Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hidden file management system based on steganography

A technology for concealing files and management systems, which is applied in the fields of electrical digital data processing, special data processing applications, internal/peripheral computer component protection, etc., to achieve the effect of convenient operation and strong portability

Active Publication Date: 2015-08-19
HEFEI HIGH DIMENSIONAL DATA TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the data is hidden through "filtering", and the data is still stored directly in the hardware. If the hardware is obtained, the hidden files may be recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden file management system based on steganography
  • Hidden file management system based on steganography
  • Hidden file management system based on steganography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0032] like figure 1 As shown, a hidden file management system based on steganography includes a storage space integration unit 1, a formatting operation unit 2, a file storage unit 3 and a file extraction unit 4;

[0033] The storage space integration unit 1 is used to abstract the storage space of the carrier file library into a continuous storage space composed of several data blocks, and use the absolute path of each carrier file in the carrier file library and each data block in its corresponding The offset position in the carrier file is a variable, and the connection relationship between the data block and the carrier file is established;

[0034] The formatting operation unit 2 is used to divide the continuous storage space into a reserved area, a block state area and a data area. The block state area is composed of several block...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hidden file management system based on steganography. The hidden file management system based on steganography comprises a storage space integration unit and an operation unit, wherein the storage space integration unit is used for abstracting storage space of a carrier file library into continuous storage space formed by splicing a plurality of data blocks; and the operation unit is used for formatting, storing, extracting and deleting files. A safe data storage mode is implemented, scattered storage spaces in a carrier file are integrated, and the hidden file management system is apparent to users, and is convenient to operate and high in portability.

Description

technical field [0001] The invention relates to the field of steganography technology and the field of data storage security technology, in particular to a hidden file management system based on steganography. Background technique [0002] At present, various storage devices or systems for storing data have appeared, and at the same time, more and more attention has been paid to the security of storing data. A common method of data security is to encrypt the data and store the key in a storage device or a host device. The disadvantage of this method is that as long as the key is obtained, all data can be deciphered. [0003] An improved technique is to hide the data in the storage device, thereby protecting the security of the data. At present, the mainstream method to implement this technology is to intercept the system's command to access files, and filter the sensitive files specified by the user to achieve the effect of hiding files. The defect of this method is tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/02G06F21/78G06F17/30
Inventor 张卫明田辉郭玉刚张卓
Owner HEFEI HIGH DIMENSIONAL DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products