CN115442043B - Video data transmission method for boiler production monitoring - Google Patents

Video data transmission method for boiler production monitoring Download PDF

Info

Publication number
CN115442043B
CN115442043B CN202211381500.5A CN202211381500A CN115442043B CN 115442043 B CN115442043 B CN 115442043B CN 202211381500 A CN202211381500 A CN 202211381500A CN 115442043 B CN115442043 B CN 115442043B
Authority
CN
China
Prior art keywords
sequence
ciphertext
watermark
pixel point
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211381500.5A
Other languages
Chinese (zh)
Other versions
CN115442043A (en
Inventor
潘宇峰
罗晖
强逸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Luosheng Machinery Equipment Co ltd
Jiangsu Taihu Boiler Co Ltd
Original Assignee
Wuxi Luosheng Machinery Equipment Co ltd
Jiangsu Taihu Boiler Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Luosheng Machinery Equipment Co ltd, Jiangsu Taihu Boiler Co Ltd filed Critical Wuxi Luosheng Machinery Equipment Co ltd
Priority to CN202211381500.5A priority Critical patent/CN115442043B/en
Publication of CN115442043A publication Critical patent/CN115442043A/en
Application granted granted Critical
Publication of CN115442043B publication Critical patent/CN115442043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to the technical field of data transmission, in particular to a video data transmission method for boiler production monitoring, which comprises the following steps: acquiring a plaintext pixel point sequence, and constructing an initial encryption list and an encryption list updating sequence; taking the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list as the ciphertext of each pixel point, and dynamically updating the encryption list according to the encryption list updating sequence and the ciphertext of each pixel point; and embedding a watermark in each ciphertext by using a preset watermark sequence to obtain a second ciphertext sequence, and further obtaining a ciphertext image and a supplementary ciphertext. The encryption list and the encryption list updating sequence constructed by the method have large key space and can resist brute force attack. Meanwhile, the invention has very good avalanche effect and key sensitivity, and can resist statistical analysis attack. The invention can carry out tamper-proof verification according to the embedded watermark, and has higher safety.

Description

Video data transmission method for boiler production monitoring
Technical Field
The invention relates to the technical field of image transmission, in particular to a video data transmission method for boiler production monitoring.
Background
The boiler is an energy converter, which is a device for heating working medium water or other fluids to certain parameters by using heat energy released by fuel combustion or other heat energy.
In the process of producing the boiler, each production link of the boiler needs to be monitored so as to prevent or discover the production defects of the boiler in time. The boiler production monitoring video data need to be transmitted to a boiler production monitoring server so that the production monitoring server can identify problems in the production process. Meanwhile, the boiler production monitoring video data need to be transmitted to a storage server for filing and storage, so that boiler production can be copied according to historical boiler production monitoring video data.
Because the boiler production monitoring video comprises the processes of all production links of the boiler and relates to commercial confidentiality, the boiler production monitoring video needs to be encrypted during transmission and storage, and poor competition caused by process leakage is prevented. Meanwhile, in the transmission and storage, the boiler production monitoring video needs to be subjected to tamper-proof verification, so that the boiler production line is prevented from being manually damaged, and legal sanctions are avoided by using a tampered monitoring image.
The existing encryption method, such as a symmetric encryption algorithm DES, has low key complexity and is difficult to resist statistical analysis attack. If the symmetric encryption algorithm AES method is a block encryption algorithm, the same encryption result is obtained for the same block, and brute force attack is difficult to resist. For example, the asymmetric encryption algorithm RSA has high safety, but has low encryption and decryption speed, is suitable for encrypting a small amount of data and is not suitable for encrypting images.
Disclosure of Invention
The invention provides a video data transmission method for boiler production monitoring, which aims to solve the existing problems.
The invention discloses a video data transmission method for boiler production monitoring, which adopts the following technical scheme:
one embodiment of the invention provides a video data transmission method for boiler production monitoring, which comprises the following steps:
acquiring a plaintext pixel point sequence; constructing an initial encryption list; acquiring an encryption list updating sequence according to the length of the plaintext pixel point sequence; taking each pixel point in the plaintext pixel point sequence as a pixel point to be encrypted;
according to the encryption list, each pixel point to be encrypted is sequentially encrypted, and the method comprises the following steps: acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element; taking the index of the first element in the encryption list as a ciphertext of the pixel point to be encrypted; acquiring the value of an element at a corresponding position of a pixel point to be encrypted in an encryption list updating sequence, taking the value as an updating position, and moving an index in an encryption list to the updating position by a first element in the encryption list to realize the updating of the encryption list;
the ciphertexts of all the pixel points to be ciphered form a first ciphertext sequence; setting a binary sequence with a fixed length as a watermark sequence, and constructing an empty watermark digit sequence;
and sequentially carrying out watermark embedding operation on each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the watermark embedding operation comprises the following steps: converting the ciphertext into a binary number, and when the digit of the binary number is 8, taking the ciphertext as a second ciphertext; when the bit number of the binary number is not 8, acquiring the watermark bit number of the ciphertext according to the length of the binary number; acquiring the front watermark digit number elements in the watermark sequence as the watermark of the ciphertext, adding the watermark of the ciphertext to the binary number, and converting the obtained result into a decimal number as a second ciphertext; deleting the front watermark digit number elements in the watermark sequence to realize the update of the watermark sequence; adding the watermark digit to the end of the watermark digit sequence;
forming a second ciphertext sequence by using all the second ciphertexts; acquiring a ciphertext image according to the second ciphertext sequence; acquiring a supplementary ciphertext according to the watermark digit sequence; and transmitting the ciphertext image and the supplementary ciphertext.
Preferably, the constructing an initial encryption list includes:
randomly ordering all integers in the range of [0,255], and using the ordering result as an initial encryption list.
Preferably, the obtaining the encrypted list updating sequence according to the length of the plaintext pixel point sequence comprises:
taking the length of the plaintext pixel point sequence as a first length; and acquiring a chaotic sequence with the length of the first length by using a chaotic mapping method, multiplying each element in the chaotic sequence by 127 and rounding downwards to obtain an encryption list updating sequence.
Preferably, the obtaining of the watermark bit number of the ciphertext according to the length of the binary number includes:
and subtracting the length of the binary number by using 8 to obtain the watermark digit of the ciphertext.
Preferably, the obtaining of the supplementary ciphertext according to the watermark bit number sequence includes:
and encrypting the watermark digit sequence by using an asymmetric encryption algorithm to obtain a supplementary ciphertext.
The technical scheme of the invention has the beneficial effects that: the encryption list and the encryption list updating sequence constructed by the method have large key space and can resist brute force cracking attack; the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list is used as the ciphertext of each pixel point, and the encryption list is dynamically updated according to the encryption list updating sequence and the ciphertext of each pixel point, so that the different encryption results of the pixel points with the same gray value are ensured, the relationship among the pixel points in the image is damaged, the ciphertext is more complex, and the statistical analysis attack can be resisted; meanwhile, the encrypted list and the ciphertext of the next pixel point have strong relevance with the ciphertext of the previous pixel point, if the gray value of one pixel point in the image is changed, the encrypted list is updated differently, the subsequent pixel point encryption results are further different, and the good avalanche effect is achieved; if one value in the initial encryption list is changed or one value in the updating sequence of the encryption list is changed, the encryption list is updated differently, the encryption results of the pixel points are further different, and the key sensitivity is very good. The avalanche effect and the key sensitivity enable the ciphertext image to no longer have the statistical rule of the plaintext image, and can resist the statistical analysis attack; the invention utilizes the preset watermark sequence to embed the watermark in each ciphertext to further obtain the ciphertext image, changes the content of the ciphertext, further increases the complexity of the ciphertext image, can perform tamper-proof verification according to the embedded watermark, and has higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of the steps of a video data transmission method for boiler production monitoring of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of the video data transmission method for boiler production monitoring according to the present invention, its specific implementation, structure, features and effects will be given in conjunction with the accompanying drawings and the preferred embodiments. In the following description, different "one embodiment" or "another embodiment" refers to not necessarily the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following describes a specific scheme of the video data transmission method for boiler production monitoring provided by the invention in detail with reference to the accompanying drawings.
Referring to fig. 1, a flow chart illustrating steps of a video data transmission method for boiler production monitoring according to an embodiment of the present invention is shown, the method comprising the following steps:
s101, collecting a boiler production monitoring video image to obtain a plaintext pixel point sequence.
The monitoring video of the boiler production is shot through the camera erected in each production area of the boiler. And acquiring an image of the boiler production monitoring video at each moment as a plaintext image.
And unfolding all pixel points in the plaintext image into a one-dimensional sequence to obtain a plaintext pixel point sequence.
And S102, setting an initial encryption list and acquiring an encryption list updating sequence.
It should be noted that, the present invention needs to construct an initial encryption list as the initial key dictionary in the encryption process, so that the gray level of each pixel point is encrypted into another result according to the encryption list in the following, and therefore, the initial encryption list needs to contain all the gray levels, and the range of the gray levels is [0,255].
In this embodiment, all integers in the range of [0,255] are randomly ordered to obtain a sequence with a length of 256, and the sequence is used as an initial encryption list. Randomly ordering all integers in the range of 0,255 for a total of 256! And (4) the possibility. Therefore, the complexity of the initial encryption list is large, the initial encryption list is not easy to guess, and brute force attack can be resisted.
It should be noted that this embodiment is divided into two encryptions, where the first encryption is to encrypt each pixel point in a plaintext pixel point sequence to obtain a first ciphertext sequence, and the second encryption is to embed a watermark in each element of the first ciphertext sequence, so as to perform ciphertext tamper-proof verification. In order to make the encryption result more complex, destroy the similarity between pixel points and the statistical rule of the plaintext pixel point sequence, the encryption list needs to be dynamically updated in the first encryption process. Therefore, an encryption list updating sequence needs to be constructed, so that the encryption list is dynamically updated according to the list updating sequence and the encryption result of each pixel point in the first encryption process, and the complexity of the encryption result is increased. In the process of dynamically updating the encryption list, the positions of the elements need to be adjusted according to the indexes of the elements in the encryption list, and in order to embed more watermarks in the second encryption, the positions after the adjustment of the elements are limited to be positioned in the first 128 positions of the encryption list, so that the size of each element in the update sequence of the encryption list is in the range of [0,127 ].
In this embodiment, the length of the plaintext pixel point sequence is obtained as the first length. And acquiring a chaotic sequence with the length of a first length by using a chaotic mapping method through keys agreed by an encryption terminal and a decryption terminal in advance, multiplying each element in the chaotic sequence by 127 and rounding down to obtain an encryption list updating sequence. The length of the encryption list update sequence is a first length, and the size of each element in the encryption list update sequence is in the range of [0,127 ].
Thus, an initial encryption list and an encryption list update sequence are obtained.
S103, encrypting the plaintext pixel point sequence for the first time according to the encryption list to obtain a first ciphertext sequence.
Each pixel point in the plaintext pixel point sequence is sequentially acquired as a pixel point to be encrypted, each pixel point to be encrypted is sequentially encrypted according to an encryption list, and the specific process is as follows:
and acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element. And acquiring the index of the first element in the encryption list as the ciphertext of the pixel point to be encrypted. And acquiring the value of the element at the corresponding position of the pixel point to be encrypted in the encryption list updating sequence as an updating position, and moving the index in the first element in the encryption list to the updating position to obtain a new encryption list.
Assuming that the gray value of the pixel point to be encrypted is 10, the encryption list is [1,9,10,34,6,41], the update position is 4, the first element is 10, the index of the first element is 2, the ciphertext of the pixel point to be encrypted is 2 at this time, the first element 10 in the encryption list is moved to the position of the index of 4 in the encryption list, and then the new encryption list is [1,9,34,6,10,41] is obtained at this time.
And encrypting the next pixel point to be encrypted according to the new encryption list, and repeating the operations until the ciphertext of all the pixel points to be encrypted is obtained. And forming the ciphertext of all the pixel points to be encrypted into a first ciphertext sequence.
Thus, the first encryption is completed, and the first ciphertext sequence is obtained.
And S104, carrying out secondary encryption on the first ciphertext sequence to obtain a ciphertext image and a supplementary ciphertext.
It should be noted that, in order to prevent the boiler production monitoring video image from being tampered in the transmission process, a watermark may be added to the first ciphertext sequence, so that whether the boiler production monitoring video image is tampered in the transmission process is verified according to the watermark in the following. And each element in the first ciphertext sequence is a number in the range of 0-255, and the number of bits for converting the first ciphertext sequence into a binary number is 1 bit to 8 bits. The watermark embedding can be carried out on binary numbers with less than 8 digits, so that the digits of the binary numbers reach 8, and a ciphertext image is obtained.
In this embodiment, a watermark sequence is first obtained, a binary sequence with a fixed length is set as the watermark sequence, where an implementer of the fixed length can set the watermark sequence according to actual conditions, and the watermark sequence is a binary sequence with a length as long as possible, and is agreed in advance by both the encryption side and the decryption side.
Secondly, an empty watermark bit number sequence is constructed. And sequentially embedding a watermark into each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the specific process comprises the following steps:
1. converting the cipher text into binary number to obtain the length of the binary number
Figure 800163DEST_PATH_IMAGE001
2. When the number of bits of the binary number is
Figure 668630DEST_PATH_IMAGE002
And then, the watermark is not required to be embedded, the watermark bit number of the ciphertext is 0, and the ciphertext is used as a second ciphertext.
3. And when the digit of the binary number is not 8, the watermark needs to be embedded, the digit D =8-S of the binary number needing to be embedded with the watermark is obtained, the first D elements in the watermark sequence are obtained and added to the binary number, the obtained result is converted into a decimal number and is used as a second ciphertext. The first D elements of the watermark sequence are deleted from the watermark sequence. The watermark bit number of the ciphertext is D.
4. And adding the watermark bit number of the ciphertext to the end of the watermark bit number sequence.
And repeating the steps until all the ciphertexts in the first cipher text sequence are traversed.
And forming all the second ciphertexts into a second cipher text sequence. And filling each second ciphertext in the second ciphertext sequence into the image according to the sequence expanded by all the pixel points in the plaintext image in the step S101 to obtain a ciphertext image.
It should be noted that, the existing asymmetric encryption algorithm is high in security, but is low in encryption and decryption speed, and is suitable for encryption of a small amount of data. Asymmetric encryption algorithms are therefore not suitable for encrypting plaintext images. But the value of each element in the watermark bit number sequence is in the range of [0,8], and after conversion into binary numbers, the length of each binary number is only 3 bits. The amount of data is small relative to the plaintext image data. The watermark bit number sequence can be encrypted using an asymmetric encryption algorithm.
In this embodiment, the watermark bit number sequence is encrypted by using an asymmetric encryption algorithm to obtain a complementary ciphertext. Asymmetric encryption algorithms include, but are not limited to, RSA encryption algorithms, ECC encryption algorithms.
And S105, carrying out transmission decryption and tamper-proof verification on the ciphertext image and the supplementary ciphertext.
The encryption terminal transmits the ciphertext image and the supplementary ciphertext to the decryption terminal. The decryption end decrypts the ciphertext image and the supplementary ciphertext and verifies the ciphertext in a tamper-proof manner, and the method specifically comprises the following steps:
and decrypting the supplementary ciphertext by using an asymmetric encryption algorithm to obtain a watermark bit number sequence.
And (5) expanding the gray values of all pixel points in the ciphertext image into a one-dimensional sequence to obtain a second ciphertext sequence. Each element in the watermark bit number sequence corresponds to the bit number of each second ciphertext embedded watermark in the second ciphertext sequence.
And sequentially extracting the watermark of each second ciphertext in the second ciphertext sequence according to the number of the watermark embedded in each second ciphertext in the second ciphertext sequence to obtain the first ciphertext. The method specifically comprises the following steps: converting the second cipher text into binary number, and embedding the second cipher text into the watermark bit number
Figure 545451DEST_PATH_IMAGE003
The watermark length as the second cipher text is obtained before the binary number is obtained
Figure 9930DEST_PATH_IMAGE004
The bits serve as a watermark for the second ciphertext. After acquiring binary number, F =8-N bits are converted into decimal number to be used as a first ciphertext.
And splicing the watermarks of all the second ciphertexts in the second cipher text sequence to obtain an actual embedded watermark sequence. All the first ciphertexts constitute a first cipher text sequence.
Performing tamper-proof verification according to the actual embedded watermark sequence, specifically comprising:
the length M of the actual embedded watermark sequence is obtained. And acquiring the first M elements in the watermark sequence prestored by the decryption end as a first watermark sequence. And comparing the difference between the actual embedded watermark sequence and the first watermark sequence, and if the actual embedded watermark sequence is inconsistent with the first watermark sequence, tampering the ciphertext image in the transmission process, wherein the ciphertext image is not credible at the moment, and the plaintext image decrypted according to the ciphertext image is not credible. If the actual embedded watermark sequence is consistent with the first watermark sequence, the ciphertext image is not tampered in the transmission process, the ciphertext image is credible, and the plaintext image decrypted according to the ciphertext image is also credible.
If the ciphertext image is not tampered in the transmission process, further decrypting the first ciphertext sequence:
the decryption side pre-stores an initial encryption list. The encryption list update sequence is acquired in the method in step S102. Sequentially acquiring each element in the first ciphertext sequence as an element to be decrypted, and sequentially decrypting each element to be decrypted according to the encryption list, wherein the specific process is as follows:
and acquiring the value of the element to be decrypted in the index in the encryption list as the plain text of the element to be decrypted. And acquiring the value of the element to be decrypted at the corresponding position in the updating sequence of the encryption list as an updating position. And moving the value of the element to be decrypted in the encryption list with the index to the position of the encryption list with the index as the updating position to obtain a new encryption list.
And decrypting the next element to be decrypted according to the new encryption list, and repeating the operations until the plaintext of all the elements to be decrypted is obtained. And (4) composing the plain texts of all elements to be decrypted into a plain text pixel point sequence. And filling the plaintext pixel point sequence into the image to obtain a plaintext image. The plaintext image is the boiler production monitoring video image.
Through the steps, the encryption transmission, decryption and tamper-proof verification of the boiler production monitoring video image are completed.
The encryption list and the encryption list updating sequence constructed by the embodiment of the invention have large key space and can resist brute force cracking attack; the index of the gray value of each pixel point in the plaintext pixel point sequence in the encryption list is used as the ciphertext of each pixel point, and the encryption list is dynamically updated according to the encryption list updating sequence and the ciphertext of each pixel point, so that the different encryption results of the pixel points with the same gray value are ensured, the relationship among the pixel points in the image is damaged, the ciphertext is more complex, and the statistical analysis attack can be resisted; meanwhile, the encrypted list and the ciphertext of the next pixel point have strong relevance with the ciphertext of the previous pixel point, if the gray value of one pixel point in the image is changed, the encrypted list is updated differently, the subsequent pixel point encryption results are further different, and the good avalanche effect is achieved; if a value in the initial encryption list is changed or a value in the encryption list updating sequence is changed, the encryption lists can be updated differently, so that the encryption results of the pixel points are different, and the key sensitivity is very good. The avalanche effect and the key sensitivity enable the ciphertext image to have the statistical rule of the plaintext image no longer, and the statistical analysis attack can be resisted; the invention utilizes the preset watermark sequence to embed the watermark in each ciphertext to further obtain the ciphertext image, changes the content of the ciphertext, further increases the complexity of the ciphertext image, can perform tamper-proof verification according to the embedded watermark, and has higher safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (5)

1. Video data transmission method for boiler production monitoring, characterized in that it comprises the following steps:
acquiring a plaintext pixel point sequence; constructing an initial encryption list; acquiring an encryption list updating sequence according to the length of the plaintext pixel point sequence; taking each pixel point in the plaintext pixel point sequence as a pixel point to be encrypted;
according to the encryption list, each pixel point to be encrypted is sequentially encrypted, and the method comprises the following steps: acquiring an element in the encryption list, which is the same as the gray value of the pixel point to be encrypted, as a first element; taking the index of the first element in the encryption list as the ciphertext of the pixel point to be encrypted; acquiring the value of an element at a corresponding position of a pixel point to be encrypted in an encryption list updating sequence, taking the value as an updating position, and moving an index in an encryption list to the updating position by a first element in the encryption list to realize the updating of the encryption list;
the ciphertext of all the pixel points to be encrypted is combined into a first ciphertext sequence; setting a binary sequence with a fixed length as a watermark sequence, and constructing an empty watermark digit sequence;
and sequentially carrying out watermark embedding operation on each ciphertext in the first ciphertext sequence according to the watermark sequence, wherein the watermark embedding operation comprises the following steps: converting the ciphertext into a binary number, and when the digit of the binary number is 8, taking the ciphertext as a second ciphertext; when the digit of the binary number is not 8, acquiring the watermark digit of the ciphertext according to the length of the binary number; acquiring the front watermark digit number elements in the watermark sequence as the watermark of the ciphertext, adding the watermark of the ciphertext to the binary number, and converting the obtained result into a decimal number as a second ciphertext;
deleting the front watermark digit number elements in the watermark sequence to realize the update of the watermark sequence; adding the watermark bit number to the end of the watermark bit number sequence;
forming a second ciphertext sequence by all the second ciphertexts; acquiring a ciphertext image according to the second ciphertext sequence; acquiring a supplementary ciphertext according to the watermark digit sequence; and transmitting the ciphertext image and the supplementary ciphertext.
2. The method of claim 1, wherein said constructing an initial encrypted list comprises:
all integers in the range of [0,255] are randomly ordered, and the ordered result is used as an initial encryption list.
3. The method of claim 1, wherein said obtaining an encrypted list update sequence based on the length of a sequence of plaintext pixel points comprises:
taking the length of the plaintext pixel point sequence as a first length; and acquiring a chaotic sequence with the length of the first length by using a chaotic mapping method, multiplying each element in the chaotic sequence by 127 and rounding downwards to obtain an encryption list updating sequence.
4. The method for transmitting video data for boiler production monitoring according to claim 1, wherein the obtaining the watermark bit number of the ciphertext according to the length of the binary number comprises:
and subtracting the length of the binary number by using 8 to obtain the watermark digit of the ciphertext.
5. The method of claim 1, wherein the obtaining the supplemental ciphertext from the watermark bit number sequence comprises:
and encrypting the watermark digit sequence by using an asymmetric encryption algorithm to obtain a supplementary ciphertext.
CN202211381500.5A 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring Active CN115442043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211381500.5A CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211381500.5A CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Publications (2)

Publication Number Publication Date
CN115442043A CN115442043A (en) 2022-12-06
CN115442043B true CN115442043B (en) 2023-01-31

Family

ID=84252940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211381500.5A Active CN115442043B (en) 2022-11-07 2022-11-07 Video data transmission method for boiler production monitoring

Country Status (1)

Country Link
CN (1) CN115442043B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116204916B (en) * 2022-12-30 2023-07-21 杭州慧康物联网科技有限公司 Database intelligent management system based on medical big data
CN115859341B (en) * 2023-02-27 2023-05-05 山东水浒文化传媒有限公司 Intelligent on-line file reading system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277978A (en) * 2022-09-26 2022-11-01 南通德辰智能科技有限公司 Image information security management method based on state coding table

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014266A (en) * 2010-12-01 2011-04-13 华中科技大学 Digital watermarking-based high-definition video encrypted transmitting method and system
CN108366181B (en) * 2018-01-23 2019-10-01 西南财经大学 A kind of image encryption method based on hyperchaotic system and multistage scramble
US11469879B2 (en) * 2020-10-28 2022-10-11 Markany Inc. Text watermarking method and apparatus for hiding information into text documents
CN115206496B (en) * 2022-07-26 2023-08-15 河南天一智能信息有限公司 Real-time transmission method of cardiovascular detection data

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277978A (en) * 2022-09-26 2022-11-01 南通德辰智能科技有限公司 Image information security management method based on state coding table

Also Published As

Publication number Publication date
CN115442043A (en) 2022-12-06

Similar Documents

Publication Publication Date Title
CN115442043B (en) Video data transmission method for boiler production monitoring
CN108566500B (en) Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism
CN108023724B (en) Data transmission method and device
CN103457718B (en) The part ciphertext of variable-length segmentation and fixing block encryption is used to upgrade
US20120134490A1 (en) Selective Data Encryption and Decryption Method and Apparatus
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN108599934B (en) Verifiable security and confidentiality enhancement method for quantum key distribution
US11057205B2 (en) Seed key expansion method and its uses
US20070189518A1 (en) 3-D quaternion quantum fractal encryption
CN111400730B (en) AES key expansion method based on weak correlation
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN112597519A (en) Non-key decryption method based on convolutional neural network in OFDM (orthogonal frequency division multiplexing) encryption system
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN115834060A (en) Cryptology-based electronic official document secure import and export method and system
CN108599922B (en) Novel method for generating integrity authentication code of message containing secret key
CN115719300B (en) Personnel information management method for big data
CN115834126A (en) Encryption transmission method for engineering electronic files
CN115423474A (en) Transaction processing method and device based on chaotic mapping
CN109450618B (en) MD 5-based encryption method and system
CN108616351B (en) Full-dynamic encryption and decryption method and encryption and decryption device
CN108566270B (en) Novel encryption method using double block cipher
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
CN106341230B (en) Method for realizing unconditional safety of modern cryptosystem by shortening cipher text length
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence
CA3025502C (en) Seed key expansion method and its uses

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant