Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for exchanging cipher watermarking based on modular operation

A modular operation and watermarking technology, applied in the field of information security, can solve problems such as security, efficiency and robustness defects, difficult multimedia data reliability, practical security protection, etc., and achieve high security, high efficiency and robustness strong effect

Active Publication Date: 2021-03-23
NANJING JIYIN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, the existing implementation mechanisms of multimedia data exchange cryptographic watermarking include domain division, homomorphic encryption, and statistical features, but these methods have defects in security, efficiency, and robustness, and it is difficult to achieve reliable multimedia data. High performance and good practical safety protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for exchanging cipher watermarking based on modular operation
  • A method and system for exchanging cipher watermarking based on modular operation
  • A method and system for exchanging cipher watermarking based on modular operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0061] The purpose of the present invention is to provide a method that avoids the defects in security, usability, efficiency, robustness, etc. caused by the existing implementation of the exchange cipher watermark, and improves the security and reliability of the exchange cipher watermark.

[0062] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password watermark exchange method and a system based on modular operation. The method comprises the following steps of: converting a copyright identifier into binary watermark information according to the copyright identifier; reading the data to be embedded with the watermark; generating a ciphertext in an integer form based on the key and the random number generator; for the numerical value of the carrier data, increasing an integral multiple of the die length to realize encryption and storing a die length parameter; carrying out modular operation on numerical values in the carrier data, and modulating and embedding watermarks into the rest of the numerical values in a quantized manner; during decryption, generating a ciphertext in an integer form by using random number generators with the same parameters according to the encrypted secret key, and reducing the numerical value of the carrier data by an integer multiple of the module length to realize decryption; when the watermark is detected, modular operation is carried out on carrier data, and the watermark is extracted by using quantitative modulation. According to the method, related characteristicsin modular operation are fully utilized, a security protection scheme that cryptology and digital watermarks are jointly implemented in the same domain of carrier data is achieved, and the security and reliability of password watermark exchange are improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for exchanging cipher watermarks based on modular operations. Background technique [0002] The security protection technology of multimedia data mainly includes cryptography and digital watermarking. Cryptography can convert plaintext multimedia data into ciphertext, thereby protecting the security of multimedia data during transmission and distribution, and technically preventing losses caused by illegal theft and leakage during multimedia data distribution. Digital watermarking is to embed copyright information, user information and other identifiers in the data to realize the functions of data copyright protection, usage tracking, leak tracking and so on. Compared with encrypted security protection methods, digital watermarks can permanently exist in vector geographic data, and realize continuous tracking of data in the process of circulation and use. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32H04L29/06H04L9/08
CPCH04L9/0869H04L63/0428H04L2209/603H04L2209/608H04N1/32272H04N1/3232
Inventor 崔翰川佟德宇朱长青吴清华曹江华
Owner NANJING JIYIN INFORMATION TECH