Image-based confidential information spreading method, device and system

A confidential information and image technology, applied in the field of image-based confidential information dissemination, can solve problems such as unsafe access, affecting image visual tension, affecting image integrity and aesthetics, and achieve the effect of improving security

Inactive Publication Date: 2016-10-12
布雷斯特商科在线(南京)科技有限公司
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are three main disadvantages in this way: first, information and resources are separated, and the visually visible information is not the resource itself that the observer wants to obtain. It needs to visit the Internet again to obtain the target resource. For example, a picture may have an mp3 URL Or the corresponding QR code, but what the user wants to get is actually an mp3 instead of this URL or QR code; second, it affects the visual tension of the overall image. In order to allow the image to carry character information, QR code or other information, often A certain pixel of the original image needs to be replaced, which affects the integrity and aesthetics of the image; third, the security is insufficient, and the plaintext information is easy to replace or tamper, and the original information can be replaced with phishing information, resulting in unsafe access; Fourth, the form of embedded information is limited. The existing image-based information dissemination system can only carry image information such as character text information or two-dimensional codes, and the image itself cannot carry audio or more different pictures.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image-based confidential information spreading method, device and system
  • Image-based confidential information spreading method, device and system
  • Image-based confidential information spreading method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention clearer, the specific implementation of the image-based confidential information dissemination method, device and system of the present invention will be further described in detail through the following examples and in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034]In daily life, we want to use digital watermarking technology to allow images to safely record and carry text, audio or image information without affecting the visual appearance of the image. These carried information are confidential way embedded in the image, invisible to the naked eye. This embodiment provides an image-based confidential information dissemination method that can achieve the above technical requirements.

[0035] see figure 1 , in one embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image-based confidential information spreading method. The method comprises the steps of obtaining a host image and information needing to be encrypted; performing fingerprint extraction on the host image, and judging whether fingerprints of the host image exist in a database or not; if fingerprints of the host image do not exist in the database, generating a decoding secret key, and storing fingerprints of the host image and the generated decoding secret key in the database; encoding and converting a binaryzation sequence of the information needing to the encrypted to generate a parasitic image; adopting the generated decoding secret key as a decoding input variable, inserting the parasitic image into the host image, and completing preparation of a confidential image. The image-based confidential information spreading method can enable the image to carry target resources, the target resources can be obtained without re-access of the Internet, information consistency is ensured, tamper-proofing is achieved, tension of the overall image vision is ensured, and inserted information cannot be seen by naked eyes. The invention further provides an image-based confidential information spreading device and system.

Description

technical field [0001] The present invention relates to the technical field of information encryption, in particular to an image-based secret information dissemination method, device and system. Background technique [0002] At present, the existing image-based information dissemination systems often add visually perceptible symbols, signs or signals such as character information, marking symbols, one-dimensional codes or two-dimensional codes on images to access the resource ontology of image promotion. There are three main disadvantages in this way: first, information and resources are separated, and the visually visible information is not the resource itself that the observer wants to obtain. It needs to visit the Internet again to obtain the target resource. For example, a picture may have an mp3 URL Or the corresponding QR code, but what the user wants to get is actually an mp3 instead of this URL or QR code; second, it affects the visual tension of the overall image. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/16
CPCG06F21/10G06F21/16G06T1/0021G06F21/1063G06F21/107
Inventor 黄缨宁佘桂华武博文
Owner 布雷斯特商科在线(南京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products