Netinfo Security ›› 2017, Vol. 17 ›› Issue (5): 44-50.doi: 10.3969/j.issn.1671-1122.2017.05.007

• Orginal Article • Previous Articles     Next Articles

Research on a User Data Security Protection Strategy Based on STDM Technology

Xiangrong CHEN1,2(), Ding CHENG3, Pengyu QIN1,2, Cheng CHENG4   

  1. 1. Department of Computer Science & Engineering, Tongji University, Shanghai 201804, China;
    2. Key Laboratory of Embedded System and Service Computing of Ministry of Education, Tongji University, Shanghai 201804, China
    3. Department of Information Security, Anhui University, Hefei Anhui 230601, China
    4. Department of Electronic Engineering, Suzhou University of Science and Technology, Suzhou Jiangsu 215009, China
  • Received:2017-02-23 Online:2017-05-20 Published:2020-05-12

Abstract:

Based on the research of spread transform dither modulation algorithm, this paper proposes a security solution based on image encryption. In the process of data encryption, the client first user name embedded in them, and the software of fingerprint and user MD5 password encryption password to get the ciphertext. Then, the client controls the ciphertext to be embedded into the image by the local random seed generation control flow. When the server receives the picture sent by the client, the server name is extracted first. Similarly, the server extracts the password ciphertext through the random number control flow, with the corresponding user password ciphertext verification. If the authentication is successful, a new random seed is generated and sent to the client. To test the method, a prototype verification system was developed and the ideal results were obtained. The results show that the image encryption scheme can be used to protect the data security of the site or the client. At the same time, it can also meet the requirements of user’s convenience.

Key words: STDM, software fingerprinting, user privacy, safety protection

CLC Number: