The research on image Information Hiding (IH) algorithm based on error-correcting code is aimed at overcoming poor robustness flaws of spatial domain image information hiding algorithm. The property of correcting random error of the error-correcting code could be used to improve the robustness of spatial domain information hiding algorithm, so that the modifications to the covers by attacker could be effectively resisted. Two different algorithms were proposed: the Least Significant Bit (LSB) information hiding algorithm based on error-correcting code and the gray-bit information hiding algorithm based on error-correction code. By embedding the coding form of secret information in LSB in the first algorithm, relatively high robustness could be achieved in the case of low density noise; while in the second one, by applying the structural characteristics of image pixel gray values, and coding each pixel gray value which had been embedded the secret information in the form of Hamming code, one error could be corrected by each pixel independently. Both theoretical analysis and experimental results show that, under the condition of same density and value of noise, the percentages of secret information recovered of these two algorithms are higher than the basic LSB algorithm, so they are two information hiding algorithms with higher robustness.
Concering that the traditional access control methods fail to support dynamic authorization and file evaluation, and suffer from malicious re-sharing issue, an Access Control Mechanism with Dynamic Authorization and File Evaluation (DAFE-AC) was proposed. DAFE-AC adopted a dynamic authorization mechanism to monitor authorized users in real-time and allowed users to supervise each other. The file evaluation mechanism in DAFE-AC could dynamically update the access threshold of files. Based on the Hash/index database, DAFE-AC can ensure the uniqueness of files in the system. In DAFE-AC, a user' authorization value can dynamically change with behaviors of other users, and users can perform file evaluation to eliminate malicious re-sharing of files.