Browse Prior Art Database

System for Background Security for Images

IP.com Disclosure Number: IPCOM000250417D
Publication Date: 2017-Jul-12
Document File: 4 page(s) / 286K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed are a method and system to use background image patterns when encrypting images, thus adding a layer of data security.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 43% of the total text.

1

System for Background Security for Images

Using images to capture information is increasingly prevalent, creating a consistent and constant volume of confidential information moving across the internet. Users give little thought to the fact that the data (e.g., personal, financial, medical, etc.) is sometimes unprotected. Security should be a major concern as hackers snoop online for this confidential information to build profiles, which leads to identity theft.

The novel contribution is a method and system to use background image patterns when encrypting images, thus adding a layer of data security. This system for cryptographic reconstruction is based on the background behind the subject of a photograph.

For example, User A takes a photograph of sales receipts laid out on a wooden table that has a distinct woodgrain pattern or other unique markings (e.g., scratches). The system uses the unique patterns and markings to build an encryption key. When User A’s photograph of the receipt also captures the unique table scratches. The system wipes the table from the picture and then wipes out the receipts. It is locked with the encryption key created using the table’s unique markings. That key can be used in a cache for a configurable amount of time to unlock images (e.g., decryption keys available on the local device may be available for 12 hours because that is the average cycle time that User A is near the table). To see or unlock the stored picture, the user takes a picture of the table because that is the decryption key for a temporary period. If there is ever a problem with the table, then the user can use the original application password.

This system for background security for images can be enabled as a security application or as a method attached to a given file share or social application.

The steps for implementing the system for background security for images follow: 1. Configuration Stage

A. User A takes a picture of the top of a table (e.g., wooden table) using a high- resolution camera

B. System divides the table into blocks, for example: i. every half inch squared represents one block ii. divide the remaining area into a configurable (constant) number of

blocks iii. divide the remaining area into variable sized blocks such that the blocks

give y entropy per block C. System creates multiple duplicate images of each block to aid block matching

at a later stage (e.g., Block1_high_res.jpg + Block1_medium_res.jpg + Block1_low_res.jpg)

D. System creates a key based on each individual block (existing art); converts the pixels in the block into integers according to an algorithm (e.g., encode red pixel into 010010010010 and concatenate that onto the next pixel and so forth to create a long encryption key)

2

E. System configures system parameters, for example: i. minimum number of blocks that must be used when a picture is to be

encrypted ii. a taxonomy of content type with associated default risk factors is

optionally modified (e.g., med...