CN110188560A - Information concealing method and robot system based on big data insertion and local behavior - Google Patents

Information concealing method and robot system based on big data insertion and local behavior Download PDF

Info

Publication number
CN110188560A
CN110188560A CN201910458087.XA CN201910458087A CN110188560A CN 110188560 A CN110188560 A CN 110188560A CN 201910458087 A CN201910458087 A CN 201910458087A CN 110188560 A CN110188560 A CN 110188560A
Authority
CN
China
Prior art keywords
information
secret
big data
hiding
secret information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910458087.XA
Other languages
Chinese (zh)
Inventor
朱定局
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Original Assignee
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Power Innovative Intelligent Technology (dongguan) Co Ltd, South China Normal University filed Critical Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Priority to CN201910458087.XA priority Critical patent/CN110188560A/en
Publication of CN110188560A publication Critical patent/CN110188560A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

Information concealing method and robot system based on big data insertion and local behavior, comprising: secret information is decomposed into multiple first information, by multiple first positions of first information insertion big data, first position is sent to the user with permission.The above method and system can hide the secret information of big data quantity, and hide the highly-safe of rear secret information, and easily extract.

Description

Information concealing method and robot system based on big data insertion and local behavior
Technical field
The present invention relates to information technology fields, more particularly to a kind of information concealing method and robot system.
Background technique
Information Hiding Techniques (Information Hiding), that is, Information hiding will protect letter in future network Breath plays an important role in terms of not being damaged, and Information hiding is confidential information to be hidden in bulk information not allow opponent to realize A kind of method.The method of Information hiding mainly has Steganography, digital watermark technology, visual password, latent channel, concealment agreement etc..
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: existing Information hiding Technology, since the data volume of cover object and camouflaging object is limited, analysis mining goes out from cover object and camouflaging object The complexity and difficulty of secret information are limited, so that secret information is possible to be cracked, lead to the safety of Information hiding It is not high.Simultaneously because the data volume of cover object and camouflaging object is limited, large batch of secret information can not be hidden.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
Based on this, it is necessary to for the defect or deficiency of Information hiding in the prior art, provide based on big data insertion and The information concealing method and robot system of local behavior, data volume to solve Information hiding in the prior art is limited, easy quilt The shortcomings that cracking.
In a first aspect, the embodiment of the present invention provides a kind of information concealing method, which comprises
Decomposition step: secret information is decomposed into multiple first information;
Inserting step: by multiple first positions of first information insertion big data.
Preferably, after the inserting step further include:
Sending step: the first position is sent to user.
Preferably, the decomposition step includes:
Function obtaining step: preset function f is obtained;
Random generation step: generating the k-1 first information at random, and wherein k is greater than 1;
Function calculates step: the secret information and k-1 first information are substituted into formula: the secret information= F (the k first information), calculates k-th of first information;
First information step: using the k first information as the multiple first information.
Second aspect, the embodiment of the present invention provide a kind of information extracting method, which comprises
Extraction step: multiple first information are extracted from multiple first positions of big data;
Synthesis step: multiple first information are synthesized into secret information.
Preferably, before the extraction step further include:
Receive step: receiving multiple positions as the first position.
Preferably, the synthesis step specifically includes:
Secret information calculates: the k first information being substituted into formula: secret information=f (k first letters Breath), calculate the secret information.
The third aspect, the embodiment of the present invention provide a kind of Information hiding and extracting method, and the method includes the letters Cease hidden method and the information extracting method.
Fourth aspect, the embodiment of the present invention provide a kind of information concealing method, the system comprises:
Decomposing module: secret information is decomposed into multiple first information;
It is inserted into module: by multiple first positions of first information insertion big data.
Preferably, after the insertion module further include:
Sending module: the first position is sent to user.
Preferably, the decomposing module includes:
Function obtains module: obtaining preset function f;
Random generating module: generating the k-1 first information at random, and wherein k is greater than 1;
Function computation module: the secret information and k-1 first information are substituted into formula: the secret information= F (the k first information), calculates k-th of first information;
First information module: using the k first information as the multiple first information.
5th aspect, the embodiment of the present invention provide a kind of information extracting system, the system comprises:
Extraction module: multiple first information are extracted from multiple first positions of big data;
Synthesis module: multiple first information are synthesized into secret information.
Preferably, before the extraction module further include:
Receiving module: receive multiple positions as the first position.
Preferably, the synthesis module specifically includes:
Secret information calculates: the k first information being substituted into formula: secret information=f (k first letters Breath), calculate the secret information.
6th aspect, the embodiment of the present invention provide a kind of Information hiding and extracting system, and the system comprises the letters Cease the system of hiding and the information extracting system.
7th aspect, the embodiment of the present invention provides a kind of robot system, is each configured in the robot described Information hiding system and the information extracting system.
The embodiment of many aspects of the present invention the utility model has the advantages that
1, secret information is decomposed into multiple first information, secret information can be made to be hidden in multiple first letters in this way In breath, so that the user of permission can not identify whether the first information is secret information, to can not find and obtain Take secret information.The first information is inserted into big data, can the first information be hidden into big data, improves the first letter The safety of breath, to improve the safety and hiding depth of secret information indirectly.
Even if 2, the data volume of secret information is very big, but the information content very little of first position, to reduce transmission when institute Amount of storage needed for the traffic and user terminal that need.
3, the decomposition of secret information is carried out by function f, so that between each first information and secret information that decompose no longer Simple cutting relationship, especially when f is a kind of nonlinear function, can not see at all from the first information with it is secret Confidential information has any relationship, so that secret information obtains fabulous pole a possibility that hiding, can crack in the first information It is small.
Information concealing method and robot system provided in an embodiment of the present invention based on big data insertion and local behavior, It include: that secret information is decomposed into multiple first information, by multiple first positions of first information insertion big data, by first It sets and is sent to the user with permission.The above method and system can hide the secret information of big data quantity, and hide rear secret Information it is highly-safe, and easily extract.
Detailed description of the invention
Fig. 1 is the flow chart for the information concealing method that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the information extracting method that the embodiment of the present invention 1 provides;
Fig. 3 is the flow chart for the Information hiding and extracting method that the embodiment of the present invention 1 provides;
Fig. 4 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 5 is the functional block diagram for the information hiding system that the embodiment of the present invention 3 provides;
Fig. 6 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 7 is the functional block diagram of Information hiding and extraction machine people's system that the embodiment of the present invention 5 provides.
Specific embodiment
Below with reference to embodiment of the present invention, technical solution in the embodiment of the present invention is described in detail.It should Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Embodiment 1, a kind of information concealing method and corresponding information extracting method.
A kind of information concealing method includes decomposition step S110, inserting step S120, sending step S130, as shown in Figure 1.
Decomposition step S110: receive to need hiding secret information, secret information is decomposed into multiple first information.It will be secret Confidential information is decomposed into multiple first information, secret information can be made to be hidden in multiple first information in this way, so that There is no the user of permission that can not identify whether the first information is secret information, so that secret information can not be found and be obtained.
Inserting step S120: by multiple first positions of first information insertion big data.The first information is inserted into big data, Can the first information be hidden into big data, improve the safety of the first information, to improve secret indirectly The safety of information and hiding depth.First position refers to the storage location of the first information, can be quasi- by first position The first information really is navigated to, the first information can be extracted from first position.
Sending step S130: first position is sent to the user with permission.Even if the data volume of secret information is very big, But the information content very little of first position, thus amount of storage needed for the traffic and user terminal required when reducing transmission.
A kind of information extracting method includes receiving step S210, extraction step S220, synthesis step S230, as shown in Figure 2.
Receive step S210: receiving multiple first positions.
Extraction step S220: multiple first information are extracted from multiple first positions of big data;
Synthesis step S230: multiple first information are synthesized into secret information.
Information concealing method can be matched with corresponding information extracting method, as shown in Figure 3.
Embodiment 2, preferred information concealing method and corresponding information extracting method.
S110 in preferred information concealing method specifically includes S111 to S114.
Function obtaining step S111: preset function f is obtained;
Random generation step S112: the k-1 first information is generated at random, wherein the k-1 first information is different between any two It is fixed identical, that is to say, not necessarily identical between each first information in this k-1 first information.
Function calculates step S113: secret information and the k-1 first information are substituted into formula secret information=f (k first Information) calculate k-th of first information;Formula " secret information=f (the k first information) " namely " secret information=f (k-1 A first information, k-th of first information) " because secret information and the k-1 first information are it is known that pass through formula " secret Information=f (the k-1 first information, k-th of first information) " can calculate k-th of first information.
First information step S114: using the k first information as the multiple first information.
The decomposition of secret information is carried out by function f, so that being no longer between each first information and secret information that decompose Simple cutting relationship can not seeing at all from the first information and secret especially when f is a kind of nonlinear function Information has any relationship, so as to obtain fabulous a possibility that hiding, capable of cracking in the first information minimum for secret information.
S230 in preferred information extracting method specifically includes secret information and calculates step S231.
Secret information calculates step S231: the k first information is substituted into formula: secret information=f (the k first information) is counted Calculate secret information.Secret information=f (the k first information), it is, secret information=f (the k-1 first information, k-th The first information).Because the k first information is it is known that can calculate secret by " secret information=f (the k first information) " Information.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can With referring to the implementation of preceding method, overlaps will not be repeated.
Embodiment 3, a kind of information hiding system and corresponding information extracting system.
A kind of information concealing method includes decomposition step S110, inserting step S120, sending step S130, as shown in Figure 4.
A kind of information extracting method includes receiving step S210, extraction step S220, synthesis step S230, as shown in Figure 5.
Information hiding system can be matched with corresponding information extracting system, as shown in Figure 6.
Embodiment 4, a kind of preferred information hiding system and corresponding information extracting system.
In a kind of preferred information hiding system, S110 specifically includes S111 to S114.
In a kind of preferred information extracting system, S230 specifically includes secret information and calculates S231.
The step in the method in the module and embodiment 1,2 in system in embodiment 3,4 corresponds, beneficial effect Also it corresponds, the particular content of each module in system repeats no more, and the beneficial effect of system also repeats no more.
Preferably, information extracting method is matched with information concealing method.Information extracting system and information hiding system Also it matches.
Embodiment 5, a kind of Information hiding and extracting robot system, as shown in fig. 7, system, Information hiding and extracting robot System is made of information hiding system and information extracting system.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory ROM) or random access memory (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of information concealing method, which is characterized in that the described method includes:
Decomposition step: secret information is decomposed into multiple first information;
Inserting step: by multiple first positions of first information insertion big data.
2. information concealing method according to claim 1, which is characterized in that after the inserting step further include:
Sending step: the first position is sent to user.
3. information concealing method according to claim 2, which is characterized in that the decomposition step includes:
Function obtaining step: preset function f is obtained;
Random generation step: generating the k-1 first information at random, and wherein k is greater than 1;
Function calculates step: the secret information and the k-1 first information are substituted into formula: the secret information=f (k A first information), calculate k-th of first information;
First information step: using the k first information as the multiple first information.
4. a kind of information extracting method, which is characterized in that the described method includes:
Extraction step: multiple first information are extracted from multiple first positions of big data;
Synthesis step: multiple first information are synthesized into secret information.
5. information extracting method according to claim 4, which is characterized in that
Before the extraction step further include:
Receive step: receiving multiple positions as the first position.
6. information extracting method according to claim 5, which is characterized in that the synthesis step specifically includes:
Secret information calculates: the k first information are substituted into formula: the secret information=f (the k first information), Calculate the secret information.
7. a kind of Information hiding and extracting method, which is characterized in that the method includes the described in any item letters of claim 1-3 Cease hidden method and the described in any item information extracting methods of claim 4-6.
8. a kind of information hiding system, which is characterized in that the system comprises:
Decomposing module: secret information is decomposed into multiple first information;
It is inserted into module: by multiple first positions of first information insertion big data.
9. a kind of information extracting system, which is characterized in that the system comprises:
Extraction module: multiple first information are extracted from multiple first positions of big data;
Synthesis module: multiple first information are synthesized into secret information.
10. a kind of robot system, which is characterized in that be each configured with information as claimed in claim 8 in the robot The system of hiding and information extracting system as claimed in claim 9.
CN201910458087.XA 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and local behavior Pending CN110188560A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910458087.XA CN110188560A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and local behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910458087.XA CN110188560A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and local behavior

Publications (1)

Publication Number Publication Date
CN110188560A true CN110188560A (en) 2019-08-30

Family

ID=67718634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910458087.XA Pending CN110188560A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and local behavior

Country Status (1)

Country Link
CN (1) CN110188560A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7628320B2 (en) * 1999-05-19 2009-12-08 Digimarc Corporation Methods and systems for interacting with physical objects
CN102843372A (en) * 2012-08-28 2012-12-26 西安交通大学 Order-preserving encryption method based on random interval partition
KR20130124806A (en) * 2012-05-07 2013-11-15 김현재 Method for processing worry using social networking service and apparatus for the same
CN103778590A (en) * 2012-10-24 2014-05-07 航天信息股份有限公司 Method and device for utilizing digital image to store and transmit information
CN107180203A (en) * 2017-06-28 2017-09-19 维沃移动通信有限公司 Image encryption, decryption method, mobile terminal and computer-readable recording medium
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data
CN109698812A (en) * 2017-10-23 2019-04-30 中国电信股份有限公司 Information ciphering method and device, information decryption method and device and security system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7628320B2 (en) * 1999-05-19 2009-12-08 Digimarc Corporation Methods and systems for interacting with physical objects
KR20130124806A (en) * 2012-05-07 2013-11-15 김현재 Method for processing worry using social networking service and apparatus for the same
CN102843372A (en) * 2012-08-28 2012-12-26 西安交通大学 Order-preserving encryption method based on random interval partition
CN103778590A (en) * 2012-10-24 2014-05-07 航天信息股份有限公司 Method and device for utilizing digital image to store and transmit information
CN107180203A (en) * 2017-06-28 2017-09-19 维沃移动通信有限公司 Image encryption, decryption method, mobile terminal and computer-readable recording medium
CN109698812A (en) * 2017-10-23 2019-04-30 中国电信股份有限公司 Information ciphering method and device, information decryption method and device and security system
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data

Similar Documents

Publication Publication Date Title
US8984292B2 (en) Keyed human interactive proof players
CN103218397B (en) A kind of social networks method for secret protection based on non-directed graph amendment
CN106487801B (en) Information Authentication method and device based on block chain
CN108197488B (en) Information hiding and extracting method and system based on big data and neural network
CN102999723B (en) The data defence component generation method that Initiative Defense XSS attacks and device thereof
CN103595696B (en) The method and device that a kind of File Ownership proves
CN106611136A (en) Data tampering verification method in cloud storage
CN105809066B (en) The storage method and terminal of encryption data
Li et al. Reversible data hiding in block compressed sensing images
Wendzel et al. A generic taxonomy for steganography methods
CN110188560A (en) Information concealing method and robot system based on big data insertion and local behavior
Mahana et al. Image steganography: Analysis & Evaluation of secret communication
Knockel et al. (Can't) Picture This 2: An Analysis of WeChat’s Realtime Image Filtering in Chats
CN110175470A (en) Information concealing method and robot system based on big data and deep learning
CN114567676B (en) Private based on multistage encryption File container entry concealing method
CN110188552A (en) Information concealing method and robot system based on big data and difference
CN109815715A (en) A kind of data ciphering method and relevant apparatus
Lysenko et al. Applying of Kutter-Jordan-Bossen steganographic algorithm in video sequences
CN110162990A (en) Information concealing method and robot system based on big data and position
CN110188557A (en) Information concealing method and robot system based on big data search
CN110188554A (en) Information concealing method and robot system based on big data and functional transformation
CN110188561A (en) Information concealing method and robot system based on big data and noise
CN110162991A (en) Information concealing method and robot system based on big data insertion and heterogeneous types
CN110191111A (en) The information concealing method and robot system verified based on big data and function
CN110135181B (en) Information hiding method and robot based on big data search and Fourier transform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination