CN115879137B - Data encryption-based supervision project information management system and method - Google Patents
Data encryption-based supervision project information management system and method Download PDFInfo
- Publication number
- CN115879137B CN115879137B CN202310148820.4A CN202310148820A CN115879137B CN 115879137 B CN115879137 B CN 115879137B CN 202310148820 A CN202310148820 A CN 202310148820A CN 115879137 B CN115879137 B CN 115879137B
- Authority
- CN
- China
- Prior art keywords
- value
- segment
- data
- representing
- segments
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000006243 chemical reaction Methods 0.000 claims abstract description 51
- 230000009466 transformation Effects 0.000 claims description 19
- 238000007726 management method Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 8
- 230000001965 increasing effect Effects 0.000 claims description 6
- 238000013500 data storage Methods 0.000 claims description 4
- 230000011218 segmentation Effects 0.000 claims 6
- 238000003860 storage Methods 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000009826 distribution Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 229910000831 Steel Inorganic materials 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data encryption storage, and provides a supervision project information management system and method based on data encryption, comprising the following steps: acquiring information of a supervision item and converting the information into an initial binary code; performing bit-increasing operation on the initial binary code and decimal conversion to obtain first data values, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining an optimal first segment according to a comparison result of first total frequencies of the two first segments; dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain gamma conversion parameters, and converting the first data value to obtain a second encryption value; the second encrypted value for each initial binary is stored. The invention reduces the regularity between the ciphertext and the plaintext through gamma conversion so as to increase the data privacy.
Description
Technical Field
The invention relates to the field of data encryption storage, in particular to a supervision project information management system and method based on data encryption.
Background
The construction unit is used for ensuring the smooth implementation and completion of the project, and normally entrusts a supervision unit to supervise and manage the project according to legal regulations and technical requirements in the project proceeding stage, wherein the supervision project information comprises data information with higher privacy, such as contract information, project design information and the like; if the project data are encrypted without necessary means in the process of monitoring the project information storage, the risk of the project information being attacked and even tampered and stolen is greatly increased; therefore, necessary encryption processing is needed to be carried out on the supervision project information, the privacy of data is increased, and the risk of leakage caused by attack is reduced.
The traditional data encryption mainly takes an entropy coding encryption mode, the probability distribution information of the data is analyzed to encrypt, no information quantity is lost in the encoding process, but the encryption algorithm can also be broken through the regularity of frequency information; there is a need for an encryption method that can reduce the privacy between ciphertext and plaintext to increase the privacy of data.
Disclosure of Invention
The invention provides a data encryption-based management project information management system and a method thereof, which aim to solve the problem that the regularity between ciphertext and plaintext in the existing data encryption is relatively large and is easy to be cracked, and the adopted technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for managing information of a supervision item based on data encryption, including the steps of:
acquiring information of a supervision item and converting the information into an initial binary code;
performing bit increment operation on each initial binary code to obtain first binary codes, and performing decimal conversion on each first binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, dividing the first data histogram for the first time to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
the second encrypted value for each initial binary is stored.
Optionally, the acquiring the supervision item information and converting the supervision item information into the initial binary code includes the following steps:
all characters in the supervision project information are converted into ASCII codes, then the ASCII codes are converted into binary codes, bit filling operation with the fixed length of 7 is carried out on all the binary codes, 0 is filled before the binary codes with the fixed length not meeting the requirement are filled, and the binary codes with the filled bits are recorded as initial binary codes.
Optionally, the obtaining the first binary code includes the following steps:
and adding 0 to each initial binary code at the tail end to perform bit increasing operation to obtain a first binary code with fixed length of 8.
Optionally, the acquiring the optimal first segment includes the following steps:
wherein,,representing the ratio of the first total frequencies of two first segments, which are +.>And,/>indicating the +.f in the first segment>Frequency of the first data value, +.>Representing the second in the second first segmentThe frequency of the first data values; />A first total frequency representing a first segment,/I>A first sum frequency representing a second first segment;
ratio of the first total frequencyComparing with a first preset threshold value when ∈>When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>And when the first segment is smaller than or equal to a first preset threshold value, taking the second first segment as the optimal first segment.
Optionally, the acquiring the second value range of the gamma conversion parameter includes the following steps:
Wherein,,representing the ratio of the second total frequencies of the two second segments, +.>Indicating the +.f in the first second segment>Frequency of the first data value, +.>Indicating the +.>The frequency of the first data values; />A second total frequency representing the first second segment,/a second total frequency representing the first second segment>A second total frequency representing a second segment;
ratio of the second total frequencyAnd comparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter.
Optionally, the obtaining the second value range of the gamma transformation parameter includes the following steps:
representing the ratio of the first total frequencies of all first data values in two first segments, +.>Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->Representing a first preset thresholdValue of->Representing the gamma transformation parameters.
Optionally, the obtaining the second encrypted value of each initial binary code includes the following steps:
wherein,,second encryption value representing initial binary encoding,/->For the definition field of the first data value, +.>First data value representing an initial binary encoding,/->Representing gamma transformation parameters, +.>Representing rounding-to-rounding functions.
In a second aspect, another embodiment of the present invention provides a data encryption-based management item information management system, including:
the information acquisition module acquires the information of the supervision project and converts the information into an initial binary code;
and a data processing module: performing bit increment operation and decimal conversion on each initial binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, performing first division to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
and a data storage module: the second encrypted value for each initial binary is stored.
Compared with the prior art, the invention has the beneficial effects that: the self-adaptive gamma conversion is used for encrypting the data, so that regularity between ciphertext and plaintext can be effectively reduced, gamma conversion parameters are selected pertinently according to the frequency of the data, the numerical difference between the high-frequency data ciphertext and plaintext can be larger, and further the privacy of the data is improved, and the relevance is reduced.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a flowchart of a method for managing information of a supervision item based on data encryption according to an embodiment of the present invention;
FIG. 2 is a block diagram of a management system for managing project information based on data encryption according to another embodiment of the present invention;
FIG. 3 is a graph showing the input and output results under different gamma conversion parameters.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart of a method for managing information of a supervision item based on data encryption according to an embodiment of the invention is shown, and the method includes the following steps:
and S001, acquiring the supervision item information and converting the supervision item information into an initial binary code.
It should be noted that, the purpose of this embodiment is to encrypt and store the supervision item information, where the supervision item information includes digital information, text information and identifier information, and when the computer performs data storage transmission, only binary data of 0 or 1 can be generally identified, so that code system conversion needs to be performed on the supervision item information, and the supervision item information can be converted into ASCII code first and then into binary code; meanwhile, the value of the ASCII code is larger than 64, the corresponding binary code length is 7 bits, and less than 7 bits of 64 are needed to be subjected to bit filling operation.
Specifically, converting text information into an English letter form formed by pinyin, converting all characters in the supervision project information into ASCII codes, converting the ASCII codes into binary codes, performing bit filling operation of which the fixed length is 7 on all the binary codes, filling 0 before coding the binary codes which do not meet the fixed length, and marking the binary codes with the completed bit filling as initial binary codes; for example, if the ASCII code value of a certain character is 60, the converted binary code is 111100, and the code length is 6 bits, the number of bits added with 0 before the binary code is 1, and the initial binary code 0111100 of 7 bits is obtained.
Step S002, performing bit-increasing operation on the initial binary code and decimal conversion to obtain a first data value, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining the optimal first segment according to the comparison result of the first total frequency of the two first segments.
It should be noted that the initial binary code is 7-bit binary code, and is converted into decimal definitionThe domain isIn order to make it possible to distribute the decimal values corresponding to the initial binary code more evenly in the definition field +.>In between, an increment operation is required for the initial binary code.
Specifically, each initial binary code is supplemented with 0 at the tail to obtain a first binary code with 8 bits, and then the first binary code is converted into a decimal value to obtain a corresponding first data value; for example, the initial binary code is 0111100, converted to decimal 60, the first binary code after the increment operation is 01111000, and the first data value converted to decimal is 120.
