Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Good resistance to attack" patented technology

Combined image compression/encryption method based on compressed sensing

ActiveCN102891999AImproved attack resistance and robustnessImprove rate-distortion performanceTelevision systemsImage compressionImage storage
The invention discloses a combined image compression/encryption method based on compressed sensing, which comprises the following steps of: firstly, a dictionary is formed by combining sub dictionaries obtained by classifying and training by combining a K-SVD method; secondly, an improved orthogonal matching pursuit algorithm is adopted in sparse coding; and finally, encryption is embedded in a compression process so that an encryption/compression algorithm of an image is realized. According to the invention, encryption and compression are tightly linked, therefore, on the premise of no basic influence to rate distortion performance, the attack resistance property and the stability of a system are further improved, the rate distortion performance of static image compression is superior to that of international main trend algorithms such as JEFG2000 and SPIHT at present, the image encryption performance is increased, and common attacks such as cipher text-only attack, chosen-ciphertext attack, known-plaintext attack and chosen-plaintext attack can be resisted. The invention can be used in image storage and transmission in the information security transmission fields such as internet, mobile telephones and video conferences.
Owner:瑞金市工业投资发展有限公司

Wavelet transform and Arnold based adaptive gray-scale watermark embedded method

InactiveCN102142258ARobustEnhance confidentiality and securitySpeech analysisSelf adaptiveConvolution
The invention discloses a wavelet transform and Arnold based adaptive gray-scale watermark embedded method which comprises the following steps: carrying out square matrix conversion and scrambling processing on an original watermark image; carrying out wavelet transform (three times) on an original host audio to obtain wavelet low frequency coefficients as the embedded pre-selected position of a watermark; automatically searching an optimal embedded sequence from the low frequency coefficients, wherein the optimal embedded sequence is the optimal embedded position of the watermark; and carrying out convolution on a digital watermark image sequence and the optimal embedded sequence, namely, embedding the digital watermark image into the low frequency coefficients of audios. The method is characterized in that in the process of digital watermark extraction, the audios containing watermarks are detected according to the original audio, and a watermark image sequence is extracted from the audios; and in the process of digital watermark reduction, the length and width of the original image are taken as extraction keys, and the extracted watermarks are reduced through the utilization of reverse Arnold conversion and image reconstruction. The method disclosed by the invention is strong in function, quick in computing speed, easy and convenient to implement, and has certain practical values in the aspects of digital image copyright protection and information hiding.
Owner:SHANGHAI SECOND POLYTECHNIC UNIVERSITY

Novel ultra-lightweight QTL (Quasi-Transmission Line) block cipher implementation method

The invention discloses a novel ultra-lightweight QTL (Quasi-Transmission Line) block cipher implementation method. According to the method, a novel generalized Feistel network structure is designed; the structural algorithm overcomes the defect that only a half of grouped data is changed during one-round iterative operation of the conventional Feistel network structure, and realizes that all grouped data is changed by the one-round iterative operation. F functions in the round operation of the algorithm comprise an F1 function and an F2 function; S1 and S2 boxes are adopted respectively; the conversion process of the F functions comprises round key add, S box substitution, P replacement and S box substitution; different S box and P replacement only requires hardware connection; the F function of the light super S box is constructed. The algorithm structure is highly symmetric, an encryption module is decrypted and multiplexed by the algorithm, decryption can be performed by exchanging an encryption round key use sequence, the operation is easy and convenient, and extra resource is not required to be consumed by the decryption. Compared with the current lightweight password, the occupied resource is smaller, the encryption performance is high, and known attack can be resisted.
Owner:HENGYANG NORMAL UNIV

DWT-SVD geometric attack prevention blind watermark method based on SIFT

The invention relates to a DWT-SVD geometric attack prevention blind watermark method based on SIFT. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, singular value decomposition is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, and the watermarks are embedded into the maximum singular value of each small block through an optimal quantitative method, the SIFT feature points of a watermark image are stored as secret keys, the types of geometric attacks are judged according to the secret keys, and correction is conducted. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of correction of attacked images, watermark extraction and watermark decryption and restoration. According to the method, by the utilization of the rotation, zoom and translation invariance of the SIFT feature points and the combination of the advantages of DWT and SVD in the digital watermark aspect, robustness on geometric attacks is remarkably improved.
Owner:HANGZHOU DIANZI UNIV

Embedding method and extracting method for text watermark based on semantic role position mapping

The invention relates to an embedding method and an extracting method for a text watermark based on semantic role position mapping. The embedding method comprises the following steps: 1) preprocessing the watermark information and converting a watermark character into code elements and forming an information string; 2) utilizing a natural language processing technique to search for the semantic role in the text, thereby acquiring the position information of the semantic role, and causing the semantic role category to be corresponding to the code elements one by one; 3) taking out the codes from the information string of the watermark one by one, mapping the codes to the position corresponding to the category of the semantic role, thereby finishing the embedding of the watermark. The extracting method comprises the following steps: searching for the semantic role on the position in the text according to the position information of the semantic role which is acquired during the process of watermark embedding; reversely mapping, thereby acquiring the information string of the watermark expressed by the code elements; lastly, converting the information string into the original watermark information. According to the method provided by the invention, the text format and content are free from any alteration, the hidden property and the robustness are excellent, and various conventional format conversions and attacks can be effectively resisted.
Owner:NANTONG UNIVERSITY

Neural network model encryption protection system and method involving domain transformation data encryption

The invention belongs to the field of artificial neural network protection mechanisms, and relates to a neural network model encryption protection system and method involving domain transformation data encryption. The system comprises an encryption module; a frequency domain transformation module in the encryption module is used for transforming original input data into a two-dimensional structure, conducting domain transformation on the original input data obtained after structure transformation and transforming the original input data in the space domain into original frequency domain data in the frequency domain; a frequency domain data processing module in the encryption module is used for processing the original frequency domain data in a specific processing mode to generate encryptedfrequency domain data; and a frequency domain inverse transformation module in the encryption module is used for conducting inverse domain transformation corresponding to above-mentioned domain transformation on the encrypted frequency domain data and transforming the encrypted frequency domain data in the frequency domain into the encrypted input data in the space domain. According to the methodof achieving input data encryption through domain transformation, the concealment and the anti-attacking performance of password information are improved, and the security of a trained artificial neural network model can be improved.
Owner:CHENGDU PANOAI INTELLIGENT TECH CO LTD

Multi-image encryption method based on fractional mellin transform

The invention provides a multi-image encryption method based on fractional mellin transform. The method includes the steps of compressing multiple images according to a frequency spectrum cutting and splicing method, then, dividing an image obtained through compression into a plurality of sub-images according to an annular domain, conducting fractional mellin transform on all the sub-images, encrypting a fractional mellin transform outcome into a cryptograph image through magnitude and phase encoding, taking transform degrees of fractional mellin transform as secret keys, and taking a center coordinate for coordinate transform, an inner radius of the annular domain for implementation of transform and an outer radius of the annular domain for implementation of transform as secondary secret keys. According to the multi-image encryption method, the multiple images are compressed through the real-value characteristics of fractional cosine transform, and therefore overweight transmission loads are avoided, and the requirement for instantaneity of image data transmission is met. Fractional mellin transform is then conducted on the image obtained through compression, the fractional order characteristic, the nonlinear characteristic and the like of the fractional cosine transform are fully utilized, and the multi-image encryption method has quite high robustness in terms of clipping prevention and noise prevention. The nonlinear operation is introduced into an encryption system while multi-image encryption transmission can be ensured, and safety of the encryption system is enhanced.
Owner:NANCHANG UNIV

Lightweight cryptographic algorithm SCENERY implementation method and device and storage medium

The invention discloses a lightweight cryptographic algorithm SCENERY implementation method, a lightweight cryptographic algorithm SCENERY implementation device and a storage medium. The method comprises the steps that a plaintext to be encrypted is acquired, IP1 initial replacement, a round function, key expansion and IP2 replacement are carried out in sequence, the round function comprises sequentially carrying out round key addition operation, S box replacement and M matrix replacement on data, and the key expansion comprises sequentially carrying out S box replacement, cyclic left shift, round constant addition operation and DP dynamic replacement on a key. An F function of an SPN structure is adopted as a round function, and a binary matrix M is constructed with the purpose of achieving high dependence when an F function linear layer is designed; a round constant and a key expansion intermediate result are selected as control signals for key expansion; DP dynamic replacement is carried out on a current round key expansion intermediate result to obtain a round key, which is a new key expansion mode, the relevance of single key iteration to front wheel input is reduced, the decoding difficulty is increased, the security is improved, and differential and linear attacks and algebraic attacks can be particularly and effectively resisted.
Owner:HENGYANG NORMAL UNIV

Data exchange system and method for onsite transaction processing

InactiveCN106327183AAvoid lostAvoid the inconvenience of replacement cardsCo-operative working arrangementsPayment protocolsPaymentApplication server
The invention discloses a data exchange system for onsite transaction processing, and the system comprises a micro-terminal induction card, a micro-terminal APP, a card reader, an application front end, an application server, and an issuing server. The micro-terminal induction card stores the identity recognition information, and the micro-terminal APP is a program which is installed on a mobile intelligent terminal and is used for identity authentication of a user and transaction processing. The issuing server is a program module which is used for the data exchange and the transaction processing. The card reader, the application front end and the application server form an application square block. The data exchange between the micro-terminal induction card and the micro-terminal APP is carried out through a circuit between the application front end and the application server and a circuit between the application front end and the issuing server. The invention also discloses a data exchange method for the onsite transaction processing, and the method comprises the steps: micro-terminal user registration and authentication, application access and marking, onsite transaction processing and abnormal transaction interception. The system can be used for replacing various types of payment cards, expense cards and identity verification cards, and is good in safety and resistance to attack.
Owner:常州真知信息技术有限公司

Novel brain-controlled intelligent rehabilitation method based on capsule network, and application thereof

The invention discloses a novel brain-controlled intelligent rehabilitation method based on a capsule network, and application thereof. According to the method, an upper computer generates corresponding motion stimulation videos according to rehabilitation training items selected by a user, the motion stimulation videos are displayed to the user through a displayer, the user imagines correspondingactions, and synchronous motion imagination electroencephalogram signals of the user are collected through an electroencephalogram collecting device, subjected to amplifying and filtering preprocessing and transmitted to the upper computer in a wireless mode; after the upper computer receives the motion imagery electroencephalogram signals and processes the motion imagery electroencephalogram signals again, the features of the motion imagery electroencephalogram signals are extracted based on a capsule network algorithm, and are classified, the classification results are converted into corresponding rehabilitation training control signals, and the rehabilitation training control signals are transmitted to a rehabilitation exercise device; the rehabilitation exercise device drives the userto perform corresponding training actions and feeds back signal data of the training actions of the user to the upper computer; and the upper computer evaluates the signal data of the training actions of the user by adopting a Fugl-Meyer evaluation method. The safety of the brain-controlled rehabilitation system can be improved.
Owner:TIANJIN UNIV

Safety device and anti-attack method thereof thereof

The invention provides a safety device and an anti-attack method thereof. Firstly, a corresponding relationship between a comprehensive attack strength threshold and an anti-attack strategy is preset,and anti-attack strategies of different grades can be correspondingly set according to different comprehensive attack strength thresholds. Then at least two kinds of detection items of the safety equipment are monitored respectively to obtain the current attack times of each detection item. A comprehensive attack strength value of a security device currently attacked is determined according to the detected current attacked times of each detection item; Then, according to the relationship between the current comprehensive attack strength value and the preset comprehensive attack strength threshold and the anti-attack strategy, the anti-attack strategy matching the current comprehensive attack strength value is selected as the target anti-attack strategy, and the target anti-attack strategyis adopted to protect the security equipment. Thus, the invention can synthesize the attack strength of the current multiple attacks on the security device and call out the corresponding level anti-attack strategy to protect the security device, thereby better protecting the information security of the user.
Owner:NATIONZ TECH INC

SIFT-based blind watermarking method for dwt‑svd against geometric attacks

The invention relates to a DWT-SVD geometric attack prevention blind watermark method based on SIFT. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, singular value decomposition is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, and the watermarks are embedded into the maximum singular value of each small block through an optimal quantitative method, the SIFT feature points of a watermark image are stored as secret keys, the types of geometric attacks are judged according to the secret keys, and correction is conducted. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of correction of attacked images, watermark extraction and watermark decryption and restoration. According to the method, by the utilization of the rotation, zoom and translation invariance of the SIFT feature points and the combination of the advantages of DWT and SVD in the digital watermark aspect, robustness on geometric attacks is remarkably improved.
Owner:HANGZHOU DIANZI UNIV

A Text Watermark Embedding and Extraction Method Based on Semantic Role Position Mapping

The present invention relates to a text watermark embedding and extraction method based on semantic role position mapping. The embedding method includes the following steps: 1) preprocessing the watermark information, converting the watermark characters into an information string composed of code elements; 2) through natural language processing The technology finds out the semantic role in the text, obtains the position information of the semantic role, and corresponds the semantic role type with the code element representing the watermark information one by one; 3) Takes out the codewords in the watermark information string one by one, and compares the codeword with the corresponding A location of the semantic role of the type is mapped to complete the embedding of the watermark. The extraction method includes: according to the position information of the semantic role obtained when embedding the watermark, find the semantic role of the position in the text, and then reversely map to obtain the watermark information string represented by the code element, and finally convert it into the original watermark information. The above method does not make any changes to the text format and content, has good concealment and robustness, and can effectively resist various common format transformations and attacks.
Owner:NANTONG UNIVERSITY

Neural Network Model Encryption Protection System and Method Involving Specified Frequency Band Encryption

The invention belongs to the field of an artificial neural network protection mechanism, and relates to a neural network model encryption protection system and method involving specified frequency band encryption. The neural network model encryption protection system comprises a data input module, an encryption module, an encrypted data input module, an artificial neural network module and a dataoutput module, wherein the encryption module comprises a frequency domain transformation module, a frequency domain data processing module and a frequency domain inverse transformation module; and thefrequency domain data processing module comprises a frequency domain specifying module, a password generating module and a password embedding module. The neural network model encryption protection system can embed a protective password into an artificial neural network model trained based on input data through the encryption for the input data under the condition of not significantly increasing the calculation amount and mainlining the performance of the artificial neural network. In addition, a method for input data encryption is realized through domain transformation, the hiding and anti-attacking performance of password information are improved, and the safety of the trained artificial neural network model is enabled to be further improved.
Owner:CHENGDU PANOAI INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products