Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

393 results about "Steganography" patented technology

Steganography (/ˌstɛɡəˈnɒɡrəfi/ STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγᾰνός), meaning "covered or concealed", and graphe (γραφή) meaning "writing".

Three-way call detection using steganography

Three-way call detection is an important component of correctional facility telephone equipment because it helps restrict calling access by certain persons to certain restricted telephone numbers. Various three-way call detection methods exist, but all of these implementations suffer from one major limitation-the detection accuracy is not as high as is desired by the industry. The present invention improves detection accuracy, using “steganography.” Steganography involves hiding one set of data or signals within another signal or carrier in such a way that its presence is typically imperceptible to the human ear, and potential even the originator of the carrier signal. The present invention involves a device that connects to a telephone, either at the line or the handset interfaces, and produces a known signal that is steganographically hidden within the user's normal voice signal. Detection equipment, residing at another location, monitors signals on telephone calls and tests for the presence of the hidden signal or data generated by the invention. Once detection is achieved, appropriate action, such as terminating or recording the call, may be taken. Improved accuracy is achieved by choosing the appropriate hidden signal(s). Once detected, the presence of the signal guarantees the call was made to the restricted party from a particular phone line.
Owner:DSI ITI INC

Novel terminal safety soft secret key management method

The invention discloses a novel terminal safety soft secret key management method. According to the method, information of two transaction parties are selected by a soft secret key system as identification ID, public and private key pairs are formed through mapping on the basis of business subdomain identification; for online payment, a two-dimensional code is generated at a receiving party; after the two-dimensional code is scanned by a payment party, signature is carried out by utilizing a private key pair randomized number, and information is sent to a background management system; signature verification is realized by the background management system through utilizing public key pair signature information; if signature verification succeeds, transaction is processed; for offline payment, signature is carried out by the receiving party through utilizing the private key pair randomized number, and a two-dimensional code is generated; the two-dimensional code is scanned by the payment party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is carried out by the payment party according to transaction information; signature is carried out by the payment party through utilizing the private key pair randomized number, a two-dimensional code is generated; the two-dimensional code is scanned by the receiving party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is successfully realized for the receiving party. Through the method, system safety is not only improved, system disposition cost is further reduced, transaction validness is fully guaranteed, and invalid information tampering and information steganography can be avoided.
Owner:CHINA SMARTCITY TECH

Compressive sensing-based adaptive video information hiding method

The invention discloses a compressive sensing-based adaptive video information hiding method, which is characterized by comprising the following steps of: a, framing a video file by using shot as a unit; b, taking the first frame of each shot as a key frame; c, establishing an image texture classification model to obtain a texture classification model mark of each key frame; d, determining a texture category of each key frame and determining whether the key frame is a texture region, or a smooth region or between the texture region and the smooth region; e, selecting an algorithm and determining insert depth; f, inserting secret information, i.e., inserting the secret information in a coefficient matrix; and g, synthesizing a video file. According to the video information hiding method, the secret information can be adaptively inserted under the condition that the entire video file is not required to be decompressed, so that the ornamental value of the video is not affected, and the method has the advantages of small amount of calculation, high information steganography efficiency, small influence on the video and good secret information safety. The method can be widely applied to various fields such as copyright authentication, pirate tracking and secure communication.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Steganography-based key transmission and key updating method

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products