It should be further noted that, all characters in the supervision item information correspond to a first data value at this time, the occurrence frequencies of the first data values are counted to obtain a first data histogram, the obtained first data histogram includes a plurality of square columns, each square column represents a first data value, and the frequency of the square column represents the occurrence frequency of the first data value; the embodiment can further achieve the encryption effect on the first data value through transformation operations such as stretching of the first data histogram; the gamma conversion is an image enhancement technology by means of exponential conversion mapping, and is performed by combining the frequencies of different square columns in the histogram, so that the regularity between the encrypted data and the first encryption value is reduced to a greater extent; the first data values are already uniformly distributed in the definition domainAnd in the method, all the first data values can be transformed by utilizing gamma transformation, the adaptive gamma transformation parameters are selected according to the overall frequency distribution of square columns, and the square columns with larger frequency are stretched, so that the range of the encrypted value range is enlarged, and the decryption difficulty is further increased.
Referring to FIG. 3, a graph showing the input and output results for different gamma conversion parameters is shown, wherein the horizontal axis is input and the vertical axis is output, when the gamma conversion parameters areWhen the brightness is larger than 1, the low gray value of the image is compressed, and the high gray value is stretched, so that the effect of strengthening the bright part, namely darkening the image is realized; but->When the brightness is less than 1, the high gray value of the image is compressed and the low gray value is stretched, so that the effect of enhancing the dark part, i.e., improving the brightness of the image is achieved.
Specifically, first, the first data histogram is divided for the first time to obtain two first segments, which are respectivelyAnd->Counting the first sum frequency of all the first data values in the two first segments and obtaining the ratio +.>The specific calculation method comprises the following steps:
wherein,,indicating the +.f in the first segment>Frequency of the first data value, +.>Indicating the +.f in the second first segment>The frequency of the first data values; />Representation ofFirst total frequency in first segment, < > first total frequency in first segment>Representing a first total frequency within a second first segment.
In the formula, the denominator is added by 1 to prevent the denominator from being 0, and the denominator is added by 1 to balance the influence of the calculation result after the denominator is added by 1, so that the embodiment obtains the denominator by adding 1Still considered as the ratio of the first total frequency of all first data values within the two first segments.
In this embodiment, a first preset threshold value is givenIn this embodiment->For example; when (when)When it is indicated that the first total frequency in the first segment is greater than the first total frequency in the second first segment, i.e +.>The total frequency of the gamma conversion parameters is larger, and the low gray value part corresponding to the gamma conversion needs to be stretched, wherein the first value range of the gamma conversion parameters is +.>Taking the first segment as the optimal first segment; when->Indicating that the first total frequency in the second first segment is greater than or equal to the first total frequency in the first segment, i.eThe total frequency of the gamma conversion is higher, namely highThe gray-scale value part is stretched, and the first value range of the gamma transformation parameter is +.>The second first segment is taken as the best first segment.
At this time, the first value range of the gamma conversion parameter is obtained according to the frequency distribution of the first data value, and the part with larger frequency can be stretched in a self-adaptive manner according to the frequency distribution condition of the first data value, so that the value range after encryption becomes larger, and the decryption difficulty is increased; however, the first value range is larger at this time, and a specific gamma transformation parameter cannot be obtained, so that a better encryption effect is achieved. Step S003, dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain a gamma conversion parameter, and converting the first data value to obtain a second encryption value.
It should be noted that, in step S002, the first value range has been obtained preliminarily according to the frequency distribution of the first data value, and according to the frequency distribution condition in the optimal first segment, the second value range is obtained by further segment comparison, and the central value of the second value range is used as the gamma conversion parameter to convert the first data value to obtain the second encryption value.
Specifically, the optimal first segment is divided a second time, and the optimal first segment is marked asThe two second sections obtained are +.>And->Counting the second total frequency of all the first data values in the two second segments and obtaining the ratio +.>The specific calculation method comprises the following steps:
wherein,,indicating the +.f in the first second segment>Frequency of the first data value, +.>Indicating the +.>The frequency of the first data values; />A second total frequency representing the first second segment,/a second total frequency representing the first second segment>Representing a second total frequency of a second segment.
In the formula, the denominator is added by 1 to prevent the denominator from being 0, and the denominator is added by 1 to balance the influence of the calculation result after the denominator is added by 1, so that the embodiment obtains the denominator by adding 1Still considered as the ratio of the second total frequency of all the first data values within the two second segments.
The first preset threshold value has been given in step S002When->Description of->The second total frequency of the first second segment is greater than the second segmentIs +.>The total frequency of the frequency band is relatively large,the smaller gray value part of the steel wire rope is required to be stretched; when->Description of->The second total frequency of the second segment is greater than or equal to the second total frequency of the first second segment, i.e.)>The total frequency of (a) is greater, and (b) is->The larger part of the gray scale value of (a) needs to be stretched.
Referring to fig. 3, the tensile patterns with large differences still result from different gamma conversion parameters in the same first value range, so that the second value range of the obtained gamma conversion parameters is specifically:
taking the central value of the second value range as the gamma conversion parameter, namelyThe values in the four cases were 0.3, 0.6, 3 and 6, respectively; it should be further noted that, because the gamma conversion is a power law conversion, directly converting the first data value may make the obtained value range too large to affect the display of the encrypted data, and the normalized power law conversion needs to be performed by using the definition domain of the first data value to obtain the encrypted second encrypted value, and the calculation method for converting the first data value into the second encrypted value is as follows:
wherein,,second encryption value representing initial binary encoding,/->For the definition field of the first data value, +.>First data value representing an initial binary encoding,/->Representing gamma transformation parameters, +.>Representing a rounding function; it should be noted that, the initial binary code, the first data value and the second encrypted value are all in one-to-one correspondence.
Thus, the encryption of the initial binary code is completed to obtain a corresponding second encryption value, and the range of the value range of the second encryption value is alsoThe encryption of the initial binary code is preferably accomplished with little regularity between the first data value and the integer of the original binary code due to stretching through the histogram and gamma transformation.
Step S004, the second encryption value of each initial binary code is stored.
Converting the initial binary codes of all letters in the supervision item information into a second encryption value, converting the second encryption value into 8-bit second binary codes for storage, and simultaneously converting gamma conversion parametersStored as a key.
In the decryption process, firstly, the stored 8-bit second binary code is converted into decimal system to obtain a second encryption value, and the ratio of the second encryption value to 255 is according toAnd performing evolution operation, multiplying 255 to obtain a corresponding first data value, converting the first data value into a 8-bit first binary code, removing the last bit to obtain a 7-bit initial binary code, converting the 7-bit initial binary code into decimal to obtain a corresponding ASCII code value and obtaining original character information, and further finishing decryption of the second binary code.
Referring to fig. 2, a block diagram of a data encryption-based management system for managing project information according to another embodiment of the present invention is shown, where the system includes:
information acquisition module S101: and acquiring the supervision item information and converting the supervision item information into an initial binary code.
The data processing module S102:
(1) Performing bit-increasing operation on the initial binary code and decimal conversion to obtain first data values, obtaining a first data histogram according to all the first data values, dividing the first data histogram to obtain two first segments, and obtaining an optimal first segment according to a comparison result of first total frequencies of the two first segments;
(2) Dividing the optimal first segment to obtain two second segments, obtaining a second value range according to a comparison result of second total frequencies of the two second segments to obtain gamma conversion parameters, and converting the first data value to obtain a second encryption value.
The data storage module S103: the second encrypted value for each initial binary is stored.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different manner from other embodiments, so that identical and similar parts of each embodiment are mutually referred to.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that:
reference in the specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. Thus, the appearances of the phrase "one embodiment" or "an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment.
In addition, the specific embodiments described in the present specification may differ in terms of parts, shapes of components, names, and the like. All equivalent or simple changes of the structure, characteristics and principle according to the inventive concept are included in the protection scope of the present invention. Those skilled in the art may make various modifications or additions to the described embodiments or substitutions in a similar manner without departing from the scope of the invention as defined in the accompanying claims.
Claims (5)
1. The management method for the supervision project information based on the data encryption is characterized by comprising the following steps:
acquiring information of a supervision item and converting the information into an initial binary code;
performing bit increment operation on each initial binary code to obtain first binary codes, and performing decimal conversion on each first binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, dividing the first data histogram for the first time to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
storing a second encryption value for each initial binary;
the method for obtaining the optimal first segment comprises the following specific steps:
wherein,,representing the ratio of the first total frequencies of two first segments, which are +.>And,/>indicating the +.f in the first segment>Frequency of the first data value, +.>Representing the second in the second first segmentThe frequency of the first data values; />A first total frequency representing a first segment,/I>A first sum frequency representing a second first segment;
ratio of the first total frequencyComparing with a first preset threshold value when ∈>When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>When the first segmentation value is smaller than or equal to a first preset threshold value, taking the second first segmentation as an optimal first segmentation;
the second value range of the gamma transformation parameter is obtained by the specific method that:
Wherein,,representing the ratio of the second total frequencies of the two second segments, +.>Indicating the +.f in the first second segment>Frequency of the first data value, +.>Indicating the +.>The frequency of the first data values; />A second total frequency representing the first second segment,/a second total frequency representing the first second segment>A second total frequency representing a second segment;
ratio of the second total frequencyComparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter;
the second value range of the gamma transformation parameter is obtained by the specific method that:
representing the ratio of the first total frequencies of all first data values in two first segments, +.>Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->Representing a first preset threshold value,/->Representing gamma transformation parameters;
the method for obtaining the second encryption value of each initial binary code comprises the following specific steps:
2. The method for managing the supervision item information based on the data encryption according to claim 1, wherein the steps of obtaining the supervision item information and converting the obtained supervision item information into the initial binary code include the following specific steps:
all characters in the supervision project information are converted into ASCII codes, then the ASCII codes are converted into binary codes, bit filling operation with the fixed length of 7 is carried out on all the binary codes, 0 is filled before the binary codes with the fixed length not meeting the requirement are filled, and the binary codes with the filled bits are recorded as initial binary codes.
3. The method for managing the management item information based on the data encryption according to claim 2, wherein the obtaining the first binary code comprises the following specific steps:
and adding 0 to each initial binary code at the tail end to perform bit increasing operation to obtain a first binary code with fixed length of 8.
4. The method for managing management item information based on data encryption according to claim 1, wherein the step of obtaining the second encryption value of each initial binary code comprises the following specific steps:
5. A data encryption based management system for managing project information, the system comprising:
the information acquisition module acquires the information of the supervision project and converts the information into an initial binary code;
and a data processing module: performing bit increment operation and decimal conversion on each initial binary code to obtain a first data value corresponding to each initial binary code;
acquiring a first data histogram according to all the first data values, performing first division to acquire two first segments, and acquiring an optimal first segment according to a comparison result of first total frequencies of all the first data values in the two first segments;
performing second division on the optimal first segment to obtain two second segments, obtaining a second value range of a gamma conversion parameter according to a comparison result of second total frequencies of all first data values in the two second segments, selecting a central value of the second value range as the gamma conversion parameter, and obtaining a second encryption value of each initial binary code for the first data value through gamma conversion and combining a definition domain of the first data value;
and a data storage module: storing a second encryption value for each initial binary;
the method for obtaining the optimal first segment comprises the following specific steps:
wherein,,representing the ratio of the first total frequencies of two first segments, which are +.>And,/>indicating the +.f in the first segment>Frequency of the first data value, +.>Representing the second in the second first segmentThe frequency of the first data values; />A first total frequency representing a first segment,/I>A first sum frequency representing a second first segment;
ratio of the first total frequencyComparing with a first preset threshold value when ∈>When the first segment is larger than a first preset threshold value, the first segment is used as the optimal first segment, and when +.>When the first segmentation value is smaller than or equal to a first preset threshold value, taking the second first segmentation as an optimal first segmentation;
the second value range of the gamma transformation parameter is obtained by the specific method that:
Wherein,,representing the ratio of the second total frequencies of the two second segments, +.>Indicating the +.f in the first second segment>Frequency of the first data value, +.>Indicating the +.>The frequency of the first data values; />A second total frequency representing the first second segment,/a second total frequency representing the first second segment>A second total frequency representing a second segment;
ratio of the second total frequencyComparing the gamma conversion parameter with a first preset threshold value to obtain a second value range of the gamma conversion parameter;
the second value range of the gamma transformation parameter is obtained by the specific method that:
representing the ratio of the first total frequencies of all first data values in two first segments, +.>Representing the ratio of the second total frequencies of all the first data values in the two second segments of the best first segment,/->Representing a first preset threshold value,/->Representing gamma transformation parameters;
the method for obtaining the second encryption value of each initial binary code comprises the following specific steps:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310148820.4A CN115879137B (en) | 2023-02-22 | 2023-02-22 | Data encryption-based supervision project information management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310148820.4A CN115879137B (en) | 2023-02-22 | 2023-02-22 | Data encryption-based supervision project information management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115879137A CN115879137A (en) | 2023-03-31 |
CN115879137B true CN115879137B (en) | 2023-07-14 |
Family
ID=85761510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310148820.4A Active CN115879137B (en) | 2023-02-22 | 2023-02-22 | Data encryption-based supervision project information management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115879137B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376267A (en) * | 2014-11-20 | 2015-02-25 | 内江师范学院 | Image shuffling encrypting method based on fractional order chaotic mapping |
CN109756322A (en) * | 2018-11-28 | 2019-05-14 | 郑州轻工业学院 | Digital image encryption method based on DES structure and DNA encoding |
CN115426101A (en) * | 2022-11-04 | 2022-12-02 | 广东夏龙通信有限公司 | Data transmission method of cloud intercommunication platform |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7515733B2 (en) * | 1993-11-18 | 2009-04-07 | Digimarc Corporation | Methods and arrangements employing digital content items |
CN105900421B (en) * | 2014-01-07 | 2019-04-26 | 杜比实验室特许公司 | Method for being coded and decoded to high dynamic range images |
CN115276990B (en) * | 2022-09-28 | 2023-12-05 | 南通森淼船舶技术有限公司 | Safety storage method for research and development information of ocean engineering equipment |
-
2023
- 2023-02-22 CN CN202310148820.4A patent/CN115879137B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376267A (en) * | 2014-11-20 | 2015-02-25 | 内江师范学院 | Image shuffling encrypting method based on fractional order chaotic mapping |
CN109756322A (en) * | 2018-11-28 | 2019-05-14 | 郑州轻工业学院 | Digital image encryption method based on DES structure and DNA encoding |
CN115426101A (en) * | 2022-11-04 | 2022-12-02 | 广东夏龙通信有限公司 | Data transmission method of cloud intercommunication platform |
Also Published As
Publication number | Publication date |
---|---|
CN115879137A (en) | 2023-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3459030B2 (en) | Coding system | |
US8255701B2 (en) | File encryption method | |
CN112506879B (en) | Data processing method and related equipment | |
CN115051798B (en) | Random number generation method and device, electronic equipment and storage medium | |
CN110768785A (en) | Encoding and decoding methods, related devices and computer equipment | |
CN112506880B (en) | Data processing method and related equipment | |
CN116071164B (en) | Digital asset tracing method based on blockchain management | |
CN109787760B (en) | Optimized secret key security enhancement method and device based on H1 type hash function family | |
CN115296862B (en) | Network data safety transmission method based on data coding | |
CN115834023B (en) | Data encryption method based on big data | |
KR20200031159A (en) | Digital perspective | |
CN115879137B (en) | Data encryption-based supervision project information management system and method | |
CN116595568B (en) | Private data encryption method based on blockchain | |
CN116825259B (en) | Medical data management method based on Internet of things | |
CN114697671B (en) | Building engineering quality management system | |
CN114297693B (en) | Model pre-training method and device, electronic equipment and storage medium | |
CN114928363A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN112612762B (en) | Data processing method and related equipment | |
CN115426111A (en) | Data encryption method and device, electronic equipment and storage medium | |
CN114553511A (en) | Data security transmission method, equipment and medium based on industrial production | |
KR101952246B1 (en) | System and Method of Energy efficient Image Encryption using Approximation based Hardware Memoization | |
CN117077182B (en) | Secure storage method for electronic commerce management system data | |
CN117540441B (en) | Transaction data secure storage method for hall type cloud terminal | |
CN116663041B (en) | RPA flow robot data intelligent processing method and system | |
US20230163782A1 (en) | Data compression system using concatenation in streaming |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |