U disk information safety system based on information hiding and digital watermarking technology

An information security system and digital watermarking technology, applied in the field of computer applications, can solve problems such as poor security and insecure encrypted files, and achieve the effects of strong compatibility, low cost, and simple operation methods.

Active Publication Date: 2014-12-17
CHENGDU YUFEI INFORMATION ENG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And encrypted files, like the Great Wall, will attract a lot of attention. Attackers can use various methods including strong cracking to decompress files, so encrypted files are not safe
However, the existing safe U disk technologies are traditional encryption and decryption methods, some of which are basically copies of dongles, and their security is very poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • U disk information safety system based on information hiding and digital watermarking technology
  • U disk information safety system based on information hiding and digital watermarking technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see figure 1 , this example illustrates the method in which confidential information is loaded and hidden into the carrier.

[0036] First, use the digital watermark generation algorithm to associate the confidential information / confidential files, the "seed" input by the user, and the serial number of the control chip or the wafer number of the storage device or the serial number of the U disk, and combine them as the input parameters of the algorithm. Encoding, generate the intermediate digital watermark information and hidden position, and then use the digital watermark embedding algorithm to load the digital watermark information into the hidden position in the ordinary carrier file to generate a visually indistinguishable carrier file that hides important information / The final carrier file of confidential documents, and does not affect the normal use of the final carrier file. The common carrier files used can be text files, picture files, audio carrier files, v...

Embodiment 2

[0038] see figure 2 , this example illustrates how the confidential information hidden in the carrier file is extracted.

[0039] First, use the digital watermark extraction algorithm to extract the digital watermark information from the hidden position in the final carrier file, and at the same time obtain the most original carrier file. For the digital watermark information, use the digital watermark analysis algorithm to extract the user The input "seed" is used as an input parameter to be operated together, and finally the hidden confidential information / confidential file is obtained.

[0040]It should be noted that: regardless of whether the "seed" input by the user when extracting confidential information matches or not the "seed" input when making the watermark, this algorithm will use it as an input parameter for operation. The difference is: the wrong "seed", the final result can only be a garbled output.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a U disk information safety system based on information hiding and digital watermarking technology, which comprises a confidential information hiding program and a hidden information extraction program. The confidential information hiding program is implemented by the following steps of: 1, extracting confidential information and a 'seed' password input by a user; 2, carrying out combined coding on the confidential information, the input 'seed' password and a wafer number of a U disk, which are used as relevant parameters, by using a digital watermarking generating algorithm to generate digital watermarking information; and 3, by using a digital watermarking embedding algorithm, loading a digital watermark into the common carrier file to generate a final carrier file with the hidden confidential information, which is indiscriminate from the carrier file visually. The hidden information extraction program is implemented by the following steps of: extracting watermarking information from the final carrier file by using a digital watermarking extraction algorithm; and operating the watermarking information by using a digital watermarking analytical algorithm and the 'seed' password input by the input user to obtain the hidden confidential information. The U disk information safety system has the advantages that: the information is well hidden and difficult to perceive, has high safety and is difficult to crack; and the system is convenient to manage and use.

Description

technical field [0001] The invention relates to a computer information security technology, specifically to a protection technology of confidential / private information, and belongs to the field of computer application technology. Background technique [0002] Along with the extensive application of personal computer, the use of U disk is quite popular, and the security problem of U disk use is also outstanding day by day. At present, incidents of secret information being leaked during the use of U disks occur frequently. folder, which plays a role in spying on secrets) has caused great harm to the information on the U disk, and the loss of U disk is also relatively common. The leakage of confidential information will cause serious harm to national security, the leakage of company confidential information will cause serious damage to the company's operation, development and economic interests, and the leakage of personal confidential information will also cause personal da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14
Inventor 李炳法华建和张约里李树源李树泉李冀燐张巍
Owner CHENGDU YUFEI INFORMATION ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products