CN106815529A - Cell phone pictures safety protection system and method based on Steganography - Google Patents

Cell phone pictures safety protection system and method based on Steganography Download PDF

Info

Publication number
CN106815529A
CN106815529A CN201611181086.8A CN201611181086A CN106815529A CN 106815529 A CN106815529 A CN 106815529A CN 201611181086 A CN201611181086 A CN 201611181086A CN 106815529 A CN106815529 A CN 106815529A
Authority
CN
China
Prior art keywords
user
picture
steganography
unit
photo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611181086.8A
Other languages
Chinese (zh)
Inventor
田辉
郭玉刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei High Dimensional Data Technology Co Ltd
Original Assignee
Hefei High Dimensional Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei High Dimensional Data Technology Co Ltd filed Critical Hefei High Dimensional Data Technology Co Ltd
Priority to CN201611181086.8A priority Critical patent/CN106815529A/en
Publication of CN106815529A publication Critical patent/CN106815529A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Image Processing (AREA)

Abstract

The present invention provides a kind of cell phone pictures safety protection system and method based on Steganography, belongs to Information Hiding Techniques field, and system includes camera model, processing module and verification management module;The photographing instruction that camera model is triggered according to user carries out generation secret photo to be concealed of taking pictures;Processing module is based on steganographic algorithm by secret photo steganography to carrier picture, and generation carries close picture;Verification management module checks that the user of secret photo carries out authentication to request, and the authority for checking secret photo is provided after subscriber authentication success.The method includes that the photographing instruction triggered according to user carries out generation secret photo to be concealed of taking pictures;Based on steganographic algorithm by secret photo steganography to carrier picture, generation carries close picture;The user of secret photo carries out authentication to be checked to request, the authority for checking secret photo is provided after subscriber authentication success.Both the purpose of hiding secret photo had been reached, the process of cell phone pictures security protection had been in turn simplify.

Description

Cell phone pictures safety protection system and method based on Steganography
Technical field
The present invention relates to information steganography technical field, more particularly to a kind of cell phone pictures safeguard protection system based on Steganography System and method.
Background technology
At present, with the arrival of cybertimes, increasing user is by texts such as picture, video, audio, message, documents The privacies such as part are stored in the client, but thing followed problem is exactly privacy leakage, and the photo leakage particularly in mobile phone is It is of common occurrence, bring very big puzzlement to user.
For the problem of cell phone pictures safety, conventional solution mainly includes two kinds:The first is that photo is carried out Encryption, and, user needs to check picture by key certification by key storage in the storage device;Second is to store Image watermarking in a device gets up, i.e., the sensitive document that user specifies is filtered so as to reach the effect of hiding photo. But there is serious defect in both approaches:As long as the shortcoming of first method is to obtain key can just decode all Data;The defect of second method is that data are realized by " filtering " hiding, and data are still stored directly In a hard disk, if obtaining the hard disk, it is possible to directly recover the file being hidden;And both approaches are all independent The photo in mobile phone is processed, that is to say, that first pass through software of taking pictures and taken pictures, then again by special treatment Algorithm is processed photo, and process is complicated, and the security reduction of photo is also resulted in interlude more.
The content of the invention
It is an object of the invention to provide a kind of cell phone pictures safety protection system and method based on Steganography, to enter While row is taken pictures, safe handling is carried out to photo, protect the safety of cell phone pictures.
To realize object above, the technical solution adopted by the present invention is:First aspect, there is provided the hand based on Steganography in Machine photo safety system, the system includes:Camera model, processing module and verification management module;
The photographing instruction that camera model is used to be triggered according to user is taken pictures, and generates secret photo to be concealed;
Processing module is used in secret photo steganography to be concealed to carrier picture based on default steganographic algorithm, and generation carries close Picture;
Verification management module carries out authentication for checking the user of secret photo to request, and in subscriber authentication success The authority for checking secret photo is provided afterwards.
Second aspect, there is provided a kind of cell phone pictures method for security protection based on Steganography, the method includes:
Taken pictures according to the photographing instruction that user triggers, generated secret photo to be concealed;
Based on default steganographic algorithm by secret photo steganography to be concealed to carrier picture, generation carries close picture;
Check that the user of secret photo carries out authentication to request, and secret photograph is checked in offer after subscriber authentication success The authority of piece.
Compared with prior art, there is following technique effect in the present invention:The present invention while being taken pictures, using steganography The photo steganography that algorithm will be generated obtains being concealed with the close figure of load of privacy of user photographic intelligence in the advance carrier picture chosen Piece, the close picture of the load seems consistent with carrier picture surface, if user needs to check the photo in cell-phone customer terminal, Need to carry out authentication, if subscriber authentication success, extracts user's using extraction algorithm from close picture is carried Privacy photo, if subscriber authentication fails, is only capable of checking the close picture of load.Therefore, in this programme, it is stored directly in movement Being carrier picture and be not the secret photo of user in client, has reached the purpose of hiding secret photo, and, even if Mobile client is stolen, and stealer can only also recover to obtain carrying close picture, and secret in can not obtaining being hidden in carrier picture Close photo, so as to reliably protect the personal secrets of user.Meanwhile, this programme while taking pictures, shine by the secret that will be generated Piece steganography in carrier picture, without respectively by take pictures software and treatment software come complete cell phone pictures safety prevent Shield, simplifies the process of cell phone pictures security protection.
Brief description of the drawings
Fig. 1 is that a kind of structure of cell phone pictures safety system based on Steganography that one embodiment of the invention is provided is shown It is intended to;
Fig. 2 is the structural representation of the cell phone pictures safety system that the another kind that one embodiment of the invention is provided is based on Steganography Figure;
The schematic flow sheet of subscriber authentication in Fig. 3 one embodiment of the invention;
Fig. 4 is the structural representation of the cell phone pictures safety system that the another kind that one embodiment of the invention is provided is based on Steganography Figure;
Fig. 5 is that a kind of flow of cell phone pictures method for security protection based on Steganography that one embodiment of the invention is provided is illustrated Figure;
Fig. 6 is that the flow of the cell phone pictures method for security protection that the another kind that one embodiment of the invention is provided is based on Steganography is illustrated Figure;
Fig. 7 is the overall flow schematic diagram of the cell phone pictures method for security protection based on Steganography in one embodiment of the invention.
Specific embodiment
With reference to Fig. 1 to Fig. 7, the present invention is described in further detail.
As shown in figure 1, present embodiments providing a kind of cell phone pictures safety system based on Steganography, the system bag Include camera model 10, processing module 20 and verification management module 30;
The photographing instruction that camera model 10 is used to be triggered according to user is taken pictures, and generates secret photo to be concealed;
Processing module 20 is used in secret photo steganography to be concealed to carrier picture based on default steganographic algorithm, and generation is carried Close picture;
Verification management module 30 is used to check that the user of secret photo carries out authentication to request, and subscriber authentication into The authority for checking secret photo is provided after work(.
It should be noted that the close picture of load at this is consistent with the outward appearance of carrier picture, simply carries and conceal in close picture The information of secret photo.When subscriber authentication fails, user is only capable of viewing the close picture of load, and cannot see secret figure Piece, it is ensured that the safety of cell phone pictures.
Specifically, as shown in Fig. 2 camera model 10 includes carrier picture management unit 11, photographing unit 12 and carries close Picture management unit 13;
Carrier picture management unit 11 is used to preserve multiple carrier pictures of advance selection;
It should be noted that carrier picture management unit 11 is to be preserved multiple carrier pictures that user actively chooses.This In user can according to the hobby selection of oneself for steganography secret photo carrier picture, more hommization is conducive to carrying Consumer's Experience sense high.
Photographing unit 12 is used to be taken pictures according to the triggering command of user, generates secret photo to be concealed;
Close picture management unit 13 is carried for preserving the close picture of load of the generation of processing module 20.
It should be noted that being specially to the process that the secret photo for generating carries out steganography treatment in the present embodiment:Take pictures Unit 12 transmits to processing module 20 the secret photo for generating, and processing module 20 calls the load in carrier picture management unit 11 Body picture and by the secret photo steganography in carrier picture, obtain carrying close picture, the close picture of load that processing module 20 will be generated It is stored in the close picture management unit 13 of load.
Also, it should be noted that the function that the photographing unit 12 in the present embodiment needs to have includes:Front camera and rear camera is cut The function of changing, the regulation of focal length and the open and close function of manual focus function flash lamp, carry close picture and are contracted with carrier picture Preview function of sketch map etc..User is contracted when the camera model 10 in using this implementation is taken pictures by clicking on carrier picture Sketch map checks that window just can be entered into carrier picture management unit 11, secret for steganography to choose corresponding carrier picture Photo.Carried when close picture thumbnail checks window, it is necessary to verified to the identity of user clicking on, if authentication into Work(, enters into and carries that view in close picture management unit 13 is exactly secret photo, if authentication failure, enters into load What is viewed in close picture management unit 13 is exactly to carry close picture.
Specifically, as shown in Fig. 2 processing module 20 includes steganography unit 21 and extraction unit 22;
Steganography unit 21 is used in the hiding secret photo steganography of band to carrier picture according to default steganographic algorithm, and generation is carried Close picture;
Extraction unit 22 is used for after verification management module 30 is to the authentication of user success, based on default extraction algorithm from Carry and extract secret photo in close picture.
It should be noted that default steganographic algorithm, extraction algorithm can be identical with algorithm of the prior art at this, Can be with difference, as long as steganography, abstraction function can be realized.
Specifically, as shown in Fig. 2 verification management module 30 includes identity authenticating unit 31 and administrative unit 32;
Whether identity authenticating unit 31 is used to verify the accounts information of user, correct with the account for judging user;
Administrative unit 32 is used to be managed the accounts information of user.
It should be noted that the administrative unit 32 at this is managed specifically for the accounts information to user, including it is right The user name management of login password, the reason for obtain identifying code to user and random generation identifying code be managed, it is right The feedback opinion that user submits to is managed and the use Log of user is managed.
It should be noted that as shown in figure 3, in the present embodiment, user first carries out user's registration, such as can be by user's Cell-phone number, email address etc. as user's registration unique account, user is by after short message verification code or mailbox checking information Login password and validation problem are set, and the account of the user, login password and validation problem can be stored in administrative unit 32 In, when user needs to log in, account and password being input into, identity authenticating unit 31 is by the account and password of user input and management The account and password stored in unit 32 are compared, and judge the account and password of user input and the account of storage in administrative unit Whether number it is consistent with password, is verified with the identity to user.
Also, it should be noted that when forgetting Password, user can obtain identifying code by cell-phone number or mailbox, and It is being that reconfigurable new password is logged in by problem checking.
Specifically, as indicated at 4, camera model 10 also includes screening unit 14 to figure;
Screening unit 14 is used to screen advance multiple carrier pictures chosen, and will screen the carrier picture preservation for obtaining In carrier picture management unit 11.
It should be noted that the screening unit 14 at this is used for according to default screening conditions to many of user's active selection Zhang Zaiti pictures are screened, default screening conditions can be the resolution ratio of picture, picture can embedded quantity, the form of picture Deng whether eligible.
Carrier picture can provide a certain amount of memory space, but some available embedding capacities of carrier picture are very Small, such as, the carrier picture of the bmp forms of 1M can provide the memory capacity of 0.3M.Accordingly, it would be desirable to first to carrier picture can Embedding capacity is screened, to prevent when steganography is carried out to secret photo, the carrier picture of selection can embedding capacity cannot Meet the demand of secret photo steganography.
Multiple carrier pictures that user actively chooses are screened by setting screening unit 11, it is ensured that screen To carrier picture can meet the requirement of secret photo steganography, prevent due to the carrier picture chosen it is unqualified caused by secret shine The unsuccessful problem of piece steganography, effectively can reliably ensure the safety of secret photo.
In addition, in order that this embodiment scheme has preferable applicability, format conversion unit can be set, with according to reality Border applicable cases, the form suitable for practical application is converted to by the form of carrier picture, such as, because IOS system cameras are clapped The picture format taken the photograph is png, and the operand format of steganography unit 21 is jpeg forms in the present embodiment, therefore, in steganography Unit 21 before carrying out steganography needs that the picture of png forms is first converted to the picture of jpeg forms.
Specifically, the close picture management unit 10 of load in the present embodiment is specially the local memory space of client or is High in the clouds.Preserved beyond the clouds by the close picture of the load for generating steganography, the load in multiple mobile devices of same user can be made close Picture is synchronized, it is also possible to the close picture of load in multiple user's mobile devices is managed, user's mobile device is saved In space.In addition, after the close picture of load of the present embodiment generation uploads to high in the clouds, even if high in the clouds is attacked, can only also obtain To the close picture of load, and secret photo can not be obtained, sufficiently protect the personal secrets of user.
Specifically, in the present embodiment in view of photographing unit 12 need in shooting process to user show it is currently used Carrier picture, therefore, in the present embodiment not by the way of the camera that cell phone system is carried is directly invoked, but remake bat According to unit 12.In addition, the carrier picture management unit 11 and the close picture management unit 13 of load in the present embodiment are all independently of The camera system of mobile phone, embody the independence of this programme.
Specifically, as shown in figure 5, present embodiment discloses a kind of cell phone pictures safety protecting method based on Steganography, The method comprises the following steps S1 to S3:
S1, the photographing instruction triggered according to user are taken pictures, and generate secret photo to be concealed;
S2, will be generated and carry close picture in secret photo steganography to be concealed to carrier picture based on default steganographic algorithm;
S3, the user of secret photo carries out authentication to be checked to request, and provided after subscriber authentication success and check secret The authority of close photo.
Specifically, as shown in fig. 6, present embodiment discloses cell phone pictures safeguard protection side of the another kind based on Steganography Method, the method in the above-described embodiments the step of S1 before also include step S0:
S0, advance multiple carrier pictures chosen are screened, and the carrier picture for obtaining will be screened and preserved.
The process screened to carrier picture based on default screening conditions at this and effect are with foregoing based on steganography What is illustrated in the cell phone pictures safety system of art is identical, and here is omitted.
Specifically, the process for carrying out authentication to asking the user for checking secret photo is specially:
Obtain account, the encrypted message of user;
Judge whether the account of user, encrypted message are consistent with the account, encrypted message that prestore,
If be consistent, it is determined that subscriber authentication success;
If do not corresponded, it is determined that subscriber authentication fails.
Specifically, as shown in fig. 7, the cell phone pictures method for security protection based on Steganography disclosed in above-described embodiment, When it is determined that subscriber authentication is successful, also comprise the following steps:
Based on default extraction algorithm, secret photo is extracted from the close picture of described load so that user checks.
And when subscriber authentication fails, user is only provided and checks the authority for carrying close picture.
It should be noted that present invention protection is that the function that steganography is carried out to privacy picture is combined with camera function Thought, i.e., in the present invention in shoot the photo that obtains through camera be to carry the secret photo that close picture shoots rather than user.Equally , steganography function and recorder, message editor procedure etc. can be related to user by those skilled in the art using thought of the invention The device of privacy is combined, to protect the personal secrets of user.

Claims (10)

1. a kind of cell phone pictures safety system based on Steganography, it is characterised in that:Including camera model(10), treatment mould Block(20)And verification management module(30);
Camera model(10)Photographing instruction for being triggered according to user is taken pictures, and generates secret photo to be concealed;
Processing module(20), by secret photo steganography to be concealed to carrier picture, generated for based on default steganographic algorithm Carry close picture;
Verification management module(30)For checking that the user of secret photo carries out authentication to request, and in subscriber authentication The authority for checking secret photo is provided after success.
2. the system as claimed in claim 1, it is characterised in that:Described camera model(10)Including carrier picture management unit (11), photographing unit(12)And carry close picture management unit(13);
Carrier picture management unit(11)Multiple carrier pictures for preserving advance selection;
Photographing unit(12)Taken pictures for the triggering command according to user, generated secret photo to be concealed;
Carry close picture management unit(13)For preserving processing module(20)The close picture of load of generation.
3. the system as claimed in claim 1, it is characterised in that:Described processing module(20)Including steganography unit(21)With carry Take unit(22);
Steganography unit(21), by the hiding secret photo steganography of band to carrier picture, generated for according to default steganographic algorithm Carry close picture;
Extraction unit(22)For in verification management module(30)After to the authentication success of user, calculated based on default extraction Method extracts secret photo from close picture is carried.
4. the system as claimed in claim 1, it is characterised in that:Described verification management module(30)Including identity authenticating unit (31)And administrative unit(32);
Identity authenticating unit(31)Verified for the accounts information to user, it is whether correct with the account for judging user;
Administrative unit(32)It is managed for the accounts information to user.
5. system as claimed in claim 2, it is characterised in that:Described camera model(10)Also include screening unit(14);
Screening unit(14)For advance multiple carrier pictures chosen to be screened, and will screened with the carrier picture guarantor for obtaining There is carrier picture management unit(11)In.
6. system as claimed in claim 2, it is characterised in that:The close picture management unit of described load(13)For client is local Memory space or high in the clouds.
7. a kind of cell phone pictures safety protecting method based on Steganography, it is characterised in that methods described includes:
Taken pictures according to the photographing instruction that user triggers, generated secret photo to be concealed;
Based on default steganographic algorithm by secret photo steganography to be concealed to carrier picture, generation carries close picture;
Check that the user of secret photo carries out authentication to request, and secret photograph is checked in offer after subscriber authentication success The authority of piece.
8. method as claimed in claim 7, it is characterised in that clapped in the described photographing instruction triggered according to user According to before generating secret photo to be concealed, also including:
Advance multiple carrier pictures chosen are screened, and will screen the carrier picture for obtaining carries out being stored for steganography.
9. method as claimed in claim 7, it is characterised in that it is determined that during subscriber authentication success, methods described is also wrapped Include:
Based on default extraction algorithm, secret photo is extracted from the close picture of described load so that user checks.
10. method as claimed in claim 7, it is characterised in that methods described also includes:
When subscriber authentication fails, user is only provided and checks the authority for carrying close picture.
CN201611181086.8A 2016-12-20 2016-12-20 Cell phone pictures safety protection system and method based on Steganography Pending CN106815529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611181086.8A CN106815529A (en) 2016-12-20 2016-12-20 Cell phone pictures safety protection system and method based on Steganography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611181086.8A CN106815529A (en) 2016-12-20 2016-12-20 Cell phone pictures safety protection system and method based on Steganography

Publications (1)

Publication Number Publication Date
CN106815529A true CN106815529A (en) 2017-06-09

Family

ID=59109950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611181086.8A Pending CN106815529A (en) 2016-12-20 2016-12-20 Cell phone pictures safety protection system and method based on Steganography

Country Status (1)

Country Link
CN (1) CN106815529A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019023955A1 (en) * 2017-08-02 2019-02-07 深圳传音通讯有限公司 Image storage and viewing method and system of intelligent terminal
CN111526123A (en) * 2017-10-24 2020-08-11 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium
CN113094672A (en) * 2021-04-25 2021-07-09 前海金信(深圳)科技有限责任公司 Method for automatically encrypting mobile phone data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002583A1 (en) * 2004-07-02 2006-01-05 Reed Alastair M Conditioning imagery to better receive steganographic encoding
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN104133544A (en) * 2013-08-26 2014-11-05 腾讯科技(深圳)有限公司 File processing method, device and terminal
CN104778416A (en) * 2015-03-04 2015-07-15 广东欧珀移动通信有限公司 Information hiding method and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002583A1 (en) * 2004-07-02 2006-01-05 Reed Alastair M Conditioning imagery to better receive steganographic encoding
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN104133544A (en) * 2013-08-26 2014-11-05 腾讯科技(深圳)有限公司 File processing method, device and terminal
CN104778416A (en) * 2015-03-04 2015-07-15 广东欧珀移动通信有限公司 Information hiding method and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019023955A1 (en) * 2017-08-02 2019-02-07 深圳传音通讯有限公司 Image storage and viewing method and system of intelligent terminal
CN111526123A (en) * 2017-10-24 2020-08-11 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium
CN111526123B (en) * 2017-10-24 2022-02-25 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium
CN113094672A (en) * 2021-04-25 2021-07-09 前海金信(深圳)科技有限责任公司 Method for automatically encrypting mobile phone data

Similar Documents

Publication Publication Date Title
US10348726B2 (en) Online identity verification platform and process
JP4931924B2 (en) Media data processing apparatus and media data processing method
US10019773B2 (en) Authentication and validation of smartphone imagery
Yuan et al. Privacy-preserving photo sharing based on a secure JPEG
JP2000152148A (en) Electronic camera
US20210287322A1 (en) Robust selective image, video, and audio content authentication
US10339283B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
CN106372522A (en) Photo shooting method, corresponding device, photo viewing method and corresponding device
WO2013021107A1 (en) Method, server and system for authentication of a person
CN106815529A (en) Cell phone pictures safety protection system and method based on Steganography
CN101415099A (en) System and method for ciphering image viewfinding device
CN110008718A (en) A kind of image processing method and terminal
CA2919749A1 (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
CN114730337A (en) Cryptographic key management
WO2015196642A1 (en) Data encryption method, decryption method and device
JP4462094B2 (en) Camera device and control program thereof
US11553216B2 (en) Systems and methods of facilitating live streaming of content on multiple social media platforms
FR2944400A1 (en) METHOD OF AUTHENTICATING A SERVER FROM A USER OF A MOBILE DEVICE
JP2023511248A (en) Content authentication based on unique attributes
CN109063442B (en) Service implementation method and device and camera implementation method and device
CN101572791A (en) Image encryption system and method
CN103067367A (en) Password hidden method and device and password retrieval method and device
Abboud Multifactor authentication for software protection
KR102539533B1 (en) Method and apparatus for preventing other people from photographing identification
CN105393257B (en) A kind of data ciphering method and encryption device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170609