CN115879137B - Data encryption-based supervision project information management system and method - Google Patents

Data encryption-based supervision project information management system and method Download PDF

Info

Publication number
CN115879137B
CN115879137B CN202310148820.4A CN202310148820A CN115879137B CN 115879137 B CN115879137 B CN 115879137B CN 202310148820 A CN202310148820 A CN 202310148820A CN 115879137 B CN115879137 B CN 115879137B
Authority
CN
China
Prior art keywords
value
segment
data
representing
segments
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310148820.4A
Other languages
Chinese (zh)
Other versions
CN115879137A (en
Inventor
王斌
单宏超
孙宏鸣
高飞
杨月榕
王军民
段志国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Tianhang Consulting Supervision Co ltd
Original Assignee
Zhejiang Tianhang Consulting Supervision Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Tianhang Consulting Supervision Co ltd filed Critical Zhejiang Tianhang Consulting Supervision Co ltd
Priority to CN202310148820.4A priority Critical patent/CN115879137B/en
Publication of CN115879137A publication Critical patent/CN115879137A/en
Application granted granted Critical
Publication of CN115879137B publication Critical patent/CN115879137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data encryption storage, and provides a supervision project information management system and method based on data encryption, comprising the following steps: acquiring information of a supervision item and converting the information into an initial binary code; performing bit-increasing operation on the initial binary code and decimal conversion to obtain first data values, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining an optimal first segment according to a comparison result of first total frequencies of the two first segments; dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain gamma conversion parameters, and converting the first data value to obtain a second encryption value; the second encrypted value for each initial binary is stored. The invention reduces the regularity between the ciphertext and the plaintext through gamma conversion so as to increase the data privacy.

Description

Data encryption-based supervision project information management system and method
Technical Field
The invention relates to the field of data encryption storage, in particular to a supervision project information management system and method based on data encryption.
Background
The construction unit is used for ensuring the smooth implementation and completion of the project, and normally entrusts a supervision unit to supervise and manage the project according to legal regulations and technical requirements in the project proceeding stage, wherein the supervision project information comprises data information with higher privacy, such as contract information, project design information and the like; if the project data are encrypted without necessary means in the process of monitoring the project information storage, the risk of the project information being attacked and even tampered and stolen is greatly increased; therefore, necessary encryption processing is needed to be carried out on the supervision project information, the privacy of data is increased, and the risk of leakage caused by attack is reduced.
The traditional data encryption mainly takes an entropy coding encryption mode, the probability distribution information of the data is analyzed to encrypt, no information quantity is lost in the encoding process, but the encryption algorithm can also be broken through the regularity of frequency information; there is a need for an encryption method that can reduce the privacy between ciphertext and plaintext to increase the privacy of data.
Disclosure of Invention
The invention provides a data encryption-based management project information management system and a method thereof, which aim to solve the problem that the regularity between ciphertext and plaintext in the existing data encryption is relatively large and is easy to be cracked, and the adopted technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for managing information of a supervision item based on data encryption, including the steps of:
acquiring information of a supervision item and converting the information into an initial binary code;
performing bit increment operation on each initial binary code to obtain first binary codes, and performing decimal conversion on each first binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, dividing the first data histogram for the first time to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
the second encrypted value for each initial binary is stored.
Optionally, the acquiring the supervision item information and converting the supervision item information into the initial binary code includes the following steps:
all characters in the supervision project information are converted into ASCII codes, then the ASCII codes are converted into binary codes, bit filling operation with the fixed length of 7 is carried out on all the binary codes, 0 is filled before the binary codes with the fixed length not meeting the requirement are filled, and the binary codes with the filled bits are recorded as initial binary codes.
Optionally, the obtaining the first binary code includes the following steps:
and adding 0 to each initial binary code at the tail end to perform bit increasing operation to obtain a first binary code with fixed length of 8.
Optionally, the acquiring the optimal first segment includes the following steps:
Figure SMS_1
wherein,,
Figure SMS_3
representing the ratio of the first total frequencies of two first segments, which are +.>
Figure SMS_7
And
Figure SMS_9
,/>
Figure SMS_2
indicating the +.f in the first segment>
Figure SMS_5
Frequency of the first data value, +.>
Figure SMS_8
Representing the second in the second first segment
Figure SMS_10
The frequency of the first data values; />
Figure SMS_4
A first total frequency representing a first segment,/I>
Figure SMS_6
A first sum frequency representing a second first segment;
ratio of the first total frequency
Figure SMS_11
Comparing with a first preset threshold value when ∈>
Figure SMS_12
When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>
Figure SMS_13
And when the first segment is smaller than or equal to a first preset threshold value, taking the second first segment as the optimal first segment.
Optionally, the acquiring the second value range of the gamma conversion parameter includes the following steps:
the best first segment is expressed as
Figure SMS_14
The two second sections are +.>
Figure SMS_15
And->
Figure SMS_16
Figure SMS_17
Wherein,,
Figure SMS_18
representing the ratio of the second total frequencies of the two second segments, +.>
Figure SMS_19
Indicating the +.f in the first second segment>
Figure SMS_20
Frequency of the first data value, +.>
Figure SMS_21
Indicating the +.>
Figure SMS_22
The frequency of the first data values; />
Figure SMS_23
A second total frequency representing the first second segment,/a second total frequency representing the first second segment>
Figure SMS_24
A second total frequency representing a second segment;
ratio of the second total frequency
Figure SMS_25
And comparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter.
Optionally, the obtaining the second value range of the gamma transformation parameter includes the following steps:
Figure SMS_26
Figure SMS_27
representing the ratio of the first total frequencies of all first data values in two first segments, +.>
Figure SMS_28
Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->
Figure SMS_29
Representing a first preset thresholdValue of->
Figure SMS_30
Representing the gamma transformation parameters.
Optionally, the obtaining the second encrypted value of each initial binary code includes the following steps:
Figure SMS_31
wherein,,
Figure SMS_32
second encryption value representing initial binary encoding,/->
Figure SMS_33
For the definition field of the first data value, +.>
Figure SMS_34
First data value representing an initial binary encoding,/->
Figure SMS_35
Representing gamma transformation parameters, +.>
Figure SMS_36
Representing rounding-to-rounding functions.
In a second aspect, another embodiment of the present invention provides a data encryption-based management item information management system, including:
the information acquisition module acquires the information of the supervision project and converts the information into an initial binary code;
and a data processing module: performing bit increment operation and decimal conversion on each initial binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, performing first division to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
and a data storage module: the second encrypted value for each initial binary is stored.
Compared with the prior art, the invention has the beneficial effects that: the self-adaptive gamma conversion is used for encrypting the data, so that regularity between ciphertext and plaintext can be effectively reduced, gamma conversion parameters are selected pertinently according to the frequency of the data, the numerical difference between the high-frequency data ciphertext and plaintext can be larger, and further the privacy of the data is improved, and the relevance is reduced.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a flowchart of a method for managing information of a supervision item based on data encryption according to an embodiment of the present invention;
FIG. 2 is a block diagram of a management system for managing project information based on data encryption according to another embodiment of the present invention;
FIG. 3 is a graph showing the input and output results under different gamma conversion parameters.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart of a method for managing information of a supervision item based on data encryption according to an embodiment of the invention is shown, and the method includes the following steps:
and S001, acquiring the supervision item information and converting the supervision item information into an initial binary code.
It should be noted that, the purpose of this embodiment is to encrypt and store the supervision item information, where the supervision item information includes digital information, text information and identifier information, and when the computer performs data storage transmission, only binary data of 0 or 1 can be generally identified, so that code system conversion needs to be performed on the supervision item information, and the supervision item information can be converted into ASCII code first and then into binary code; meanwhile, the value of the ASCII code is larger than 64, the corresponding binary code length is 7 bits, and less than 7 bits of 64 are needed to be subjected to bit filling operation.
Specifically, converting text information into an English letter form formed by pinyin, converting all characters in the supervision project information into ASCII codes, converting the ASCII codes into binary codes, performing bit filling operation of which the fixed length is 7 on all the binary codes, filling 0 before coding the binary codes which do not meet the fixed length, and marking the binary codes with the completed bit filling as initial binary codes; for example, if the ASCII code value of a certain character is 60, the converted binary code is 111100, and the code length is 6 bits, the number of bits added with 0 before the binary code is 1, and the initial binary code 0111100 of 7 bits is obtained.
Step S002, performing bit-increasing operation on the initial binary code and decimal conversion to obtain a first data value, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining the optimal first segment according to the comparison result of the first total frequency of the two first segments.
It should be noted that the initial binary code is 7-bit binary code, and is converted into decimal definitionThe domain is
Figure SMS_37
In order to make it possible to distribute the decimal values corresponding to the initial binary code more evenly in the definition field +.>
Figure SMS_38
In between, an increment operation is required for the initial binary code.
Specifically, each initial binary code is supplemented with 0 at the tail to obtain a first binary code with 8 bits, and then the first binary code is converted into a decimal value to obtain a corresponding first data value; for example, the initial binary code is 0111100, converted to decimal 60, the first binary code after the increment operation is 01111000, and the first data value converted to decimal is 120.
It should be further noted that, all characters in the supervision item information correspond to a first data value at this time, the occurrence frequencies of the first data values are counted to obtain a first data histogram, the obtained first data histogram includes a plurality of square columns, each square column represents a first data value, and the frequency of the square column represents the occurrence frequency of the first data value; the embodiment can further achieve the encryption effect on the first data value through transformation operations such as stretching of the first data histogram; the gamma conversion is an image enhancement technology by means of exponential conversion mapping, and is performed by combining the frequencies of different square columns in the histogram, so that the regularity between the encrypted data and the first encryption value is reduced to a greater extent; the first data values are already uniformly distributed in the definition domain
Figure SMS_39
And in the method, all the first data values can be transformed by utilizing gamma transformation, the adaptive gamma transformation parameters are selected according to the overall frequency distribution of square columns, and the square columns with larger frequency are stretched, so that the range of the encrypted value range is enlarged, and the decryption difficulty is further increased.
Referring to FIG. 3, a graph showing the input and output results for different gamma conversion parameters is shown, wherein the horizontal axis is input and the vertical axis is output, when the gamma conversion parameters are
Figure SMS_40
When the brightness is larger than 1, the low gray value of the image is compressed, and the high gray value is stretched, so that the effect of strengthening the bright part, namely darkening the image is realized; but->
Figure SMS_41
When the brightness is less than 1, the high gray value of the image is compressed and the low gray value is stretched, so that the effect of enhancing the dark part, i.e., improving the brightness of the image is achieved.
Specifically, first, the first data histogram is divided for the first time to obtain two first segments, which are respectively
Figure SMS_42
And->
Figure SMS_43
Counting the first sum frequency of all the first data values in the two first segments and obtaining the ratio +.>
Figure SMS_44
The specific calculation method comprises the following steps:
Figure SMS_45
wherein,,
Figure SMS_46
indicating the +.f in the first segment>
Figure SMS_47
Frequency of the first data value, +.>
Figure SMS_48
Indicating the +.f in the second first segment>
Figure SMS_49
The frequency of the first data values; />
Figure SMS_50
Representation ofFirst total frequency in first segment, < > first total frequency in first segment>
Figure SMS_51
Representing a first total frequency within a second first segment.
In the formula, the denominator is added by 1 to prevent the denominator from being 0, and the denominator is added by 1 to balance the influence of the calculation result after the denominator is added by 1, so that the embodiment obtains the denominator by adding 1
Figure SMS_52
Still considered as the ratio of the first total frequency of all first data values within the two first segments.
In this embodiment, a first preset threshold value is given
Figure SMS_55
In this embodiment->
Figure SMS_57
For example; when (when)
Figure SMS_59
When it is indicated that the first total frequency in the first segment is greater than the first total frequency in the second first segment, i.e +.>
Figure SMS_54
The total frequency of the gamma conversion parameters is larger, and the low gray value part corresponding to the gamma conversion needs to be stretched, wherein the first value range of the gamma conversion parameters is +.>
Figure SMS_56
Taking the first segment as the optimal first segment; when->
Figure SMS_58
Indicating that the first total frequency in the second first segment is greater than or equal to the first total frequency in the first segment, i.e
Figure SMS_60
The total frequency of the gamma conversion is higher, namely highThe gray-scale value part is stretched, and the first value range of the gamma transformation parameter is +.>
Figure SMS_53
The second first segment is taken as the best first segment.
At this time, the first value range of the gamma conversion parameter is obtained according to the frequency distribution of the first data value, and the part with larger frequency can be stretched in a self-adaptive manner according to the frequency distribution condition of the first data value, so that the value range after encryption becomes larger, and the decryption difficulty is increased; however, the first value range is larger at this time, and a specific gamma transformation parameter cannot be obtained, so that a better encryption effect is achieved. Step S003, dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain a gamma conversion parameter, and converting the first data value to obtain a second encryption value.
It should be noted that, in step S002, the first value range has been obtained preliminarily according to the frequency distribution of the first data value, and according to the frequency distribution condition in the optimal first segment, the second value range is obtained by further segment comparison, and the central value of the second value range is used as the gamma conversion parameter to convert the first data value to obtain the second encryption value.
Specifically, the optimal first segment is divided a second time, and the optimal first segment is marked as
Figure SMS_61
The two second sections obtained are +.>
Figure SMS_62
And->
Figure SMS_63
Counting the second total frequency of all the first data values in the two second segments and obtaining the ratio +.>
Figure SMS_64
The specific calculation method comprises the following steps:
Figure SMS_65
wherein,,
Figure SMS_66
indicating the +.f in the first second segment>
Figure SMS_67
Frequency of the first data value, +.>
Figure SMS_68
Indicating the +.>
Figure SMS_69
The frequency of the first data values; />
Figure SMS_70
A second total frequency representing the first second segment,/a second total frequency representing the first second segment>
Figure SMS_71
Representing a second total frequency of a second segment.
In the formula, the denominator is added by 1 to prevent the denominator from being 0, and the denominator is added by 1 to balance the influence of the calculation result after the denominator is added by 1, so that the embodiment obtains the denominator by adding 1
Figure SMS_72
Still considered as the ratio of the second total frequency of all the first data values within the two second segments.
The first preset threshold value has been given in step S002
Figure SMS_73
When->
Figure SMS_77
Description of->
Figure SMS_80
The second total frequency of the first second segment is greater than the second segmentIs +.>
Figure SMS_75
The total frequency of the frequency band is relatively large,
Figure SMS_76
the smaller gray value part of the steel wire rope is required to be stretched; when->
Figure SMS_79
Description of->
Figure SMS_81
The second total frequency of the second segment is greater than or equal to the second total frequency of the first second segment, i.e.)>
Figure SMS_74
The total frequency of (a) is greater, and (b) is->
Figure SMS_78
The larger part of the gray scale value of (a) needs to be stretched.
Referring to fig. 3, the tensile patterns with large differences still result from different gamma conversion parameters in the same first value range, so that the second value range of the obtained gamma conversion parameters is specifically:
Figure SMS_82
taking the central value of the second value range as the gamma conversion parameter, namely
Figure SMS_83
The values in the four cases were 0.3, 0.6, 3 and 6, respectively; it should be further noted that, because the gamma conversion is a power law conversion, directly converting the first data value may make the obtained value range too large to affect the display of the encrypted data, and the normalized power law conversion needs to be performed by using the definition domain of the first data value to obtain the encrypted second encrypted value, and the calculation method for converting the first data value into the second encrypted value is as follows:
Figure SMS_84
wherein,,
Figure SMS_85
second encryption value representing initial binary encoding,/->
Figure SMS_86
For the definition field of the first data value, +.>
Figure SMS_87
First data value representing an initial binary encoding,/->
Figure SMS_88
Representing gamma transformation parameters, +.>
Figure SMS_89
Representing a rounding function; it should be noted that, the initial binary code, the first data value and the second encrypted value are all in one-to-one correspondence.
Thus, the encryption of the initial binary code is completed to obtain a corresponding second encryption value, and the range of the value range of the second encryption value is also
Figure SMS_90
The encryption of the initial binary code is preferably accomplished with little regularity between the first data value and the integer of the original binary code due to stretching through the histogram and gamma transformation.
Step S004, the second encryption value of each initial binary code is stored.
Converting the initial binary codes of all letters in the supervision item information into a second encryption value, converting the second encryption value into 8-bit second binary codes for storage, and simultaneously converting gamma conversion parameters
Figure SMS_91
Stored as a key.
In the decryption process, firstly, the stored 8-bit second binary code is converted into decimal system to obtain a second encryption value, and the ratio of the second encryption value to 255 is according to
Figure SMS_92
And performing evolution operation, multiplying 255 to obtain a corresponding first data value, converting the first data value into a 8-bit first binary code, removing the last bit to obtain a 7-bit initial binary code, converting the 7-bit initial binary code into decimal to obtain a corresponding ASCII code value and obtaining original character information, and further finishing decryption of the second binary code.
Referring to fig. 2, a block diagram of a data encryption-based management system for managing project information according to another embodiment of the present invention is shown, where the system includes:
information acquisition module S101: and acquiring the supervision item information and converting the supervision item information into an initial binary code.
The data processing module S102:
(1) Performing bit-increasing operation on the initial binary code and decimal conversion to obtain first data values, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining an optimal first segment according to a comparison result of first total frequencies of the two first segments;
(2) Dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain gamma conversion parameters, and converting the first data value to obtain a second encryption value.
The data storage module S103: the second encrypted value for each initial binary is stored.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different manner from other embodiments, so that identical and similar parts of each embodiment are mutually referred to.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that:
reference in the specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. Thus, the appearances of the phrase "one embodiment" or "an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment.
In addition, the specific embodiments described in the present specification may differ in terms of parts, shapes of components, names, and the like. All equivalent or simple changes of the structure, characteristics and principle according to the inventive concept are included in the protection scope of the present invention. Those skilled in the art may make various modifications or additions to the described embodiments or substitutions in a similar manner without departing from the scope of the invention as defined in the accompanying claims.

Claims (5)

1. The management method for the supervision project information based on the data encryption is characterized by comprising the following steps:
acquiring information of a supervision item and converting the information into an initial binary code;
performing bit increment operation on each initial binary code to obtain first binary codes, and performing decimal conversion on each first binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, dividing the first data histogram for the first time to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
storing a second encryption value for each initial binary;
the method for obtaining the optimal first segment comprises the following specific steps:
Figure QLYQS_1
wherein,,
Figure QLYQS_3
representing the ratio of the first total frequencies of two first segments, which are +.>
Figure QLYQS_8
And
Figure QLYQS_10
,/>
Figure QLYQS_4
indicating the +.f in the first segment>
Figure QLYQS_6
Frequency of the first data value, +.>
Figure QLYQS_7
Representing the second in the second first segment
Figure QLYQS_9
The frequency of the first data values; />
Figure QLYQS_2
A first total frequency representing a first segment,/I>
Figure QLYQS_5
A first sum frequency representing a second first segment;
ratio of the first total frequency
Figure QLYQS_11
Comparing with a first preset threshold value when ∈>
Figure QLYQS_12
When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>
Figure QLYQS_13
When the first segmentation value is smaller than or equal to a first preset threshold value, taking the second first segmentation as an optimal first segmentation;
the second value range of the gamma transformation parameter is obtained by the specific method that:
the best first segment is expressed as
Figure QLYQS_14
The two second sections are +.>
Figure QLYQS_15
And->
Figure QLYQS_16
Figure QLYQS_17
Wherein,,
Figure QLYQS_18
representing the ratio of the second total frequencies of the two second segments, +.>
Figure QLYQS_19
Indicating the +.f in the first second segment>
Figure QLYQS_20
Frequency of the first data value, +.>
Figure QLYQS_21
Indicating the +.>
Figure QLYQS_22
The frequency of the first data values; />
Figure QLYQS_23
A second total frequency representing the first second segment,/a second total frequency representing the first second segment>
Figure QLYQS_24
A second total frequency representing a second segment;
ratio of the second total frequency
Figure QLYQS_25
Comparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter;
the second value range of the gamma transformation parameter is obtained by the specific method that:
Figure QLYQS_26
Figure QLYQS_27
representing the ratio of the first total frequencies of all first data values in two first segments, +.>
Figure QLYQS_28
Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->
Figure QLYQS_29
Representing a first preset threshold value,/->
Figure QLYQS_30
Representing gamma transformation parameters;
the method for obtaining the second encryption value of each initial binary code comprises the following specific steps:
Figure QLYQS_31
wherein,,
Figure QLYQS_32
second encryption value representing initial binary encoding,/->
Figure QLYQS_33
For the definition field of the first data value, +.>
Figure QLYQS_34
First data value representing an initial binary encoding,/->
Figure QLYQS_35
Representing gamma transformation parameters, +.>
Figure QLYQS_36
Representing rounding-to-rounding functions.
2. The method for managing the supervision item information based on the data encryption according to claim 1, wherein the steps of obtaining the supervision item information and converting the obtained supervision item information into the initial binary code include the following specific steps:
all characters in the supervision project information are converted into ASCII codes, then the ASCII codes are converted into binary codes, bit filling operation with the fixed length of 7 is carried out on all the binary codes, 0 is filled before the binary codes with the fixed length not meeting the requirement are filled, and the binary codes with the filled bits are recorded as initial binary codes.
3. The method for managing the management item information based on the data encryption according to claim 2, wherein the obtaining the first binary code comprises the following specific steps:
and adding 0 to each initial binary code at the tail end to perform bit increasing operation to obtain a first binary code with fixed length of 8.
4. The method for managing management item information based on data encryption according to claim 1, wherein the step of obtaining the second encryption value of each initial binary code comprises the following specific steps:
Figure QLYQS_37
wherein,,
Figure QLYQS_38
second encryption value representing initial binary encoding,/->
Figure QLYQS_39
For the definition field of the first data value, +.>
Figure QLYQS_40
First data value representing an initial binary encoding,/->
Figure QLYQS_41
Representing gamma transformation parameters, +.>
Figure QLYQS_42
Representing rounding-to-rounding functions.
5. A data encryption based management system for managing project information, the system comprising:
the information acquisition module acquires the information of the supervision project and converts the information into an initial binary code;
and a data processing module: performing bit increment operation and decimal conversion on each initial binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, performing first division to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
and a data storage module: storing a second encryption value for each initial binary;
the method for obtaining the optimal first segment comprises the following specific steps:
Figure QLYQS_43
wherein,,
Figure QLYQS_44
representing the ratio of the first total frequencies of two first segments, which are +.>
Figure QLYQS_47
And
Figure QLYQS_49
,/>
Figure QLYQS_45
indicating the +.f in the first segment>
Figure QLYQS_48
Frequency of the first data value, +.>
Figure QLYQS_50
Representing the second in the second first segment
Figure QLYQS_51
The frequency of the first data values; />
Figure QLYQS_46
A first total frequency representing a first segment,/I>
Figure QLYQS_52
A first sum frequency representing a second first segment;
ratio of the first total frequency
Figure QLYQS_53
Comparing with a first preset threshold value when ∈>
Figure QLYQS_54
When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>
Figure QLYQS_55
When the first segmentation value is smaller than or equal to a first preset threshold value, taking the second first segmentation as an optimal first segmentation;
the second value range of the gamma transformation parameter is obtained by the specific method that:
the best first segment is expressed as
Figure QLYQS_56
The two second sections are +.>
Figure QLYQS_57
And->
Figure QLYQS_58
Figure QLYQS_59
Wherein,,
Figure QLYQS_60
representing the ratio of the second total frequencies of the two second segments, +.>
Figure QLYQS_61
Indicating the +.f in the first second segment>
Figure QLYQS_62
Frequency of the first data value, +.>
Figure QLYQS_63
Indicating the +.>
Figure QLYQS_64
The frequency of the first data values; />
Figure QLYQS_65
A second total frequency representing the first second segment,/a second total frequency representing the first second segment>
Figure QLYQS_66
A second total frequency representing a second segment;
ratio of the second total frequency
Figure QLYQS_67
Comparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter;
the second value range of the gamma transformation parameter is obtained by the specific method that:
Figure QLYQS_68
Figure QLYQS_69
representing the ratio of the first total frequencies of all first data values in two first segments, +.>
Figure QLYQS_70
Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->
Figure QLYQS_71
Representing a first preset threshold value,/->
Figure QLYQS_72
Representing gamma transformation parameters;
the method for obtaining the second encryption value of each initial binary code comprises the following specific steps:
Figure QLYQS_73
wherein,,
Figure QLYQS_74
second encryption value representing initial binary encoding,/->
Figure QLYQS_75
For the definition field of the first data value, +.>
Figure QLYQS_76
First data value representing an initial binary encoding,/->
Figure QLYQS_77
Representing gamma transformation parameters, +.>
Figure QLYQS_78
Representing rounding-to-rounding functions.
CN202310148820.4A 2023-02-22 2023-02-22 Data encryption-based supervision project information management system and method Active CN115879137B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310148820.4A CN115879137B (en) 2023-02-22 2023-02-22 Data encryption-based supervision project information management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310148820.4A CN115879137B (en) 2023-02-22 2023-02-22 Data encryption-based supervision project information management system and method

Publications (2)

Publication Number Publication Date
CN115879137A CN115879137A (en) 2023-03-31
CN115879137B true CN115879137B (en) 2023-07-14

Family

ID=85761510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310148820.4A Active CN115879137B (en) 2023-02-22 2023-02-22 Data encryption-based supervision project information management system and method

Country Status (1)

Country Link
CN (1) CN115879137B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376267A (en) * 2014-11-20 2015-02-25 内江师范学院 Image shuffling encrypting method based on fractional order chaotic mapping
CN109756322A (en) * 2018-11-28 2019-05-14 郑州轻工业学院 Digital image encryption method based on DES structure and DNA encoding
CN115426101A (en) * 2022-11-04 2022-12-02 广东夏龙通信有限公司 Data transmission method of cloud intercommunication platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515733B2 (en) * 1993-11-18 2009-04-07 Digimarc Corporation Methods and arrangements employing digital content items
CN105900421B (en) * 2014-01-07 2019-04-26 杜比实验室特许公司 Method for being coded and decoded to high dynamic range images
CN115276990B (en) * 2022-09-28 2023-12-05 南通森淼船舶技术有限公司 Safety storage method for research and development information of ocean engineering equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376267A (en) * 2014-11-20 2015-02-25 内江师范学院 Image shuffling encrypting method based on fractional order chaotic mapping
CN109756322A (en) * 2018-11-28 2019-05-14 郑州轻工业学院 Digital image encryption method based on DES structure and DNA encoding
CN115426101A (en) * 2022-11-04 2022-12-02 广东夏龙通信有限公司 Data transmission method of cloud intercommunication platform

Also Published As

Publication number Publication date
CN115879137A (en) 2023-03-31

Similar Documents

Publication Publication Date Title
JP3459030B2 (en) Coding system
US8255701B2 (en) File encryption method
CN112506879B (en) Data processing method and related equipment
CN115051798B (en) Random number generation method and device, electronic equipment and storage medium
CN110768785A (en) Encoding and decoding methods, related devices and computer equipment
CN112506880B (en) Data processing method and related equipment
CN116071164B (en) Digital asset tracing method based on blockchain management
CN109787760B (en) Optimized secret key security enhancement method and device based on H1 type hash function family
CN115296862B (en) Network data safety transmission method based on data coding
CN115834023B (en) Data encryption method based on big data
KR20200031159A (en) Digital perspective
CN115879137B (en) Data encryption-based supervision project information management system and method
CN116595568B (en) Private data encryption method based on blockchain
CN116825259B (en) Medical data management method based on Internet of things
CN114697671B (en) Building engineering quality management system
CN114297693B (en) Model pre-training method and device, electronic equipment and storage medium
CN114928363A (en) Data processing method, data processing device, computer equipment and storage medium
CN112612762B (en) Data processing method and related equipment
CN115426111A (en) Data encryption method and device, electronic equipment and storage medium
CN114553511A (en) Data security transmission method, equipment and medium based on industrial production
KR101952246B1 (en) System and Method of Energy efficient Image Encryption using Approximation based Hardware Memoization
CN117077182B (en) Secure storage method for electronic commerce management system data
CN117540441B (en) Transaction data secure storage method for hall type cloud terminal
CN116663041B (en) RPA flow robot data intelligent processing method and system
US20230163782A1 (en) Data compression system using concatenation in streaming

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant