CN110188557A - Information concealing method and robot system based on big data search - Google Patents

Information concealing method and robot system based on big data search Download PDF

Info

Publication number
CN110188557A
CN110188557A CN201910455279.5A CN201910455279A CN110188557A CN 110188557 A CN110188557 A CN 110188557A CN 201910455279 A CN201910455279 A CN 201910455279A CN 110188557 A CN110188557 A CN 110188557A
Authority
CN
China
Prior art keywords
information
secret
secret information
big data
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910455279.5A
Other languages
Chinese (zh)
Other versions
CN110188557B (en
Inventor
朱定局
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Original Assignee
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Power Innovative Intelligent Technology (dongguan) Co Ltd, South China Normal University filed Critical Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Priority to CN201910455279.5A priority Critical patent/CN110188557B/en
Publication of CN110188557A publication Critical patent/CN110188557A/en
Application granted granted Critical
Publication of CN110188557B publication Critical patent/CN110188557B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

A kind of information concealing method and robot system based on big data search, it include: that the first information high with the secret information matching degree is found from big data, position of the first information in big data is obtained as first position, using the difference between the secret information and the first information as the second information.The above method and system are by the way that secret information to be hidden in the first information in big data, so that the data volume of Information hiding is unrestricted, while and the first information is originally there is in big data, concealment is extremely strong, it is difficult to be cracked, to improve capacity and the safety of Information hiding.

Description

Information concealing method and robot system based on big data search
Technical field
The present invention relates to information technology fields, more particularly to a kind of information concealing method and robot system.
Background technique
Information Hiding Techniques (Information Hiding), that is, Information hiding will protect letter in future network Breath plays an important role in terms of not being damaged, and Information hiding is confidential information to be hidden in bulk information not allow opponent to realize A kind of method.The method of Information hiding mainly has Steganography, digital watermark technology, visual password, latent channel, concealment agreement etc..
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: existing Information hiding Technology, since the data volume of cover object and camouflaging object is limited, analysis mining goes out from cover object and camouflaging object The complexity and difficulty of secret information are limited, so that secret information is possible to be cracked, lead to the safety of Information hiding It is not high.Simultaneously because the data volume of cover object and camouflaging object is limited, large batch of secret information can not be hidden.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
Based on this, it is necessary to for the defect or deficiency of Information hiding in the prior art, provide based on big data search Information concealing method and robot system, data volume to solve the disadvantage that Information hiding in the prior art is limited, is easily cracked.
In a first aspect, the embodiment of the present invention provides a kind of information concealing method, which comprises
Data search step: the first information high with the secret information matching degree is found from big data;
Position acquisition step: position of the first information in big data is obtained as first position;
Difference calculates step: using the difference between the secret information and the first information as the second information.
Preferably,
Data search step specifically includes:
Information dicing step: secret information is cut into multiple portions secret information;
More data search steps: it is found respectively from big data and high multiple of multiple partial secret information matches degree The first information;
The position acquisition step specifically includes:
Multiposition obtaining step: multiple positions of multiple first information in big data are obtained as multiple first It sets;
The difference calculates step and specifically includes:
More differences calculate steps: using the corresponding difference between multiple secret informations and multiple first information as Multiple second information.
Preferably, after the difference calculating step further include:
It repeatedly hides and executes step: multiple groups first position, the second information is calculated according to multiple first information;
Authorization message sending step: at least one set of first position, second information are sent to user.
Second aspect, the embodiment of the present invention provide a kind of information extracting method, which comprises
First information extraction step: the first information is extracted from the first position in big data;
Secret information generation step: secret information is generated with the second information according to the first information.
Preferably, the first information extraction step specifically includes:
Multi information extraction step: multiple first information are extracted from multiple first positions in big data;
The secret information generation step specifically includes:
Multi-section divides secret information generation step: more according to multiple first information and corresponding multiple second information generations A partial secret information;
Secret information generation step: it synthesizes the multiple partial secret information to obtain secret information.
Preferably, after the secret information generation step further include:
It repeatedly extracts and executes step: multiple groups secret information is obtained by first position described in multiple groups, second information;
Secret information screening step: receiving check information, selects from secret information described in multiple groups consistent with check information Secret information;
Secret information sending step: the secret information is sent to user.
The third aspect, the embodiment of the present invention provide a kind of Information hiding and extracting method, and the method includes the letters Cease hidden method and the information extracting method.
Fourth aspect, the embodiment of the present invention provide a kind of information hiding system, the system comprises:
Data search module: the first information high with the secret information matching degree is found from big data;
Position acquisition module: position of the first information in big data is obtained as first position;
Difference computation module: using the difference between the secret information and the first information as the second information.
Preferably,
Data search module specifically includes:
Information cutting module: secret information is cut into multiple portions secret information;
Majority is according to search module: finding respectively from big data and high multiple of multiple partial secret information matches degree The first information;
The position acquisition module specifically includes:
Multiposition obtains module: obtaining multiple positions of multiple first information in big data as multiple first It sets;
The difference computation module specifically includes:
More difference computation modules: using the corresponding difference between multiple secret informations and multiple first information as Multiple second information.
Preferably, after the difference computation module further include:
It repeatedly hides execution module: multiple groups first position, the second information is calculated according to multiple first information;
Authorization message sending module: at least one set of first position, second information are sent to user.
5th aspect, the embodiment of the present invention provide a kind of information extracting system, the system comprises:
First information extraction module: the first information is extracted from the first position in big data;
First information generation module: secret information is generated with the second information according to the first information.
Preferably, the first information extraction module specifically includes:
Multi information extraction module: multiple first information are extracted from multiple first positions in big data;
The first information generation module specifically includes:
Multi-section divides secret information generation module: more according to multiple first information and corresponding multiple second information generations A partial secret information;
Secret information generation module: it synthesizes the multiple partial secret information to obtain secret information.
Preferably, after the secret information generation module further include:
It repeatedly extracts execution module: multiple groups secret information is obtained by first position described in multiple groups, second information;
Secret information screening module: receiving check information, selects from secret information described in multiple groups consistent with check information Secret information;
Secret information sending module: the secret information is sent to user.
6th aspect, the embodiment of the present invention provide a kind of Information hiding and extraction system, and the system comprises the letters Cease the system of hiding and the information extracting system.
7th aspect, the embodiment of the present invention provide a kind of robot system, are respectively configured in the robot just like the 4th Information extracting system described in information hiding system described in aspect and the 5th aspect.
The embodiment of the present invention the utility model has the advantages that
1, the Information Hiding Techniques based on big data search, since the data volume of cover object and camouflaging object is big, From the great cover object of data volume and camouflaging object analysis mining go out secret information complexity and difficulty it is very high, such as Cause the safety of Information hiding high so that secret information can not extremely be cracked with " looking for a needle in a haystack ".Simultaneously because The data volume of cover object and camouflaging object is big, can hide large batch of secret information.
2, because the people that possess permission to big data, but do not possess secret information permission do not know first position and the Two information, so secret information can not be extracted by big data, it is ensured that the safety of secret information.
3, because the first information is and the highest data of secret information matching degree, the first information and secret information Difference very little, therefore the data volume very little of the second information;Simultaneously as first position is the corresponding position of the first information or volume Number, so the data volume of first position also very little;As long as so the first position of data volume very little and the second information are sent to Possess secret information the user of permission, so that it may it enables the user to extract secret information by synthesis from big data, Its network overhead, storage overhead, computing cost are all extremely low.
Information concealing method and robot system provided in an embodiment of the present invention based on big data search, comprising: from big The first information high with the secret information matching degree is found in data, is obtained position of the first information in big data and is made For first position, using the difference between the secret information and the first information as the second information.The above method and system By the way that secret information to be hidden in the first information in big data, so that the data volume of Information hiding is unrestricted, while and One information was originally there is in big data, and concealment is extremely strong, it is difficult to is cracked, to improve the capacity and safety of Information hiding Property.
Detailed description of the invention
Fig. 1 is the flow chart for the information concealing method that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the information extracting method that the embodiment of the present invention 3 provides;
Fig. 3 is the flow chart of Information hiding and extracting method that the embodiment of the present invention 5 provides;
Fig. 4 is the functional block diagram for the information hiding system that the embodiment of the present invention 6 provides;
Fig. 5 is the functional block diagram for the information extracting system that the embodiment of the present invention 8 provides;
Fig. 6 is the functional block diagram of Information hiding and extraction system that the embodiment of the present invention 11 provides.
Specific embodiment
Below with reference to embodiment of the present invention, technical solution in the embodiment of the present invention is described in detail.It should Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Embodiment 1 provides a kind of information concealing method, as shown in Figure 1, the method includes the steps S110 to step S170.
Secret information receives step S110: receiving to need hiding secret information;For example, it is desired to which hiding information is 100 Open the first photo.
Data search step S120: the first information y ' high with secret information y matching degree is found from big data.Secret letter Breath refers to information to be concealed, can be text, password, image, figure or sound etc..For example, (such as from big data Google searches figure or whiteness searches figure) find with 100 the first photo matching degrees greater than 80% the second photo as the first information. Wherein, the first information can be made of one or more data in big data, these data, which can be distributed in big data, appoints Meaning position.The matching degree is high, refers to that the matching degree of the secret information and the data is greater than preset value or the secret information With the matching degrees of the data in the secret information and the big data in the sorting from large to small of the matching degree of each data Serial number be greater than default serial number.
Position acquisition step S130: position of the first information y ' in big data is obtained as first position s.Preferably, First position s includes that first start bit sets s1, the first end position s2, then y ' sets s1 and the first end position in first start bit Between s2.For example, using 100 network address of this 100 the second photos as first position.Wherein, position includes storage position It sets or path or call number or mark, the first information can be navigated to from big data by position.
Difference calculates step S140: using the difference between first information y ' and secret information y as the second information z.First Difference between information and the first information is as the second information, convenient for that can be believed by the second information and first at the stage of extraction Breath restores the first information.Formula: the second information=f (secret information, the first information), i.e. z=f (y, y '), wherein f is to seek difference Function, if the first information, the first information and the second information are all the formats of number, then the formula can simplify are as follows: Second information=the first information-first information.For example, using the difference of 100 the first photos and corresponding second photo as second Information, for example, the pixel value that the pixel value of every first photo can be subtracted to corresponding second photo obtains the second information.
It repeatedly hides and executes step S150: S120~S140 can be employed many times to obtain the unduplicated first information of multiple groups And its corresponding first position and the second information, and multiple groups first position and the second information are sent to secret information ownership The user of limit.For example, finding unduplicated 3 groups and 100 the first photos from big data (such as google searches figure or whiteness searches figure) Second photo of the matching degree greater than 80% is as 3 groups of first information.
Authorization message sending step S160: at least one set of first position s, the second information z are sent to user.
Check information generation step S170: it using the partial information of secret information or attribute information as check information, sends To the user for possessing secret information permission.For example, using last 20 pixel values of every first photo as check information, or Using the number of pixels of every first photo as check information.
Preferably, the Information hiding stage can also by the second information, check information insertion big data in the second position, The third place;Without the second information, check information are sent to user, it is only necessary to send the second position, the third place To user.The second information, verification letter correspondingly are extracted from the second position in big data, the third place in the Information hiding stage Breath.
One more specific embodiment: needing hiding information is 100 the first photos, then from big data (such as google Search figure or whiteness search figure) find with 100 the first photo matching degrees greater than 80% the second photo as the first information, by this The downloading network address of 100 the second photos is as first position, using the difference of 100 the first photos and corresponding second photo as the Two information.
In embodiment 1 because the first information be with the highest data of secret information matching degree, the first information with The difference very little of secret information, therefore the data volume very little of the second information;Simultaneously as first position is that the first information is corresponding Position or number, so the data volume of first position also very little;As long as so by the first position of data volume very little and the second letter Breath is sent to the user for possessing secret information permission, so that it may enable the user to extract from big data by synthesis secret Confidential information, network overhead, storage overhead, computing cost are all extremely low.
Embodiment 2 provides a kind of preferred information concealing method, according to information concealing method described in embodiment 1, in conjunction with Big data.
Step S110 includes information dicing step S111: secret information y is cut into multiple portions secret information y1, Y2 ..., ym (number that m is cutting).
Step S120 includes more data search step S121: found respectively from big data with multiple secret information y1, Y2 ..., ym the matching degree high multiple first information y1 ', y2 ' ..., ym ';
Step S130 includes multiposition obtaining step S131: obtaining the multiple first information y1 ', y2 ' ..., ym ' and is counting greatly Multiple positions in are as multiple first position s1, s2 ..., sm.
Step S140 includes that more differences calculate step S141: by the multiple first information y1 ', y2 ' ..., ym ' with it is multiple secret Confidential information y1, the correspondence difference between y2 ..., ym is as multiple second information z1, z2 ..., zm.Wherein, z1=f (y1, Y1 '), z2=f (y2, y2 ') ..., zm=f (ym, ym ').
Embodiment 2 main is the utility model has the advantages that secret information is cut into different piece reconvert, so that even if part of secret Confidential information is cracked, and can not also recover all parts of secret information, and then can not recover secret information, further improve The safety of secret information and it is difficult to cracking.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can With referring to the implementation of preceding method, overlaps will not be repeated.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can With referring to the implementation of preceding method, overlaps will not be repeated.
Embodiment 3,4 be respectively with embodiment 1,2 corresponding information extracting methods.The preferred embodiment of embodiment 3,4 And beneficial effect is similar with embodiment 1,2 respectively, repeats no more.
Embodiment 3 provides a kind of information extracting method, and the method includes the steps S210 to step S270, as shown in Figure 2.
Authorization message obtaining step S210: receive at least one set first position s, the second information z.Usually from user terminal Receive first position s, the second information z by network.
First information extraction step S220: first information y ' is extracted from the first position s in big data.For example, from first 100 the second photos are downloaded in position at 100 network address as the first information.
Secret information generation step S230: y ' and the second information z generates secret information y according to the first information.Because hidden In the hiding stage, the second information=f (secret information, the first information), wherein f is the letter for seeking difference between secret information and the first information Number, so being substituted into the second information and the first information in this formula and secret letter being calculated in Restore Secret information Breath.Work as secret information, when the first information is all number, the+the second information of secret information=first information.For example, by the first information In the pixel value of every second photo obtain the pixel value of every first photo plus pixel value corresponding in the second information.
It repeatedly extracts and executes step S240: S220~S230 can be employed many times and come through multiple groups first position and the second letter Breath is to obtain multiple groups secret information.
Information checking S250: it is selected from multiple groups secret information and the consistent secret information of check information.
Secret information selects step S260: have multiple groups with the matched secret information of check information described in the S ' 6, then if Wherein every group of secret information is identical as other K group secret informations, corresponding that group of secret information of choosing maximum K value.For example, the 1st group Identical as the 2nd group of secret information, the 3rd group is different from other 2 groups of secret informations, i.e., the 1st group is identical as other 1 group of secret information, 2nd group identical as other 1 group of secret information, and the 3rd group identical as other 0 group of secret information, then selects the 1st group of secret information or the 2nd Group secret information.
Secret information sending step S270: secret information is sent to the user for possessing secret information permission.
Embodiment 4 provides a kind of information extracting method, according to information extracting method described in embodiment 3, in conjunction with big data.
Step S210 includes more authorization message obtaining step S211: receive multiple first position s1 of user's input, S2 ..., sm, multiple second information z1, z2 ..., zm.
Step S220 includes more first information extraction step S221: from multiple first position s1 in big data, s2 ..., Sm extracts the multiple first information y1 ', y2 ' ..., ym '.
Step S230 includes more secret information generation step S231: according to the multiple first information y1 ', y2 ' ..., ym ' with Corresponding multiple second information z1, z2 ..., zm generate multiple secret information y1, y2 ..., ym.Wherein, z1=f (y1, Y1 '), z2=f (y2, y2 ') ..., zm=f (ym, ym ').
Step S230 includes secret information generation step S232: multiple portions secret information y1, y2 ..., ym are synthesized To secret information y.It preferably, is m parts using secret information y as the cutting of character string isometric ground in Information hiding embodiment, at For y1, y2 ..., ym.Preferably, it is extracted from the head of corresponding portion secret information and extracts 1 and y1,2y2 in serial number, such as 1y1 M and ym is extracted in middle extraction 2 and y2 ..., mym.Y1, y2 ..., ym are combined to obtain y according to the sequencing of serial number.
The utility model has the advantages that multiple portions secret information, finally synthesizes secret information, secret information is nondestructively gone back It is former.
Embodiment 5 provides a kind of Information hiding and extracting method, as shown in figure 3, Information hiding and extracting method are by implementing The information concealing method of any one of example 1 to 2 and the information extracting method composition of any one of embodiment 3 to 4.
Embodiment 6-10 is system corresponding with embodiment 1-5 respectively.The preferred embodiment of embodiment 6-10 and beneficial Effect is similar with embodiment 1-5 respectively, repeats no more.
Embodiment 6 provides a kind of information hiding system, and the system comprises modules 110 to module 170, as shown in Figure 4.
Secret information receiving module 110: receive to need hiding secret information.
Data search module 120: the first information y ' high with secret information y matching degree is found from big data.
Position acquisition module 130: position of the first information y ' in big data is obtained as first position s.
Difference computation module 140: using the difference between first information y ' and secret information y as the second information z.
It repeatedly hides execution module 150: S120~S140 can be employed many times to obtain the unduplicated first information of multiple groups And its corresponding first position and the second information, and multiple groups first position and the second information are sent to secret information ownership The user of limit.
Authorization message sending module 160: at least one set of first position s, the second information z are sent to user.
Check information generation module 170: it using the partial information of secret information or attribute information as check information, is sent to Possess secret information the user of permission.
Embodiment 7 provides a kind of preferred information hiding system, according to information hiding system described in embodiment 6, in conjunction with Big data.
Module 110 includes information cutting module 111: secret information y is cut into multiple portions secret information y1, Y2 ..., ym (number that m is cutting).
Module 120 include majority according to search module 121: found respectively from big data with multiple secret information y1, Y2 ..., ym the matching degree high multiple first information y1 ', y2 ' ..., ym ';
Module 130 includes that multiposition obtains module 131: obtaining the multiple first information y1 ', y2 ' ..., ym ' in big data In multiple positions as multiple first position s1, s2 ..., sm.
Module 140 includes more difference computation modules 141: by the multiple first information y1 ', y2 ' ..., ym ' and multiple secrets Information y1, the correspondence difference between y2 ..., ym is as multiple second information z1, z2 ..., zm.
Embodiment 8,9 be respectively with embodiment 6,7 corresponding information extracting systems.The preferred embodiment of embodiment 8,9 And beneficial effect is similar with embodiment 6,7 respectively, repeats no more.
Embodiment 8 provides a kind of information extracting system, as shown in figure 5, the system comprises modules 210 to module 270.
Authorization message obtains module 210: receiving at least one set first position s, the second information z.Usually from user terminal Receive first position s, the second information z by network.
First information extraction module 220: first information y ' is extracted from the first position s in big data.For example, from first 100 the second photos are downloaded in setting at 100 network address as the first information.
Secret information generation module 230: y ' and the second information z generates secret information y according to the first information.
It repeatedly extracts execution module 240: S220~S230 can be employed many times and come through multiple groups first position and the second letter Breath is to obtain multiple groups secret information.
Information checking S250: it is selected from multiple groups secret information and the consistent secret information of check information.
Secret information selecting module 260: having multiple groups with the matched secret information of check information described in the S ' 6, then if Wherein every group of secret information is identical as other K group secret informations, corresponding that group of secret information of choosing maximum K value.
Secret information sending module 270: secret information is sent to the user for possessing secret information permission.
Embodiment 9 provides a kind of information extracting system, according to information extracting system described in embodiment 8, in conjunction with big data.
Module 210 include more authorization messages obtain module 211: receive user input multiple first position s1, s2 ..., Sm, multiple second information z1, z2 ..., zm.
Module 220 includes more first information extraction modules 221: from multiple first position s1, s2 ..., the sm in big data Extract the multiple first information y1 ', y2 ' ..., ym '.
Module 230 include more secret information generation modules 231: according to the multiple first information y1 ', y2 ' ..., ym ' with it is right Multiple second the information z1, z2 ..., zm answered generate multiple secret information y1, y2 ..., ym.
Module 230 includes secret information generation module 232: multiple portions secret information y1, y2 ..., ym are synthesized to obtain Secret information y.
Embodiment 10 provides a kind of Information hiding and extraction system, Information hiding and extraction system are any by embodiment 6 to 7 The information hiding system of item and the information extracting system composition of any one of embodiment 8 to 9.
Embodiment 11 provides a kind of Information hiding and extraction machine people's system, as shown in fig. 6, Information hiding and extraction machine People's system is made of the information hiding system of any one of embodiment 1 to 5 and the information extracting system of any one of embodiment 6 to 10.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory ROM) or random access memory (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of information concealing method, which is characterized in that the described method includes:
Data search step: the first information high with the secret information matching degree is found from big data;
Position acquisition step: position of the first information in big data is obtained as first position;
Difference calculates step: using the difference between the secret information and the first information as the second information.
2. information concealing method according to claim 1, which is characterized in that
Data search step specifically includes:
Information dicing step: secret information is cut into multiple portions secret information;
More data search steps: multiple first high with multiple partial secret information matches degree are found respectively from big data Information;
The position acquisition step specifically includes:
Multiposition obtaining step: multiple positions of multiple first information in big data are obtained as multiple first positions;
The difference calculates step and specifically includes:
More differences calculate step: using the corresponding difference between multiple secret informations and multiple first information as multiple Second information.
3. information concealing method according to claim 1, which is characterized in that the difference calculates after step further include:
It repeatedly hides and executes step: multiple groups first position, the second information is calculated according to multiple first information;
Authorization message sending step: at least one set of first position, second information are sent to user.
4. a kind of information extracting method, which is characterized in that the described method includes:
First information extraction step: the first information is extracted from the first position in big data;
Secret information generation step: secret information is generated with the second information according to the first information.
5. information extracting method according to claim 4, which is characterized in that the first information extraction step specifically wraps It includes:
Multi information extraction step: multiple first information are extracted from multiple first positions in big data;
The secret information generation step specifically includes:
Multi-section divides secret information generation step: generating multiple portions with corresponding multiple second information according to multiple first information Divide secret information;
Secret information generation step: it synthesizes the multiple partial secret information to obtain secret information.
6. information extracting method according to claim 5, which is characterized in that also wrapped after the secret information generation step It includes:
It repeatedly extracts and executes step: multiple groups secret information is obtained by first position described in multiple groups, second information;
Secret information screening step: receiving check information, selects from secret information described in multiple groups consistent secret with check information Confidential information;
Secret information sending step: the secret information is sent to user.
7. a kind of Information hiding and extracting method, which is characterized in that the method includes the described in any item letters of claim 1-3 Cease hidden method and the described in any item information extracting methods of claim 4-6.
8. a kind of information hiding system, which is characterized in that the system comprises:
Data search module: the first information high with the secret information matching degree is found from big data;
Position acquisition module: position of the first information in big data is obtained as first position;
Difference computation module: using the difference between the secret information and the first information as the second information.
9. a kind of information extracting system, which is characterized in that the system comprises:
First information extraction module: the first information is extracted from the first position in big data;
First information generation module: secret information is generated with the second information according to the first information.
10. a kind of robot system, which is characterized in that be each configured with information as claimed in claim 8 in the robot The system of hiding and information extracting system as claimed in claim 9.
CN201910455279.5A 2019-05-29 2019-05-29 Information hiding method based on big data search and robot system Active CN110188557B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910455279.5A CN110188557B (en) 2019-05-29 2019-05-29 Information hiding method based on big data search and robot system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910455279.5A CN110188557B (en) 2019-05-29 2019-05-29 Information hiding method based on big data search and robot system

Publications (2)

Publication Number Publication Date
CN110188557A true CN110188557A (en) 2019-08-30
CN110188557B CN110188557B (en) 2023-07-04

Family

ID=67718436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910455279.5A Active CN110188557B (en) 2019-05-29 2019-05-29 Information hiding method based on big data search and robot system

Country Status (1)

Country Link
CN (1) CN110188557B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data
CN108197488A (en) * 2017-12-25 2018-06-22 大国创新智能科技(东莞)有限公司 Information hiding, extracting method and system based on big data and neural network
US10275826B1 (en) * 2008-05-16 2019-04-30 The Pnc Financial Services Group, Inc. Hidden money folders

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10275826B1 (en) * 2008-05-16 2019-04-30 The Pnc Financial Services Group, Inc. Hidden money folders
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data
CN108197488A (en) * 2017-12-25 2018-06-22 大国创新智能科技(东莞)有限公司 Information hiding, extracting method and system based on big data and neural network

Also Published As

Publication number Publication date
CN110188557B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN108197488B (en) Information hiding and extracting method and system based on big data and neural network
CN104008521B (en) LSB based on gray level co-occurrence matrixes statistical nature replaces steganalysis method
Kumar et al. High capacity reversible data hiding based on histogram shifting for medical images
CN103414840A (en) Data hiding method based on image set
Atoum A comparative study of combination with different LSB techniques in MP3 steganography
CN110188557A (en) Information concealing method and robot system based on big data search
Alia et al. An improved video steganography: using random key-dependent
CN107612678A (en) A kind of steganography method based on network topology structure figure
Por et al. StegCure: a comprehensive steganographic tool using enhanced LSB scheme
CN110175470A (en) Information concealing method and robot system based on big data and deep learning
CN110135181B (en) Information hiding method and robot based on big data search and Fourier transform
Basak et al. Steganography in grey scale animated GIF using hash based pixel value differencing
CN110188554A (en) Information concealing method and robot system based on big data and functional transformation
Thanekar et al. OCTA (STAR) PVD: A different approach of image steganopgraphy
CN111723346B (en) Visual secret sharing method based on 'bamboo joint worm' reference matrix authentication
Tulasidasu et al. Steganography based secret image sharing using block division technique
CN109214163B (en) Identity authentication method and device
CN110188569B (en) Information hiding method based on big data and Fourier transform and robot system
Marella et al. Development of a facial feature based image steganography technology
CN110175463A (en) Information concealing method and robot system based on big data search and functional transformation
CN107369186B (en) A kind of information concealing method and device
CN110162990A (en) Information concealing method and robot system based on big data and position
CN110188561A (en) Information concealing method and robot system based on big data and noise
CN110162991A (en) Information concealing method and robot system based on big data insertion and heterogeneous types
Madhi et al. Pixel steganography method for grayscale image steganography on colour images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant