Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Visual cryptography" patented technology

Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information appears as a visual image. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares. When all n shares were overlaid, the original image would appear. There are several generalizations of the basic scheme including k-out-of-n visual cryptography.

Method for authentication of mobile transactions using video encryption and method for video encryption

The present invention relates to a method which aims to improve data security in mobile payment transactions. To achieve this goal, we propose a highly secure method for transactions validation through video encryption and a new view of secrecy based on the combination of encrypted video (102, 203, 305) and a transparent safe card (110, 202, 307) with unique secret pattern (111, 308). This safe card (110, 202, 307) is shown as a translucent or transparent device capable of acting as “layer” or decoding mask using visual cryptography techniques. Additionally, it is proposed in one embodiment of the present invention a method for encryption of unencrypted video (602) through a frame analysis module (601) and a frame recomposition module (612).
Owner:SAMSUNG ELECTRONICSA AMAZONIA

One-time pad password system based on visual cryptography

The invention provides a one-time pad password system based on visual cryptography. The technical scheme is that the one-time pad password system comprises a main-control module, an identity characteristic input interface, a visual information display terminal, a password input terminal and a plurality of subscriber masking pictures, wherein each subscriber masking picture corresponds to a subscriber; the identity characteristic input interface receives the identity characteristic data input of subscribers and sends the identity characteristic data input to the main-control module; the password input terminal receives the password input and sends the password input to the main-control module; the visual information display terminal receives visual cryptography subsidiary pictures sent by the main-control module and displays the visual cryptography subsidiary pictures to the subscribers; the subscribers place the possessed subscriber masking pictures on a first aligning frame to acquire the password P at the time; the main-control module comprises a master control program and a database; the main-control module takes a computer system as the platform and further comprises another master control program and another database to achieve subscriber register and authentication identification. The one-time pad password system provided by the invention can achieve safe, convenient andefficient subscriber identity authentication.
Owner:NAT UNIV OF DEFENSE TECH

Key synchronization in a visual cryptographic system

A system for visual cryptography comprises a server (1) for encrypting a series of images using a set of keys, a terminal (2) for displaying the encrypted images, a transmission medium (4) for transmitting the encrypting images from the server to the terminal (2), and a decryption device (3) for decrypting the encrypted image displayed on the terminal. A key identification is produced by the server (1) and displayed by the terminal (2). The decryption device (3) senses the key identification and selects the corresponding key from its key set.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Biological characteristic remote authentication method based on visual codes

The invention provides a biological characteristic remote authentication method based on visual codes, which is used for solving potential security hazards in data storage and transmission in the traditional biological characteristic remote authentication system. The method comprises the following steps: registering a user; storing a registered biological characteristic image into multiple shares by a visual code method on a common access structure, defining a permission set of share images, and ensuring that only share combinations in the permission set can recover the registered biological characteristic image; superposing any share combinations in the permission set, and carrying out logic or operation to decrypt the registered biological characteristic image; and finally, authenticating the access user by using the decrypted registered biological characteristic images. The invention can ensure that the secret biological characteristic image can be recovered when any share images are damaged, and ensure no leakage of secret biological characteristic image information even if part of shares are thieved, thereby enhancing the data storage and transmission security in the biological characteristic remote authentication process.
Owner:XIDIAN UNIV

QR code secret sharing method based on visual password

The invention provides a QR code secret sharing method based on a visual password. The method comprises the steps: designing a 0-1 planning strategy by analyzing secret unrecoverable conditions of a shared subset, and then constructing a secret sharing matrix; based on the secret sharing matrix, adjusting the content code words of the carrier QR code by using an XOR visual password technology; andfinally, generating a secret sharing copy QR code according to the adjusted carrier QR code content code word, thereby realizing sharing of a secret QR code image. The method not only inherits the advantages of easy realization of visual cipher technology coding and low decoding calculation complexity, but also is superior to other existing methods in robustness, and the secret image has better security.
Owner:绍兴聚量数据技术有限公司 +1

Display device for visually reconstructing an image

The invention relates to a display device for visually reconstructing an image (330) from an encoded image (320), such a device being particularly useful in the field of visual cryptography. The display device has two stacked liquid crystalline layers (410, 420) with individually addressable pixels. One layer (420) renders encoded image data together with a randomization pattern, and the other layer (410) only renders a randomization pattern. If the patterns match, the display device shows a visually reconstructed image (330) to a viewer. Means are provided for improving an optical match between the LC layers, such as a birefringent layer (414) between the two LC layers. Alternatively, two twisted nematic LC layers can be used having opposite twist directions. Such means were found to improve an image quality of the visually reconstructed image, and can in fact be advantageously applied in any display system including a plurality of LC layers cooperating for forming an image.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Eye fundus image nondestructive digital copyright management method based on fingerprint and zero-watermark mixed framework

The invention discloses an eye fundus image nondestructive digital copyright management method based on a fingerprint and zero-watermark mixed framework. The method comprises the following steps: firstly, performing 2D-DCT transformation on a normalized eye fundus image, setting different weights for coefficients obtained by transformation, extracting eye fundus image features with high identifiability and high robustness as fingerprints for content-based searching; and secondly, building a mapping relation between the fingerprints and watermarks according to a zero-watermark copyright protection method based on a VSS visual cryptography algorithm for copyright authentication. Compared with the conventional method, the method disclosed by the invention has the advantages that the whole process of the method is nondestructive and meets the requirement for accurate diagnosis; the method has the effect of protecting the copyright of the eye fundus image for a long time, and the problem of one-off copyright authentication based on digital watermarks; and the eye fundus image nondestructive digital copyright management method is applicable to digital copyright management of the eye fundus image, and has a certain clinical significance for auxiliary diagnosis of eye fundus-related diseases.
Owner:CENT SOUTH UNIV

Visual-cryptography-based visible anti-copying technique

The invention provides an efficient and safe visible anti-copying technique which has low costs. The technique is based on the visual cryptography principles. By printing two sharing pictures of the visual cryptography program on a transparent film with a certain thickness according to a specific way, the cryptic pictures is visible from a certain offset angle instead of from the front of the paper, therefore preventing the pictures from being copied by equipments such as copying machines and scanners. As shown in the following picture, the pictures seen from right above and from the side of the anti-copying transparent film manufactured by the technique of the invention are totally different, wherein the picture can be clearly seen from the side face while the picture can not be seen or can be vaguely seen from the right above. The technique is applicable to the prevention of illegal copying of plane pictures and texts, therefore effectively avoiding forgery; to the prevention of intentionally or unintentionally peeping and covert photography, protecting privacy; and has low cost, applicable to extensively issued plane image-text carriers such as paper money, credit cards, negotiable securities, bills, identity cards and the like.
Owner:刘峰

A threshold visual cryptography matrix construction method

PendingCN109727294AQuality assuranceWill not affect the decryption effectImage codingArray data structureAlgorithm
The invention provides a threshold visual cryptography matrix construction method, which comprises the following steps of: constructing an accumulation counting group which consists of an | P | * | T| matrix CA; After the array P, the authorization subset and the forbidden subset are determined, determining F, wherein F is a set in Gamma infinity; Determining a set Gamma infinity, wherein the number of sets in the Gamma infinity is equal to that of the Gamma infinity; Constructing a matrix CA; Constructing basis matrixes S0'and S1 'of the accumulation array according to a (n, n) threshold scheme; Observing the distribution condition of the position with the Hamming weight of 1 in each line in the matrix CA, and taking the line sequence of the position with the Hamming weight of 1 in thematrix CA as the line sequence of the base matrixes S0 and S1; And so on, obtaining final basis matrixes S0 and S1. Due to the fact that the column number of the formed basis matrix is relatively small, the smaller the column number is, the smaller the pixel expansion degree is, the phenomenon that the decryption effect is affected due to the fact that an image is excessively stretched when secrets are recovered is avoided, and the quality of the decrypted image is guaranteed to a great extent.
Owner:CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products