A Method and System for Information Hiding Based on Fingerprint Image

A fingerprint image and information hiding technology, which is applied in the field of cryptography and information security, can solve the problems of private key distortion, easy distortion of the carrier, and hacking, and achieve high stability and difficulty in cracking, ensuring safe and efficient extraction, and ensuring security Effect

Active Publication Date: 2020-10-09
GUANGZHOU UNIVERSITY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, although the carrier is encrypted, it is still easy to be broken by an attacker, and there is a danger of leaking the private key. face the risk of private key distortion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method and System for Information Hiding Based on Fingerprint Image
  • A Method and System for Information Hiding Based on Fingerprint Image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] see figure 1 , which is a schematic flowchart of a fingerprint image-based information hiding method provided by an embodiment of the present invention, the method includes the following steps:

[0043] S1, the key generation center generates a private key corresponding to the user;

[0044] S2. The key generation center uses the user's fingerprint image as a carrier image, and performs image normalization processing on the fingerprint image to obtain a nor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information hiding method based on a fingerprint image. The information hiding method comprises the following steps that: a key generation center generates a private key; the key generation center takes a fingerprint image as a carrier image, and performs image normalization processing on the fingerprint image; the key generation center determines an embedding area of anormalized fingerprint image; the key generation center acquires a key based on a Logistic chaotic sequence and a singular value decomposition transformational algorithm; the key generation center embeds the private key into the embedding area; a user terminal acquires the fingerprint image containing the private key based on a fingerprint of a user; and the user terminal restores the embedding area through chaos, performs decryption by using the key to obtain an original fingerprint image, and acquires an original private key through a key extraction center. Through adoption of the information hiding method and system, the private key is hidden in a fingerprint image carrier which has extremely high stability and cracking difficulty, so that the private key is transmitted in a hidden way,and the security of the private key is ensured effectively. Meanwhile, the invention also discloses an information hiding system based on the fingerprint image.

Description

technical field [0001] The invention belongs to the technical field of cryptography and information security, in particular to an information hiding method and system based on a fingerprint image. Background technique [0002] With the development and popularization of information technology and Internet technology, information security issues have become increasingly prominent, and how to ensure information security has become the focus of attention. Covert communication is an important aspect of information security. At this stage, the ways to realize secret communication mainly include encryption technology and information hiding. Among them, encryption technology is the most commonly used covert communication technology. Through the encryption key, important information is encrypted into ciphertext for transmission, and the information cannot be deciphered without the key. Information hiding technology involves cryptography, information theory, mathematics, computer vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/32H04L29/06
CPCH04L9/001H04L9/3231H04L9/3263H04L63/0428H04L63/06H04L63/0823
Inventor 王国军文玺张少波陈淑红彭滔
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products