Unlock instant, AI-driven research and patent intelligence for your innovation.

A ciphertext preservation method under carrier damage

A ciphertext and carrier technology, applied in the field of information security, can solve the problems of being easily discovered by others, garbled secret information, attacks, etc., and achieve the effect of overcoming poor robustness, large amount of embedded information, and enhancing reliability.

Inactive Publication Date: 2021-04-23
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, cryptographic technology also has its own problems. For example, secret information is coded to generate garbled characters, which is easy to be discovered by others, attacking and destroying; It is required that the authentication information can be directly embedded in the multimedia data, but it is difficult to achieve this in cryptographic technology. Moreover, the authenticity authentication of multimedia content often needs to endure a certain degree of distortion. However, cryptographic technology often does not allow any bit change.
[0005] Traditional encryption technology can no longer meet people's needs, so information hiding technology is born as a new information security technology application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ciphertext preservation method under carrier damage
  • A ciphertext preservation method under carrier damage
  • A ciphertext preservation method under carrier damage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] refer to figure 1 , figure 2 , image 3 with Figure 4 , the embodiment of the present invention provides a method for preserving ciphertext when the carrier is damaged. The method includes four steps of loading the image file, loading the ciphertext file, encrypting and decrypting. Each step will be described in detail below:

[0027] Step 1, load the image file:

[0028] Open the image file;

[0029] Get the path name and extension of the image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preserving ciphertext when a carrier is damaged, and relates to the technical field of information security. The ciphertext information is hidden by means of the least significant bit LSB algorithm, and has the advantages of simple implementation and large amount of embedded information. Since the image has been embedded with encrypted information, it cannot be distinguished by naked eyes alone, thus ensuring the security of secret information transmission. On this basis, the sender can arbitrarily choose a 24-bit bmp image as a carrier, use the idea of ​​maximum likelihood probability to store information, and use (7,3) cyclic codes to perform error control coding on the carrier format information sequence for storing ciphertext, Even if the image is damaged due to a certain degree of cropping during the communication process, the receiver can ensure the recovery of the ciphertext information embedded in the image through its own error detection and correction capabilities, thus to a certain extent overcome the robustness of the LSB algorithm to store information. The shortcomings of poor performance greatly enhance the reliability of information transmission.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for preserving ciphertext when a carrier is damaged. Background technique [0002] From ancient times to the present, the problem of information security in human society has been a long-lasting problem. In ancient my country, in the form of Tibetan-initial poems and Tibetan-tail poems, the meaning and "secret words" to be expressed were hidden in specific positions in poems or pictures. Crack the hidden information in it, so as to achieve the purpose of information hiding. [0003] In today's society, with the development of network technology and multimedia technology, people pay more and more attention to multimedia technology, and our life has become increasingly exciting due to the development of digital information, such as various multimedia digital products Greatly enrich our life. Because multimedia has the characteristics of being reproducible an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
Inventor 张明远高梓铭陈伟超范九伦
Owner XIAN UNIV OF POSTS & TELECOMM