CN117834162A - Image transmission method, device, equipment and storage medium - Google Patents

Image transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN117834162A
CN117834162A CN202211201432.XA CN202211201432A CN117834162A CN 117834162 A CN117834162 A CN 117834162A CN 202211201432 A CN202211201432 A CN 202211201432A CN 117834162 A CN117834162 A CN 117834162A
Authority
CN
China
Prior art keywords
encryption
result
transmitted
character string
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211201432.XA
Other languages
Chinese (zh)
Inventor
张译友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Soyoung Technology Beijing Co Ltd
Original Assignee
Soyoung Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Soyoung Technology Beijing Co Ltd filed Critical Soyoung Technology Beijing Co Ltd
Priority to CN202211201432.XA priority Critical patent/CN117834162A/en
Publication of CN117834162A publication Critical patent/CN117834162A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides an image transmission method, an image transmission device and a storage medium, wherein the method comprises the following steps: converting the picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted in a first encryption mode to obtain a first encryption result; splicing the preset information value with the first encryption result to obtain a splicing result; encrypting the splicing result by adopting a second encryption mode to obtain a second encryption result; and sending the preset information value, the first encryption result and the second encryption result to the client. By the application of the method and the device, the safe transmission of the user information can be ensured in the picture information transmission process.

Description

Image transmission method, device, equipment and storage medium
Technical Field
The application belongs to the technical field of image processing, and particularly relates to an image transmission method, an image transmission device and a storage medium.
Background
At present, medical cosmetology is an emerging consumer hot trend based on medical technology. Medical cosmetology is mainly divided into four types of plastic cosmetology (including micro plastic), skin cosmetology, injection cosmetology and oral cosmetology. Among them, the non-surgical micro-plastic project with high frequency, low price and noninvasive anti-aging is a future development trend. In recent years, along with the continuous improvement of the living standard of people and the continuous increase of the medical insurance demands of masses, the medical plastic and cosmetic industries are also continuously developed, the cosmetic industries are rapidly developed, modern medical and cosmetic technologies are increasingly developed, and the effect prediction and the risk prevention can be carried out through computer simulation and image processing technologies, so that the effect and the safety of micro-whole projects are greatly improved.
In the image processing process facing the user, the server side can change and adjust characteristic information (such as eyebrow shape, eye makeup, lip makeup and the like) in the image for a plurality of times, and sends the adjusted picture to the client side for the client side to perform and select. However, with the development of image recognition technology, the image information in the picture format is more and more easily cracked by the outside, so that the information security problem is more and more serious.
Disclosure of Invention
The image transmission method, the device, the equipment and the storage medium can ensure the safe transmission of the user information in the picture information transmission process.
An embodiment of a first aspect of the present application provides an image transmission method, including:
converting a picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted by adopting a first encryption mode to obtain a first encryption result;
splicing the preset information value with the first encryption result to obtain a splicing result;
encrypting the spliced result by adopting a second encryption mode to obtain a second encryption result;
and sending the preset information value, the first encryption result and the second encryption result to a client.
In some embodiments of the present application, encrypting the character string to be transmitted by using a first encryption manner to obtain a first encryption result includes:
encrypting the character string to be transmitted by adopting a preset encryption algorithm;
and performing base64 coding on the character string encrypted by the preset encryption algorithm to obtain a first encryption result.
In some embodiments of the present application, splicing the preset information value with the first encryption result includes:
base64 encoding is carried out on the preset information value;
and splicing the encoded information value with the first encryption result.
In some embodiments of the present application, the encrypting the splice result using the second encryption method includes:
and encrypting the splicing result by using a hash algorithm by using a preset secret key.
In some embodiments of the present application, the sending the preset information value, the first encryption result, and the second encryption result to the client includes:
storing the preset information value, the first encryption result and the second encryption result as temporary files, and converting the temporary files into output character strings;
and sending the output character string to a client.
In some embodiments of the present application, after the converting the temporary file into the output string, the method further includes:
and storing the output character string in an encrypted private address, and cleaning regularly.
In some embodiments of the present application, the converting the picture to be transmitted into the character string to be transmitted includes:
receiving a picture acquisition request sent by a client, and determining a request field in the picture acquisition request;
and if the request field is a first value, performing base64 encoding on the picture to be transmitted, and converting the picture to be transmitted into a character string to be transmitted.
An embodiment of a second aspect of the present application provides an image transmission apparatus, including:
the first encryption module is used for converting the picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted in a first encryption mode to obtain a first encryption result;
the splicing module is used for splicing the preset information value with the first encryption result and obtaining a splicing result;
the second encryption module is used for encrypting the splicing result in a second encryption mode to obtain a second encryption result;
and the sending module is used for sending the preset information value, the first encryption result and the second encryption result to the client in the form of character strings.
An embodiment of a third aspect of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the computer program to implement the method of the first aspect.
An embodiment of the fourth aspect of the present application provides a computer readable storage medium having stored thereon a computer program for execution by a processor to implement the method of the first aspect.
The technical scheme provided in the embodiment of the application has at least the following technical effects or advantages:
in the embodiment of the application, firstly, converting the picture information into a character string, then sequentially encrypting, splicing and re-encrypting the character string, and finally, presetting a characteristic value, the picture information represented by the character string and finally encrypting and decrypting the result to be sent to the client so that the client can decrypt the encrypted picture information according to a preset secret key. Therefore, the encrypted picture information can be sent to the client in the form of character strings, so that the safety and reliability in the picture information transmission process are ensured. In this embodiment, the preset information value, the first encryption result and the second encryption result are all sent to the client, and the client can decrypt the second encryption result according to the iv value on one hand to obtain the splicing result. And then, a first encryption result is solved based on the splicing result and the iv value, and then, the solved first encryption result is decrypted based on a preset key to obtain a picture to be transmitted. On the other hand, the received first encryption result can be directly decrypted based on the preset secret key, and the picture to be transmitted can also be obtained. And then the client can compare the pictures to be transmitted which are solved twice, and if the two pictures to be transmitted which are solved are the same picture, the picture transmission process is safe and reliable. If the two pictures to be transmitted are not the same picture, the picture transmission process is unsafe, the pictures to be transmitted can be intercepted and cracked by people, and the risk of information leakage exists.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures.
In the drawings:
fig. 1 is a schematic flow chart of an image transmission method according to an embodiment of the present application;
FIG. 2a shows an original picture sent by a client;
fig. 2b shows a picture to be transmitted after modification at the server side;
fig. 3 is a schematic flow chart of another image transmission method according to an embodiment of the present application;
fig. 4 is a schematic structural view of an image transmission device according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 6 shows a schematic diagram of a storage medium according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
Image transmission methods, apparatuses, devices and storage media according to embodiments of the present application are described below with reference to the accompanying drawings.
Currently, in the image processing process facing the user, when the server side sends the adjusted picture information to the client side, the picture is mostly directly transmitted (for example, a file in a picture format is stored first, and then the file is sent to the client side). However, with the development of image recognition technology, the image information in the picture format is more and more easily cracked by the outside, so that the information security problem is more and more serious. Therefore, the information transmission in the picture format is directly carried out, and the related requirements of the new national standard on the information security cannot be met.
Based on this, the embodiment provides an image transmission method, which firstly converts the picture information into a character string, then encrypts the character string by a series of algorithms, and finally sends the preset information value, the picture information represented by the character string and the final encryption result to the client side together, so that the client side decrypts the encrypted picture information according to the preset key. Therefore, the encrypted picture information can be sent to the client in the form of character strings, so that the safety and reliability in the picture information transmission process are ensured.
As shown in fig. 1, the image transmission method may include the steps of:
step S1, converting the picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted in a first encryption mode to obtain a first encryption result.
The execution body of the embodiment may be any device that needs to perform image transmission, for example, but not limited to, a server for performing various image operations in the medical industry. The embodiment may be a single server device, or a server cluster, or a cloud service platform, which is not limited in particular, so long as data transmission such as pictures and characters can be performed. Specifically, the method can be applied to the image processing process facing the user, the server can change and adjust the characteristic information (such as eyebrow shape, eye makeup, lip makeup and the like) in the image, and after receiving the image acquisition request of the client, the server sends the modified image to the client.
The image to be transmitted is, for example, but not limited to, an eyebrow change image to be encrypted, that is, the original face image is uploaded by the client (as shown in fig. 2 a), and after the server modifies the eyebrow in the original face image, the image to be transmitted is formed (as shown in fig. 2 b).
When the server side sends the modified picture to the client side, the picture to be transmitted can be converted into a character string to be transmitted, so that the picture information is encrypted by adopting an encryption algorithm. After the transmission character string is converted into the transmission character string, the character string to be transmitted can be encrypted in a first encryption mode, and a first encryption result is obtained. The first encryption result may be understood as a string encrypted by an encryption algorithm. The first encryption mode may be any encryption mode of a character string, and the client may decrypt the corresponding key if the key is preset to the client.
In view of the transition period of encryption and non-encryption of the picture information currently in the information security requirement, an interface call branch can be additionally arranged at the server, and corresponding to different request fields, encryption operation and non-encryption operation are respectively carried out when the picture information is transmitted. For example, when the request field is 1, an encryption operation is performed, that is, the image transmission method provided by the present embodiment is executed; when the request field is 0, non-encryption operation, i.e., normal picture transmission is performed. Here, normal picture transmission is understood to mean that image information is transmitted to a client in the form of pictures.
Based on the above technical scheme of calling branches by adding interfaces, after receiving a picture acquisition request sent by a client, a server may first determine a request field in the picture acquisition request. If the request field is the first value, base64 encoding is carried out on the picture to be transmitted, and the picture to be transmitted is converted into a character string to be transmitted, so that subsequent algorithm encryption and data transmission processes are carried out. If the request field is the second value, the picture to be transmitted is directly sent to the client in a picture format.
The Base64 is one of encoding modes for transmitting 8Bit byte codes, and is a method for representing binary data based on 64 printable characters, and can be used for transmitting longer identification information in an HTTP environment. Because the Base64 coding is unreadable, the pictures can be read after decoding, and the safety of the picture transmission is higher. It is to be understood that the present embodiment is not limited to the Base64 encoding mode, as long as the picture to be transmitted can be converted into a character string to be transmitted, and the character string can be, but is not limited to, a 16-ary character string.
After the server converts the picture to be transmitted into the character string to be transmitted, the character string to be transmitted can be encrypted by adopting a preset encryption algorithm, and then the character string encrypted by the preset encryption algorithm is subjected to base64 coding, so that a first encryption result is obtained. In this embodiment, after the character string to be transmitted is encrypted, the data is changed, so that in order to facilitate transmission in the HTTP environment, the encrypted character string may be base64 encoded, so as to improve the security and transmission efficiency of the transmission of the picture information.
Specifically, the preset encryption algorithm may be an AES (Advanced Encryption Standard ) encryption algorithm, which has the advantages of fast encryption speed and higher security, so that the encryption and decryption process is more efficient and safer. It will be appreciated that AES encryption is a preferred embodiment, and the present embodiment is not limited to AES encryption, but is also not limited to symmetric encryption algorithms, as long as the client can decrypt according to the corresponding key after encryption.
And S2, splicing the preset information value with the first encryption result to obtain a splicing result.
The preset information value is also called a preset IV (Information Value) value, and can be used for encoding an input variable and evaluating the prediction capability, and the magnitude of the IV value can represent the strength of the prediction capability of a certain variable, and the value range is [0, positive infinity). In this embodiment, the IV value is set separately and is set for a certain variable, so it is not used to represent the strength of the prediction capability of a certain variable, but only used as a key transmission parameter in the encryption and decryption process for the first encryption result, and it may be any character string, so long as the IV value is transmitted to the client, it can perform decryption operation based on the IV value and a preset key, and can present a picture to the user for display. In this embodiment, the IV value is specifically but not limited to a 16-bit string with each bit being 0.
When the server side splices the preset information value and the first encryption result, the base64 coding can be performed on the preset information value, and then the coded information value and the first encryption result are spliced. Therefore, the two character strings are spliced, the encrypted data structure can be changed, so that the encrypted data is not easy to crack, and the safety of picture transmission can be further improved.
The splicing of the preset information value and the first encryption result can be understood as connecting the character string of the preset information value and the character string of the first encryption result, one in the previous and subsequent forms, into a long character string. And the present embodiment is not particularly limited as to which character string is before and which character string is after.
And S3, encrypting the spliced result by adopting a second encryption mode to obtain a second encryption result.
Any encryption algorithm can be adopted in the second encryption mode, so long as the splicing result can be encrypted, and the client can decrypt according to the corresponding secret key.
In some embodiments, when the second encryption mode is used to encrypt the splicing result, a preset key may be used to encrypt the splicing result by using a hash algorithm. The preset key and the splicing result are used as key transmission parameters to jointly carry out hash encryption. Specifically, the preset key and the splicing result can be input into a hash encryption function to obtain a corresponding second encryption result.
Wherein the preset key may be, but is not limited to, a randomly generated 16-bit string. The hash encryption function may be somewhat limited to the hmac SHA256 encryption function.
And S4, transmitting the preset information value, the first encryption result and the second encryption result to the client.
In this embodiment, the preset information value, the first encryption result and the second encryption result are all sent to the client, and the client can decrypt the second encryption result according to the iv value on one hand to obtain the splicing result. And then, a first encryption result is solved based on the splicing result and the iv value, and then, the solved first encryption result is decrypted based on a preset key to obtain a picture to be transmitted. On the other hand, the received first encryption result can be directly decrypted based on the preset secret key, and the picture to be transmitted can also be obtained. And then the client can compare the pictures to be transmitted which are solved twice, and if the two pictures to be transmitted which are solved are the same picture, the picture transmission process is safe and reliable. If the two pictures to be transmitted are not the same picture, the picture transmission process is unsafe, the pictures to be transmitted can be intercepted and cracked by people, and the risk of information leakage exists.
When the client sends the preset information value, the first encryption result and the second encryption result to the client, the client can store the preset information value, the first encryption result and the second encryption result as temporary files and convert the temporary files into output character strings. Therefore, the three data of the preset information value, the first encryption result and the second encryption result can be recorded in one output character string, the integrity of the data can be ensured, and the subsequent data transmission is more convenient.
After the client converts the temporary file into the output character string, the output character string can be sent to the client, so that multiple items of data comprising the twice-encrypted pictures to be transmitted are sent to the client at one time in a character form, the safety of the pictures to be transmitted is guaranteed, information leakage can be effectively prevented, the high efficiency and instantaneity of data transmission are guaranteed, and the implementation and popularization of online picture transmission are facilitated.
The temporary file may be, but is not limited to, a json file, which is a lightweight data exchange format, based on a subset of ECMAScript (js specification formulated by european computer association), and uses a text format completely independent of programming language to store and represent data, which is easy to read and write, and easy to machine parse and generate. For many Web applications to exchange data. Which is itself a string of characters but has a fixed format, and strings conforming to this format, we call json strings. json files are files used to store simple data structures and objects.
After the temporary file is converted into the output character string, the output character string can be stored in the encrypted private address, so that only a white list person who knows the encrypted private address can decrypt the private address and acquire data from the encrypted private address. The security and confidentiality of the temporary file can be guaranteed, so that the security of the picture to be transmitted is further guaranteed.
Wherein the private address may be, but is not limited to, a private address in a cloud platform.
In view of the limited storage space of the private domain address, the data in the private domain address can be cleaned periodically. For example, the private domain address can be cleaned every one month, half year, ten days, etc. to prevent network congestion caused by too much data in the private domain address.
In addition, when the preset information value, the first encryption result and the second encryption result are sent to the client, the encrypted private domain address containing the preset information value, the first encryption result and the second encryption result can be sent to the client, and the client can directly obtain the preset information value, the first encryption result, the second encryption result and the like from the encrypted private domain address, so that the picture transmission efficiency can be further improved.
The present application will now be described in detail with reference to fig. 3 and the following examples.
1. Uploading an eyebrow-shaped picture to be encrypted, converting the picture into a base64 character string, and performing AES encryption;
2. performing base64 coding on the 16-system character string after AES encryption;
3. setting an iv value and a key value as key transmission parameters in the encryption and decryption process, performing base64 coding on the iv value, and splicing the iv value and the result of the step 2;
4. taking the key value and the result in the step 3 as parameter transmission, and jointly encrypting the hmac SHA 256;
5. storing the iv value, the encryption result of the picture and the result of the step 4 into a json file;
6. performing base64 coding on the json file in the step 5, and storing the json file as a temporary file to output;
7. changing the encrypted private domain address, storing the temporary file in the step 6 in the private domain address, and cleaning regularly;
8. adding an interface call branch, performing encryption operation when a request field is 1, and performing normal picture transmission when the request field is 0;
9. the client obtains the corresponding encrypted file at the private address, and carries out decryption operation according to the preset iv value and key value, and displays the decrypted file to the user for display.
In summary, in the image transmission method provided in this embodiment, the image information is first converted into a character string, then the character string is sequentially encrypted, spliced and re-encrypted, and finally the preset feature value, the image information represented by the character string and the final encryption result are sent to the client, so that the client decrypts the encrypted image information according to the preset key. Therefore, the encrypted picture information can be sent to the client in the form of character strings, so that the safety and reliability in the picture information transmission process are ensured. In this embodiment, the preset information value, the first encryption result and the second encryption result are all sent to the client, and the client can decrypt the second encryption result according to the iv value on one hand to obtain the splicing result. And then, a first encryption result is solved based on the splicing result and the iv value, and then, the solved first encryption result is decrypted based on a preset key to obtain a picture to be transmitted. On the other hand, the received first encryption result can be directly decrypted based on the preset secret key, and the picture to be transmitted can also be obtained. And then the client can compare the pictures to be transmitted which are solved twice, and if the two pictures to be transmitted which are solved are the same picture, the picture transmission process is safe and reliable. If the two pictures to be transmitted are not the same picture, the picture transmission process is unsafe, the pictures to be transmitted can be intercepted and cracked by people, and the risk of information leakage exists.
Based on the same concept as the image transmission method, the embodiment of the present application further provides an image transmission apparatus for performing the image transmission method provided in any one of the embodiments, as shown in fig. 4, where the apparatus includes:
the first encryption module 100 is configured to convert a picture to be transmitted into a character string to be transmitted, and encrypt the character string to be transmitted in a first encryption manner to obtain a first encryption result;
the splicing module 200 is configured to splice the preset information value with the first encryption result, and obtain a splicing result;
the second encryption module 300 is configured to encrypt the splicing result by using a second encryption manner, so as to obtain a second encryption result;
the sending module 400 is configured to send the preset information value, the first encryption result, and the second encryption result to the client in the form of a string.
The image transmission device provided by the above embodiment of the present application and the image transmission method provided by the embodiment of the present application are the same inventive concept, and have the same advantages as the method adopted, operated or implemented by the application program stored therein.
The embodiment of the application also provides an electronic device for executing the image transmission method. Referring to fig. 5, a schematic diagram of an electronic device according to some embodiments of the present application is shown. As shown in fig. 5, the electronic device 8 includes: processor 800, memory 801, bus 802 and communication interface 803, processor 800, communication interface 803 and memory 801 being connected by bus 802; the memory 801 stores a computer program executable on the processor 800, and the processor 800 executes the image transmission method according to any of the foregoing embodiments of the present application when executing the computer program.
The memory 801 may include a high-speed random access memory (RAM: random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory. The communication connection between the device network element and the at least one other network element is achieved through at least one communication interface 803 (which may be wired or wireless), the internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
Bus 802 may be an ISA bus, a PCI bus, or an EISA bus, among others. The buses may be divided into address buses, data buses, control buses, etc. The memory 801 is configured to store a program, and the processor 800 executes the program after receiving an execution instruction, and the image transmission method disclosed in any of the foregoing embodiments of the present application may be applied to the processor 800 or implemented by the processor 800.
The processor 800 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the methods described above may be performed by integrated logic circuitry in hardware or instructions in software in processor 800. The processor 800 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but may also be a Digital Signal Processor (DSP), application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in the memory 801, and the processor 800 reads information in the memory 801 and performs the steps of the above method in combination with its hardware.
The electronic device provided by the embodiment of the application and the image transmission method provided by the embodiment of the application are the same in inventive concept, and have the same beneficial effects as the method adopted, operated or implemented by the electronic device.
The present embodiment also provides a computer readable storage medium corresponding to the image transmission method provided in the foregoing embodiment, referring to fig. 6, the computer readable storage medium is shown as an optical disc 30, on which a computer program (i.e. a program product) is stored, and the computer program when executed by a processor performs the image transmission method provided in any of the foregoing embodiments.
It should be noted that examples of the computer readable storage medium may also include, but are not limited to, a phase change memory (PRAM), a Static Random Access Memory (SRAM), a Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash memory, or other optical or magnetic storage medium, which will not be described in detail herein.
The computer readable storage medium provided by the above-described embodiments of the present application has the same advantageous effects as the method adopted, operated or implemented by the application program stored therein, for the same inventive concept as the image transmission method provided by the embodiments of the present application.
It should be noted that:
in the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the present application may be practiced without these specific details. In some instances, well-known structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the application, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the application and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the following schematic diagram: i.e., the claimed application requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the present application and form different embodiments. For example, in the following claims, any of the claimed embodiments can be used in any combination.
The foregoing is merely a preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An image transmission method, comprising:
converting a picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted by adopting a first encryption mode to obtain a first encryption result;
splicing the preset information value with the first encryption result to obtain a splicing result;
encrypting the spliced result by adopting a second encryption mode to obtain a second encryption result;
and sending the preset information value, the first encryption result and the second encryption result to a client.
2. The method of claim 1, wherein encrypting the character string to be transmitted using the first encryption method to obtain a first encryption result comprises:
encrypting the character string to be transmitted by adopting a preset encryption algorithm;
and performing base64 coding on the character string encrypted by the preset encryption algorithm to obtain a first encryption result.
3. The method of claim 2, wherein concatenating the predetermined information value with the first encryption result comprises:
base64 encoding is carried out on the preset information value;
and splicing the encoded information value with the first encryption result.
4. The method of claim 1, wherein encrypting the splice result using a second encryption method comprises:
and encrypting the splicing result by using a hash algorithm by using a preset secret key.
5. The method of claim 1, wherein the sending the preset information value, the first encryption result, and the second encryption result to the client comprises:
storing the preset information value, the first encryption result and the second encryption result as temporary files, and converting the temporary files into output character strings;
and sending the output character string to a client.
6. The method of claim 5, wherein after converting the temporary file into an output string, further comprising:
and storing the output character string in an encrypted private address, and cleaning regularly.
7. The method according to any one of claims 1-6, wherein converting the picture to be transmitted into the character string to be transmitted comprises:
receiving a picture acquisition request sent by a client, and determining a request field in the picture acquisition request;
and if the request field is a first value, performing base64 encoding on the picture to be transmitted, and converting the picture to be transmitted into a character string to be transmitted.
8. An image transmission apparatus, comprising:
the first encryption module is used for converting the picture to be transmitted into a character string to be transmitted, and encrypting the character string to be transmitted in a first encryption mode to obtain a first encryption result;
the splicing module is used for splicing the preset information value with the first encryption result and obtaining a splicing result;
the second encryption module is used for encrypting the splicing result in a second encryption mode to obtain a second encryption result;
and the sending module is used for sending the preset information value, the first encryption result and the second encryption result to the client in the form of character strings.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor runs the computer program to implement the method of any one of claims 1-7.
10. A computer readable storage medium having stored thereon a computer program, wherein the program is executed by a processor to implement the method of any of claims 1-7.
CN202211201432.XA 2022-09-29 2022-09-29 Image transmission method, device, equipment and storage medium Pending CN117834162A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211201432.XA CN117834162A (en) 2022-09-29 2022-09-29 Image transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211201432.XA CN117834162A (en) 2022-09-29 2022-09-29 Image transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117834162A true CN117834162A (en) 2024-04-05

Family

ID=90505021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211201432.XA Pending CN117834162A (en) 2022-09-29 2022-09-29 Image transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117834162A (en)

Similar Documents

Publication Publication Date Title
CN111865586B (en) Method and device for encrypting product information
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN107579962B (en) A kind of method and device of source code encryption and decryption
CN101996155B (en) Processor supporting a plurality of command systems
WO2008141992A1 (en) Method and apparatus for encrypting and decrypting software
CN109145632A (en) For generating the method and device of traceable file
CN110019075B (en) Log encryption method and device and log decryption method and device
CN107800716B (en) Data processing method and device
CN114124364B (en) Key security processing method, device, equipment and computer readable storage medium
JP6930053B2 (en) Data encryption method and system using device authentication key
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
US20020138750A1 (en) Method of enabling one or more functional blocks of a controller
CN113055184B (en) Data encryption and decryption method and device
CN117834162A (en) Image transmission method, device, equipment and storage medium
CN114640443B (en) Online engineering quotation safety interaction method and system
CN103605927A (en) Encryption and decryption method based on embedded Linux system
CN116170157A (en) User password encryption and decryption method and device based on national encryption algorithm
JP6246516B2 (en) Information processing system
CN113645183B (en) Data encryption transmission method, system, computer equipment and storage medium
CN110971581A (en) Encrypted data processing method and device
CN114465720A (en) Key migration method and device, storage medium and electronic equipment
CN113886850A (en) Information encryption method, decryption method, device, electronic equipment and storage medium
JP6631989B2 (en) Encryption device, control method, and program
KR20130122177A (en) Method and apparatus for encryption for modbus communication
CN114500037B (en) Configurable interface encryption method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination