CN110188560A - Information concealing method and robot system based on big data insertion and local behavior - Google Patents
Information concealing method and robot system based on big data insertion and local behavior Download PDFInfo
- Publication number
- CN110188560A CN110188560A CN201910458087.XA CN201910458087A CN110188560A CN 110188560 A CN110188560 A CN 110188560A CN 201910458087 A CN201910458087 A CN 201910458087A CN 110188560 A CN110188560 A CN 110188560A
- Authority
- CN
- China
- Prior art keywords
- information
- secret
- big data
- hiding
- secret information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000003780 insertion Methods 0.000 title claims abstract description 13
- 230000037431 insertion Effects 0.000 title claims abstract description 13
- 238000000605 extraction Methods 0.000 claims description 11
- 230000015572 biosynthetic process Effects 0.000 claims description 10
- 238000003786 synthesis reaction Methods 0.000 claims description 10
- 238000000354 decomposition reaction Methods 0.000 claims description 9
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
Information concealing method and robot system based on big data insertion and local behavior, comprising: secret information is decomposed into multiple first information, by multiple first positions of first information insertion big data, first position is sent to the user with permission.The above method and system can hide the secret information of big data quantity, and hide the highly-safe of rear secret information, and easily extract.
Description
Technical field
The present invention relates to information technology fields, more particularly to a kind of information concealing method and robot system.
Background technique
Information Hiding Techniques (Information Hiding), that is, Information hiding will protect letter in future network
Breath plays an important role in terms of not being damaged, and Information hiding is confidential information to be hidden in bulk information not allow opponent to realize
A kind of method.The method of Information hiding mainly has Steganography, digital watermark technology, visual password, latent channel, concealment agreement etc..
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: existing Information hiding
Technology, since the data volume of cover object and camouflaging object is limited, analysis mining goes out from cover object and camouflaging object
The complexity and difficulty of secret information are limited, so that secret information is possible to be cracked, lead to the safety of Information hiding
It is not high.Simultaneously because the data volume of cover object and camouflaging object is limited, large batch of secret information can not be hidden.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
Based on this, it is necessary to for the defect or deficiency of Information hiding in the prior art, provide based on big data insertion and
The information concealing method and robot system of local behavior, data volume to solve Information hiding in the prior art is limited, easy quilt
The shortcomings that cracking.
In a first aspect, the embodiment of the present invention provides a kind of information concealing method, which comprises
Decomposition step: secret information is decomposed into multiple first information;
Inserting step: by multiple first positions of first information insertion big data.
Preferably, after the inserting step further include:
Sending step: the first position is sent to user.
Preferably, the decomposition step includes:
Function obtaining step: preset function f is obtained;
Random generation step: generating the k-1 first information at random, and wherein k is greater than 1;
Function calculates step: the secret information and k-1 first information are substituted into formula: the secret information=
F (the k first information), calculates k-th of first information;
First information step: using the k first information as the multiple first information.
Second aspect, the embodiment of the present invention provide a kind of information extracting method, which comprises
Extraction step: multiple first information are extracted from multiple first positions of big data;
Synthesis step: multiple first information are synthesized into secret information.
Preferably, before the extraction step further include:
Receive step: receiving multiple positions as the first position.
Preferably, the synthesis step specifically includes:
Secret information calculates: the k first information being substituted into formula: secret information=f (k first letters
Breath), calculate the secret information.
The third aspect, the embodiment of the present invention provide a kind of Information hiding and extracting method, and the method includes the letters
Cease hidden method and the information extracting method.
Fourth aspect, the embodiment of the present invention provide a kind of information concealing method, the system comprises:
Decomposing module: secret information is decomposed into multiple first information;
It is inserted into module: by multiple first positions of first information insertion big data.
Preferably, after the insertion module further include:
Sending module: the first position is sent to user.
Preferably, the decomposing module includes:
Function obtains module: obtaining preset function f;
Random generating module: generating the k-1 first information at random, and wherein k is greater than 1;
Function computation module: the secret information and k-1 first information are substituted into formula: the secret information=
F (the k first information), calculates k-th of first information;
First information module: using the k first information as the multiple first information.
5th aspect, the embodiment of the present invention provide a kind of information extracting system, the system comprises:
Extraction module: multiple first information are extracted from multiple first positions of big data;
Synthesis module: multiple first information are synthesized into secret information.
Preferably, before the extraction module further include:
Receiving module: receive multiple positions as the first position.
Preferably, the synthesis module specifically includes:
Secret information calculates: the k first information being substituted into formula: secret information=f (k first letters
Breath), calculate the secret information.
6th aspect, the embodiment of the present invention provide a kind of Information hiding and extracting system, and the system comprises the letters
Cease the system of hiding and the information extracting system.
7th aspect, the embodiment of the present invention provides a kind of robot system, is each configured in the robot described
Information hiding system and the information extracting system.
The embodiment of many aspects of the present invention the utility model has the advantages that
1, secret information is decomposed into multiple first information, secret information can be made to be hidden in multiple first letters in this way
In breath, so that the user of permission can not identify whether the first information is secret information, to can not find and obtain
Take secret information.The first information is inserted into big data, can the first information be hidden into big data, improves the first letter
The safety of breath, to improve the safety and hiding depth of secret information indirectly.
Even if 2, the data volume of secret information is very big, but the information content very little of first position, to reduce transmission when institute
Amount of storage needed for the traffic and user terminal that need.
3, the decomposition of secret information is carried out by function f, so that between each first information and secret information that decompose no longer
Simple cutting relationship, especially when f is a kind of nonlinear function, can not see at all from the first information with it is secret
Confidential information has any relationship, so that secret information obtains fabulous pole a possibility that hiding, can crack in the first information
It is small.
Information concealing method and robot system provided in an embodiment of the present invention based on big data insertion and local behavior,
It include: that secret information is decomposed into multiple first information, by multiple first positions of first information insertion big data, by first
It sets and is sent to the user with permission.The above method and system can hide the secret information of big data quantity, and hide rear secret
Information it is highly-safe, and easily extract.
Detailed description of the invention
Fig. 1 is the flow chart for the information concealing method that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the information extracting method that the embodiment of the present invention 1 provides;
Fig. 3 is the flow chart for the Information hiding and extracting method that the embodiment of the present invention 1 provides;
Fig. 4 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 5 is the functional block diagram for the information hiding system that the embodiment of the present invention 3 provides;
Fig. 6 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 7 is the functional block diagram of Information hiding and extraction machine people's system that the embodiment of the present invention 5 provides.
Specific embodiment
Below with reference to embodiment of the present invention, technical solution in the embodiment of the present invention is described in detail.It should
Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Embodiment 1, a kind of information concealing method and corresponding information extracting method.
A kind of information concealing method includes decomposition step S110, inserting step S120, sending step S130, as shown in Figure 1.
Decomposition step S110: receive to need hiding secret information, secret information is decomposed into multiple first information.It will be secret
Confidential information is decomposed into multiple first information, secret information can be made to be hidden in multiple first information in this way, so that
There is no the user of permission that can not identify whether the first information is secret information, so that secret information can not be found and be obtained.
Inserting step S120: by multiple first positions of first information insertion big data.The first information is inserted into big data,
Can the first information be hidden into big data, improve the safety of the first information, to improve secret indirectly
The safety of information and hiding depth.First position refers to the storage location of the first information, can be quasi- by first position
The first information really is navigated to, the first information can be extracted from first position.
Sending step S130: first position is sent to the user with permission.Even if the data volume of secret information is very big,
But the information content very little of first position, thus amount of storage needed for the traffic and user terminal required when reducing transmission.
A kind of information extracting method includes receiving step S210, extraction step S220, synthesis step S230, as shown in Figure 2.
Receive step S210: receiving multiple first positions.
Extraction step S220: multiple first information are extracted from multiple first positions of big data;
Synthesis step S230: multiple first information are synthesized into secret information.
Information concealing method can be matched with corresponding information extracting method, as shown in Figure 3.
Embodiment 2, preferred information concealing method and corresponding information extracting method.
S110 in preferred information concealing method specifically includes S111 to S114.
Function obtaining step S111: preset function f is obtained;
Random generation step S112: the k-1 first information is generated at random, wherein the k-1 first information is different between any two
It is fixed identical, that is to say, not necessarily identical between each first information in this k-1 first information.
Function calculates step S113: secret information and the k-1 first information are substituted into formula secret information=f (k first
Information) calculate k-th of first information;Formula " secret information=f (the k first information) " namely " secret information=f (k-1
A first information, k-th of first information) " because secret information and the k-1 first information are it is known that pass through formula " secret
Information=f (the k-1 first information, k-th of first information) " can calculate k-th of first information.
First information step S114: using the k first information as the multiple first information.
The decomposition of secret information is carried out by function f, so that being no longer between each first information and secret information that decompose
Simple cutting relationship can not seeing at all from the first information and secret especially when f is a kind of nonlinear function
Information has any relationship, so as to obtain fabulous a possibility that hiding, capable of cracking in the first information minimum for secret information.
S230 in preferred information extracting method specifically includes secret information and calculates step S231.
Secret information calculates step S231: the k first information is substituted into formula: secret information=f (the k first information) is counted
Calculate secret information.Secret information=f (the k first information), it is, secret information=f (the k-1 first information, k-th
The first information).Because the k first information is it is known that can calculate secret by " secret information=f (the k first information) "
Information.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can
With referring to the implementation of preceding method, overlaps will not be repeated.
Embodiment 3, a kind of information hiding system and corresponding information extracting system.
A kind of information concealing method includes decomposition step S110, inserting step S120, sending step S130, as shown in Figure 4.
A kind of information extracting method includes receiving step S210, extraction step S220, synthesis step S230, as shown in Figure 5.
Information hiding system can be matched with corresponding information extracting system, as shown in Figure 6.
Embodiment 4, a kind of preferred information hiding system and corresponding information extracting system.
In a kind of preferred information hiding system, S110 specifically includes S111 to S114.
In a kind of preferred information extracting system, S230 specifically includes secret information and calculates S231.
The step in the method in the module and embodiment 1,2 in system in embodiment 3,4 corresponds, beneficial effect
Also it corresponds, the particular content of each module in system repeats no more, and the beneficial effect of system also repeats no more.
Preferably, information extracting method is matched with information concealing method.Information extracting system and information hiding system
Also it matches.
Embodiment 5, a kind of Information hiding and extracting robot system, as shown in fig. 7, system, Information hiding and extracting robot
System is made of information hiding system and information extracting system.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory ROM) or random access memory (Random Access
Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (10)
1. a kind of information concealing method, which is characterized in that the described method includes:
Decomposition step: secret information is decomposed into multiple first information;
Inserting step: by multiple first positions of first information insertion big data.
2. information concealing method according to claim 1, which is characterized in that after the inserting step further include:
Sending step: the first position is sent to user.
3. information concealing method according to claim 2, which is characterized in that the decomposition step includes:
Function obtaining step: preset function f is obtained;
Random generation step: generating the k-1 first information at random, and wherein k is greater than 1;
Function calculates step: the secret information and the k-1 first information are substituted into formula: the secret information=f (k
A first information), calculate k-th of first information;
First information step: using the k first information as the multiple first information.
4. a kind of information extracting method, which is characterized in that the described method includes:
Extraction step: multiple first information are extracted from multiple first positions of big data;
Synthesis step: multiple first information are synthesized into secret information.
5. information extracting method according to claim 4, which is characterized in that
Before the extraction step further include:
Receive step: receiving multiple positions as the first position.
6. information extracting method according to claim 5, which is characterized in that the synthesis step specifically includes:
Secret information calculates: the k first information are substituted into formula: the secret information=f (the k first information),
Calculate the secret information.
7. a kind of Information hiding and extracting method, which is characterized in that the method includes the described in any item letters of claim 1-3
Cease hidden method and the described in any item information extracting methods of claim 4-6.
8. a kind of information hiding system, which is characterized in that the system comprises:
Decomposing module: secret information is decomposed into multiple first information;
It is inserted into module: by multiple first positions of first information insertion big data.
9. a kind of information extracting system, which is characterized in that the system comprises:
Extraction module: multiple first information are extracted from multiple first positions of big data;
Synthesis module: multiple first information are synthesized into secret information.
10. a kind of robot system, which is characterized in that be each configured with information as claimed in claim 8 in the robot
The system of hiding and information extracting system as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458087.XA CN110188560A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and local behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458087.XA CN110188560A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and local behavior |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110188560A true CN110188560A (en) | 2019-08-30 |
Family
ID=67718634
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910458087.XA Pending CN110188560A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and local behavior |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188560A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7628320B2 (en) * | 1999-05-19 | 2009-12-08 | Digimarc Corporation | Methods and systems for interacting with physical objects |
CN102843372A (en) * | 2012-08-28 | 2012-12-26 | 西安交通大学 | Order-preserving encryption method based on random interval partition |
KR20130124806A (en) * | 2012-05-07 | 2013-11-15 | 김현재 | Method for processing worry using social networking service and apparatus for the same |
CN103778590A (en) * | 2012-10-24 | 2014-05-07 | 航天信息股份有限公司 | Method and device for utilizing digital image to store and transmit information |
CN107180203A (en) * | 2017-06-28 | 2017-09-19 | 维沃移动通信有限公司 | Image encryption, decryption method, mobile terminal and computer-readable recording medium |
CN107786555A (en) * | 2017-10-24 | 2018-03-09 | 大国创新智能科技(东莞)有限公司 | Information steganography method and system, information extracting method and system based on big data |
CN109698812A (en) * | 2017-10-23 | 2019-04-30 | 中国电信股份有限公司 | Information ciphering method and device, information decryption method and device and security system |
-
2019
- 2019-05-29 CN CN201910458087.XA patent/CN110188560A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7628320B2 (en) * | 1999-05-19 | 2009-12-08 | Digimarc Corporation | Methods and systems for interacting with physical objects |
KR20130124806A (en) * | 2012-05-07 | 2013-11-15 | 김현재 | Method for processing worry using social networking service and apparatus for the same |
CN102843372A (en) * | 2012-08-28 | 2012-12-26 | 西安交通大学 | Order-preserving encryption method based on random interval partition |
CN103778590A (en) * | 2012-10-24 | 2014-05-07 | 航天信息股份有限公司 | Method and device for utilizing digital image to store and transmit information |
CN107180203A (en) * | 2017-06-28 | 2017-09-19 | 维沃移动通信有限公司 | Image encryption, decryption method, mobile terminal and computer-readable recording medium |
CN109698812A (en) * | 2017-10-23 | 2019-04-30 | 中国电信股份有限公司 | Information ciphering method and device, information decryption method and device and security system |
CN107786555A (en) * | 2017-10-24 | 2018-03-09 | 大国创新智能科技(东莞)有限公司 | Information steganography method and system, information extracting method and system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8984292B2 (en) | Keyed human interactive proof players | |
CN103218397B (en) | A kind of social networks method for secret protection based on non-directed graph amendment | |
CN106487801B (en) | Information Authentication method and device based on block chain | |
CN108197488B (en) | Information hiding and extracting method and system based on big data and neural network | |
CN102999723B (en) | The data defence component generation method that Initiative Defense XSS attacks and device thereof | |
CN103595696B (en) | The method and device that a kind of File Ownership proves | |
CN106611136A (en) | Data tampering verification method in cloud storage | |
CN105809066B (en) | The storage method and terminal of encryption data | |
Li et al. | Reversible data hiding in block compressed sensing images | |
Wendzel et al. | A generic taxonomy for steganography methods | |
CN110188560A (en) | Information concealing method and robot system based on big data insertion and local behavior | |
Mahana et al. | Image steganography: Analysis & Evaluation of secret communication | |
Knockel et al. | (Can't) Picture This 2: An Analysis of WeChat’s Realtime Image Filtering in Chats | |
CN110175470A (en) | Information concealing method and robot system based on big data and deep learning | |
CN114567676B (en) | Private based on multistage encryption File container entry concealing method | |
CN110188552A (en) | Information concealing method and robot system based on big data and difference | |
CN109815715A (en) | A kind of data ciphering method and relevant apparatus | |
Lysenko et al. | Applying of Kutter-Jordan-Bossen steganographic algorithm in video sequences | |
CN110162990A (en) | Information concealing method and robot system based on big data and position | |
CN110188557A (en) | Information concealing method and robot system based on big data search | |
CN110188554A (en) | Information concealing method and robot system based on big data and functional transformation | |
CN110188561A (en) | Information concealing method and robot system based on big data and noise | |
CN110162991A (en) | Information concealing method and robot system based on big data insertion and heterogeneous types | |
CN110191111A (en) | The information concealing method and robot system verified based on big data and function | |
CN110135181B (en) | Information hiding method and robot based on big data search and Fourier transform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |