Data hiding method and data hiding system

    公开(公告)号:US10311757B2

    公开(公告)日:2019-06-04

    申请号:US15444308

    申请日:2017-02-27

    Abstract: The invention relates to the technical field of data hiding, in particular to a data hiding method and a data hiding system. An image is used as a data carrier; after secret data is converted into a bit sequence by a sending end, the values of each bit in the bit sequence are hidden in the image; the image hidden with the secret data is obtained and is sent to a receiving end; and the receiving end can extract the hidden secret data from the image according to a corresponding secret key. During data hiding, each square image block can hide two-bit data through inverse number odd-even properties of a pixel gray value sequence of two diagonal lines of each square image block, so that the volume of data hidden in the image is twice of the number of the image blocks split by the image.

    DATA HIDING METHOD AND DATA HIDING SYSTEM
    2.
    发明申请

    公开(公告)号:US20170169736A1

    公开(公告)日:2017-06-15

    申请号:US15444308

    申请日:2017-02-27

    CPC classification number: G09C1/00 G09C5/00 H04L2209/16

    Abstract: The invention relates to the technical field of data hiding, in particular to a data hiding method and a data hiding system. An image is used as a data carrier; after secret data is converted into a bit sequence by a sending end, the values of each bit in the bit sequence are hidden in the image; the image hidden with the secret data is obtained and is sent to a receiving end; and the receiving end can extract the hidden secret data from the image according to a corresponding secret key. During data hiding, each square image block can hide two-bit data through inverse number odd-even properties of a pixel gray value sequence of two diagonal lines of each square image block, so that the volume of data hidden in the image is twice of the number of the image blocks split by the image.

    METHOD, APPARATUS, AND SYSTEM FOR ACCESS CONTROL OF SHARED DATA
    3.
    发明申请
    METHOD, APPARATUS, AND SYSTEM FOR ACCESS CONTROL OF SHARED DATA 审中-公开
    方法,装置和用于共享数据访问控制的系统

    公开(公告)号:US20160359856A1

    公开(公告)日:2016-12-08

    申请号:US15024379

    申请日:2014-12-31

    Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The the data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.

    Abstract translation: 共享数据的访问控制方法包括数据访问请求者向数据存储处理器发送访问共享数据的请求,获取共享数据的密文,加密密钥的密文,访问策略和 来自数据存储经销商的密文属性组件,以及分别向属性授权者发送获取数据访问请求者的用户属性组件的请求。 属性授权器分别生成数据访问请求者的用户属性组件,并将数据访问请求者的用户属性组件传送到数据访问请求者。 数据访问请求者恢复加密密钥,并根据加密密钥解密共享数据的密文,以获得请求访问的共享数据。

    Method, apparatus, and system for access control of shared data

    公开(公告)号:US10050968B2

    公开(公告)日:2018-08-14

    申请号:US15024379

    申请日:2014-12-31

    Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.

Patent Agency Ranking