CN115442043A - Video data transmission method for boiler production monitoring - Google Patents

Video data transmission method for boiler production monitoring Download PDF

Info

Publication number
CN115442043A
CN115442043A CN202211381500.5A CN202211381500A CN115442043A CN 115442043 A CN115442043 A CN 115442043A CN 202211381500 A CN202211381500 A CN 202211381500A CN 115442043 A CN115442043 A CN 115442043A
Authority
CN
China
Prior art keywords
sequence
ciphertext
watermark
pixel point
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211381500.5A
Other languages
Chinese (zh)
Other versions
CN115442043B (en
Inventor
潘宇峰
罗晖
强逸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Luosheng Machinery Equipment Co ltd
Jiangsu Taihu Boiler Co Ltd
Original Assignee
Wuxi Luosheng Machinery Equipment Co ltd
Jiangsu Taihu Boiler Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Luosheng Machinery Equipment Co ltd, Jiangsu Taihu Boiler Co Ltd filed Critical Wuxi Luosheng Machinery Equipment Co ltd
Priority to CN202211381500.5A priority Critical patent/CN115442043B/en
Publication of CN115442043A publication Critical patent/CN115442043A/en
Application granted granted Critical
Publication of CN115442043B publication Critical patent/CN115442043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to the technical field of data transmission, in particular to a video data transmission method for boiler production monitoring, which comprises the following steps: acquiring a plaintext pixel point sequence, and constructing an initial encryption list and an encryption list updating sequence; taking the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list as the ciphertext of each pixel point, and dynamically updating the encryption list according to the encryption list updating sequence and the ciphertext of each pixel point; and embedding a watermark in each ciphertext by using a preset watermark sequence to obtain a second ciphertext sequence, and further obtaining a ciphertext image and a supplementary ciphertext. The encryption list and the encryption list updating sequence constructed by the invention have large key space and can resist brute force attack. Meanwhile, the invention has very good avalanche effect and key sensitivity and can resist statistical analysis attack. The invention can carry out tamper-proof verification according to the embedded watermark, and has higher safety.

Description

Video data transmission method for boiler production monitoring
Technical Field
The invention relates to the technical field of image transmission, in particular to a video data transmission method for boiler production monitoring.
Background
The boiler is an energy converter, which is a device for heating working medium water or other fluids to certain parameters by using heat energy released by fuel combustion or other heat energy.
In the process of producing the boiler, each production link of the boiler needs to be monitored so as to prevent or discover the production defects of the boiler in time. The boiler production monitoring video data need to be transmitted to a boiler production monitoring server so that the production monitoring server can identify problems in the production process. Meanwhile, the boiler production monitoring video data need to be transmitted to a storage server for filing and storage, so that boiler production can be copied according to historical boiler production monitoring video data.
Because the boiler production monitoring video comprises the processes of all production links of the boiler and relates to commercial confidentiality, the boiler production monitoring video needs to be encrypted during transmission and storage, and poor competition caused by process leakage is prevented. Meanwhile, the monitoring video of boiler production needs to be subjected to tamper-proof verification in transmission and storage, so that the boiler production line is prevented from being damaged artificially, and legal sanctions are avoided by utilizing the tampered monitoring image.
The existing encryption method, such as a symmetric encryption algorithm DES, has low key complexity and is difficult to resist statistical analysis attack. If the symmetric encryption algorithm AES method is a block encryption algorithm, the same encryption result is obtained for the same block, and brute force attack is difficult to resist. For example, the asymmetric encryption algorithm RSA has high safety, but has low encryption and decryption speed, is suitable for encrypting a small amount of data and is not suitable for encrypting images.
Disclosure of Invention
The invention provides a video data transmission method for boiler production monitoring, which aims to solve the existing problems.
The invention discloses a video data transmission method for boiler production monitoring, which adopts the following technical scheme:
one embodiment of the invention provides a video data transmission method for boiler production monitoring, which comprises the following steps:
acquiring a plaintext pixel point sequence; constructing an initial encryption list; acquiring an encryption list updating sequence according to the length of the plaintext pixel point sequence; taking each pixel point in the plaintext pixel point sequence as a pixel point to be encrypted;
according to the encryption list, each pixel point to be encrypted is sequentially encrypted, and the method comprises the following steps: acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element; taking the index of the first element in the encryption list as the ciphertext of the pixel point to be encrypted; acquiring the value of an element at the corresponding position of a pixel point to be encrypted in an encryption list updating sequence, taking the value as an updating position, and moving an index in an encryption list as the updating position in the first element in the encryption list to update the encryption list;
the ciphertext of all the pixel points to be encrypted is combined into a first ciphertext sequence; setting a binary sequence with a fixed length as a watermark sequence, and constructing an empty watermark digit sequence;
and sequentially carrying out watermark embedding operation on each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the watermark embedding operation comprises the following steps: converting the ciphertext into a binary number, and when the digit of the binary number is 8, taking the ciphertext as a second ciphertext; when the bit number of the binary number is not 8, acquiring the watermark bit number of the ciphertext according to the length of the binary number; acquiring front watermark digit number elements in the watermark sequence as watermarks of the ciphertext, converting the obtained result into a decimal number before adding the watermarks of the ciphertext to the binary number to serve as a second ciphertext; deleting the front watermark digit number elements in the watermark sequence to realize the update of the watermark sequence; adding the watermark bit number to the end of the watermark bit number sequence;
forming a second ciphertext sequence by using all the second ciphertexts; acquiring a ciphertext image according to the second ciphertext sequence; acquiring a supplementary ciphertext according to the watermark digit sequence; and transmitting the ciphertext image and the supplementary ciphertext.
Preferably, the constructing an initial encryption list includes:
randomly ordering all integers in the range of [0,255], and using the ordering result as an initial encryption list.
Preferably, the obtaining of the encryption list updating sequence according to the length of the plaintext pixel point sequence includes:
taking the length of the plaintext pixel point sequence as a first length; and acquiring a chaotic sequence with the length of the first length by using a chaotic mapping method, multiplying each element in the chaotic sequence by 127 and rounding downwards to obtain an encryption list updating sequence.
Preferably, the obtaining of the watermark bit number of the ciphertext according to the length of the binary number includes:
and subtracting the length of the binary number by 8 to obtain the watermark bit number of the ciphertext.
Preferably, the obtaining of the supplementary ciphertext according to the watermark bit number sequence includes:
and encrypting the watermark digit sequence by using an asymmetric encryption algorithm to obtain a supplementary ciphertext.
The technical scheme of the invention has the beneficial effects that: the encryption list and the encryption list updating sequence constructed by the method have large key space and can resist brute force cracking attack; the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list is used as the ciphertext of each pixel point, and the encryption list is dynamically updated according to the encryption list updating sequence and the ciphertext of each pixel point, so that the different encryption results of the pixel points with the same gray value are ensured, the relationship among the pixel points in the image is damaged, the ciphertext is more complex, and the statistical analysis attack can be resisted; meanwhile, the encrypted list and the ciphertext of the next pixel point have strong relevance with the ciphertext of the previous pixel point, if the gray value of one pixel point in the image is changed, the encrypted list can be updated differently, the subsequent pixel point encrypted results are further different, and the excellent avalanche effect is achieved; if a value in the initial encryption list is changed or a value in the encryption list updating sequence is changed, the encryption lists can be updated differently, so that the encryption results of the pixel points are different, and the key sensitivity is very good. The avalanche effect and the key sensitivity enable the ciphertext image to no longer have the statistical rule of the plaintext image, and can resist the statistical analysis attack; the invention utilizes the preset watermark sequence to embed the watermark in each ciphertext to further obtain the ciphertext image, changes the content of the ciphertext, further increases the complexity of the ciphertext image, can perform tamper-proof verification according to the embedded watermark, and has higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of the steps of a video data transmission method for boiler production monitoring of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of the video data transmission method for boiler production monitoring according to the present invention, its specific implementation, structure, features and effects will be given in conjunction with the accompanying drawings and the preferred embodiments. In the following description, different "one embodiment" or "another embodiment" refers to not necessarily the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following describes a specific scheme of the video data transmission method for boiler production monitoring provided by the invention in detail with reference to the accompanying drawings.
Referring to fig. 1, a flow chart of steps of a video data transmission method for boiler production monitoring according to an embodiment of the present invention is shown, the method includes the following steps:
s101, collecting a boiler production monitoring video image to obtain a plaintext pixel point sequence.
The monitoring video of the boiler production is shot through the camera erected in each production area of the boiler. And acquiring an image of the boiler production monitoring video at each moment as a plaintext image.
And unfolding all pixel points in the plaintext image into a one-dimensional sequence to obtain a plaintext pixel point sequence.
And S102, setting an initial encryption list and acquiring an encryption list updating sequence.
It should be noted that, the present invention needs to construct an initial encryption list as the initial key dictionary in the encryption process, so that the gray level value of each pixel point can be encrypted into another result according to the encryption list in the following, and therefore, the initial encryption list needs to contain all the gray level values, and the range of the gray level values is [0,255].
In this embodiment, all integers in the range of [0,255] are randomly ordered to obtain a sequence with a length of 256, and the sequence is used as an initial encryption list. Randomly ordering all integers in the range of [0,255], for a total of 256! And (4) possibility. Therefore, the complexity of the initial encryption list is large, the initial encryption list is not easy to guess, and brute force attack can be resisted.
It should be noted that this embodiment is divided into two encryptions, where the first encryption is to encrypt each pixel point in a plaintext pixel point sequence to obtain a first ciphertext sequence, and the second encryption is to embed a watermark in each element of the first ciphertext sequence, so as to perform ciphertext tamper-proof verification. In order to make the encryption result more complex, destroy the similarity between pixel points and the statistical rule of the plaintext pixel point sequence, the encryption list needs to be dynamically updated in the first encryption process. Therefore, an encryption list updating sequence needs to be constructed, so that the encryption list is dynamically updated according to the list updating sequence and the encryption result of each pixel point in the first encryption process, and the complexity of the encryption result is increased. In the process of dynamically updating the encryption list, the positions of the elements need to be adjusted according to the indexes of the elements in the encryption list, and in order to embed more watermarks in the second encryption, the positions after the adjustment of the elements are limited to be positioned in the first 128 positions of the encryption list, so that the size of each element in the update sequence of the encryption list is in the range of [0,127 ].
In this embodiment, the length of the plaintext pixel point sequence is obtained as the first length. And obtaining a chaos sequence with the length of the first length by a chaos mapping method through a secret key agreed in advance by the encryption terminal and the decryption terminal, multiplying each element in the chaos sequence by 127 and rounding down to obtain an encryption list updating sequence. The length of the encryption list update sequence is a first length, and the size of each element in the encryption list update sequence is in the range of [0,127 ].
Thus, an initial encryption list and an encryption list update sequence are obtained.
S103, encrypting the plaintext pixel point sequence for the first time according to the encryption list to obtain a first ciphertext sequence.
Each pixel point in the plaintext pixel point sequence is sequentially acquired as a pixel point to be encrypted, each pixel point to be encrypted is sequentially encrypted according to an encryption list, and the specific process is as follows:
and acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element. And acquiring the index of the first element in the encryption list as the ciphertext of the pixel point to be encrypted. And acquiring the value of the element at the corresponding position of the pixel point to be encrypted in the encryption list updating sequence as an updating position, and moving the index in the first element in the encryption list to the updating position to obtain a new encryption list.
Assuming that the gray value of the pixel point to be encrypted is 10, the encryption list is [1,9,10,34,6,41], the update position is 4, the first element is 10, the index of the first element is 2, the ciphertext of the pixel point to be encrypted is 2 at this time, the first element 10 in the encryption list is moved to the position of the index of 4 in the encryption list, and then the new encryption list is [1,9,34,10,6,41] is obtained at this time.
And encrypting the next pixel point to be encrypted according to the new encryption list, and repeating the operations until all the ciphertext of the pixel points to be encrypted is obtained. And forming the ciphertext of all the pixel points to be encrypted into a first ciphertext sequence.
Thus, the first encryption is completed, and the first ciphertext sequence is obtained.
And S104, encrypting the first ciphertext sequence for the second time to obtain a ciphertext image and a supplementary ciphertext.
It should be noted that, in order to prevent the boiler production monitoring video image from being tampered in the transmission process, a watermark may be added to the first ciphertext sequence, so that whether the boiler production monitoring video image is tampered in the transmission process is verified according to the watermark in the following. And each element in the first ciphertext sequence is a number in the range of 0-255, and the number of bits for converting the first ciphertext sequence into a binary number is 1 bit to 8 bits. The watermark embedding can be carried out on the binary number with less than 8 bits, so that the number of the bits reaches 8, and the ciphertext image is obtained.
In this embodiment, a watermark sequence is first obtained, a binary sequence with a fixed length is set as the watermark sequence, where an implementer of the fixed length can set the watermark sequence according to actual conditions, and the watermark sequence is a binary sequence with a length as long as possible, and is agreed in advance by both the encryption side and the decryption side.
Secondly, an empty watermark bit number sequence is constructed. And sequentially embedding a watermark into each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the specific process comprises the following steps:
1. converting the cipher text into binary number to obtain the length of the binary number
Figure 4844DEST_PATH_IMAGE002
2. When the number of bits of the binary number is
Figure 846898DEST_PATH_IMAGE003
And then, the watermark is not required to be embedded, the watermark bit number of the ciphertext is 0, and the ciphertext is taken as a second ciphertext.
3. And when the digit of the binary number is not 8, the watermark needs to be embedded, the digit D =8-S of the binary number in which the watermark needs to be embedded is obtained, the first D elements in the watermark sequence are obtained and added to the binary number, the obtained result is converted into a decimal number and is used as a second ciphertext. The first D elements of the watermark sequence are deleted from the watermark sequence. The watermark bit number of the ciphertext is D.
4. And adding the watermark bit number of the ciphertext to the end of the watermark bit number sequence.
And repeating the steps until all the ciphertexts in the first cipher text sequence are traversed.
And forming all the second ciphertexts into a second cipher text sequence. And filling each second ciphertext in the second ciphertext sequence into the image according to the sequence expanded by all the pixel points in the plaintext image in the step S101 to obtain a ciphertext image.
It should be noted that, the existing asymmetric encryption algorithm is high in security, but is low in encryption and decryption speed, and is suitable for encryption of a small amount of data. Asymmetric encryption algorithms are therefore not suitable for encrypting plaintext images. But the value of each element in the watermark bit number sequence is in the range of [0,8], and after conversion into binary numbers, the length of each binary number is only 3 bits. The amount of data is small relative to the plaintext image data. The watermark bit sequence may thus be encrypted using an asymmetric encryption algorithm.
In this embodiment, the watermark bit number sequence is encrypted by using an asymmetric encryption algorithm to obtain a complementary ciphertext. Asymmetric encryption algorithms include, but are not limited to, RSA encryption algorithms, ECC encryption algorithms.
And S105, carrying out transmission decryption and tamper-proof verification on the ciphertext image and the supplementary ciphertext.
The encryption terminal transmits the ciphertext image and the supplementary ciphertext to the decryption terminal. The decryption end decrypts the ciphertext image and the complementary ciphertext and verifies the ciphertext in a tamper-proof manner, and specifically comprises the following steps:
and decrypting the supplementary ciphertext by using an asymmetric encryption algorithm to obtain a watermark bit number sequence.
And (5) expanding the gray values of all pixel points in the ciphertext image into a one-dimensional sequence to obtain a second ciphertext sequence. Each element in the watermark bit number sequence corresponds to the bit number of each second ciphertext embedded watermark in the second ciphertext sequence.
Embedding watermark according to each second ciphertext in second ciphertext sequenceAnd sequentially extracting the watermark of each second ciphertext in the second ciphertext sequence to obtain the first ciphertext. The method specifically comprises the following steps: converting the second cipher text into binary number, and embedding the second cipher text into the watermark
Figure 540310DEST_PATH_IMAGE004
The watermark length as the second cipher text is obtained before the binary number is obtained
Figure 416999DEST_PATH_IMAGE005
The bits serve as a watermark for the second ciphertext. And F =8-N bits after the binary number is obtained and converted into a decimal number as a first ciphertext.
And splicing the watermarks of all the second ciphertexts in the second cipher text sequence to obtain an actual embedded watermark sequence. All the first ciphertexts constitute a first cipher text sequence.
Performing tamper-proof verification according to the actual embedded watermark sequence, specifically comprising:
the length M of the actual embedded watermark sequence is obtained. And acquiring the first M elements in the watermark sequence prestored by the decryption end as a first watermark sequence. And comparing the difference between the actual embedded watermark sequence and the first watermark sequence, and if the actual embedded watermark sequence is inconsistent with the first watermark sequence, tampering the ciphertext image in the transmission process, wherein the ciphertext image is not credible at the moment, and the plaintext image decrypted according to the ciphertext image is not credible. If the actual embedded watermark sequence is consistent with the first watermark sequence, the ciphertext image is not tampered in the transmission process, the ciphertext image is credible, and the plaintext image decrypted according to the ciphertext image is also credible.
If the ciphertext image is not tampered in the transmission process, further decrypting the first ciphertext sequence:
the decryption side pre-stores an initial encryption list. The encryption list update sequence is acquired in the method in step S102. Sequentially acquiring each element in the first ciphertext sequence as an element to be decrypted, and sequentially decrypting each element to be decrypted according to the encryption list, wherein the specific process comprises the following steps:
and acquiring the value of the element to be decrypted in the index in the encryption list as the plaintext of the element to be decrypted. And acquiring the value of the element to be decrypted at the corresponding position in the updating sequence of the encryption list as an updating position. And moving the value of the element to be decrypted in the encryption list with the index to the position of the encryption list with the index as the updating position to obtain a new encryption list.
And decrypting the next element to be decrypted according to the new encryption list, and repeating the operations until the plaintext of all the elements to be decrypted is obtained. And (4) composing the plain texts of all elements to be decrypted into a plain text pixel point sequence. And filling the plaintext pixel point sequence into the image to obtain a plaintext image. The plaintext image is the boiler production monitoring video image.
Through the steps, the encryption transmission, decryption and tamper-proof verification of the monitoring video images produced by the boiler are completed.
The encryption list and the encryption list updating sequence constructed by the embodiment of the invention have large key space and can resist brute force cracking attack; the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list is used as the ciphertext of each pixel point, and the encryption list is dynamically updated according to the encryption list updating sequence and the ciphertext of each pixel point, so that the different encryption results of the pixel points with the same gray value are ensured, the relationship among the pixel points in the image is damaged, the ciphertext is more complex, and the statistical analysis attack can be resisted; meanwhile, the encrypted list and the ciphertext of the next pixel point have strong relevance with the ciphertext of the previous pixel point, if the gray value of one pixel point in the image is changed, the encrypted list can be updated differently, the subsequent pixel point encrypted results are further different, and the excellent avalanche effect is achieved; if a value in the initial encryption list is changed or a value in the encryption list updating sequence is changed, the encryption lists can be updated differently, so that the encryption results of the pixel points are different, and the key sensitivity is very good. The avalanche effect and the key sensitivity enable the ciphertext image to no longer have the statistical rule of the plaintext image, and can resist the statistical analysis attack; the invention utilizes the preset watermark sequence to embed the watermark in each ciphertext to further obtain the ciphertext image, changes the content of the ciphertext, further increases the complexity of the ciphertext image, can perform tamper-proof verification according to the embedded watermark, and has higher safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (5)

1. Video data transmission method for boiler production monitoring, characterized in that it comprises the following steps:
acquiring a plaintext pixel point sequence; constructing an initial encryption list; acquiring an encryption list updating sequence according to the length of the plaintext pixel point sequence; taking each pixel point in the plaintext pixel point sequence as a pixel point to be encrypted;
according to the encryption list, each pixel point to be encrypted is sequentially encrypted, and the method comprises the following steps: acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element; taking the index of the first element in the encryption list as a ciphertext of the pixel point to be encrypted; acquiring the value of an element at the corresponding position of a pixel point to be encrypted in an encryption list updating sequence, taking the value as an updating position, and moving an index in an encryption list as the updating position in the first element in the encryption list to update the encryption list;
the ciphertext of all the pixel points to be encrypted is combined into a first ciphertext sequence; setting a binary sequence with a fixed length as a watermark sequence, and constructing an empty watermark digit sequence;
and sequentially carrying out watermark embedding operation on each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the watermark embedding operation comprises the following steps: converting the ciphertext into a binary number, and when the digit of the binary number is 8, taking the ciphertext as a second ciphertext; when the digit of the binary number is not 8, acquiring the watermark digit of the ciphertext according to the length of the binary number; acquiring the front watermark digit number elements in the watermark sequence as the watermark of the ciphertext, adding the watermark of the ciphertext to the binary number, and converting the obtained result into a decimal number as a second ciphertext;
deleting the front watermark digit number elements in the watermark sequence to realize the update of the watermark sequence; adding the watermark bit number to the end of the watermark bit number sequence;
forming a second ciphertext sequence by all the second ciphertexts; acquiring a ciphertext image according to the second ciphertext sequence; acquiring a supplementary ciphertext according to the watermark digit sequence; and transmitting the ciphertext image and the supplementary ciphertext.
2. The method of claim 1, wherein said constructing an initial encrypted list comprises:
randomly ordering all integers in the range of [0,255], and using the ordering result as an initial encryption list.
3. The method of claim 1, wherein said obtaining an encrypted list update sequence based on the length of a sequence of plaintext pixel points comprises:
taking the length of the plaintext pixel point sequence as a first length; and acquiring a chaotic sequence with the length of the first length by using a chaotic mapping method, multiplying each element in the chaotic sequence by 127 and rounding downwards to obtain an encryption list updating sequence.
4. The video data transmission method for boiler production monitoring according to claim 1, wherein said obtaining the watermark bit number of the ciphertext according to the length of the binary number comprises:
and subtracting the length of the binary number by using 8 to obtain the watermark digit of the ciphertext.
5. The method of claim 1, wherein the obtaining the supplemental ciphertext from the watermark bit number sequence comprises:
and encrypting the watermark digit sequence by using an asymmetric encryption algorithm to obtain a supplementary ciphertext.
CN202211381500.5A 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring Active CN115442043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211381500.5A CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211381500.5A CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Publications (2)

Publication Number Publication Date
CN115442043A true CN115442043A (en) 2022-12-06
CN115442043B CN115442043B (en) 2023-01-31

Family

ID=84252940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211381500.5A Active CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Country Status (1)

Country Link
CN (1) CN115442043B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115859341A (en) * 2023-02-27 2023-03-28 山东水浒文化传媒有限公司 Online file intelligent reading and amending system
CN116204916A (en) * 2022-12-30 2023-06-02 杭州慧康物联网科技有限公司 Database intelligent management system based on medical big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014266A (en) * 2010-12-01 2011-04-13 华中科技大学 Digital watermarking-based high-definition video encrypted transmitting method and system
CN108366181A (en) * 2018-01-23 2018-08-03 西南财经大学 A kind of image encryption method based on hyperchaotic system and multistage scramble
US20220131683A1 (en) * 2020-10-28 2022-04-28 Markany Inc. Text watermarking method and apparatus for hiding information into text documents
CN115206496A (en) * 2022-07-26 2022-10-18 河南天一智能信息有限公司 Real-time transmission method of cardiovascular detection data
CN115277978A (en) * 2022-09-26 2022-11-01 南通德辰智能科技有限公司 Image information security management method based on state coding table

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014266A (en) * 2010-12-01 2011-04-13 华中科技大学 Digital watermarking-based high-definition video encrypted transmitting method and system
CN108366181A (en) * 2018-01-23 2018-08-03 西南财经大学 A kind of image encryption method based on hyperchaotic system and multistage scramble
US20220131683A1 (en) * 2020-10-28 2022-04-28 Markany Inc. Text watermarking method and apparatus for hiding information into text documents
CN115206496A (en) * 2022-07-26 2022-10-18 河南天一智能信息有限公司 Real-time transmission method of cardiovascular detection data
CN115277978A (en) * 2022-09-26 2022-11-01 南通德辰智能科技有限公司 Image information security management method based on state coding table

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谢国波等: "基于像素置乱和比特替换的混沌图像加密算法", 《微电子学与计算机》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116204916A (en) * 2022-12-30 2023-06-02 杭州慧康物联网科技有限公司 Database intelligent management system based on medical big data
CN116204916B (en) * 2022-12-30 2023-07-21 杭州慧康物联网科技有限公司 Database intelligent management system based on medical big data
CN115859341A (en) * 2023-02-27 2023-03-28 山东水浒文化传媒有限公司 Online file intelligent reading and amending system

Also Published As

Publication number Publication date
CN115442043B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN115442043B (en) Video data transmission method for boiler production monitoring
CN108023724B (en) Data transmission method and device
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN113824728B (en) Network communication method and system based on data encryption
CN108599934B (en) Verifiable security and confidentiality enhancement method for quantum key distribution
US11057205B2 (en) Seed key expansion method and its uses
US20070189518A1 (en) 3-D quaternion quantum fractal encryption
CN112597519A (en) Non-key decryption method based on convolutional neural network in OFDM (orthogonal frequency division multiplexing) encryption system
CN104881838A (en) A meaningful non-augmented image storage and reconstruction method based on GF (23) (K, N)
CN115632880A (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN110166784A (en) A kind of adapting to image texture area steganographic algorithm based on block of pixels
CN108599922B (en) Novel method for generating integrity authentication code of message containing secret key
CN115719300A (en) Personnel information management method for big data
CN115834126A (en) Encryption transmission method for engineering electronic files
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
CN115423474A (en) Transaction processing method and device based on chaotic mapping
CN109450618B (en) MD 5-based encryption method and system
CN108616351B (en) Full-dynamic encryption and decryption method and encryption and decryption device
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
CN106357382A (en) Encryption method and system for network data transmission
CN102474413B (en) Private key compression
CN111639937A (en) Digital currency risk management and control method and system
CA3025502C (en) Seed key expansion method and its uses
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence
Walidaniy et al. Improvement of PSNR by Using Shannon-Fano Compression Technique in AES-LSB StegoCrypto

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant