details of the embodiment of the present invention are not repeated herein.
The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (10)

1. A method of data processing, the method comprising:
the method comprises the steps that first equipment obtains target data;
the first equipment encrypts the target data according to a preset encryption algorithm to obtain encrypted data;
the first equipment generates image data according to original data of a preset image and the encrypted data;
and the first equipment sends the image data to second equipment so that the second equipment analyzes the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
2. The method according to claim 1, wherein the first device generates image data from original data of a preset image and the encrypted data, and comprises:
the first equipment converts the encrypted data into binary data to obtain binary data;
and replacing the pixel values included in the original data of the preset image by the binary data by the first equipment to obtain the image data.
3. The method of claim 2, wherein the original data of the preset image comprises pixel values of eight-bit values, and wherein replacing the pixel values of the original data of the preset image with the binary data by the first device comprises:
the first device replaces the last four bits of the pixel values included in the original data of the preset image with the binary data.
4. The method of claim 1, further comprising:
the first equipment processes the target data by utilizing a Hash algorithm to obtain a first Hash value;
the first device sends the first hash value to the second device, so that the second device processes the target data by using the hash algorithm to obtain a second hash value, and the target data is verified based on the first hash value and the second hash value.
5. A method of data processing, the method comprising:
the method comprises the steps that second equipment receives image data sent by first equipment, wherein the image data are generated by the first equipment according to original data and encrypted data of a preset image, and the encrypted data are generated by the first equipment through encrypting target data according to a preset encryption algorithm;
the second equipment analyzes the image data to obtain the encrypted data;
and the second equipment decrypts the encrypted data to obtain the target data.
6. The method of claim 5, wherein the second device parsing the image data to obtain the encrypted data comprises:
the second equipment extracts pixel values included in the image data to obtain binary data;
and the second equipment converts the binary data to obtain the encrypted data.
7. The method of claim 6, wherein the second device extracts pixel values comprised by the image data to obtain binary data, comprising:
and the second equipment extracts the last four bits of the pixel value of each pixel point included in the image data to obtain the binary data.
8. The method of claim 5, further comprising:
the second equipment receives a first hash value sent by the first equipment, wherein the first hash value is obtained by processing the target data by the first equipment by using a hash algorithm;
the second equipment processes the target data by utilizing the hash algorithm to obtain a second hash value;
the second device verifies the target data based on the first hash value and the second hash value.
9. A data processing apparatus, characterized by comprising:
an acquisition unit configured to acquire target data;
the encryption unit is used for encrypting the target data according to a preset encryption algorithm to obtain encrypted data;
the generating unit is used for generating image data according to original data of a preset image and the encrypted data;
and the first sending unit is used for sending the image data to second equipment so that the second equipment analyzes the image data to obtain the encrypted data, and decrypts the encrypted data to obtain the target data.
10. A data processing apparatus, comprising:
the image processing device comprises a first receiving unit, a second receiving unit and a processing unit, wherein the first receiving unit is used for receiving image data sent by first equipment, the image data is generated by the first equipment according to original data and encrypted data of a preset image, and the encrypted data is generated by the first equipment through encrypting target data according to a preset encryption algorithm;
the analysis unit is used for analyzing the image data to obtain the encrypted data;
and the decryption unit is used for decrypting the encrypted data to obtain the target data.
CN202210891066.9A 2022-07-27 2022-07-27 Data processing method and device Pending CN115238290A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210891066.9A CN115238290A (en) 2022-07-27 2022-07-27 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210891066.9A CN115238290A (en) 2022-07-27 2022-07-27 Data processing method and device

Publications (1)

Publication Number Publication Date
CN115238290A true CN115238290A (en) 2022-10-25

Family

ID=83674763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210891066.9A Pending CN115238290A (en) 2022-07-27 2022-07-27 Data processing method and device

Country Status (1)

Country Link
CN (1) CN115238290A (en)

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
EP2835933B1 (en) Method, device and system for implementing media data processing
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN111131282B (en) Request encryption method and device, electronic equipment and storage medium
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
US20210160203A1 (en) System for disarming encrypted attachment files of e-mail and disarming method using same
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN113347143B (en) Identity verification method, device, equipment and storage medium
CN112272314B (en) Method, device, equipment and medium for safely transmitting video in video network
CN103731423A (en) Safe method for repeated data deleting
CN104038336A (en) Data encryption method based on 3DES
CN113515766A (en) File transmission method and device
CN109039997B (en) Secret key obtaining method, device and system
CN111416702B (en) Data transmission method, data transmission system and computer readable storage medium
CN111625844A (en) Survey data security encryption method and device, electronic equipment and storage medium
CN115238290A (en) Data processing method and device
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN115913571A (en) File encryption and decryption method and device, and digital copyright protection system
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN113079155B (en) File encryption processing method based on mixed password
CN110971581A (en) Encrypted data processing method and device
CN115002141A (en) File storage method and device based on block chain
CN113946862A (en) Data processing method, device and equipment and readable storage medium
CN112738560A (en) Video data transmission method, receiving method, server and client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination