CN105991559A - User safety login method based on image encryption technology - Google Patents

User safety login method based on image encryption technology Download PDF

Info

Publication number
CN105991559A
CN105991559A CN201510059780.1A CN201510059780A CN105991559A CN 105991559 A CN105991559 A CN 105991559A CN 201510059780 A CN201510059780 A CN 201510059780A CN 105991559 A CN105991559 A CN 105991559A
Authority
CN
China
Prior art keywords
client
cryptographic secret
user
expanding
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510059780.1A
Other languages
Chinese (zh)
Other versions
CN105991559B (en
Inventor
程久军
秦鹏宇
杨阳
张庆阳
胡刘飞
柳影波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongji University
Original Assignee
Tongji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongji University filed Critical Tongji University
Priority to CN201510059780.1A priority Critical patent/CN105991559B/en
Publication of CN105991559A publication Critical patent/CN105991559A/en
Application granted granted Critical
Publication of CN105991559B publication Critical patent/CN105991559B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a user safety login method based on an image encryption technology. The user safety login method comprises the steps: a client performs MD5 encryption on a user password to obtain a password ciphertext; the client embeds a user name into an image through STDM; the client generates a control flow according to a random seed stored in local, and embeds the encrypted password ciphertext into the image through the STDM; the client sends the image to a server end; the server end extracts the user name from the received image through the STDM; the server end generates a control flow according to a random seed stored in local, and obtains the password ciphertext from the received image through the STDM; the server end obtains the password ciphertext through verification, and if verification is successful, a new random seed is generated and the new random seed and the verification passing information are sent to the client together; the client updates the random seed; and if verification is not successful, failure of verification is prompted. Compared with the prior art, based on a traditional STDM, the user safety login method based on an image encryption technology utilizes the random seeds to generate the control flows to embed the ciphertext into the image, so that the safety of the system is improved.

Description

A kind of user security login method based on image encryption technology
Technical field
The present invention relates to information security field, especially relate to a kind of user security based on image encryption technology and step on Lu Fangfa.
Background technology
Along with Internet technology develops rapidly, people's living standard improves, and quality strengthens, but the most under cover Huge potential safety hazard.As protection userspersonal information and the important means of property safety, authentication is all kinds of The function that website and software are indispensable, is embodied in user at the beginning and logs in, if payment platform or involve Pecuniary exchange also has further certification.Network is developing to mobile direction in a word, and people live increasingly Convenient, also expose a lot of problem simultaneously.Many famous Web site and software vendor are disclosed in transmission user in succession and step on Plaintext transmission during record information, password can be carried out MD5 computing transmission by only a part of website, but at MD5 MD5 simple after verifying not impact resistant the most whether safety.The company that safety ratio is relatively focused on by a few family of only a few The AES that can use TLS is encrypted, but it uses CBC block cipher mode to fall into enemy hands.2013 In February in year, NadhemAlFardan and Kenny Paterson is found that the attack pattern of an entitled Luck13, The block cipher mode of the CBC mode that this attack pattern primary challenge SSL/TLS takes.Attack and can pass through Block the mode (such as being linked by the intentional drop of Malware, TLS can retransmit automatically) that TLS connects, allow transmission Fang Fanfu sends same encrypted content (ciphertext of such as cookie or password), and TLS sends the time of error message The analysis of difference, Luck13 attacks can crack ciphertext within a short period of time.Therefore, direct plaintext transmission or letter Single encryption can not protect user profile well, just can intercept and capture user simply with packet capturing analysis and log in content. For important information transmitting procedure as log-on message or payment verification, combine the most ripe cloud skill Art, it is proposed that the method for oneself.
Summary of the invention
Defect that the purpose of the present invention is contemplated to overcome above-mentioned prior art to exist and provide a kind of and add based on image The user security login method of secret skill art.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of user security login method based on image encryption technology, it is characterised in that comprise the following steps:
(1) client logs in password and carries out md5 encryption and obtain cryptographic secret user;
(2) user name is embedded in picture by client by digital watermark method based on expanding and transforming jitter modulation;
(3) client generates with the random seed being stored in this locality and controls stream, is carried out based on extension by this control stream Cryptographic secret is embedded in picture by the digital watermark method of conversion jitter modulation;
(4) picture is sent to server end by client;
(5) server end is carried from the picture received by digital watermark method based on expanding and transforming jitter modulation Take out user name;
(6) server end generates with the random seed being stored in this locality and controls stream, is carried out based on expansion by this control stream The digital watermark method of exhibition conversion jitter modulation extracts cryptographic secret from the picture received;
(7) server end carrys out the cryptographic secret extracted in verification step (6) with the cryptographic secret being saved in this locality, if It is proved to be successful, then generates a new random seed, and be sent to client, client in the lump with being verified information End updates random seed, and client completes to log in;Otherwise then pointing out authentication failed, client logs in failure.
In described step (1), the software fingerprinting logging in password software logged in this user of user is combined by client Generate user for this software log in password after, then carry out md5 encryption.
Described random seed is local zone time during server authentication user cipher ciphertext success.
Described client is passed through based on transform expansion after username and password ciphertext is converted to 128 0-1 bit streams The digital watermark method of jitter modulation embeds in picture.
In described step (2), user name is passed through digital watermark method based on expanding and transforming jitter modulation by client Embed in picture particularly as follows:
(201) client generates 24 very color BMP pictures of 256 × 256 pixels;
(202) picture generated in step (301) is carried out the dct transform of 8 × 8, obtains 32 × 32 DCT Coefficient matrix;
(203) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter The digital watermark method of system embeds the user name of 128;
In described step (3), client generates with the random seed being stored in this locality and controls stream, is flowed by this control Carry out digital watermark method based on expanding and transforming jitter modulation cryptographic secret embedded in picture particularly as follows:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(302) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion The digital watermark method embedding cryptographic secret of exhibition conversion jitter modulation:
(3021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (301) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method embeds 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation; (3022) judge whether 128 cryptographic secret have had fully embedded into, if YES then it is embedding to complete cryptographic secret Enter, if it has not, return to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out the inverse transformation of dct transform.
In described step (5), server end passes through digital watermark method based on expanding and transforming jitter modulation from reception To picture in extract user name particularly as follows:
(501) picture received is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT systems Matrix number;
(502) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter The digital watermark method of system extracts user name;
In described step (6), server end generates with the random seed being stored in this locality and controls stream, by this control Stream carries out digital watermark method based on expanding and transforming jitter modulation and extracts cryptographic secret from the picture received Particularly as follows:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(602) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion The digital watermark method extraction cryptographic secret of exhibition conversion jitter modulation:
(6021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (601) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation; (6022) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext, If it has not, return to step (6021).
During in described step (7), server end is saved in the picture that the cryptographic secret of this locality is built-in being saved in this locality , concrete cryptographic secret extracting method is:
(701) picture being saved in this locality is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT coefficient matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(703) according to following rule, 32 × 32 coefficient matrixes are carried out the digital water modulated based on expanding and transforming jitter Impression method extraction cryptographic secret:
(7031) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (702) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(7032) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext, If it has not, return to step (7031).
Described 0-1 controls the length of flow control stream less than 896.
Described client is mobile terminal or PC terminal.
Communicated by ssl protocol between described client and server.
Compared with prior art, the invention have the advantages that
1., on the basis of traditional digital watermark method based on expanding and transforming jitter modulation, utilize Cipher Strength High pseudorandom number generator ANSI x9.17 produces pseudo random number and flows as control, becomes based on extension remaining On the basis of changing the digital watermark method anti-interference height of jitter modulation own and the advantage of suppression host's interference, enter one The safety of step increase system.
The most each software introduces software fingerprinting, produces unique software identification.Be combineding with each other with original code, it is new to produce Password, accordingly even when multiple account uses same password, without worrying to there is insecurity.It may be said that simultaneously Safety and and convenience are taken into account.
3. utilize powerful calculating ability and the storage capacity of cloud service instantly, select in communication process with picture be Carrier is transmitted.At server end, carry out the storage of data also with picture, so in communication and storage two Safety has all been accomplished to promote by individual link.
Accompanying drawing explanation
Fig. 1 is the data flow diagram communicated between the client and server of the present invention;
Detailed description of the invention
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.
Embodiment 1
Client: user's software in PC inputs its username and password, and PC end is according to user name and user Select the software logged in, find the corresponding software fingerprinting of this software and time seed in the local database, and will use The original password of family input is combined with software fingerprinting, encrypts through md5, forms 16 cryptographic secret, turn further The cryptographic secret of 128 0-1 bit streams of chemical conversion.User name fills into 128 0-1 bit streams equally.
Can (password of the user name of 128 and 128 be close by 256bit information for ensureing that host image is sufficiently large Literary composition) embed, we use 24 very color bmp pictures of 256 × 256.The picture generated is carried out 8 × 8 Dct transform, obtains 32 × 32 DCT coefficient matrixes;To in 32 × 32 DCT coefficient matrixes front 32 × 4 Individual matrix carries out the user name that digital watermark method based on expanding and transforming jitter modulation embeds 128;
According to the time seed extracted from local data base, utilize pseudo random number based on ANSI X9.17 Generator, inputs using time seed as it, obtains the 0-1 control stream that one including at least 128 1.
Skip front 32 × 4 matrixes, carry out becoming based on extension to rear 32 × 28 coefficient matrixes according to following rule The digital watermark method changing jitter modulation embeds the cryptographic secret of 128, and specific rules is as follows:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and embeds 1 cryptographic secret, as Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if It is no, returns to step (1).
After completing the embedding of username and password ciphertext, picture is sent to server end according to SSL mode by PC end.
Server end: after the picture received for server carries out the dct transform of 8 × 8, obtain 32 × 32 Individual DCT coefficient matrix, carries out digital water based on expanding and transforming jitter modulation in the most front 32 × 4 matrixes Impression method extracts user name;
From data base, extract, according to the user name extracted, the time seed that this user is corresponding, utilize based on ANSI The pseudorandom number generator of X9.17, inputs this time seed as it, obtains one including at least 128 1 0-1 control stream;
Skip front 32 × 4 matrixes, carry out becoming based on extension to rear 32 × 28 coefficient matrixes according to following rule Change the digital watermark method of jitter modulation and extract the cryptographic secret of 128:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and extracts 1 cryptographic secret, as Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if It is no, returns to step (6021).
After extracting the cryptographic secret in the picture that PC end transmits, server end also needs to take out being somebody's turn to do of local preservation The cryptographic secret of user is used for verifying, in the present embodiment, it is also embedding that server end is saved in the cryptographic secret of this locality Enter in the picture being saved in this locality.
Therefore, the picture being saved in this locality is first carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 Individual DCT coefficient matrix;
Utilize pseudorandom number generator based on ANSI X9.17, using described be stored in this locality random seed as Its input, obtains the 0-1 control stream that one including at least 128 1;
According to following rule, 32 × 32 coefficient matrixes are carried out the digital watermarking side modulated based on expanding and transforming jitter The cryptographic secret of method extraction 128:
(1) take out a matrix in turn, and control stream sequentially reads a data from gained, if 1, the most right The current matrix taken out carries out digital watermark method based on expanding and transforming jitter modulation and extracts 1 cryptographic secret, as Fruit is 0, then the current matrix taken out is not done any operation;
(2) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete cryptographic secret, if It is no, returns to step (1).
After extracting the cryptographic secret of local preservation, by two cryptographic secret phase comparisons.If be consistent, just to client End sends License Info and updates the time seed in local data base, and the most also notice client is updated to this new life The time seed become.Additionally, the time seed newly-generated with this is also regenerated control stream by server end, will Cryptographic secret embeds the checking work in local picture, when user's next time logs in again.
Embodiment 2
The present embodiment is substantially the same manner as Example 1, and uniquely distinguishing the client being in the present embodiment is mobile phone terminal, Mobile phone terminal, by WLAN or mobile network and server end communication, is suitable for current network and gradually tends to moving The trend of dynamicization.

Claims (10)

1. a user security login method based on image encryption technology, it is characterised in that comprise the following steps:
(1) client logs in password and carries out md5 encryption and obtain cryptographic secret user;
(2) user name is embedded in picture by client by digital watermark method based on expanding and transforming jitter modulation;
(3) client generates with the random seed being stored in this locality and controls stream, is carried out based on extension by this control stream Cryptographic secret is embedded in picture by the digital watermark method of conversion jitter modulation;
(4) picture is sent to server end by client;
(5) server end is carried from the picture received by digital watermark method based on expanding and transforming jitter modulation Take out user name;
(6) server end generates with the random seed being stored in this locality and controls stream, is carried out based on expansion by this control stream The digital watermark method of exhibition conversion jitter modulation extracts cryptographic secret from the picture received;
(7) server end carrys out the cryptographic secret extracted in verification step (6) with the cryptographic secret being saved in this locality, if It is proved to be successful, then generates a new random seed, and be sent to client, client in the lump with being verified information End updates random seed, and client completes to log in;Otherwise then pointing out authentication failed, client logs in failure.
A kind of user security login method based on image encryption technology the most according to claim 1, it is special Levying and be, in described step (1), client is by the software fingerprinting logging in password and the logged in software of this user of user In conjunction with generate user for this software log in password after, then carry out md5 encryption.
A kind of user security login method based on image encryption technology the most according to claim 1 and 2, It is characterized in that, described random seed is local zone time during server authentication user cipher ciphertext success.
A kind of user security login method based on image encryption technology the most according to claim 3, it is special Levying and be, described client is passed through based on extension after username and password ciphertext is converted to 128 0-1 bit streams The digital watermark method of conversion jitter modulation embeds in picture.
5. according to a kind of based on image encryption technology the user security login method described in claim 4, its It is characterised by,
In described step (2), user name is passed through digital watermark method based on expanding and transforming jitter modulation by client Embed in picture particularly as follows:
(201) client generates 24 very color BMP pictures of 256 × 256 pixels;
(202) picture generated in step (301) is carried out the dct transform of 8 × 8, obtains 32 × 32 DCT Coefficient matrix;
(203) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter The digital watermark method of system embeds the user name of 128;
In described step (3), client generates with the random seed being stored in this locality and controls stream, is flowed by this control Carry out digital watermark method based on expanding and transforming jitter modulation cryptographic secret embedded in picture particularly as follows:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(302) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion The digital watermark method embedding cryptographic secret of exhibition conversion jitter modulation:
(3021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (301) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method embeds 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(3022) judge whether 128 cryptographic secret have had fully embedded into, if YES then it is embedding to complete cryptographic secret Enter, if it has not, return to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out the inverse transformation of dct transform.
6. according to a kind of based on image encryption technology the user security login method described in claim 5, its It is characterised by,
In described step (5), server end passes through digital watermark method based on expanding and transforming jitter modulation from reception To picture in extract user name particularly as follows:
(501) picture received is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT systems Matrix number;
(502) carry out 32 × 4 matrixes front in 32 × 32 DCT coefficient matrixes adjusting based on expanding and transforming jitter The digital watermark method of system extracts user name;
In described step (6), server end generates with the random seed being stored in this locality and controls stream, by this control Stream carries out digital watermark method based on expanding and transforming jitter modulation and extracts cryptographic secret from the picture received Particularly as follows:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(602) skip front 32 × 4 matrixes, according to following rule, rear 32 × 28 coefficient matrixes are carried out based on expansion The digital watermark method extraction cryptographic secret of exhibition conversion jitter modulation:
(6021) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (601) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(6022) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext, If it has not, return to step (6021).
A kind of user security login method based on image encryption technology the most according to claim 6, it is special Levying and be, in described step (7), server end is saved in local cryptographic secret and is built-in being saved in the figure of this locality In sheet, concrete cryptographic secret extracting method is:
(701) picture being saved in this locality is carried out the dct transform of 8 × 8 by server end, obtains 32 × 32 DCT coefficient matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, by the described random seed being stored in this locality Input as it, obtain the 0-1 control stream that one including at least 128 1;
(703) according to following rule, 32 × 32 coefficient matrixes are carried out the digital water modulated based on expanding and transforming jitter Impression method extraction cryptographic secret:
(7031) take out a matrix in turn, and gained sequentially reads one digit number in controlling stream from step (702) According to, if 1, then the current matrix taken out is carried out digital water based on expanding and transforming jitter modulation Impression method extracts 1 cryptographic secret, if 0, then the current matrix taken out is not done any operation;
(7032) judge that 128 cryptographic secret have the most all extracted, extract if YES then complete ciphertext, If it has not, return to step (7031).
8. log according to a kind of based on image encryption technology the user security described in claim 5 or 6 or 7 Method, it is characterised in that described 0-1 controls the length of flow control stream less than 896.
9. according to a kind of based on image encryption technology the user security login method described in claim 1, its Being characterised by, described client is mobile terminal or PC terminal.
10. according to a kind of based on image encryption technology user security login method the most described in claim 1, It is characterized in that, communicated by ssl protocol between described client and server.
CN201510059780.1A 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology Expired - Fee Related CN105991559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510059780.1A CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510059780.1A CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Publications (2)

Publication Number Publication Date
CN105991559A true CN105991559A (en) 2016-10-05
CN105991559B CN105991559B (en) 2019-03-01

Family

ID=57036104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510059780.1A Expired - Fee Related CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Country Status (1)

Country Link
CN (1) CN105991559B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device
CN107395629A (en) * 2017-08-23 2017-11-24 周口师范学院 A kind of computer network security registration and verification method
CN108537009A (en) * 2017-03-03 2018-09-14 绍兴读图网络科技有限公司 A kind of method and system of picture download and legal verification
CN109214163A (en) * 2018-09-14 2019-01-15 厦门北卡信息科技有限公司 A kind of identity authentication method and device
CN115348017A (en) * 2022-10-18 2022-11-15 阿里巴巴(中国)有限公司 Ciphertext processing method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691103A (en) * 2019-11-07 2020-01-14 南京航空航天大学 Mobile terminal login verification method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090220076A1 (en) * 2008-02-28 2009-09-03 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090220076A1 (en) * 2008-02-28 2009-09-03 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BRIAN CHEN ETAL: "《Quantization Index Modulation: A Class of Provably》", 《IEEE TRANSACTION ON INFORMATION THEORY》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device
WO2018113690A1 (en) * 2016-12-23 2018-06-28 腾讯科技(深圳)有限公司 Login authorisation method and apparatus, and login method and apparatus
CN108537009A (en) * 2017-03-03 2018-09-14 绍兴读图网络科技有限公司 A kind of method and system of picture download and legal verification
CN107395629A (en) * 2017-08-23 2017-11-24 周口师范学院 A kind of computer network security registration and verification method
CN109214163A (en) * 2018-09-14 2019-01-15 厦门北卡信息科技有限公司 A kind of identity authentication method and device
CN115348017A (en) * 2022-10-18 2022-11-15 阿里巴巴(中国)有限公司 Ciphertext processing method and device

Also Published As

Publication number Publication date
CN105991559B (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN110601853B (en) Block chain private key generation method and equipment
CN105991559A (en) User safety login method based on image encryption technology
CN104469767B (en) The implementation method of integrated form security protection subsystem in a set of mobile office system
CN110519297B (en) Data processing method and device based on block chain private key
WO2016169423A1 (en) Data authenticity identification method for safety check of two-dimensional code
CN103944900B (en) It is a kind of that attack prevention method and its device are asked across station based on encryption
CN101005361B (en) Server and software protection method and system
CN105897424A (en) Method for enhancing identity authentication
CN105631248A (en) Signing method, forging judgment method and tampering judgment method of electronic contract
CN108243176A (en) Data transmission method and device
CN103327034A (en) Safe login method, system and device
CN108848503B (en) A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis
CN110505049A (en) A kind of text information transmission method, apparatus and system
US11374933B2 (en) Securing digital data transmission in a communication network
CN105554344A (en) Multi-image encryption method based on mixed graphics primitives
CN104270346B (en) The methods, devices and systems of two-way authentication
CN107835168A (en) A kind of authentication method being multiplied based on client information sequence spreading matrix transposition
CN110139163B (en) Method and related device for acquiring bullet screen
CN100574320C (en) A kind of method and terminal installation thereof that improves the safety certification video monitoring
CN104618306A (en) Novel integrated mobile phone data transmission key signal encryption method
CN102014136B (en) Peer to peer (P2P) network secure communication method based on random handshake
CN104469758B (en) More equipment safety login methods
CN104683979B (en) A kind of authentication method and equipment
Mohamed et al. A novel watermarking technique in data transmission between QR codes and database
CN105871788A (en) Server login password generation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190301

Termination date: 20220205

CF01 Termination of patent right due to non-payment of annual fee