Search

CN-121462701-B - Encryption method and decryption method for Internet of vehicles data

CN121462701BCN 121462701 BCN121462701 BCN 121462701BCN-121462701-B

Abstract

The invention relates to the technical field of information security, in particular to an encryption method and a decryption method of internet of vehicles data, wherein the encryption method comprises the steps of obtaining images of the internet of vehicles data and determining sensitive areas of the images; the method comprises the steps of randomly generating a specific two-dimensional Logistic chaotic encryptor chaotic sequence parameter and an AES key, encrypting a sensitive area based on the specific two-dimensional Logistic chaotic encryptor chaotic sequence parameter to obtain an encrypted image, encrypting the chaotic sequence parameter based on the AES key to obtain an encrypted chaotic parameter, obtaining signature data based on the sensitive area and the AES key, obtaining embedded data based on the encrypted chaotic parameter and the signature data, dynamically embedding the embedded data into the encrypted image to realize encryption of the vehicle networking data, and distributing the AES key to a vehicle enterprise, a traffic management department and a main body of an insurance company by adopting a Shamir key distribution method to realize data encryption strength and safe transmission, so that safe circulation and value release of vehicle networking data elements are promoted.

Inventors

  • CHEN HUI
  • WU YONGXIAN
  • HE PENG

Assignees

  • 湖北大学

Dates

Publication Date
20260508
Application Date
20260108

Claims (8)

  1. 1. An encryption method for internet of vehicles data is characterized by comprising the following steps: acquiring an image related to internet of vehicles data, and determining a sensitive area of the image; Randomly generating chaotic sequence parameters and an AES key of a specialized two-dimensional Logistic chaotic encryptor; encrypting the sensitive area based on the chaotic sequence parameter to obtain an encrypted image, wherein the method comprises the following steps: acquiring the position information of the sensitive area and marking the position information in the least significant bit of the image; determining the length of a required chaotic sequence based on the position information of the sensitive area; Based on the length, a corresponding Logistic chaotic sequence is obtained; Encrypting the sensitive area based on the Logistic chaotic sequence to obtain an encrypted image; Encrypting the chaotic sequence parameter based on an AES key to obtain an encrypted chaotic parameter; Based on the sensitive area and the AES key, signature data are obtained; Obtaining embedded data based on the encrypted chaotic parameters and the signature data; embedding the embedded data into the encrypted image to realize encryption of the internet of vehicles data; And fragmenting the AES key by adopting a Shamir key distribution method, and distributing the AES key to a vehicle enterprise, a traffic management department and a main body of an insurance company.
  2. 2. The method of claim 1, wherein encrypting the sensitive region based on the Logistic chaotic sequence to obtain an encrypted image comprises: after sequencing the Logistic chaotic sequence, a mapping table is obtained; Disturbing the original pixel points of the sensitive area based on the mapping table to obtain chaotic pixel points; and based on the Logistic chaotic sequence corresponding to the chaotic pixel point and the original pixel point, realizing pixel value substitution through exclusive OR operation to obtain an encrypted image.
  3. 3. The method of claim 1, wherein encrypting the chaotic sequence parameter based on an AES key to obtain an encrypted chaotic parameter comprises: Packaging the chaotic sequence parameters to obtain 128-bit packaging data; And based on the packed data, encrypting by adopting an AES key to obtain an encrypted chaotic parameter.
  4. 4. The method of claim 1, wherein obtaining signature data based on the sensitive area and AES key comprises: Processing the sensitive area by adopting an SM3 password hash algorithm to generate 256-bit hash data; Based on the 256-bit hash data, performing HMAC-SM3 signature by adopting an AES key to obtain signature data.
  5. 5. The method of claim 1, wherein obtaining embedded data based on the encrypted chaotic parameters and the signature data comprises: and splicing the encrypted chaotic parameters with the signature data to obtain embedded data.
  6. 6. The decryption method of the internet of vehicles data is characterized by comprising the following steps of: Acquiring an image to be decrypted; When receiving a recovery request initiated by each main body, determining an AES key by a Shamir key recovery method based on the recovery request of each main body, wherein the recovery request comprises AES key fragments corresponding to each main body; extracting embedded data and an encrypted image based on the image to be decrypted; disassembling the embedded data to obtain encrypted chaotic parameters and signature data; Acquiring the least significant bit of the encrypted image; Determining location information of a sensitive area of the encrypted image based on the least significant bit; Based on the AES key and the encryption chaotic parameter, obtaining a chaotic sequence parameter of a specialized two-dimensional Logistic chaotic encryptor; and decrypting the encrypted image based on the chaotic sequence parameters to obtain an original image, and decrypting the image to be decrypted.
  7. 7. The method of claim 6, further comprising, after extracting the embedded data using an inverse of a histogram shifted RDH data extraction algorithm based on the image to be decrypted: And adopting an HMAC-SM3 signature technology to check the signature data so as to judge the security of the image to be decrypted.
  8. 8. The method of claim 6, wherein decrypting the encrypted image based on the chaotic sequence of parameters results in an original image, comprising: Obtaining a Logistic chaotic sequence based on the chaotic sequence parameters and the position information of the sensitive area of the encrypted image; obtaining an inverse mapping table based on the Logistic chaotic sequence; And based on the inverse mapping table, reversely replacing the pixel points of the sensitive area after the inverse exclusive OR operation to obtain an original image.

Description

Encryption method and decryption method for Internet of vehicles data Technical Field The invention relates to the technical field of information security, in particular to an encryption method and a decryption method for internet of vehicles data. Background Along with the large-scale deployment of intelligent network-connected automobiles, massive image and video data are frequently streamed at the automobile end, the road side and the cloud end, and sensitive information such as vehicle identifications, faces, geographic positions and the like contained in the massive image and video data face serious leakage and abuse risks. The existing data desensitization scheme has obvious defects that the traditional mosaic or fuzzy processing is irreversible, so that the data lose the subsequent analysis and evidence value, the conventional encryption method lacks cross-mechanism collaborative decryption capability, and complex requirements of safe sharing and compliance use among multiple parties such as a train enterprise, a traffic management department, an insurance company, a user and the like in the ecology of the train network are difficult to meet. Especially in the scenes of accident tracing, insurance loss, traffic law enforcement and the like, privacy is required to be strictly protected, original data is required to be efficiently recovered under the authorized condition, and the balance is not realized in the prior art. Therefore, how to provide an encryption and decryption method for internet of vehicles data, so that the encryption strength and the safe transmission of the data can be ensured, and meanwhile, the data can be flexibly decrypted, is a technical problem to be solved at present. Disclosure of Invention In view of the above, the present invention provides an encryption method and decryption method for internet of vehicles data that overcomes or at least partially solves the above-mentioned problems. In a first aspect, the present invention provides a method for encrypting internet of vehicles data, including: acquiring an image related to internet of vehicles data, and determining a sensitive area of the image; Randomly generating chaotic sequence parameters and an AES key of a specialized two-dimensional Logistic chaotic encryptor; encrypting the sensitive area based on the chaotic sequence parameters to obtain an encrypted image; Encrypting the chaotic sequence parameter based on an AES key to obtain an encrypted chaotic parameter; Based on the sensitive area and the AES key, signature data are obtained; Obtaining embedded data based on the encrypted chaotic parameters and the signature data; embedding the embedded data into the encrypted image to realize encryption of the internet of vehicles data; And fragmenting the AES key by adopting a Shamir key distribution method, and distributing the AES key to a vehicle enterprise, a traffic management department and a main body of an insurance company. Preferably, encrypting the sensitive area based on the chaotic sequence parameter to obtain an encrypted image, including: acquiring the position information of the sensitive area and marking the position information in the least significant bit of the image; determining the length of a required chaotic sequence based on the position information of the sensitive area; Based on the length, a corresponding Logistic chaotic sequence is obtained; and encrypting the sensitive area based on the Logistic chaotic sequence to obtain an encrypted image. Preferably, encrypting the sensitive area based on the Logistic chaotic sequence to obtain an encrypted image, including: after sequencing the Logistic chaotic sequence, a mapping table is obtained; Disturbing the original pixel points of the sensitive area based on the mapping table to obtain chaotic pixel points; and based on the Logistic chaotic sequence corresponding to the chaotic pixel point and the original pixel point, realizing pixel value substitution through exclusive OR operation to obtain an encrypted image. Preferably, encrypting the chaotic sequence parameter based on an AES key to obtain an encrypted chaotic parameter, including: Packaging the chaotic sequence parameters to obtain 128-bit packaging data; And based on the packed data, encrypting by adopting an AES key to obtain an encrypted chaotic parameter. Preferably, based on the sensitive area and the AES key, obtaining signature data includes: Processing the sensitive area by adopting an SM3 password hash algorithm to generate 256-bit hash data; Based on the 256-bit hash data, performing HMAC-SM3 signature by adopting an AES key to obtain signature data. Preferably, obtaining embedded data based on the encrypted chaotic parameter and the signature data includes: and splicing the encrypted chaotic parameters with the signature data to obtain embedded data. In a second aspect, the present invention further provides a method for decrypting internet of vehicles data, including: Acquiring