CN115580865B - Artificial intelligence-based 5G communication transmission encryption system and method - Google Patents

Artificial intelligence-based 5G communication transmission encryption system and method Download PDF

Info

Publication number
CN115580865B
CN115580865B CN202211469502.XA CN202211469502A CN115580865B CN 115580865 B CN115580865 B CN 115580865B CN 202211469502 A CN202211469502 A CN 202211469502A CN 115580865 B CN115580865 B CN 115580865B
Authority
CN
China
Prior art keywords
encrypted
type
structural element
dimensional data
data matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211469502.XA
Other languages
Chinese (zh)
Other versions
CN115580865A (en
Inventor
王强
朱丽丽
胡宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhixuecheng Network Technology Co ltd
Original Assignee
Nanjing Zhixuecheng Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zhixuecheng Network Technology Co ltd filed Critical Nanjing Zhixuecheng Network Technology Co ltd
Priority to CN202211469502.XA priority Critical patent/CN115580865B/en
Publication of CN115580865A publication Critical patent/CN115580865A/en
Application granted granted Critical
Publication of CN115580865B publication Critical patent/CN115580865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention relates to the technical field of digital information transmission, in particular to a 5G communication transmission encryption system and method based on artificial intelligence, which comprises the following steps: acquiring time sequence data to be encrypted, determining a two-dimensional data matrix to be encrypted by using a digital information transmission technology, and further determining a binary image; according to the optimal size of each first type structural element, a sliding window is constructed on the binary image, the number of first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted is determined, and each second type structural element is obtained; determining the discrete degree corresponding to each sliding window in the binary image to obtain each third type structural element; determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted to obtain a target type structural element; and performing data operation on the two-dimensional data matrix to be encrypted according to the target type structural element, so as to obtain an encrypted ciphertext of the time series data to be encrypted. The invention effectively improves the security of the encrypted data.

Description

Artificial intelligence-based 5G communication transmission encryption system and method
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a 5G communication transmission encryption system and method based on artificial intelligence.
Background
In the wireless communication, a radio signal is used as an information carrier, so that the restriction of wired communication on the position of a communication terminal is eliminated, and the wireless communication is rapidly and deeply conscious of flexibility and portability, and has been rapidly developed in the last decade. However, as wireless communication technology develops and is more and more widely used, security problems during communication become more and more exposed. The wireless communication brings convenience to people, and the openness of a wireless channel caused by the broadcasting characteristic of electromagnetic waves makes the security of the wireless communication face more serious challenges, and in order to improve the security of wireless communication data, encryption processing needs to be performed on radio signal data.
The prior art provides an uplink secure transmission method based on downlink feedback assistance in a 5G communication system, and the publication number of the method is CN105007578B, and the method is used for solving the problem that the existing physical layer secure transmission technology cannot be directly applied to the 5G uplink communication system, that is, solving the problem of unbalanced uplink and downlink secure capacity to a certain extent, so as to ensure the transmission security of a 5G uplink single-input multiple-output system, but the method has the condition that downlink estimation errors are accumulated to the uplink, which is easy to reduce the security of encrypted data, thereby resulting in poor security of the encrypted data.
Disclosure of Invention
In order to solve the problem of poor security of encrypted data in the conventional method, the invention aims to provide a 5G communication transmission encryption system and method based on artificial intelligence.
The invention provides a 5G communication transmission encryption method based on artificial intelligence, which comprises the following steps:
acquiring time sequence data to be encrypted, determining a two-dimensional data matrix to be encrypted according to the time sequence data to be encrypted, and further determining a binary image corresponding to the two-dimensional data matrix to be encrypted, wherein a first type point in the binary image is used for representing a numerical value 1 in the two-dimensional data matrix, and a second type point in the binary image is used for representing a numerical value 0 in the two-dimensional data matrix;
acquiring each first type structural element with the optimal size corresponding to the two-dimensional data matrix to be encrypted, constructing a sliding window on a binary image corresponding to the two-dimensional data matrix to be encrypted according to the optimal size of each first type structural element, and determining the number of first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted according to the number of first type points in each sliding window in the binary image;
screening each first type structural element according to the number of first type points in the structural elements corresponding to the two-dimensional data matrix to be encrypted, so as to obtain each second type structural element;
determining the discrete degree corresponding to each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image, and screening each second type structural element according to the discrete degree corresponding to each sliding window in the binary image so as to obtain each third type structural element;
determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted according to the number of all first type points in the binary image and the number of the first type points of each third type structural element in the binary image, and screening each third type structural element according to the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted so as to obtain a target type structural element corresponding to the two-dimensional data matrix to be encrypted;
and performing data operation on the two-dimensional data matrix to be encrypted according to the target type structural element corresponding to the two-dimensional data matrix to be encrypted, so as to obtain an encrypted ciphertext of the time series data to be encrypted.
Further, the step of determining the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted includes:
determining a statistical histogram corresponding to a two-dimensional data matrix to be encrypted according to the number of first type points in each sliding window in the binary image;
determining the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted according to the occurrence frequency of the sliding window of each first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted;
and determining the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted according to the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted.
Further, the calculation formula for determining the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted is as follows:
Figure DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 985489DEST_PATH_IMAGE002
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,Nis the maximum first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure 282741DEST_PATH_IMAGE003
for the first statistical histogram corresponding to the two-dimensional data matrix to be encryptedaThe probability of occurrence of a sliding window of the order of magnitude of the number of first type points.
Further, a calculation formula for determining the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted is as follows:
Figure 128337DEST_PATH_IMAGE004
wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE005
the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted,
Figure 480296DEST_PATH_IMAGE002
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure 933406DEST_PATH_IMAGE006
in order to preset the maximum skewness,
Figure 967221DEST_PATH_IMAGE007
in order to preset the minimum skewness,
Figure 69038DEST_PATH_IMAGE008
represents rounding down.
Further, the step of determining the discrete degree corresponding to each sliding window in the binary image comprises:
determining the number of jumping times corresponding to each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image;
and determining the discrete degree corresponding to each sliding window in the binary image according to the jumping times corresponding to each sliding window in the binary image.
Further, a calculation formula for determining the discrete degree corresponding to each sliding window in the binary image is as follows:
Figure 871909DEST_PATH_IMAGE009
wherein the content of the first and second substances,
Figure 696252DEST_PATH_IMAGE010
is the second in a binary imageiThe corresponding degree of dispersion of each sliding window,
Figure DEST_PATH_IMAGE011
is the second in a binary imageiThe number of jump times corresponding to each sliding window.
Further, the step of screening each second type structural element includes:
determining a discrete degree mean value corresponding to each sliding window in the binary image according to the discrete degree corresponding to each sliding window in the binary image, and taking the discrete degree mean value corresponding to each sliding window in the binary image as a discrete degree threshold value corresponding to each second type structural element;
obtaining the discrete degree corresponding to each second type structural element, calculating the difference value between the discrete degree corresponding to each second type structural element and the discrete degree threshold value corresponding to each second type structural element, and determining the discrete degree difference value corresponding to each second type structural element;
and screening the second type structural elements according to the discrete degree difference values corresponding to the second type structural elements, and taking the second type structural elements with the minimum discrete degree difference values as third type structural elements.
Further, the step of determining the matching degree between each third type structural element and the two-dimensional data matrix to be encrypted includes:
and calculating the ratio of the number of the first type points of each third type structural element in the binary image to the number of all the first type points in the binary image, and taking the ratio as the matching degree of the corresponding third type structural element and the two-dimensional data matrix to be encrypted.
The invention also provides an artificial intelligence based 5G communication transmission encryption system which comprises a processor and a memory, wherein the processor is used for processing the instructions stored in the memory so as to realize the artificial intelligence based 5G communication transmission encryption method.
The invention has the following beneficial effects:
according to the time sequence data to be encrypted, the digital information transmission technology is utilized to carry out normalization and data reconstruction processing on the time sequence data to be encrypted, and a two-dimensional data matrix to be encrypted is obtained. The method comprises the steps of obtaining each first type structural element with the optimal size corresponding to a two-dimensional data matrix to be encrypted, determining the number of first type points in the structural elements corresponding to the two-dimensional data matrix to be encrypted, and screening each first type structural element to obtain each second type structural element. And determining the discrete degree corresponding to each sliding window in the binary image, and screening each second type structural element to obtain each third type structural element. And determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted, and screening each third type structural element to obtain a target type structural element corresponding to the two-dimensional data matrix to be encrypted. And performing data operation on the two-dimensional data matrix to be encrypted according to the target type structural element corresponding to the two-dimensional data matrix to be encrypted, so as to obtain an encrypted ciphertext of the time series data to be encrypted.
According to the method, through a digital information transmission technology, according to the data characteristics of the time sequence data to be encrypted, each first type structural element with the optimal scale corresponding to the two-dimensional data matrix to be encrypted is continuously screened, so that the target type structural element is obtained, the target type structural element is utilized to perform data operation on the time sequence data to be encrypted, and the safety of encrypted data is effectively improved. Meanwhile, the invention avoids the condition of generating a large amount of data when the traversing operation determines the structural element, and accelerates the data encryption processing speed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an artificial intelligence based encryption method for 5G communication transmission in an embodiment of the present invention;
FIG. 2 is a schematic diagram of a two-dimensional data matrix to be encrypted according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a binary image corresponding to a two-dimensional data matrix to be encrypted according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a single first type point structuring element in an embodiment of the present invention;
fig. 5 is a statistical histogram corresponding to a two-dimensional data matrix to be encrypted in the embodiment of the present invention;
FIG. 6 is a diagram illustrating a preset deployment rule according to an embodiment of the present invention;
FIG. 7 is a diagram of a binary image in an embodiment of the present inventionXSchematic diagram of type structural element.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of the embodiments, structures, features and effects of the technical solutions according to the present invention will be given with reference to the accompanying drawings and preferred embodiments. In the following description, different references to "one embodiment" or "another embodiment" do not necessarily refer to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The embodiment provides an artificial intelligence based 5G communication transmission encryption method, as shown in fig. 1, the method includes the following steps:
(1) Acquiring time sequence data to be encrypted, determining a two-dimensional data matrix to be encrypted according to the time sequence data to be encrypted, and further determining a binary image corresponding to the two-dimensional data matrix to be encrypted, wherein a first type point in the binary image is used for representing a numerical value 1 in the two-dimensional data matrix, and a second type point in the binary image is used for representing a numerical value 0 in the two-dimensional data matrix.
First, it should be noted that the data information is stored in the computer in a binary form, and there are only two data choices, which are respectively 0 or 1. If a certain data in the time series data to be encrypted is only related to the data adjacent to the left and right of the data, the relevance of the data in the whole time series data to be encrypted is not strong, and the encrypted data is easy to crack.
In the embodiment, in order to enhance the relevance between each data in the time series data to be encrypted and the security of the encrypted ciphertext, the one-dimensional time series data to be encrypted is collated, combined and spliced, so that the time series data to be encrypted is converted into a two-dimensional data matrix. The method comprises the steps of firstly obtaining time sequence data to be encrypted, and carrying out binary coding processing on one-dimensional time sequence data to be encrypted to obtain binary coded data to be encrypted, wherein the binary coded data comprise a numerical value 1 and a numerical value 0. A certain amount of binary coded data is divided intoLHas a length oflThe two-dimensional data string of (2), the divided data stringLThe two-dimensional data strings are arranged according to the division sequence to obtain the size of
Figure 669893DEST_PATH_IMAGE012
Fig. 2 shows the two-dimensional data matrix, and fig. 2 is a schematic diagram of the two-dimensional data matrix to be encrypted.
Will have the size of
Figure 857292DEST_PATH_IMAGE012
The two-dimensional data matrix to be encrypted is converted into a binary image, that is, the data with the element 1 in the two-dimensional data matrix is represented by the first type point, and the data with the element 0 in the two-dimensional data matrix is represented by the second type point. The first type point and the second type point in the binary image corresponding to the two-dimensional data matrix to be encrypted are black points and white points, as shown in fig. 3, fig. 3 is a two-dimensional number to be encryptedAnd according to the binary image schematic diagram corresponding to the matrix. The process of binary coding the time series data to be encrypted and the process of converting the two-dimensional data matrix into the binary image are both the prior art, are not in the protection scope of the invention, and are not elaborated herein.
Thus, the time series data to be encrypted, the two-dimensional data matrix to be encrypted, and the binary image corresponding to the two-dimensional data matrix to be encrypted are obtained in this embodiment.
(2) Acquiring each first type structural element with the optimal size corresponding to the two-dimensional data matrix to be encrypted, constructing a sliding window on the binary image corresponding to the two-dimensional data matrix to be encrypted according to the optimal size of each first type structural element, and determining the number of first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted according to the number of first type points in each sliding window in the binary image.
It should be noted that, when the two-dimensional matrix to be encrypted is subjected to the erosion operation by using the morphological structural element, the isolated first type point is removed, and when the two-dimensional matrix is reduced by the expansion operation, the isolated first type point is lost. Therefore, the selected structural elements have different sizes and types, and the loss rate of the two-dimensional matrix to be encrypted is different. In general, traversing a two-dimensional matrix to be encrypted is used to determine a target structural element, which specifically includes: the method comprises the steps that structural elements with each type of size are subjected to traversal calculation, so that the loss rate corresponding to the structural elements with each type of size when a two-dimensional matrix to be encrypted is processed is obtained, the structural elements corresponding to the minimum loss rate are obtained by comparing the loss rates corresponding to the structural elements with all types of sizes when the two-dimensional matrix to be encrypted is processed, the structural elements can be used as target structural elements, traversal operation needs to occupy a large amount of calculation amount, meanwhile, when the generated data amount of the two-dimensional matrix is large, the calculation speed of traversal operation is slow, but if the target structural elements are selected randomly, the corresponding loss rates cannot be guaranteed. Therefore, in order to ensure that the calculation speed is increased under the condition that the loss rate of the structural elements corresponding to the two-dimensional matrix to be encrypted is as small as possible when the structural elements process the two-dimensional matrix to be encrypted, the embodiment screens out the target structural elements from the first type structural elements with the optimal size according to the relevance among the data in the two-dimensional data matrix to be encrypted. Firstly, determining the number of first type points in a structural element corresponding to a two-dimensional data matrix to be encrypted, wherein the method comprises the following steps:
and (2-1) acquiring each first type structural element with the optimal size corresponding to the two-dimensional data matrix to be encrypted, and constructing a sliding window on the binary image corresponding to the two-dimensional data matrix to be encrypted according to the optimal size of each first type structural element.
First, it should be noted that, the larger the size of the structural element is, the larger the loss rate of the structural element corresponding to the two-dimensional matrix to be encrypted is when the structural element processes the two-dimensional matrix to be encrypted is, the more the types of the structural element are, the slower the calculation speed of the encryption processing performed on the two-dimensional data matrix to be encrypted by using the structural element is, and in order to reduce the loss rate corresponding to the two-dimensional data matrix to be encrypted and improve the encryption and decryption calculation speed, the embodiment needs to determine the optimal size of the structural element corresponding to the two-dimensional data matrix to be encrypted.
When the size of the structural element is
Figure 530981DEST_PATH_IMAGE013
When the structure element is a single structure element of the first type point, as shown in fig. 4, fig. 4 is a schematic diagram of the single structure element of the first type point, in this embodiment, the first type point may be referred to as a black point, and the second type point may be referred to as a white point. The single black dot structure element has the minimum loss rate when processing the two-dimensional data matrix to be encrypted, but the amount of information retained by the encrypted ciphertext processed by the single black dot structure element is the maximum, and the calculation amount when decoding the encrypted ciphertext is also large, so the embodiment expects to improve the calculation speed of encryption and decryption by losing a small amount of data information of the two-dimensional data matrix to be encrypted. The embodiment will select the size as the single black dot structure element correlation data
Figure 778422DEST_PATH_IMAGE014
The structural element of (1) is taken as the structural element with the optimal size, and the obtained size is
Figure 36097DEST_PATH_IMAGE014
For each type of structural element, each first type of structural element having the respective type as the optimum size, e.g. forRStructural element, cross-shaped structural element andXtype structural elements, etc., the dimensions of each first type structural element being the same.
When the optimal size of each first type structural element is
Figure 355083DEST_PATH_IMAGE014
When constructing a two-dimensional data matrix to be encrypted with dimensions of
Figure 132546DEST_PATH_IMAGE014
And sliding the sliding window on the two-dimensional data matrix to be encrypted, so as to obtain each sliding window in the binary image.
(2-2) determining the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted according to the number of the first type points in each sliding window in the binary image, wherein the method comprises the following steps:
(2-2-1) determining a statistical histogram corresponding to the two-dimensional data matrix to be encrypted according to the number of the first type points in each sliding window in the binary image.
In this embodiment, the number of occurrences of each sliding window with different number in the binary image is determined by counting the number of first type points in each sliding window in the binary image, and a statistical histogram corresponding to the two-dimensional data matrix to be encrypted is constructed, as shown in fig. 5, fig. 5 is a statistical histogram corresponding to the two-dimensional data matrix to be encrypted, in fig. 5, the horizontal axis of the statistical histogram is the order of magnitude of each first type point, and is recorded as the order of magnitude of each first type pointAIn the present embodiment, the magnitude of each first type dot is within a value range [1,9 ]]Counting the number of times of occurrence of the sliding window with the vertical axis of the histogram as the magnitude of each first type point, and recording the number asB. The process of constructing the statistical histogram is prior art and is not within the scope of the present invention, and will not be described in detail herein.
(2-2-2) determining the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted according to the occurrence frequency of the sliding window of each first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted.
In this embodiment, in order to facilitate subsequent determination of the number of first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted, it is necessary to first determine a skewness of a statistical histogram corresponding to the two-dimensional data matrix to be encrypted, obtain a probability of occurrence of a sliding window of each first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted according to the number of times of occurrence of a sliding window of each first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted and a total number of times of occurrence of sliding windows of all first type point magnitudes, and further determine the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted, where a calculation formula is:
Figure 564271DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 794396DEST_PATH_IMAGE002
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,Nis the maximum first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure 41706DEST_PATH_IMAGE003
for the first statistical histogram corresponding to the two-dimensional data matrix to be encryptedaThe probability of occurrence of a sliding window of the order of magnitude of the number of first type points.
It should be noted that, if the number of times of occurrence of the sliding windows of the plurality of first type point magnitude orders is greater, and the number levels of the plurality of first type point magnitude orders are higher, the number of the first type points existing in the structural element corresponding to the two-dimensional data matrix to be encrypted will be greater. The process of determining the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted is the prior art and is not within the protection scope of the present invention, and is not elaborated herein.
For a statistical histogram corresponding to a two-dimensional data matrix to be encrypted, when the skewness of the statistical histogram is smaller, the statistical histogram left-hand represents that the number of first type points in each sliding window in a binary image is smaller, and at the moment, the number of the first type points in a structural element corresponding to the two-dimensional data matrix to be encrypted which is subsequently determined is also smaller; when the skewness of the statistical histogram is larger, the statistical histogram is right-skewed, the statistical histogram right-skewed represents that the number of the first type points in each sliding window in the binary image is larger, and at the moment, the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted, which is determined subsequently, is also larger, so that a smaller loss rate is ensured.
And (2-2-3) determining the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted according to the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted.
In this embodiment, a preset maximum skewness and a preset minimum skewness of the statistical histogram under an extreme condition are obtained, and the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted is calculated according to the skewness, the preset maximum skewness and the preset minimum skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted, where the calculation formula is:
Figure 939255DEST_PATH_IMAGE015
wherein, the first and the second end of the pipe are connected with each other,
Figure 279232DEST_PATH_IMAGE005
the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted,
Figure 262231DEST_PATH_IMAGE002
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure 923020DEST_PATH_IMAGE006
in order to preset the maximum skewness,
Figure 658763DEST_PATH_IMAGE007
in order to preset the minimum skewness,
Figure 950067DEST_PATH_IMAGE008
represent rounding down on.
It should be noted that, the greater the number of the first type points in the structural element, the more rigorous the requirement of satisfying perfect corrosion when performing corrosion operation, the greater the loss caused by encryption when not performing perfect corrosion, but the less the data amount contained in the encrypted ciphertext, the faster the decryption speed when decrypting; the smaller the number of the first type points in the structural element is, the less rigorous the requirement of meeting the perfect corrosion during the corrosion operation is, the smaller the loss caused by encryption when the perfect corrosion cannot be carried out is, but the data volume contained in the encrypted ciphertext is large, and the decryption speed is slow during decryption.
(3) And screening each first type structural element according to the number of the first type points in the structural elements corresponding to the two-dimensional data matrix to be encrypted, so as to obtain each second type structural element.
In this embodiment, the number of the first type points in each first type structural element is selected as the number of the first type points in the structural element corresponding to the two-dimensional data matrix to be encrypted obtained in the step (2-2-3)MThe structural elements of (1) are used as the structural elements of the second type, and the number of the first type points in the structural elements of the second type is the same.
(4) And according to the position of each first type point in each sliding window in the binary image, determining the discrete degree corresponding to each sliding window in the binary image, and according to the discrete degree corresponding to each sliding window in the binary image, screening each second type structural element to obtain each third type structural element.
It should be noted that, each second-type structural element obtained according to the number of the first-type points in the structural element only determines the type of the structural element through global analysis, and the number of the first-type points can only be obtained asMThe number of types of the structural elements is reduced, but more types of the structural elements still exist, so as to further improve the selection targetThe accuracy of the structural elements requires a local analysis of each second type of structural element. The method comprises the following steps:
(4-1) determining the corresponding discrete degree of each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image, wherein the step comprises the following steps:
and (4-1-1) determining the number of jumping times corresponding to each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image.
In this embodiment, the elements in each sliding window are expanded according to a preset expansion rule by using the position of each first type point in each sliding window in the binary image, so as to obtain an expansion sequence corresponding to each sliding window. The preset expansion rule is as follows: taking the center point of the sliding window as a starting point, unfolding the sliding window clockwise and leftwards, and winding the center point of the sliding window for a circle, so as to obtain an unfolding sequence corresponding to each sliding window, as shown in fig. 6, where fig. 6 is a schematic diagram of a preset unfolding rule.
Since the size of each sliding window in the binary image is
Figure 902587DEST_PATH_IMAGE014
Therefore, the number of bits of the spreading sequence corresponding to each sliding window is 9. Counting the number of transitions of the 9-bit spreading sequence corresponding to each sliding window, where a transition refers to a process from a first type point to a second type point or a process from the second type point to the first type point, for example, 000000000 includes 0 transition, 000001111 includes 1 transition from the second type point 0 to the first type point 1, 100000111 includes 1 transition from the first type point 1 to the second type point 0 and 1 transition from the second type point 0 to the first type point 1, and the number of transitions is recorded as 2. In this embodiment, the number of transitions is recorded as 8 in fig. 6 for the 9-bit spreading sequence.
And (4-1-2) determining the discrete degree corresponding to each sliding window in the binary image according to the jump times corresponding to each sliding window in the binary image.
In this embodiment, to determine the second in the binary imageiTaking the discrete degree corresponding to each sliding window as an example, according to the second degree in the binary imageiThe jump times corresponding to each sliding window are calculatedSecond in binary imageiThe discrete degree corresponding to each sliding window is calculated by the following formula:
Figure 39170DEST_PATH_IMAGE016
wherein the content of the first and second substances,
Figure 832682DEST_PATH_IMAGE010
is the second in a binary imageiThe corresponding degree of dispersion of each sliding window,
Figure 29308DEST_PATH_IMAGE011
is the second in a binary imageiThe number of jump times corresponding to each sliding window.
Second in reference binary imageiAnd determining the discrete degree corresponding to each sliding window to obtain the discrete degree corresponding to each sliding window in the binary image. It should be noted that, if the larger the number of hops corresponding to a certain sliding window is, the poorer the connectivity of each first type point in the sliding window is, the more discrete the first type points in the sliding window are distributed.
(4-2) screening the second type structural elements according to the discrete degree corresponding to each sliding window in the binary image to obtain third type structural elements, wherein the steps comprise:
(4-2-1) determining a discrete degree mean value corresponding to each sliding window in the binary image according to the discrete degree corresponding to each sliding window in the binary image, and taking the discrete degree mean value corresponding to each sliding window in the binary image as a discrete degree threshold value corresponding to each second-type structure element.
Calculating the discrete degree mean value corresponding to all the sliding windows in the binary image according to the discrete degree corresponding to each sliding window in the binary image obtained in the step (4-1-2), and taking the discrete degree mean value corresponding to all the sliding windows in the binary image as the discrete degree threshold value corresponding to each second type structural element, wherein the calculation formula is as follows:
Figure 472053DEST_PATH_IMAGE017
wherein the content of the first and second substances,
Figure 943486DEST_PATH_IMAGE018
the discrete degree mean value corresponding to all sliding windows in the binary image,
Figure 653822DEST_PATH_IMAGE010
is the second in a binary imageiThe corresponding degree of dispersion of the individual sliding windows,Ithe number of sliding windows in the binary image.
It should be noted that, when the two-dimensional data matrix to be encrypted is encrypted, the same type of structural elements need to be used globally for processing, and in order to reduce loss, the dispersion degree mean value is used as the dispersion degree threshold corresponding to each second type of structural element in this embodiment.
(4-2-2) obtaining the discrete degree corresponding to each second type structural element, calculating the difference value between the discrete degree corresponding to each second type structural element and the discrete degree threshold value corresponding to each second type structural element, and determining the discrete degree difference value corresponding to each second type structural element.
In this embodiment, each second-type structural element is split into a spreading sequence, and the second spreading sequence in the binary image in step (4-1-2) is referred to according to the spreading sequence corresponding to each second-type structural elementiAnd determining the discrete degree corresponding to each sliding window, and calculating the discrete degree corresponding to each second type structural element so as to obtain the discrete degree corresponding to each second type structural element. And the discrete degree corresponding to each second type structural element is subtracted from the discrete degree threshold value, so that a discrete degree difference value corresponding to each second type structural element is obtained.
(4-2-3) screening the second type structural elements according to the discrete degree difference values corresponding to the second type structural elements, and taking the second type structural elements with the smallest discrete degree difference values as third type structural elements.
Sorting the discrete degree difference values corresponding to the second type structural elements according to a sequence from small to large, selecting a plurality of second type structural elements with the minimum discrete degree difference values from the sorting sequence, and taking the plurality of second type structural elements with the minimum discrete degree difference values as third type structural elements, wherein the discrete degrees corresponding to the third type structural elements are the same. It should be noted that the discrete degree is calculated based on the number of transitions, and there are multiple second type structural elements with the minimum discrete degree difference value in the case of different types of structural elements having the same discrete degree.
(5) And according to the number of all the first type points in the binary image and the number of the first type points of each third type structural element in the binary image, determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted, and according to the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted, screening each third type structural element to obtain a target type structural element corresponding to the two-dimensional data matrix to be encrypted.
And (5-1) determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted according to the number of all the first type points in the binary image and the number of the first type points of each third type structural element in the binary image.
And calculating the ratio of the number of the first type points of each third type structural element in the binary image to the number of all the first type points of the binary image according to the number of all the first type points of each third type structural element in the binary image and the number of all the first type points of each third type structural element in the binary image, and taking the ratio as the matching degree of the corresponding third type structural element and the two-dimensional data matrix to be encrypted.
It should be noted that, regarding the number of the first-type points of each third-type structural element in the binary image, the first-type points of two or more structural elements of the same type may be repeated on the binary image, and at this time, the number of the first-type points is counted according to practical situations, that is, the number of the first-type points is not counted repeatedly. For example, there are two first type points in the binary image with a number of 5XStructural element of the typeXThe pattern structure element has a repeated first pattern point, when the two pattern points areXThe number of the first type points of the type structure element in the binary image is 9, as shown in FIG. 7FIG. 7 is a diagram of a binary imageXSchematic diagram of type structural element.
In the present embodiment, to determineiTaking the matching degree of the third type structural element and the two-dimensional data matrix to be encrypted as an example, the number of all the first type points in the binary image and the number of the first type points are used as the matching degreeiThe number of the first type points of the third type structural elements in the binary image is calculatediThe matching degree of the third type structural element and the two-dimensional data matrix to be encrypted has the calculation formula:
Figure 224612DEST_PATH_IMAGE019
wherein the content of the first and second substances,
Figure 886144DEST_PATH_IMAGE020
is as followsiThe degree of matching of the third type of structuring element with the two-dimensional data matrix to be encrypted,
Figure 364530DEST_PATH_IMAGE021
is as followsiThe number of first type points of the third type structure elements within the binary image,mis the number of all first type points within the binary image.
Reference toiAnd a step of determining the matching degree of the third type structural elements and the two-dimensional data matrix to be encrypted, so as to obtain the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted. It should be noted that, the larger the number of the first type points of a certain third type structural element in the binary image is, the larger the matching degree between the third type structural element and the two-dimensional data matrix to be encrypted is, and the higher the possibility that the third type structural element is the target type structural element is.
And (5-2) screening each third type structural element according to the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted, so as to obtain a target type structural element corresponding to the two-dimensional data matrix to be encrypted.
In this embodiment, the third-type structural element corresponding to the maximum matching degree is selected from the matching degrees of each third-type structural element and the two-dimensional data matrix to be encrypted, and the third-type structural element corresponding to the maximum matching degree is used as the target-type structural element corresponding to the two-dimensional data matrix to be encrypted, so that the target-type structural element corresponding to the two-dimensional data matrix to be encrypted is obtained.
(6) And performing data operation on the two-dimensional data matrix to be encrypted according to the target type structural element corresponding to the two-dimensional data matrix to be encrypted, so as to obtain an encrypted ciphertext of the time series data to be encrypted.
It should be noted that, the importance degrees of the time sequence data to be encrypted are sorted, when the time sequence data to be encrypted is subjected to two-dimensional matrix conversion, the importance degrees of the two-dimensional data strings are marked in advance, the two-dimensional data strings are divided into necessary two-dimensional data strings and unnecessary two-dimensional data strings according to the importance degrees, when encryption processing is subsequently performed, the necessary two-dimensional data strings need to be subjected to lossless encryption processing, and the unnecessary data can be subjected to lossy encryption processing.
In this embodiment, the target type structural element corresponding to the two-dimensional data matrix to be encrypted obtained in the step (5-2) is used as an encryption key of the two-dimensional data matrix to be encrypted, and the encryption key is used to perform encryption data operation on the two-dimensional data matrix to be encrypted, so as to obtain an encryption ciphertext of the two-dimensional data matrix to be encrypted. And performing corrosion operation and expansion operation on a necessary two-dimensional data string in a two-dimensional data matrix to be encrypted, performing difference on the original necessary two-dimensional data string and the two-dimensional data string subjected to the corrosion expansion operation to obtain a plurality of lost first type points, and adding separators to the plurality of first type points and placing the first type points behind an encrypted ciphertext. At this time, the present embodiment completes the encryption processing of the time-series data to be encrypted.
After obtaining the encrypted ciphertext of the two-dimensional data matrix to be encrypted, corresponding operations are needed to be used for decryption and recovery, so that the encrypted data is recovered to the original form, and corresponding information carried by the original data is obtained, wherein the decryption step comprises the following steps:
1) Splitting data, dividing the encrypted data according to corresponding separators when the data are combined, and dividing the whole encrypted ciphertext data into basic data, first type point data and sliding core data, wherein the sliding core data refers to structural metadata.
2) And restoring basic data, wherein the basic data is the damaged binary image data obtained after corrosion operation, at the moment, sliding kernel data is obtained, and expansion operation is carried out on the core node binary image of the basic data by using the sliding kernel data to obtain the binary image data after the expansion operation.
3) And (3) necessary data restoration, namely superposing the first type point data and the binary image data after the expansion operation to obtain a restored two-dimensional data matrix, wherein the obtained two-dimensional data matrix is damaged and part of unnecessary data is lost.
4) And converting the two-dimensional data matrix into one-dimensional time sequence data, thereby realizing the decryption operation of the encrypted ciphertext of the two-dimensional data matrix to be encrypted.
The embodiment also provides an artificial intelligence based 5G communication transmission encryption system, which comprises a processor and a memory, wherein the processor is used for processing instructions stored in the memory to implement the artificial intelligence based 5G communication transmission encryption method.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (9)

1. A5G communication transmission encryption method based on artificial intelligence is characterized by comprising the following steps:
acquiring time sequence data to be encrypted, determining a two-dimensional data matrix to be encrypted according to the time sequence data to be encrypted, and further determining a binary image corresponding to the two-dimensional data matrix to be encrypted, wherein a first type point in the binary image is used for representing a numerical value 1 in the two-dimensional data matrix, and a second type point in the binary image is used for representing a numerical value 0 in the two-dimensional data matrix;
obtaining each first type structural element with the optimal size corresponding to the two-dimensional data matrix to be encrypted, wherein the optimal size is
Figure QLYQS_1
The first type structural element is of the size
Figure QLYQS_2
According to the optimal size of each first type structural element, a sliding window is constructed on a binary image corresponding to the two-dimensional data matrix to be encrypted, and according to the number of first type points in each sliding window in the binary image, the number of first type points in the first type structural element corresponding to the two-dimensional data matrix to be encrypted is determined;
screening each first type structural element according to the number of first type points in the first type structural element corresponding to the two-dimensional data matrix to be encrypted, so as to obtain each second type structural element;
determining the discrete degree corresponding to each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image, and screening each second type structural element according to the discrete degree corresponding to each sliding window in the binary image so as to obtain each third type structural element;
determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted according to the number of all first type points in the binary image and the number of the first type points of each third type structural element in the binary image, screening each third type structural element according to the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted, and taking the third type structural element corresponding to the maximum matching degree as a target type structural element corresponding to the two-dimensional data matrix to be encrypted so as to obtain a target type structural element corresponding to the two-dimensional data matrix to be encrypted;
and performing data operation on the two-dimensional data matrix to be encrypted according to the target type structural element corresponding to the two-dimensional data matrix to be encrypted, so as to obtain an encrypted ciphertext of the time series data to be encrypted.
2. The artificial intelligence based 5G communication transmission encryption method according to claim 1, wherein the step of determining the number of first type points in the first type structural element corresponding to the two-dimensional data matrix to be encrypted comprises:
determining a statistical histogram corresponding to a two-dimensional data matrix to be encrypted according to the number of first type points in each sliding window in the binary image;
determining skewness of a statistical histogram corresponding to the two-dimensional data matrix to be encrypted according to the occurrence frequency of a sliding window of each first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted;
and determining the number of first type points in the first type structural element corresponding to the two-dimensional data matrix to be encrypted according to the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted.
3. The artificial intelligence based 5G communication transmission encryption method according to claim 2, wherein the calculation formula for determining the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted is:
Figure QLYQS_3
wherein the content of the first and second substances,
Figure QLYQS_4
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted, N is the maximum first type point magnitude in the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure QLYQS_5
for two-dimensional moments of data to be encryptedAnd the probability of the occurrence of the sliding window of the a-th first type point magnitude in the statistical histogram corresponding to the array.
4. The artificial intelligence based 5G communication transmission encryption method according to claim 3, wherein the calculation formula for determining the number of the first type points in the first type structural element corresponding to the two-dimensional data matrix to be encrypted is as follows:
Figure QLYQS_6
wherein, the first and the second end of the pipe are connected with each other,
Figure QLYQS_7
for the number of first type points in the first type structuring element corresponding to the two-dimensional data matrix to be encrypted,
Figure QLYQS_8
is the skewness of the statistical histogram corresponding to the two-dimensional data matrix to be encrypted,
Figure QLYQS_9
in order to preset the maximum skewness,
Figure QLYQS_10
in order to preset the minimum skewness,
Figure QLYQS_11
represents rounding down.
5. The artificial intelligence based 5G communication transmission encryption method according to claim 1, wherein the step of determining the discrete degree corresponding to each sliding window in the binary image comprises:
determining the number of jumping times corresponding to each sliding window in the binary image according to the position of each first type point in each sliding window in the binary image;
and determining the discrete degree corresponding to each sliding window in the binary image according to the jump times corresponding to each sliding window in the binary image.
6. The artificial intelligence based 5G communication transmission encryption method according to claim 5, wherein the calculation formula for determining the discrete degree corresponding to each sliding window in the binary image is as follows:
Figure QLYQS_12
wherein the content of the first and second substances,
Figure QLYQS_13
for the discrete degree corresponding to the ith sliding window in the binary image,
Figure QLYQS_14
and the number of jump times corresponding to the ith sliding window in the binary image.
7. The artificial intelligence based 5G communication transmission encryption method according to claim 1, wherein the step of screening each second type structural element comprises:
determining a discrete degree mean value corresponding to each sliding window in the binary image according to the discrete degree corresponding to each sliding window in the binary image, and taking the discrete degree mean value corresponding to each sliding window in the binary image as a discrete degree threshold value corresponding to each second type structural element;
obtaining the discrete degree corresponding to each second type structural element, calculating the difference value between the discrete degree corresponding to each second type structural element and the discrete degree threshold value corresponding to each second type structural element, and determining the discrete degree difference value corresponding to each second type structural element;
and screening the second type structural elements according to the discrete degree difference values corresponding to the second type structural elements, and taking the second type structural elements with the minimum discrete degree difference values as third type structural elements.
8. The artificial intelligence based 5G communication transmission encryption method according to claim 1, wherein the step of determining the matching degree of each third type structural element and the two-dimensional data matrix to be encrypted comprises:
and calculating the ratio of the number of the first type points of each third type structural element in the binary image to the number of all the first type points in the binary image, and taking the ratio as the matching degree of the corresponding third type structural element and the two-dimensional data matrix to be encrypted.
9. An artificial intelligence based encryption system for 5G communication transmissions, comprising a processor and a memory, wherein the processor is configured to process instructions stored in the memory to implement an artificial intelligence based encryption method for 5G communication transmissions according to any one of claims 1-8.
CN202211469502.XA 2022-11-22 2022-11-22 Artificial intelligence-based 5G communication transmission encryption system and method Active CN115580865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211469502.XA CN115580865B (en) 2022-11-22 2022-11-22 Artificial intelligence-based 5G communication transmission encryption system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211469502.XA CN115580865B (en) 2022-11-22 2022-11-22 Artificial intelligence-based 5G communication transmission encryption system and method

Publications (2)

Publication Number Publication Date
CN115580865A CN115580865A (en) 2023-01-06
CN115580865B true CN115580865B (en) 2023-03-10

Family

ID=84588074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211469502.XA Active CN115580865B (en) 2022-11-22 2022-11-22 Artificial intelligence-based 5G communication transmission encryption system and method

Country Status (1)

Country Link
CN (1) CN115580865B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111582034A (en) * 2020-04-07 2020-08-25 北京旋极信息技术股份有限公司 Method and equipment for extracting scene features
CN115150818A (en) * 2022-09-05 2022-10-04 光谷技术有限公司 Communication transmission encryption method based on artificial intelligence

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111582034A (en) * 2020-04-07 2020-08-25 北京旋极信息技术股份有限公司 Method and equipment for extracting scene features
CN115150818A (en) * 2022-09-05 2022-10-04 光谷技术有限公司 Communication transmission encryption method based on artificial intelligence

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于逻辑口令锁的整盘加密新方案;赵福祥等;《计算机科学》;20101015(第10期);全文 *

Also Published As

Publication number Publication date
CN115580865A (en) 2023-01-06

Similar Documents

Publication Publication Date Title
US7433910B2 (en) Method and apparatus for the parallel correlator and applications thereof
US8281138B2 (en) Steganalysis of suspect media
US7656942B2 (en) Denoising signals containing impulse noise
CN113904764A (en) Image encryption method based on multi-scale compressed sensing and Markov model
CN110021369B (en) Gene sequencing data compression and decompression method, system and computer readable medium
CN115460382B (en) Security and protection engineering monitoring data safety transmission method
CN116978011B (en) Image semantic communication method and system for intelligent target recognition
CN111464717B (en) Reversible information hiding method with contrast ratio pull-up by utilizing histogram translation
CN111126595A (en) Method and equipment for model compression of neural network
JP2008067361A (en) Encoding apparatus, decoding apparatus, encoding method, and program
CN110019184B (en) Method for compressing and decompressing ordered integer array
CN106682258B (en) Multi-operand addition optimization method and system in high-level comprehensive tool
CN115580865B (en) Artificial intelligence-based 5G communication transmission encryption system and method
CN112464901B (en) Face feature extraction method based on gradient face local high-order main direction mode
KR0181048B1 (en) Apparatus for transmitting bitplane compressed by means of triangle block
US7474793B2 (en) Methods for compression using a denoiser
CN113923314B (en) Reversible data hiding method and device
CN114676629A (en) Multi-means composite light weight processing method for modulation type recognition model
CN109389546B (en) Multi-block reversible watermark embedding method and device and watermark extracting method and device
JP6005273B2 (en) Data stream encoding method, transmission method, transmission method, encoding device for encoding data stream, transmission device, and transmission device
Mandal et al. Variant of LSB steganography algorithm for hiding information in RGB images
CN111816195A (en) Audio reversible steganography method, secret information extraction and carrier audio recovery method
CN111614864A (en) SVD and CBC mode combination-based image compression encryption transmission method
CN111008276A (en) Complete entity relationship extraction method and device
CN108471342B (en) Unequal error protection LT code encoding method suitable for progressive data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant