Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information hiding and protecting method based on image

An information hiding and picture technology, applied in the field of picture-based information hiding and protection, can solve the problems of unfriendly user interaction, poor information camouflage and concealment, single form, etc. The effect of strong confidentiality

Inactive Publication Date: 2014-11-05
BEIJING DEEP AI INTELLIGENT TECH
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the current information encryption and decryption technology has the following disadvantages: 1. The encryption and decryption methods generally only support users to input text passwords or use simple gestures for encryption and decryption, and the form is relatively simple, especially not friendly enough for user interaction on mobile computing platforms; 2. The camouflage and concealment of the information is not good, and the general encrypted information will make people clearly see that the information is encrypted information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding and protecting method based on image
  • Information hiding and protecting method based on image
  • Information hiding and protecting method based on image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] The information hiding and protection method proposed by the present invention is applied to mobile computing devices represented by smart phones. The following is an example where the user wishes to hide and protect the text message "HelloWorld" on the mobile phone. Information hiding process such as figure 1 shown.

[0046] The information encryption process is as follows:

[0047] Step 1: Input the original information, for example, the user enters the text information "HelloWorld";

[0048] Step 2: Select an existing image as a camouflage image, for example, the user selects a landscape image as a camouflage image, such as figure 2 shown;

[0049] Step 3: Divide the image area, for example, the user selects the nine-square grid to divide the camouflage picture, such as image 3 shown. Among them, the display of the dividing line is only for the convenience of operation, and will not be used as an integral part of the image;

[0050] Step 4: Determine the enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information hiding and protecting method based on an image and belongs to the technical field of computer applications. According to the information hiding and protecting method, original information to be transmitted is encrypted and hidden into an image, a user without a decryption password can only see the disguising image, and setting of an encryption password and a decryption password is completed by operations carried on the image; the operations carried on the image are composed of one behavior conducted on the area of the image by a user or multiple behaviors conducted on the area of the image by the user; during decryption, when the user inputs a correct decryption password, the coding data of the image are read, decrypted original information is extracted from the coding data, and the original information is displayed after the original information is decrypted through the decryption password. The information hiding and protecting method based on the image is high in safety and usability, capable of being applied to a mobile computing platform and a non-mobile computing platform and also capable of being applied to encrypted storage of local information and encrypted transmission or encrypted copying of information, and therefore the information safety of the user is effectively protected.

Description

technical field [0001] The invention relates to a picture-based information hiding and protection method, which belongs to the technical field of computer applications. Background technique [0002] Computer and information technology have developed rapidly in recent years, especially information processing technology based on mobile computing platforms, which has played an increasingly important role in people's production and life. According to information from China Industry Consulting Network, in terms of hardware, it is estimated that by 2016, the number of smartphones in my country will reach 700 million. In addition, in terms of the amount of information sent, in 2012, the number of mobile short messages sent nationwide reached 897.31 billion. In recent years, with the rapid development of new-generation instant messaging systems such as WeChat, people will increasingly use mobile platforms to send messages. [0003] The widespread use of information technology has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
CPCG06F21/6209G06F2221/2107
Inventor 沈大勇伍艺郭伦昊高一轩其他发明人请求不公开姓名
Owner BEIJING DEEP AI INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products