CN109543432A - Facial image encrypts anti-tamper and retrieval method in a kind of video - Google Patents

Facial image encrypts anti-tamper and retrieval method in a kind of video Download PDF

Info

Publication number
CN109543432A
CN109543432A CN201811409747.7A CN201811409747A CN109543432A CN 109543432 A CN109543432 A CN 109543432A CN 201811409747 A CN201811409747 A CN 201811409747A CN 109543432 A CN109543432 A CN 109543432A
Authority
CN
China
Prior art keywords
face
feature
facial image
nalu
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811409747.7A
Other languages
Chinese (zh)
Inventor
滕广华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JOVISION TECHNOLOGY Co Ltd
Original Assignee
JOVISION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JOVISION TECHNOLOGY Co Ltd filed Critical JOVISION TECHNOLOGY Co Ltd
Priority to CN201811409747.7A priority Critical patent/CN109543432A/en
Publication of CN109543432A publication Critical patent/CN109543432A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to the present invention relates to technical field of face recognition, in particular to facial image encrypts anti-tamper and retrieval method in a kind of video, it is characterized in that, the following steps are included: A, front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, integrated, is encoded, the H264 NALU obtained by encoder is sent;B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received;C, face integrity verification and retrieval phase.The beneficial effects of the invention are as follows, quick-searching and Given Face can be decoded in the video comprising facial image, guarantee the integrality, availability and confidentiality of personnel's face, while the invisible processing of shielding rapidly and efficiently is carried out to the irrelevant personnel face in video.

Description

Facial image encrypts anti-tamper and retrieval method in a kind of video
(1) technical field
The present invention relates to technical field of face recognition, in particular to facial image encrypts anti-tamper and retrieval side in a kind of video Method.
(2) background technique
Face recognition technology based on deep learning graduallys mature, and it is most wide to have become application prospect in intelligent security guard product instantly One of wealthy technical field can fast and accurately be marked interested specific using face recognition technology in monitoring scene Facial image makes people not need with the naked eye to identify again, has liberated manpower and improved accuracy.With the technology It is universal, also there is the problem of some applications, limits the technology and continue to develop, for example, both need to mark in video proof The image of Given Face out, while in order to protect privacy to be also required to carry out specially treated to other faces, in addition, lack it is a kind of from Quick-searching goes out the method for Given Face in the video file of magnanimity, is unable to give full play the advantage of recognition of face.
Existing solution and disadvantage: facial image is that may be present be maliciously tampered aiming at the problem that, current method It is the protection to video file memory, such as password is arranged to video memory.But it is light due to manager's awareness of safety Thin, password is easy to reveal or be cracked, and can not solve in transmission process due to by man-in-the-middle attack etc. and The problem of caused video data stream is tampered not can guarantee the integrality and confidentiality of facial image;And to unrelated in video The processing of face be then by manually plus the modes such as mosaic, it is more time-consuming.
For this reason, it may be desirable to seek a kind of technical solution, at least to mitigate the above problem.
(3) summary of the invention
The present invention in order to make up not can guarantee in the prior art facial image integrality and confidentiality, manually plus mosaic it is time-consuming Laborious deficiency provides facial image in a kind of video and encrypts anti-tamper and retrieval method.
The present invention is achieved through the following technical solutions:
Facial image encrypts anti-tamper and retrieval method in a kind of video, which comprises the following steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated, Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption Picture NALU saves as video file, completes specific retrieval;
The step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated The information such as face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will The encryption data writes back in original image again, realizes the encryption to face;
A3, the cryptographic Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the digital signature of facial image is obtained as SkA [H using private key SkA encryption H (Feature) of front end (Feature)], PkB [Ke] is obtained using the key Ke generated in the public key PkB encryption A2 step of rear end;
A5, SkA [H (Feature)]+PkB [Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU SEI self-defining data frame sends H264 NALU finally by network;
The step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine Rope goes out SEI self-defining data frame;
B2, parsed from SEI self-defining data frame according to format SkA [H (Feature)], Pk [Ke]+, Pos, ts;
B3, PkB [Ke] is decrypted using the private key of rear end, obtains encryption key Ke;Use the public key decryptions SkA [H of front end (Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted;
The step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, to verify face integrality;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, compares successfully Afterwards, facial image User data are write back into original image, and these NALU is extracted and save as video file, in this document only Video frame comprising the Given Face completes retrieval Given Face.
Further, in order to preferably realize the present invention, the Encryption Algorithm in the step A2 is symmetric encipherment algorithm;
The threshold comparison specific steps of step C2 include:
C21, given threshold;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21 The threshold value set in rapid, that is, be regarded as same person's face.
The beneficial effects of the present invention are: the present invention quick-searching and can decode spy in the video comprising facial image Determine face, guarantee the integrality, availability and confidentiality of personnel's face, while the irrelevant personnel face in video is carried out fast Speed efficiently shields invisible processing.
(4) Detailed description of the invention
Fig. 1 is the front end encryption process sequence figure that facial image encrypts anti-tamper and retrieval method in video of the invention.
Fig. 2 is that facial image encrypts the rear end decryption of anti-tamper and retrieval method in video of the invention and integrality is tested Demonstrate,prove flow chart.
(5) specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and embodiments.
Fig. 1, Fig. 2 are a kind of specific embodiment of the invention.The embodiment, which is that facial image encryption is anti-in a kind of video, to be usurped The method for changing and retrieving mainly includes following three big steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated, Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption Picture NALU saves as video file, completes specific retrieval.
Dismantling analysis is carried out to each step below:
If the front end Fig. 1 encryption process sequence is as shown in the figure, step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated The information such as face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will The encryption data writes back in original image again, realizes the encryption to face;
A3, the cryptographic Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the private key Sk using front endAThe digital signature that encryption H (Feature) obtains facial image is SkA[H (Feature)], using the public key Pk of rear endBThe key Ke generated in encryption A2 step obtains PkB[Ke];
A5, by SkA[H(Feature)] +PkB[Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU SEI self-defining data frame sends H264 NALU finally by network.
As shown in the decryption of the rear end Fig. 2 and integrity verification flow chart, step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine Rope goes out SEI self-defining data frame;
B2, Sk is parsed from SEI self-defining data frame according to formatA[H(Feature)] ,Pk[Ke]+,Pos,ts;
B3, Pk is decrypted using the private key of rear endB[Ke] obtains encryption key Ke;Use the public key decryptions Sk of front endA[H (Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted.
As shown in the decryption of the rear end Fig. 2 and integrity verification flow chart, step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, if it is inconsistent it may be considered that data by It distorts, to ensure that the integrality of face;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, and principle is meter The standard deviation of two groups of characteristic value datas is calculated, standard deviation is less than a certain threshold value and is regarded as same person's face.If compare at Function then writes back to User data in original image, and these NALU are extracted and save as video file, then only wraps in this document Video frame containing the Given Face.Retrieval Given Face can be realized, and other irrelevant personnel facial images are sightless.
Wherein the Encryption Algorithm in step A2 is symmetric encipherment algorithm.
Wherein the threshold comparison specific steps of step C2 include:
C21, given threshold;The method of given threshold can be herein, calculates the same person and takes under different emotional states All face pictures characteristic value;The characteristic value of all human face photos of the same person is subjected to standard deviation calculating two-by-two, is taken The average value of standard deviation is as threshold value;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21 The threshold value set in rapid, that is, be regarded as same person's face.
Compared with prior art, advantage is as follows for the present embodiment: using after the technical program, including in the video file of video recording The face information detected can quickly retrieve specific face according to the facial image of input, together from video file When by ensure that the confidentiality of face to facial image encryption;By adding digital signature to facial image, ensure that The integrality of face;By the decipherment algorithm of this programme, the availability of facial image ensure that, while protecting other unrelated people The privacy of member, has achieved the purpose that the technical program, solves that data safety degree in the field is low, retrieval Given Face is tired Difficult, irrelevant personnel image procossing hardly possible technical problem.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, this field is common Other modifications or equivalent replacement that technical staff makes technical solution of the present invention, without departing from technical solution of the present invention Spirit and scope, be intended to be within the scope of the claims of the invention.

Claims (3)

1. facial image encrypts anti-tamper and retrieval method in a kind of video, which comprises the following steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated, Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption Picture NALU saves as video file, completes specific retrieval;
The step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated Face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts information;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will The encryption data writes back in original image again, realizes the encryption to face;
A3, the Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the private key Sk using front endAThe digital signature that encryption H (Feature) obtains facial image is SkA[H (Feature)], Use the public key Pk of rear endBThe key Ke generated in encryption A2 step obtains PkB[Ke];
A5, by SkA[H(Feature)] +PkB[Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU SEI self-defining data frame sends H264 NALU finally by network;
The step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine Rope goes out SEI self-defining data frame;
B2, Sk is parsed from SEI self-defining data frame according to formatA[H(Feature)] ,Pk[Ke]+,Pos,ts;
B3, Pk is decrypted using the private key of rear endB[Ke] obtains encryption key Ke;Use the public key decryptions Sk of front endA[H (Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted;
The step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, to verify face integrality;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, compares successfully Afterwards, facial image User data are write back into original image, and these NALU is extracted and save as video file, in this document only Video frame comprising the Given Face finally completes retrieval Given Face.
2. facial image according to claim 1 encrypts anti-tamper and retrieval method, it is characterised in that: the step A2 In Encryption Algorithm be symmetric encipherment algorithm.
3. facial image according to claim 1 encrypts anti-tamper and retrieval method, it is characterised in that: the step C2 Threshold comparison specific steps include:
C21, given threshold;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21 The threshold value set in rapid, that is, be regarded as same person's face.
CN201811409747.7A 2018-11-23 2018-11-23 Facial image encrypts anti-tamper and retrieval method in a kind of video Pending CN109543432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811409747.7A CN109543432A (en) 2018-11-23 2018-11-23 Facial image encrypts anti-tamper and retrieval method in a kind of video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811409747.7A CN109543432A (en) 2018-11-23 2018-11-23 Facial image encrypts anti-tamper and retrieval method in a kind of video

Publications (1)

Publication Number Publication Date
CN109543432A true CN109543432A (en) 2019-03-29

Family

ID=65849845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811409747.7A Pending CN109543432A (en) 2018-11-23 2018-11-23 Facial image encrypts anti-tamper and retrieval method in a kind of video

Country Status (1)

Country Link
CN (1) CN109543432A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135196A (en) * 2019-05-10 2019-08-16 内蒙古工业大学 A kind of data fusion tamper resistant method based on input data compression expression association analysis
CN111405233A (en) * 2020-03-25 2020-07-10 苏州科达科技股份有限公司 Encrypted graph transmission method, device, storage medium and system in video conference
CN113674195A (en) * 2020-05-13 2021-11-19 ***通信集团有限公司 Image detection method, device, equipment and storage medium
CN113709523A (en) * 2020-05-21 2021-11-26 联咏科技股份有限公司 Method for encoding and decoding private data and image processing apparatus
CN116541872A (en) * 2023-07-07 2023-08-04 深圳奥联信息安全技术有限公司 Data information safety transmission method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101694724A (en) * 2009-10-21 2010-04-14 重庆大学 Method for embedding GPS information in JPEG image of digital camera and ensuring safety of image
CN101957911A (en) * 2010-09-29 2011-01-26 汉王科技股份有限公司 Face identification method and system
CN103731271A (en) * 2013-12-30 2014-04-16 北京工业大学 On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling
CN108052915A (en) * 2017-12-22 2018-05-18 深圳英飞拓科技股份有限公司 A kind of method and device that Face datection is carried out to video and is identified

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101694724A (en) * 2009-10-21 2010-04-14 重庆大学 Method for embedding GPS information in JPEG image of digital camera and ensuring safety of image
CN101957911A (en) * 2010-09-29 2011-01-26 汉王科技股份有限公司 Face identification method and system
CN103731271A (en) * 2013-12-30 2014-04-16 北京工业大学 On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling
CN108052915A (en) * 2017-12-22 2018-05-18 深圳英飞拓科技股份有限公司 A kind of method and device that Face datection is carried out to video and is identified

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135196A (en) * 2019-05-10 2019-08-16 内蒙古工业大学 A kind of data fusion tamper resistant method based on input data compression expression association analysis
CN111405233A (en) * 2020-03-25 2020-07-10 苏州科达科技股份有限公司 Encrypted graph transmission method, device, storage medium and system in video conference
CN111405233B (en) * 2020-03-25 2021-08-20 苏州科达科技股份有限公司 Encrypted graph transmission method, device, storage medium and system in video conference
CN113674195A (en) * 2020-05-13 2021-11-19 ***通信集团有限公司 Image detection method, device, equipment and storage medium
CN113709523A (en) * 2020-05-21 2021-11-26 联咏科技股份有限公司 Method for encoding and decoding private data and image processing apparatus
CN113709523B (en) * 2020-05-21 2024-02-13 联咏科技股份有限公司 Method for encoding and decoding private data and image processing apparatus
CN116541872A (en) * 2023-07-07 2023-08-04 深圳奥联信息安全技术有限公司 Data information safety transmission method and system
CN116541872B (en) * 2023-07-07 2024-04-09 深圳奥联信息安全技术有限公司 Data information safety transmission method and system

Similar Documents

Publication Publication Date Title
CN109543432A (en) Facial image encrypts anti-tamper and retrieval method in a kind of video
Panah et al. On the properties of non-media digital watermarking: a review of state of the art techniques
CA2333864C (en) Biometric identification method and system
CN101719205B (en) Digital copyright management method and system
CN102891754B (en) Method and device for protecting network digital multimedia copyright
CN102609890B (en) A kind of image digital watermark embeds and detecting system
US10311215B2 (en) Secure recording and rendering of encrypted multimedia content
CN103152556A (en) Surveillance video encryption method for protecting privacy
WO2017021953A1 (en) A method and system for differentiated privacy protection
CN105897428B (en) A kind of real-time video safety communication system and method based on iris recognition
CN102932650B (en) Video data integrity protection and verification method, equipment and system
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN110446105A (en) Video-encryption, decryption method and device
JP2019161643A (en) Tamper protection and video source identification for video processing pipeline
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
CN106778292A (en) A kind of quick restoring method of Word encrypted documents
Yari et al. An overview and computer forensic challenges in image steganography
CN102088611B (en) H.264 standard motion vector-based method for embedding and extracting fragile watermark
KR102387169B1 (en) Digital forensic data decoding device
CN102164303A (en) Video copyright protection method and system as well as video publisher entity
CN108595920A (en) Network video listens management support rights service subsystem
JP5718757B2 (en) Image management apparatus, image management program, and image management method
Bogdanoski et al. Steganography in support of the global terrorism
US20150371013A1 (en) Method and system for locking content
CN109756459B (en) Data processing method, data identification method, data processing device, data identification device, and data processing medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329