CN109829322B - Authorization information based real-time encryption and decryption method and system for digital media files - Google Patents

Authorization information based real-time encryption and decryption method and system for digital media files Download PDF

Info

Publication number
CN109829322B
CN109829322B CN201910082105.9A CN201910082105A CN109829322B CN 109829322 B CN109829322 B CN 109829322B CN 201910082105 A CN201910082105 A CN 201910082105A CN 109829322 B CN109829322 B CN 109829322B
Authority
CN
China
Prior art keywords
file
authorization information
media file
decryption
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910082105.9A
Other languages
Chinese (zh)
Other versions
CN109829322A (en
Inventor
刘渭滨
吴杨萌
邹智元
邢薇薇
赵建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jiaotong University
Original Assignee
Beijing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jiaotong University filed Critical Beijing Jiaotong University
Priority to CN201910082105.9A priority Critical patent/CN109829322B/en
Publication of CN109829322A publication Critical patent/CN109829322A/en
Application granted granted Critical
Publication of CN109829322B publication Critical patent/CN109829322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for encrypting and decrypting a digital media file in real time based on authorization information, wherein the method comprises the following steps: s1, reading an original digital media file A, and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B; s2, obtaining an encryption key K1; s3, according to the encryption key K1, the authorization number media file B is encrypted by adopting an encryption algorithm, and an encrypted authorization number media file C containing authorization information is obtained. S4, reading the encrypted authorization number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream; s5, taking out authorization information from the decrypted file stream; and verifying according to the authorization information; and S6, based on the network protocol, transmitting the decrypted file stream which is successfully verified in parallel, and realizing real-time decryption.

Description

Authorization information based real-time encryption and decryption method and system for digital media files
Technical Field
The invention relates to a method and a system for encrypting and decrypting a file, in particular to a method and a system for encrypting and decrypting an authorized digital media file in real time.
Background
With the rapid development of information technology, information security and other problems are more and more concerned by people. Some media files are related to privacy, and are not expected to be acquired or viewed by unauthorized third parties, so that the media files need to be encrypted and protected, the files cannot be directly read and played (viewed), and the files can be played (viewed) only after being decrypted by authorized clients, so that file information is protected, and leakage of the files is prevented.
In order to avoid sharing of digital media files among users, an independent encrypted file needs to be generated for a set of system, and a system unique identifier needs to be provided when the encrypted file is generated. In the prior art, reading and playing (viewing) of encrypted digital media files are performed only by decrypting all encrypted files, so that the files can be viewed or played, and the efficiency is very low.
Meanwhile, the authorization technology adopted in the prior art is generally system-level authorization or application-level authorization, once authorization is successful, corresponding permissions are obtained for all files in the system, and all files cannot be effectively protected.
Disclosure of Invention
The invention provides a real-time encryption and decryption method and system for digital media files based on authorization information, and aims to solve the problems that encrypted files cannot be decrypted and viewed in real time and temporary files are generated during decryption in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
a real-time encryption and decryption method for digital media files based on authorization information comprises the following steps:
s1, reading an original digital media file A, and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B;
s2, obtaining an encryption key K1;
s3, according to the encryption key K1, the authorization number media file B is encrypted by adopting an encryption algorithm, and an encrypted authorization number media file C containing authorization information is obtained.
The method further comprises the following steps:
s4, reading the encrypted authorization number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
s5, taking out authorization information from the decrypted file stream; and verifying according to the authorization information;
and S6, based on the network protocol, transmitting the decrypted file stream which is successfully verified in parallel, and realizing real-time decryption.
The step of writing the authorization information into the original digital media file A by adopting an information hiding technology comprises the following steps:
s11, selecting a corresponding steganography algorithm in an information hiding technology according to the file type of the original digital media file A;
s12, encrypting the authorization information by using a steganographic key K2 to obtain a binary authorization information sequence;
and S13, writing the binary authorization information sequence into the original digital media file A by adopting the steganography algorithm.
The step S4 includes:
s41, decrypting the encrypted media file C with the authorization number according to the encryption key K1; processing the decrypted encrypted authorization number media file C according to the size of the user-defined decryption block buffer-size to obtain a decrypted preloaded file object;
s42, reading the decrypted stream in the preloaded file object into a byte array, and writing the content of the byte array into the current memory stream to realize block decryption.
Wherein the step of retrieving authorization information from the decrypted file stream comprises:
s51, selecting a corresponding information extraction algorithm in the information hiding technology according to the file type of the decrypted file stream;
s52, reading the authorization information in the decrypted file stream by adopting a selected information extraction algorithm to obtain an authorization information sequence;
s53, decrypting the authorization information sequence by using the steganographic key K2 to obtain the authorization information.
A system for real-time encryption and decryption of digital media files based on authorization information, comprising:
the authorization information adding module is used for reading the original digital media file A and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B;
the file encryption module is used for acquiring an encryption key K1; and encrypting the authorized number media file B by adopting an encryption algorithm according to the encryption key K1 to obtain an encrypted authorized number media file C containing the authorization information.
The system further comprises:
the block decryption module reads the encrypted authorized number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
the authorization information verification module is used for taking out the authorization information from the decrypted file stream; and verifying according to the authorization information;
and the parallel transmission module is used for transmitting the decrypted file stream which is successfully verified in parallel based on a network protocol so as to realize real-time decryption.
According to the scheme, the method of block decryption is utilized, the file decryption efficiency is improved, parallel transmission is carried out through a network protocol, real-time decryption is achieved, temporary files are not generated in the decryption process, authorization processing is carried out on each file at the same time, unauthorized files are prevented from being randomly checked after decryption, the efficiency of checking the decrypted files is improved, and the protection strength of the files is increased.
Drawings
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings;
fig. 1 is a schematic diagram illustrating a method for encrypting and decrypting a digital media file in real time based on authorization information according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a method for encrypting and decrypting a digital media file in real time based on authorization information according to the present invention in embodiment 1;
FIG. 3 is a diagram showing the effect of decimal conversion of spatial pixel values in an image file into binary values in the embedding process of the LSB replacement steganography algorithm in the embodiment;
FIG. 4 is a diagram illustrating the effect of embedding a sequence of authorization information into the least significant bits of an image pixel value during the embedding process of the LSB replacement steganography algorithm in an embodiment;
FIG. 5 is a diagram showing effects before and after encryption of a file in the embodiment;
FIG. 6 is a diagram showing the effect of decimal pixel values of an image file containing authorization information being converted into binary data during the extraction process of the LSB replacement steganography algorithm in the embodiment;
FIG. 7 is a diagram showing the effect of extracting the least significant bit of binary data, i.e. the authorization information sequence, in the extraction process of the LSB replacement steganography algorithm in the embodiment;
fig. 8 is a schematic diagram illustrating a system for encrypting and decrypting a digital media file in real time based on authorization information according to an embodiment of the present invention;
fig. 9 is a schematic diagram illustrating a system for encrypting and decrypting a digital media file in real time based on authorization information according to another embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the invention, the invention is further described below with reference to preferred embodiments and the accompanying drawings. It is to be understood by persons skilled in the art that the following detailed description is illustrative and not restrictive, and is not to be taken as limiting the scope of the invention.
As shown in fig. 1, a method for encrypting and decrypting a digital media file in real time based on authorization information according to the present invention includes:
s11, reading the original digital media file A, and writing the authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B.
The step of writing the authorization information into the original digital media file A by adopting an information hiding technology comprises the following steps:
s111, selecting a corresponding steganography algorithm in an information hiding technology according to the file type of the original digital media file A;
s112, encrypting the authorization information by using a steganographic key K2 to obtain a binary authorization information sequence;
s113, writing the binary authorization information sequence into the original digital media file A by adopting the steganographic algorithm.
S12, obtaining an encryption key K1;
s13, according to the encryption key K1, the authorization number media file B is encrypted by adopting an encryption algorithm, and an encrypted authorization number media file C containing authorization information is obtained.
The method further comprises the following steps:
s14, reading the encrypted authorization number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
the step S14 includes:
s141, decrypting the encrypted media file C with the authorization number according to the encryption key K1; processing the decrypted encrypted authorization number media file C according to the size of the user-defined decryption block buffer-size to obtain a decrypted preloaded file object;
and S142, reading the decrypted decryption stream in the preloaded file object into a byte array, and writing the content of the byte array into the current memory stream to realize block decryption.
S15, taking out authorization information from the decrypted file stream; and verifying according to the authorization information;
the step of retrieving authorization information from the decrypted file stream comprises:
s151, selecting a suitable information extraction algorithm in an information hiding technology according to the file type of the decrypted file stream;
s152, reading the authorization information in the decrypted file stream by adopting a selected information extraction algorithm to obtain an authorization information sequence;
s153, decrypting the authorization information sequence by using the steganographic key K2 to obtain the authorization information.
And S16, based on the network protocol, transmitting the decrypted file stream which is successfully verified in parallel, and realizing real-time decryption.
Embodiments of the present invention are described below.
As shown in fig. 2, the present invention discloses a real-time encryption and decryption method for digital media files based on authorization information, the steps of the method are as follows:
s1, reading the digital media file F, and writing the authorization information M into the file F by adopting an information hiding technology;
s2, inputting a key, and encrypting the file by adopting an encryption algorithm;
and S3, outputting the encrypted file to obtain the encrypted digital media file E containing the authorization information.
S4, reading the media file E, inputting the key and the size of the custom decryption block buffer-size, and carrying out block decryption on the file to obtain a decryption stream;
s5, taking the authorization information from the decrypted stream and verifying the authorization information;
s6, based on network protocol parallel transmission authorized decryption file flow, real-time decryption is realized.
Wherein the step S1 includes:
s11, selecting a corresponding steganography algorithm in the information hiding technology according to different types of the digital media files;
s12, encrypting the authorization information by using a steganographic key secret to obtain a binary authorization information sequence;
and S13, writing the binary authorization information sequence into the digital media file by adopting a steganographic algorithm.
Wherein the step S4 includes:
s41, preprocessing the encrypted file E, inputting a key, and obtaining a decrypted preloaded file object according to the size of a user-defined decryption block buffer-size;
s42, reading the decryption stream in the preprocessed file object into a byte array, and writing the content of the byte array into the current memory stream, thereby carrying out block decryption;
preferably, the step S5 includes:
s51, selecting a suitable information extraction algorithm in the information hiding technology according to different media file types;
s52, reading the authorization information in the digital media file by adopting an information extraction algorithm to obtain an authorization information sequence;
s53, decrypting the authorization information sequence by using the steganographic key secret to finally obtain the authorization information.
Example 1 is further described below by substituting a specific type of digital media file to be processed:
s1, reading the digital media file F, and writing the authorization information M into the file F by adopting an information hiding technology:
accessing a data media file resource through a URL (uniform resource locator), taking a test.jpg file as an example, and then selecting an LSB (least significant bit) replacement steganography algorithm in an information hiding technology to write the authorization information M into the test.jpg file according to the type of the data media file, namely the image file.
The information hiding technology embedding process based on the LSB replacement steganography algorithm comprises the following steps:
1) encrypting the authorization information M by using a steganographic key secret to obtain a binary authorization information sequence; assume that the binary authorization information sequence is [ 001001101 ];
2) jpg file, as shown in fig. 3, converting the spatial pixel value in the image file from decimal to binary in the embedding process of LSB replacing steganography algorithm into binary effect diagram;
3) embedding the encrypted authorization information sequence into the least significant bit of the image pixel value of the test.jpg number media file, that is, replacing the least significant bit of the image file data corresponding to each bit of information in the binary authorization information, wherein the replacement process is as shown in fig. 4;
4) and converting the obtained binary data containing the authorization information into decimal pixel values so as to obtain an image file containing the authorization information.
S2, inputting a key, and encrypting the file by adopting an encryption algorithm:
and inputting a key, and encrypting the digital media file containing the authorization information by adopting an AES symmetric encryption algorithm.
S3, outputting the encrypted file to obtain an encrypted digital media file E containing authorization information:
the encrypted file is output to obtain the encrypted digital media file test, encrypted, which contains the authorization information, as shown in fig. 5, which is an effect diagram before and after encryption.
S4, reading the media file E, inputting the key and the size of the custom decryption block buffer-size, and carrying out block decryption on the file to obtain a decryption stream:
encrypted file test. encrypt is accessed via URL and converted into the form of file stream fin. Preprocessing fin, executing AES decryption conversion on fin according to a target data stream fin, initializing a decryption stream cin by adopting a reading mode on fin, and creating a decryption stream buffer zone hash;
reading the length of the file, dividing the file into N blocks according to the size buffer-size of the self-defined decryption block, wherein the length of the file is length, and the size of the file is N
Figure GDA0002996578050000071
Because the size of the file cannot be exactly divided into N blocks, there may be a remainder, represented by a slice, where the slice is (length) mod (buffer-size);
reading the written byte blocks to a decryption stream buffer area hash, and decrypting the byte blocks in the memory hash until all the byte blocks are completely decrypted in the decryption stream buffer area hash;
then closing all stream objects fin, hash and cin to obtain a preloaded file object loadfile;
and finally, reading the decryption stream cin in the preprocessed file object loadfile into byte arrays, and writing the content in the byte arrays into the current memory stream hash, thereby carrying out block decryption on the file stream fin.
S5, taking the authorization information from the decrypted stream and verifying:
according to the type of the digital media file, namely the image file, LSB replacement steganography algorithm in the information hiding technology is selected to extract the authorization information M from the decryption stream.
The specific extraction process of the information hiding technology based on the LSB replacement steganography algorithm comprises the following steps:
1) the decimal pixel value of the image containing the authorization information is converted into binary data, and as shown in fig. 7, the decimal pixel value of the image file containing the authorization information is converted into an effect graph of the binary data in the extraction process of the LSB replacement steganography algorithm;
2) extracting the least significant bit containing the binary data, namely the authorization information sequence, as shown in fig. 7, and extracting the least significant bit containing the binary data, namely the authorization information, in the extraction process of the LSB replacing steganography algorithm;
3) and decrypting the authorization information sequence according to the secret key secret to obtain the authorization information M.
S6, based on network protocol parallel transmission authorized decryption file flow, real-time decryption is realized.
After the encrypted file test is read, block decryption of the file is completed in the memory according to the authorization information M and the size of the decryption block buffer-size, and then a decrypted file stream is output in parallel based on a network protocol and transmitted while being decrypted, so that the effect of real-time decryption is realized, and a decrypted temporary file is not generated.
As shown in fig. 8, the system for real-time encryption and decryption of digital media files based on authorization information according to the present invention includes:
the authorization information adding module 81 is used for reading the original digital media file A and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B;
the file encryption module 82 is used for acquiring an encryption key K1; and encrypting the authorized number media file B by adopting an encryption algorithm according to the encryption key K1 to obtain an encrypted authorized number media file C containing the authorization information.
The system further comprises:
the block decryption module 83 reads the encrypted authorized number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
an authorization information verification module 84 that extracts authorization information from the decrypted file stream; and verifying according to the authorization information;
a parallel transmission module 85 for transmitting the authorized decrypted file stream in parallel based on the network protocol; and real-time decryption is realized.
As shown in fig. 9, the present embodiment provides a real-time encryption and decryption system for digital media files based on authorization information, including:
the authorization information adding module is used for reading the digital media file F and writing the authorization information M into the file F by adopting an information hiding technology;
the file encryption module inputs a key and encrypts the file by adopting an encryption algorithm;
and the encrypted file output module is used for outputting the encrypted file to obtain an encrypted digital media file E containing the authorization information.
The block decryption module reads the digital media file E, inputs the key and the size of the user-defined decryption block buffer-size, and performs block decryption on the file to obtain a decryption stream;
the authorization information verification module is used for taking out the authorization information from the decryption stream and verifying the authorization information;
and the parallel transmission module is used for transmitting the authorized decrypted file stream in parallel based on the network protocol to realize real-time decryption.
Preferably, the system further comprises a display module that displays the content of the real-time decrypted file.
The invention has the following beneficial effects:
(1) the technical scheme of the invention aims at the problems that only system-level authorization is carried out, not each digital media file is authorized, and the files cannot be decrypted in real time. The invention solves the problems that the encrypted file can not be decrypted and viewed in real time, a temporary file can be generated during decryption, and only system-level authorization is carried out in authorization authentication without authorizing all files in the prior art.
(2) According to the scheme, the method of block decryption is utilized, the file decryption efficiency is improved, parallel transmission is carried out through a network protocol, real-time decryption is achieved, temporary files are not generated in the decryption process, authorization processing is carried out on each file at the same time, unauthorized files are prevented from being randomly checked after decryption, the efficiency of checking the decrypted files is improved, and the protection strength of the files is increased.
(3) In order to improve the efficiency of reading and playing (viewing) the encrypted digital media file, the invention adopts the methods of block decryption and parallel transmission to realize real-time decryption of the digital media file, and the file can be viewed while the decryption is carried out, thereby saving the time of a user waiting for the decryption process, not generating a temporary file, and effectively improving the efficiency of viewing the decrypted file.
(4) The invention writes the authorization information into each number of media files, namely, each encrypted file needs a corresponding specific authority, thereby preventing unauthorized files from being checked randomly, preventing users from sharing the files and effectively protecting each number of media files.
(5) The invention aims at the problem that the files can be checked only after being completely decrypted in the process of decrypting the media files, and authorizes each media file, and provides a scheme capable of decrypting the media files in real time. The scheme utilizes the block decryption technology to effectively overcome the defects of the traditional decryption method, improves the file decryption efficiency, effectively improves the efficiency when the decrypted files are viewed, can decrypt and view each authorized file, does not generate temporary files, and ensures that each authorized file can be encrypted and decrypted in real time.
In summary, the technical scheme of the invention processes the file encryption and decryption requirements in real time, and compared with the traditional method, the technical scheme of the invention processes each file in an authorized manner, prevents unauthorized files from being randomly viewed after decryption, and increases the file protection strength.
It should be understood that the above-mentioned embodiments of the present invention are only examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention, and it will be obvious to those skilled in the art that other variations or modifications may be made on the basis of the above description, and all embodiments may not be exhaustive, and all obvious variations or modifications belonging to the technical solutions of the present invention are within the scope of the present invention.

Claims (5)

1. The method for encrypting and decrypting the digital media file in real time based on the authorization information is characterized by comprising the following steps of:
s1, reading an original digital media file A, and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B; the method specifically comprises the following steps:
s11, selecting a corresponding steganography algorithm in an information hiding technology according to the file type of the original digital media file A;
s12, encrypting the authorization information by using a steganographic key K2 to obtain a binary authorization information sequence;
s13, writing the binary authorization information sequence into the original digital media file A by adopting the steganography algorithm;
s2, obtaining an encryption key K1;
s3, according to the encryption key K1, the authorization number media file B is encrypted by adopting an encryption algorithm, and an encrypted authorization number media file C containing authorization information is obtained;
the method further comprises the steps of:
s4, reading the encrypted authorization number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
s5, taking out authorization information from the decrypted file stream; and verifying according to the authorization information;
and S6, based on the network protocol, transmitting the decrypted file stream which is successfully verified in parallel, and realizing real-time decryption.
2. The method according to claim 1, wherein the step S4 includes:
s41, decrypting the encrypted media file C with the authorization number according to the encryption key K1; processing the decrypted encrypted authorization number media file C according to the size of the user-defined decryption block buffer-size to obtain a decrypted preloaded file object;
s42, reading the decrypted stream in the preloaded file object into a byte array, and writing the content of the byte array into the current memory stream to realize block decryption.
3. The method of claim 1, wherein the step of retrieving authorization information from the decrypted file stream comprises:
s51, selecting a corresponding information extraction algorithm in the information hiding technology according to the file type of the decrypted file stream;
s52, reading the authorization information in the decrypted file stream by adopting a selected information extraction algorithm to obtain an authorization information sequence;
s53, decrypting the authorization information sequence by using the steganographic key K2 to obtain the authorization information.
4. A system for real-time encryption and decryption of digital media files based on authorization information, wherein the method of any of claims 1 to 3 is performed, comprising:
the authorization information adding module is used for reading the original digital media file A and writing authorization information into the original digital media file A by adopting an information hiding technology to obtain an authorization digital media file B;
the file encryption module is used for acquiring an encryption key K1; and encrypting the authorized number media file B by adopting an encryption algorithm according to the encryption key K1 to obtain an encrypted authorized number media file C containing the authorization information.
5. The system of claim 4, further comprising:
the block decryption module reads the encrypted authorized number media file C; acquiring the encryption key K1 and the defined size of the decryption block; according to the encryption key K1 and the size of the decryption block, carrying out block decryption on the encrypted authorized number media file C to obtain a decrypted file stream;
the authorization information verification module is used for taking out the authorization information from the decrypted file stream; and verifying according to the authorization information;
and the parallel transmission module is used for transmitting the decrypted file stream which is successfully verified in parallel based on a network protocol so as to realize real-time decryption.
CN201910082105.9A 2019-01-28 2019-01-28 Authorization information based real-time encryption and decryption method and system for digital media files Active CN109829322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910082105.9A CN109829322B (en) 2019-01-28 2019-01-28 Authorization information based real-time encryption and decryption method and system for digital media files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910082105.9A CN109829322B (en) 2019-01-28 2019-01-28 Authorization information based real-time encryption and decryption method and system for digital media files

Publications (2)

Publication Number Publication Date
CN109829322A CN109829322A (en) 2019-05-31
CN109829322B true CN109829322B (en) 2021-05-04

Family

ID=66862635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910082105.9A Active CN109829322B (en) 2019-01-28 2019-01-28 Authorization information based real-time encryption and decryption method and system for digital media files

Country Status (1)

Country Link
CN (1) CN109829322B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468607B (en) * 2020-03-31 2024-08-20 国电南瑞科技股份有限公司 Method for generating and using encrypted tamper-proof file
CN112270638A (en) * 2020-11-19 2021-01-26 闪捷信息科技有限公司 Sensitive file steganography and tracing method based on deep confrontation network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160308669A1 (en) * 2015-04-20 2016-10-20 Jian Ho Method and System for Real Time Data Protection with Private Key and Algorithm for Transmission and Storage
CN106023053B (en) * 2016-02-05 2019-01-15 四川长虹电器股份有限公司 High capacity file encryption steganography and extracting method based on jpeg image
CN108718235A (en) * 2018-04-28 2018-10-30 王萍 A kind of stream encryption and decryption method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107889070A (en) * 2017-11-08 2018-04-06 广东欧珀移动通信有限公司 Image processing method, device, terminal and computer-readable recording medium

Also Published As

Publication number Publication date
CN109829322A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
Peng et al. Separable robust reversible watermarking in encrypted 2D vector graphics
CN109274644B (en) Data processing method, terminal and watermark server
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN105634732A (en) Ciphertext domain multi-bit reversible information hiding method
Ahmed et al. A secure image steganography using LSB and double XOR operations
Nunna et al. Secure data transfer through internet using cryptography and image steganography
WO2019196866A1 (en) Anonymization processing method, apparatus and device, and storage medium
WO2007001075A1 (en) Encryption device, encryption method, decryption device, decryption method, and data structure
Karthikeyan et al. Enhanced security in steganography using encryption and quick response code
CN109829322B (en) Authorization information based real-time encryption and decryption method and system for digital media files
Cao et al. A Privacy‐Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking‐Based Data Auditing
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
Sharma et al. Adaptive steganographic algorithm using cryptographic encryption RSA algorithms
Baby et al. Combined Strength of Steganography and Cryptography-A Literature Survey.
KR101517312B1 (en) Information processing device in embedded device, and method of processing information
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Rao et al. A novel information security scheme using cryptic steganography
Devi et al. Preventing Data Leakage in Cloud Servers through Watermarking and Encryption Techniques
CN114119332A (en) Block chain-based digital watermark writing and reading method and device
CN111476701A (en) Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
CN113194319B (en) Encryption and decryption method and system for exchange cipher watermark
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
Rajavarman A Novel Approach to Enhancing Secure Sharing Using Modified LSB Technique
Rifqi et al. Combining Steganography And Cryptograph Techniques For Data Security (Case Study In PT XYZ)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant