CN105427234A - Sharing method and sharing system for WIFI password - Google Patents

Sharing method and sharing system for WIFI password Download PDF

Info

Publication number
CN105427234A
CN105427234A CN201610049098.9A CN201610049098A CN105427234A CN 105427234 A CN105427234 A CN 105427234A CN 201610049098 A CN201610049098 A CN 201610049098A CN 105427234 A CN105427234 A CN 105427234A
Authority
CN
China
Prior art keywords
password
watermark
picture
block
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610049098.9A
Other languages
Chinese (zh)
Inventor
喻海中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610049098.9A priority Critical patent/CN105427234A/en
Publication of CN105427234A publication Critical patent/CN105427234A/en
Priority to PCT/CN2016/103893 priority patent/WO2017128788A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10004Still image; Photographic image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20021Dividing image into blocks, subimages or windows
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20052Discrete cosine transform [DCT]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a sharing method for a WIFI password. The method comprises: step S10, according to an acquired preshared password, generating a password watermark picture corresponding to the preshared password; step S20, according to an acquired carrier picture, embedding the password watermark picture into the carrier picture, and then forming a watermark carrier picture; step S30, sharing and transmitting the watermark carrier picture to a shared terminal; step S40, according to the received watermark carrier picture, extracting password watermark information in the watermark carrier picture; step S60, according to the extracted password watermark information, recognizing a shared password in the password watermark information. The preshared password is embedded into the picture by using a watermark algorithm, thus not only positively controlling sharing time and a sharing object, bus also improving confidentiality of the WIFI password in the sharing process.

Description

A kind of sharing method of WIFI password and share system
Technical field
The present invention relates to password and share field, particularly relate to sharing method and the share system of WIFI password.
Background technology
The classic method sharing WIFI password is oral account, writtenly informs, problem that this WIFI password sharing method easily causes that password leaks etc.In recent years, in order to prevent WIFI password from occurring leaking in the process shared, by the NFC password tab of the WIFI password write network equipment.Being shared user terminal in the process of NFC password tab, from NFC password tab, read password.But this WIFI password is shared mode and be there is its share time uncontrollable, shares the defects such as object, thus reduces the protection of WIFI password.
Summary of the invention
Technical scheme provided by the invention is as follows:
The sharing method of a kind of WIFI password provided by the invention, comprising: step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; Described password watermark picture, according to the carrier picture got, is embedded into after on carrier picture by step S20, forms watermark carrier picture; Step S30 shares the described watermark carrier picture of transmission to being shared in terminal; Step S40, according to the watermark carrier picture received, extracts the password watermark information in described watermark carrier picture; Step S60, according to the password watermark information extracted, identifies and is shared password in described password watermark information.
Further, also comprised before described step S10: this carrier picture segmentation, according to the carrier picture obtained, is become the some pieces of carrier picture block do not covered mutually by step S01.
Further, this sharing method also comprises: step S11 is according to the block number of carrier picture block after segmentation, be the some pieces of password watermark picture block do not covered mutually by described password watermark picture segmentation, the block number of described carrier picture block is the even-multiple of the block number of this password watermark picture block.
Further, described step S20 comprises: step S21, according to the carrier picture block after segmentation, carries out territory conversion to every block carrier picture block one by one; Step S22, according to the carrier picture block after the conversion of territory, chooses the watermark location information of embedding one block encryption watermark picture block; Every block encryption watermark picture block, according to the watermark location information chosen, is embedded in one piece of carrier picture block after the conversion of territory by step S23; After step S24 carries out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one, form watermark carrier picture.
Further, described step S40 comprises: described watermark carrier picture segmentation, according to the watermark carrier picture received, is become the some pieces of watermark carrier picture block do not covered mutually by step S41; Step S42, according to the watermark carrier picture block after segmentation, carries out territory conversion to every block watermark carrier picture block one by one; Step S43, according to the watermark carrier picture block after the conversion of territory, extracts the reference information of password watermark picture block embedded location; Step S44, according to the reference information extracted, calculates the password watermark information in every block watermark carrier picture block.
Further, described step S60 comprises: step S61 according to the password watermark information calculated, all password watermark informations that joint account obtains; Step S62, according to the password watermark information after merging, identifies and is shared password in described password watermark information.
Further, this sharing method also comprises: step S70 according to share obtain shared password, judge that this is shared password whether identical with preset password; If step S71 this to be shared password identical with preset password, then shared password and completed checking; If step S72 this to be shared password different from preset password, then being shared password cannot complete checking.
Further, this sharing method also comprises: step S50 judges whether there is attack sign in described password watermark information; If in this password watermark information of step S51 exist attack sign, then described watermark carrier picture share in transmitting procedure under attack; If there is not attack sign in this password watermark information of step S52, then described watermark carrier picture share in transmitting procedure not under attack.
The share system of a kind of WIFI password that this law provides, comprising: watermark generation module, this watermark generation module shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; Watermark embedding module, described password watermark picture, according to the carrier picture got, is embedded into after on carrier picture by this watermark embedding module, forms watermark carrier picture; Share transport module, this shares the watermark carrier picture that transport module receives the output of described watermark embedding module, shares the described watermark carrier picture of transmission to being shared in terminal; Watermark extracting module, shares the watermark carrier picture that transport module sends, extracts the password watermark information in described watermark carrier picture described in this watermark extracting module receives; Password identification module, this password identification module receives the password watermark information that described watermark extracting module exports, and identifies and is shared password in described password watermark information.
Further, this share system also comprises: segmentation module, according to the carrier picture obtained, this carrier picture segmentation is become the some pieces of carrier picture block do not covered mutually.
Compared with prior art, the sharing method of WIFI password provided by the invention, utilizes watermarking algorithm to be embedded in picture by sharing password in advance, both can its share time of ACTIVE CONTROL, share object; The confidentiality improving WIFI password can shared in process again.This sharing method, in the process of watermark embedment or extraction, after picture segmentation is become block, carries out embedding or extracting, improves the reliability of this sharing method.This sharing method also, after identifying and being shared password, verifies the correctness of this password, this sharing method perfect.Whether this sharing method can also receive attack by Timeliness coverage watermark carrier picture in the process of transmission, thus has ensured the security of transmission and prevented password to be tampered; In addition, no matter whether receive attack, all do not affect correctly sharing of password, improve the security of this method, reliability.
Accompanying drawing explanation
Below by clearly understandable mode, accompanying drawings preferred implementation, is further described the above-mentioned characteristic of a kind of sharing method of WIFI password and share system, technical characteristic, advantage and implementation thereof.
Fig. 1 is the schematic flow sheet of the sharing method of a kind of WIFI password of the present invention;
Fig. 2 is the schematic flow sheet of the sharing method of the another kind of WIFI password of the present invention;
Fig. 3 is the part run schematic diagram of the sharing method of WIFI password in the present invention;
Fig. 4 is the part run schematic diagram of the sharing method of WIFI password in the present invention;
Fig. 5 is the schematic flow sheet of the sharing method of another WIFI password of the present invention;
Fig. 6 is the schematic flow sheet of the sharing method of another WIFI password of the present invention;
Fig. 7 is the composition structural representation of the share system of a kind of WIFI password of the present invention;
Fig. 8 is the part composition structural representation of the share system of the another kind of WIFI password of the present invention;
Fig. 9 is the part composition structural representation of the share system of the another kind of WIFI password of the present invention;
Figure 10 is the schematic flow sheet of the present invention's sharing method of another WIFI password again;
Figure 11 is the schematic diagram of watermark picture in the present invention.
Drawing reference numeral illustrates:
10, watermark generation module, 11, segmentation module, 20, watermark embedding module, 21, territory conversion module, 22, position chooses module, 23, territory inverse transform block, 30, transport module is shared, 40, watermark extracting module, 41, segmentation submodule, 42, territory transformation submodule, 43, information extraction modules, 50, judge module, 60, password identification module, 70, password authentication module.
Embodiment
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, contrast accompanying drawing is illustrated the specific embodiment of the present invention below.Apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings, and obtain other embodiment.
For making simplified form, only schematically show part related to the present invention in each figure, they do not represent its practical structures as product.In addition, be convenient to make simplified form understand, there are the parts of identical structure or function in some figure, only schematically depict one of them, or only marked one of them.In this article, " one " not only represents " only this ", also can represent the situation of " more than one ".
Fig. 1 is the schematic flow sheet of the sharing method of a kind of WIFI password of the present invention.As shown in Figure 1, according to one embodiment of present invention, a kind of sharing method of WIFI password, comprising: step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored; Described password watermark picture, according to the carrier picture got, is embedded into after on carrier picture by step S20, forms watermark carrier picture; This carrier picture can be the particular picture that user chooses, and also can be initiatively to share terminal random pictures obtained from certain storehouse; Step S30 shares the described watermark carrier picture of transmission to being shared in terminal; Step S40, according to the watermark carrier picture received, extracts the password watermark information in described watermark carrier picture; Step S60, according to the password watermark information extracted, identifies and is shared password in described password watermark information.
Fig. 2 is the schematic flow sheet of the sharing method of the another kind of WIFI password of the present invention.Fig. 3 is the part run schematic diagram of the sharing method of WIFI password in the present invention.Fig. 4 is the part run schematic diagram of the sharing method of WIFI password in the present invention.As shown in Figure 2, Figure 3, Figure 4, according to another embodiment of the invention, a kind of sharing method of WIFI password, comprising:
This carrier picture segmentation, according to the carrier picture obtained, is become the some pieces of carrier picture block do not covered mutually by step S01; Set in step S01 carrier picture function as: X=f (x, y), the size of carrier picture is M c* N c; Carrier image block function is: X m=f m(x', y'), the size 8*8 of carrier image block; Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored;
Preferably, also comprise the block number of step S11 according to carrier picture block after segmentation, be the some pieces of password watermark picture block do not covered mutually by described password watermark picture segmentation, the block number of described carrier picture block is the even-multiple of the block number of this password watermark picture block; The size of password watermark picture is M in step s 11 m* N m; Password watermark picture block function is: W m=w m(x', y'), the size of password watermark picture block is (M m* 8/M c) * (N m* 8/N c);
Preferably, also comprise step S21 according to the carrier picture block after segmentation, one by one territory conversion is carried out to every block carrier picture block; Carry out territory conversion to every block carrier picture block one by one in the step s 21 to refer to: carry out dct transform to every block carrier picture block one by one; Carrier picture block function after the conversion of territory is: Y m=DCT (X m)=F m(u, v), wherein F m(u, v) is the size at m picture discrete cosine transform rear space frequency (u, v) place;
Preferably, also comprise step S22 according to the carrier picture block after the conversion of territory, choose the watermark location information of embedding one block encryption watermark picture block; In step S22, choose r is from F mthe loading position that (u, v) intermediate frequency is selected, 1≤r≤(M m* 8/M c) * (N m* 8/N c), W br () is password watermark picture block W m=w mthe function of position of (x', y');
Preferably, also comprise step S23 according to the watermark location information chosen, every block encryption watermark picture block is embedded in one piece of carrier picture block after the conversion of territory; According to addition criterion in step S23, according to following formula, be embedded in carrier picture block by password watermark picture block, this formula is: Y r'=aW b(r); Wherein a is intensity factor, then uses Y r' replace the DCT intermediate frequency coefficient after embed watermark;
Preferably, also comprise after step S24 carries out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one, form watermark carrier picture; Carry out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one in step s 24 which to refer to: carry out DCT inverse transformation to the carrier picture block being embedded with password watermark picture block one by one; Watermark carrier picture function is: X'=f'(x', y');
Step S30 shares the described watermark carrier picture of transmission to being shared in terminal;
Preferably, also comprise step S41 according to the watermark carrier picture received, described watermark carrier picture segmentation is become the some pieces of watermark carrier picture block do not covered mutually; The size 8*8 of watermark carrier image block in step S41, watermark carrier picture block function is: X m'=f m' (x', y'); Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Preferably, also comprise step S42 according to the watermark carrier picture block after segmentation, one by one territory conversion is carried out to every block watermark carrier picture block; In step S42, carry out territory conversion to every block watermark carrier picture block one by one refer to: carry out two-dimensional dct transform to every block watermark carrier picture block one by one;
Preferably, also comprise step S43 according to the watermark carrier picture block after the conversion of territory, extract the reference information of password watermark picture block embedded location; The reference information extracting password watermark picture block embedded location in step S43 refers to: the intermediate frequency coefficient extracting password watermark picture block embedded location;
Preferably, also comprise step S44 according to the reference information extracted, calculate the password watermark information in every block watermark carrier picture block; The computing formula calculating the password watermark information in every block watermark carrier picture block in step S44 is: W b(r)=Y r/ a;
Preferably, also comprise step S61 according to the password watermark information calculated, merge all password watermark informations extracted; Preferably, also comprise step S62 according to the password watermark information after merging, identify and shared password in password watermark information.
Fig. 5 is the schematic flow sheet of the sharing method of another WIFI password of the present invention.As shown in Figure 5, according to still a further embodiment, a kind of sharing method of WIFI password, comprising:
This carrier picture segmentation, according to the carrier picture obtained, is become M by step S01 c* N cthe carrier picture block that block does not cover mutually; Set in step S01 carrier picture function as: X=f (x, y), the size of carrier picture is M c* N c; Carrier image block function is: X m=f m(x', y'), the size 8*8 of carrier image block; Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored;
Preferably, also comprising the block number of step S11 according to carrier picture block after segmentation, is M by described password watermark picture segmentation c* N cthe password watermark picture block that block does not cover mutually, the block number of described carrier picture block is the even-multiple of the block number of this password watermark picture block; The size of password watermark picture is M in step s 11 m* N m; Password watermark picture block function is: W m=w m(x', y'), the size of password watermark picture block is (M m* 8/M c) * (N m* 8/N c);
Preferably, also comprise step S21 according to the carrier picture block after segmentation, one by one territory conversion is carried out to every block carrier picture block; Carry out territory conversion to every block carrier picture block one by one in the step s 21 to refer to: carry out dct transform to every block carrier picture block one by one; Carrier picture block function after the conversion of territory is: Y m=DCT (X m)=F m(u, v), wherein F m(u, v) is the size at m picture discrete cosine transform rear space frequency (u, v) place;
Preferably, also comprise step S22 according to the carrier picture block after the conversion of territory, choose the watermark location information of embedding one block encryption watermark picture block; In step S22, choose r is from F mthe loading position that (u, v) intermediate frequency is selected, 1≤r≤(M m* 8/M c) * (N m* 8/N c), W br () is password watermark picture block W m=w mthe function of position of (x', y');
Preferably, also comprise step S23 according to the watermark location information chosen, every block encryption watermark picture block is embedded in one piece of carrier picture block after the conversion of territory; According to addition criterion in step S23, according to following formula, be embedded in carrier picture block by password watermark picture block, this formula is: Y r'=aW b(r); Wherein a is intensity factor, then uses Y r' replace the DCT intermediate frequency coefficient after embed watermark;
Preferably, also comprise after step S24 carries out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one, form watermark carrier picture; Carry out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one in step s 24 which to refer to: carry out DCT inverse transformation to the carrier picture block being embedded with password watermark picture block one by one; Watermark carrier picture function is: X'=f'(x', y');
Step S30 shares the described watermark carrier picture of transmission to being shared in terminal;
Preferably, also comprise step S41 according to the watermark carrier picture received, described watermark carrier picture segmentation is become M c* N cthe watermark carrier picture block that block does not cover mutually; The size 8*8 of watermark carrier image block in step S41, watermark carrier picture block function is: X m'=f m' (x', y'); Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Preferably, also comprise step S42 according to the watermark carrier picture block after segmentation, one by one territory conversion is carried out to every block watermark carrier picture block; In step S42, carry out territory conversion to every block watermark carrier picture block one by one refer to: carry out two-dimensional dct transform to every block watermark carrier picture block one by one;
Preferably, also comprise step S43 according to the watermark carrier picture block after the conversion of territory, extract the reference information of password watermark picture block embedded location; The reference information extracting password watermark picture block embedded location in step S43 refers to: the intermediate frequency coefficient extracting password watermark picture block embedded location;
Preferably, also comprise step S44 according to the reference information extracted, calculate the password watermark information in every block watermark carrier picture block; The computing formula calculating the password watermark information in every block watermark carrier picture block in step S44 is: W b(r)=Y r/ a;
Preferably, also comprise step S61 according to the password watermark information calculated, merge all password watermark informations extracted; Preferably, also comprise step S62 according to the password watermark information after merging, identify and shared password in password watermark information;
Step S70 according to share obtain shared password, judge that this is shared password whether identical with preset password; If step S71 this to be shared password identical with preset password, then shared password and completed checking; If step S72 this to be shared password different from preset password, then being shared password cannot complete checking.
Fig. 6 is the schematic flow sheet of the sharing method of another WIFI password of the present invention.As shown in Figure 6, according to still another embodiment of the invention, a kind of sharing method of WIFI password, comprising:
This carrier picture segmentation, according to the carrier picture obtained, is become the some pieces of carrier picture block do not covered mutually by step S01; Set in step S01 carrier picture function as: X=f (x, y), the size of carrier picture is M c* N c; Carrier image block function is: X m=f m(x', y'), the size 8*8 of carrier image block; Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored;
Preferably, also comprise the block number of step S11 according to carrier picture block after segmentation, be the some pieces of password watermark picture block do not covered mutually by described password watermark picture segmentation, the block number of described carrier picture block is the even-multiple of the block number of this password watermark picture block; The size of password watermark picture is M in step s 11 m* N m; Password watermark picture block function is: W m=w m(x', y'), the size of password watermark picture block is (M m* 8/M c) * (N m* 8/N c);
Preferably, also comprise step S21 according to the carrier picture block after segmentation, one by one territory conversion is carried out to every block carrier picture block; Carry out territory conversion to every block carrier picture block one by one in the step s 21 to refer to: carry out dct transform to every block carrier picture block one by one; Carrier picture block function after the conversion of territory is: Y m=DCT (X m)=F m(u, v), wherein F m(u, v) is the size at m picture discrete cosine transform rear space frequency (u, v) place;
Preferably, also comprise step S22 according to the carrier picture block after the conversion of territory, choose the watermark location information of embedding one block encryption watermark picture block; In step S22, choose r is from F mthe loading position that (u, v) intermediate frequency is selected, 1≤r≤(M m* 8/M c) * (N m* 8/N c), W br () is password watermark picture block W m=w mthe function of position of (x', y');
Preferably, also comprise step S23 according to the watermark location information chosen, every block encryption watermark picture block is embedded in one piece of carrier picture block after the conversion of territory; According to addition criterion in step S23, according to following formula, be embedded in carrier picture block by password watermark picture block, this formula is: Y r'=aW b(r); Wherein a is intensity factor, then uses Y r' replace the DCT intermediate frequency coefficient after embed watermark;
Preferably, also comprise after step S24 carries out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one, form watermark carrier picture; Carry out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one in step s 24 which to refer to: carry out DCT inverse transformation to the carrier picture block being embedded with password watermark picture block one by one; Watermark carrier picture function is: X'=f'(x', y');
Step S30 shares the described watermark carrier picture of transmission to being shared in terminal;
Preferably, also comprise step S41 according to the watermark carrier picture received, described watermark carrier picture segmentation is become the some pieces of watermark carrier picture block do not covered mutually; The size 8*8 of watermark carrier image block in step S41, watermark carrier picture block function is: X m'=f m' (x', y'); Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Preferably, also comprise step S42 according to the watermark carrier picture block after segmentation, one by one territory conversion is carried out to every block watermark carrier picture block; In step S42, carry out territory conversion to every block watermark carrier picture block one by one refer to: carry out two-dimensional dct transform to every block watermark carrier picture block one by one;
Preferably, also comprise step S43 according to the watermark carrier picture block after the conversion of territory, extract the reference information of password watermark picture block embedded location; The reference information extracting password watermark picture block embedded location in step S43 refers to: the intermediate frequency coefficient extracting password watermark picture block embedded location;
Preferably, also comprise step S44 according to the reference information extracted, calculate the password watermark information in every block watermark carrier picture block; The computing formula calculating the password watermark information in every block watermark carrier picture block in step S44 is: W b(r)=Y r/ a;
Step S50 judges whether there is attack sign in described password watermark information; This attack sign is black and white fleck or unfilled corner etc.;
If exist in this password watermark information of step S51 and attack sign (black and white fleck or unfilled corner), then described watermark carrier picture is being shared (attacked by noise or shearing attack) under attack in transmitting procedure; Attack sign if occur, transmission to be reported an error or to the prompting accepting user and carry out other modes.
If there is not attack sign (black and white fleck or unfilled corner) in this password watermark information of step S52, then described watermark carrier picture does not have (attacked by noise or shearing attack) under attack sharing in transmitting procedure; Attack sign if do not exist, continue to perform step S60.
Preferably, also comprise step S61 according to the password watermark information calculated, merge all password watermark informations extracted; Preferably, also comprise step S62 according to the password watermark information after merging, identify and shared password in password watermark information;
Step S70 according to share obtain shared password, judge that this is shared password whether identical with preset password; If step S71 this to be shared password identical with preset password, then shared password and completed checking; If step S72 this to be shared password different from preset password, then being shared password cannot complete checking.
Fig. 7 is the composition structural representation of a kind of share system of the present invention.As shown in Figure 7, according to one embodiment of present invention, a kind of share system of WIFI password, comprising: watermark generation module 10, shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored; Watermark embedding module 20, according to the carrier picture got, is embedded into described password watermark picture after on carrier picture, forms watermark carrier picture; This carrier picture can be the particular picture that user chooses, and also can be initiatively to share terminal random pictures obtained from certain storehouse; Sharing transport module 30, sharing the described watermark carrier picture of transmission to being shared in terminal; Watermark extracting module 40, according to the watermark carrier picture received, extracts the password watermark information in described watermark carrier picture; Password identification module 60, according to the password watermark information extracted, identifies and is shared password in described password watermark information.
Fig. 8 is the part composition structural representation of the another kind of share system of the present invention.Fig. 9 is the part composition structural representation of the another kind of share system of the present invention.As shown in Figure 8, Figure 9, according to another embodiment of the invention, a kind of share system of WIFI password, comprising:
Segmentation module 11, according to the carrier picture obtained, becomes M by this carrier picture segmentation c* N cthe carrier picture block that block does not cover mutually; Set in step S01 carrier picture function as: X=f (x, y), the size of carrier picture is M c* N c; Carrier image block function is: X m=f m(x', y'), the size 8*8 of carrier image block; Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Watermark generation module 10, shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this; This shares password in advance can be inputted by user, also can be to obtain initiatively to share the password that terminal has stored;
Preferably, also comprising segmentation module 11, according to the block number of carrier picture block after segmentation, is M by described password watermark picture segmentation m* N mthe password watermark picture block that block does not cover mutually, the block number M of described carrier picture block c* N cfor the block number M of this password watermark picture block m* N meven-multiple; The size of password watermark picture is M in step s 11 m* N m; Password watermark picture block function is: W m=w m(x', y'), the size of password watermark picture block is (M m* 8/M c) * (N m* 8/N c);
Preferably, also comprise territory conversion module 21, according to the carrier picture block after segmentation, one by one territory conversion is carried out to every block carrier picture block; Carry out territory conversion to every block carrier picture block one by one in the step s 21 to refer to: carry out dct transform to every block carrier picture block one by one; Carrier picture block function after the conversion of territory is: Y m=DCT (X m)=F m(u, v), wherein F m(u, v) is the size at m picture discrete cosine transform rear space frequency (u, v) place;
Preferably, also comprise position and choose module 22, according to the carrier picture block after the conversion of territory, choose the watermark location information of embedding one block encryption watermark picture block; In step S22, choose r is from F mthe loading position that (u, v) intermediate frequency is selected, 1≤r≤(M m* 8/M c) * (N m* 8/N c), W br () is password watermark picture block W m=w mthe function of position of (x', y');
Preferably, also comprise watermark embedding module 20, according to the watermark location information chosen, every block encryption watermark picture block is embedded in one piece of carrier picture block after the conversion of territory; According to addition criterion in step S23, according to following formula, be embedded in carrier picture block by password watermark picture block, this formula is: Y r'=aW b(r); Wherein a is intensity factor, then uses Y r' replace the DCT intermediate frequency coefficient after embed watermark;
Preferably, also comprise territory inverse transform block 23, after one by one territory inverse transformation being carried out to the carrier picture block being embedded with password watermark picture block, form watermark carrier picture; Carry out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one in step s 24 which to refer to: carry out DCT inverse transformation to the carrier picture block being embedded with password watermark picture block one by one; Watermark carrier picture function is: X'=f'(x', y');
Sharing transport module 30, sharing the described watermark carrier picture of transmission to being shared in terminal;
Preferably, also comprise segmentation submodule 41, according to the watermark carrier picture received, described watermark carrier picture segmentation is become M c* N cthe watermark carrier picture block that block does not cover mutually; The size 8*8 of watermark carrier image block in step S41, watermark carrier picture block function is: X m'=f m' (x', y'); Wherein m=1,2 ..., (M c/ 8) * (N c/ 8), 0≤x ' is designated as, y '≤8;
Preferably, also comprise territory transformation submodule 42, according to the watermark carrier picture block after segmentation, one by one territory conversion is carried out to every block watermark carrier picture block; In step S42, carry out territory conversion to every block watermark carrier picture block one by one refer to: carry out two-dimensional dct transform to every block watermark carrier picture block one by one;
Preferably, also comprise information extraction modules 43, according to the watermark carrier picture block after the conversion of territory, extract the reference information of password watermark picture block embedded location; The reference information extracting password watermark picture block embedded location in step S43 refers to: the intermediate frequency coefficient extracting password watermark picture block embedded location;
Preferably, also comprise watermark extracting module 40, according to the reference information extracted, calculate the password watermark information in every block watermark carrier picture block; The computing formula calculating the password watermark information in every block watermark carrier picture block in step S44 is: W b(r)=Y r/ a;
Judge module 50, judges whether there is attack sign in described password watermark information; This attack sign is black and white fleck or unfilled corner etc.;
If exist in this password watermark information and attack sign (black and white fleck or unfilled corner), then described watermark carrier picture is being shared (salt-pepper noise is attacked or shearing attack) under attack in transmitting procedure;
If there is not attack sign (black and white fleck or unfilled corner) in this password watermark information, then described watermark carrier picture does not have (salt-pepper noise attack or shearing attack) under attack sharing in transmitting procedure;
Preferably, also comprise password identification module 60, according to the password watermark information calculated, merge all password watermark informations extracted; Preferably, also comprise password identification module 60 according to the password watermark information after merging, identify and shared password in password watermark information;
Password authentication module 70, according to share obtain shared password, judge that this is shared password whether identical with preset password; If it is identical with preset password that this is shared password, shared password and completed checking in password authentication module 70; If it is different from preset password that this is shared password, shared password and cannot be completed checking in password authentication module 70.
Figure 10 is the schematic flow sheet of the present invention's sharing method of another WIFI password again.Figure 11 is the schematic diagram of watermark picture in the present invention.According to one embodiment of present invention, a kind of sharing method of WIFI password, comprising:
Choosing image, in order to carry out the interpolation of digital watermarking on image, texture can be selected compared with the image of horn of plenty, simultaneously in order to improve the efficiency of transmission, the picture size selected is unsuitable excessive;
Generate digital watermarking, i.e. Edit Password, digital watermarking represents the password that end shared by password, and password is embedded in carrier picture with the form of picture; Maximum length due to WIFI password is generally 64, therefore watermarking images average mark can be splitted into the region of 8x8 to deposit WIFI password, the pixel of suitable quantity is chosen to placement code characters image of encoding in each region, as 32x32 pixel, and 64x64 pixel; If each character-coded pixel number very little, be then unfavorable for the identification of successive character, cross the efficiency affecting watermark at most and generate; Suppose that password is PHICOMM (as shown in figure 11), arranging each character-coded pixel number is 32x32, then institute's generating watermark image size is 256x256;
Add watermark, be actually and the process of synthesizing of recoding is carried out to common standard image and watermark picture; For the digital picture that with the addition of watermark, the vision system of people is not easily discovered the change picture; Because digital watermarking has secret, safety, the feature of robust, is therefore carrying out can accomplishing not reveal to other people during password is shared; At present, on digital image watermarking technology, have a large amount of relevant algorithms and can provide use, be mainly divided into: the watermarking algorithm based on spatial domain, the watermarking algorithm based on transform domain (mainly containing the watermarking algorithm based on discrete cosine transform, discrete Fourier transformation DFT, wavelet transform DWT theory), watermarking algorithm based on image compression domain;
Transmitting image, shares in process carrying out password, participator and the transmission that can be completed watermarking images by participator by the communication technology such as bluetooth, NFC, WIFI;
Extract watermarking images, decode from carrier picture by watermark information and extract, this process is included in the decode procedure of digital watermarking algorithm;
Identification and verification WIFI password, after extracting watermark picture, can carry out a segmentation 8x8 region to watermark picture, to each region picture, adopts character recognition technologies, identifies the code characters representated by picture, thus complete the checking of WIFI password; This method mainly comprises chooses image, generates digital watermarking, adds watermark, transmission watermarking images, and watermarking images extracts and verification; The steps such as the identification and verification of WIFI password.
Word watermark refers to the digital signal embedded in digital carrier (comprising multimedia, document, software etc.), and it can be that image, word, symbol, numeral etc. are all can as the information identified.Digital watermarking neither affects normal use and the existent value of initial carrier, is also not easy to be humanly perceptible, and thus its this technology can be used for password and share, thus solves the leakage problem of password.Digital image watermarking adopts image processing algorithm, watermark symbol information is embedded in ordinary numbers image, recompile is carried out to image, after recodification, the vision system of people can not discover the change of picture of publishing picture, and the image processing algorithm to routine, as denoising, enhancing etc. has certain robustness.The digital watermarking of image is extracted, and namely adopts the process that watermark information decodes out by decoding algorithm from the digital picture of band watermark.
The invention has the advantages that, the disguise of digital watermark technology, transmission reliability, anti-tamper robustness effectively can ensure the disguise that password is shared and controllability, thus prevent password from extensively being revealed, and need the worry of frequent Modify password.Digital watermarking, owing to being embedded in digital picture, and not added watermark digit image and is not distinguished in visual effect, therefore ensure that the disguise of password.Digital picture in transmission, owing to the addition of digital watermarking, therefore in transmitting procedure, even if met with attack, is carrying out can investigating out rapidly in watermark extracting and verification, thus has ensured and transmit safe and reliable and prevent information from distorting.The present invention shares in process carrying out password, can have effectively select to share time, place and the object shared.
It should be noted that above-described embodiment all can independent assortment as required.The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. a sharing method for WIFI password, is characterized in that, comprising:
Step S10 shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this;
Described password watermark picture, according to the carrier picture got, is embedded into after on carrier picture by step S20, forms watermark carrier picture;
Step S30 shares the described watermark carrier picture of transmission to being shared in terminal;
Step S40, according to the watermark carrier picture received, extracts the password watermark information in described watermark carrier picture;
Step S60, according to the password watermark information extracted, identifies and is shared password in described password watermark information.
2. the sharing method of WIFI password as claimed in claim 1, is characterized in that, also comprised before described step S10:
This carrier picture segmentation, according to the carrier picture obtained, is become the some pieces of carrier picture block do not covered mutually by step S01.
3. the sharing method of WIFI password as claimed in claim 2, is characterized in that, also comprise:
Step S11 is according to the block number of carrier picture block after segmentation, and be the some pieces of password watermark picture block do not covered mutually by described password watermark picture segmentation, the block number of described carrier picture block is the even-multiple of the block number of this password watermark picture block.
4. the sharing method of WIFI password as claimed in claim 3, it is characterized in that, described step S20 comprises:
Step S21, according to the carrier picture block after segmentation, carries out territory conversion to every block carrier picture block one by one;
Step S22, according to the carrier picture block after the conversion of territory, chooses the watermark location information of embedding one block encryption watermark picture block;
Every block encryption watermark picture block, according to the watermark location information chosen, is embedded in one piece of carrier picture block after the conversion of territory by step S23;
After step S24 carries out territory inverse transformation to the carrier picture block being embedded with password watermark picture block one by one, form watermark carrier picture.
5. the sharing method of WIFI password as claimed in claim 1, it is characterized in that, described step S40 comprises:
Described watermark carrier picture segmentation, according to the watermark carrier picture received, is become the some pieces of watermark carrier picture block do not covered mutually by step S41;
Step S42, according to the watermark carrier picture block after segmentation, carries out territory conversion to every block watermark carrier picture block one by one;
Step S43, according to the watermark carrier picture block after the conversion of territory, extracts the reference information of password watermark picture block embedded location;
Step S44, according to the reference information extracted, calculates the password watermark information in every block watermark carrier picture block.
6. the sharing method of WIFI password as claimed in claim 5, it is characterized in that, described step S60 comprises:
Step S61 according to the password watermark information calculated, all password watermark informations that joint account obtains;
Step S62, according to the password watermark information after merging, identifies and is shared password in described password watermark information.
7., as the sharing method of the WIFI password in claim 1 ~ 6 as described in any one, it is characterized in that, also comprise:
Step S70 according to share obtain shared password, judge that this is shared password whether identical with preset password;
If step S71 this to be shared password identical with preset password, then shared password and completed checking;
If step S72 this to be shared password different from preset password, then being shared password cannot complete checking.
8. the sharing method of WIFI password as claimed in claim 1, is characterized in that, also comprise:
Step S50 judges whether there is attack sign in described password watermark information;
If in this password watermark information of step S51 exist attack sign, then described watermark carrier picture share in transmitting procedure under attack;
If there is not attack sign in this password watermark information of step S52, then described watermark carrier picture share in transmitting procedure not under attack.
9. application is as a share system for the sharing method of the WIFI password in claim 1 ~ 8 as described in any one, it is characterized in that, comprising:
Watermark generation module, this watermark generation module shares password in advance according to what get, generates and shares the corresponding password watermark picture of password in advance with this;
Watermark embedding module, described password watermark picture, according to the carrier picture got, is embedded into after on carrier picture by this watermark embedding module, forms watermark carrier picture;
Share transport module, this shares the watermark carrier picture that transport module receives the output of described watermark embedding module, shares the described watermark carrier picture of transmission to being shared in terminal;
Watermark extracting module, shares the watermark carrier picture that transport module sends, extracts the password watermark information in described watermark carrier picture described in this watermark extracting module receives;
Password identification module, this password identification module receives the password watermark information that described watermark extracting module exports, and identifies and is shared password in described password watermark information.
10., according to the share system of WIFI password as claimed in claim 9, it is characterized in that, comprising:
Segmentation module, this carrier picture segmentation, according to the carrier picture obtained, is become the some pieces of carrier picture block do not covered mutually by this segmentation module.
CN201610049098.9A 2016-01-25 2016-01-25 Sharing method and sharing system for WIFI password Pending CN105427234A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610049098.9A CN105427234A (en) 2016-01-25 2016-01-25 Sharing method and sharing system for WIFI password
PCT/CN2016/103893 WO2017128788A1 (en) 2016-01-25 2016-10-29 Sharing method and sharing system of wifi password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610049098.9A CN105427234A (en) 2016-01-25 2016-01-25 Sharing method and sharing system for WIFI password

Publications (1)

Publication Number Publication Date
CN105427234A true CN105427234A (en) 2016-03-23

Family

ID=55505416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610049098.9A Pending CN105427234A (en) 2016-01-25 2016-01-25 Sharing method and sharing system for WIFI password

Country Status (2)

Country Link
CN (1) CN105427234A (en)
WO (1) WO2017128788A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131828A (en) * 2016-06-30 2016-11-16 维沃移动通信有限公司 A kind of WiFi password sharing method, mobile terminal and Cloud Server
WO2017128788A1 (en) * 2016-01-25 2017-08-03 上海斐讯数据通信技术有限公司 Sharing method and sharing system of wifi password
WO2017143817A1 (en) * 2016-02-26 2017-08-31 上海斐讯数据通信技术有限公司 Wifi password sharing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050123194A1 (en) * 2002-02-21 2005-06-09 Xerox Corporation Method of embedding color information in printed documents using watermarking
CN1627681A (en) * 2003-12-10 2005-06-15 联想(北京)有限公司 Secure data transmission method
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof
CN104933668A (en) * 2015-06-11 2015-09-23 广东工业大学 Processing method of reversible watermark on the basis of local positioning and ALattar integer transform

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3917513B2 (en) * 2002-12-27 2007-05-23 株式会社東芝 Digital watermark embedding device, digital watermark detection device, digital watermark embedding method, digital watermark detection method, and program
CN1517855A (en) * 2003-01-16 2004-08-04 成都市宇飞信息工程有限公司 Image digital watermark method
CN102129658A (en) * 2011-03-10 2011-07-20 浪潮(北京)电子信息产业有限公司 Method and device for realizing digital watermark
CN102254298B (en) * 2011-08-17 2013-06-19 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN102970307B (en) * 2012-12-21 2016-01-13 网秦无限(北京)科技有限公司 Cipher safety system and password safety method
CN103067367A (en) * 2012-12-21 2013-04-24 网秦无限(北京)科技有限公司 Password hidden method and device and password retrieval method and device
CN105427234A (en) * 2016-01-25 2016-03-23 上海斐讯数据通信技术有限公司 Sharing method and sharing system for WIFI password

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050123194A1 (en) * 2002-02-21 2005-06-09 Xerox Corporation Method of embedding color information in printed documents using watermarking
CN1627681A (en) * 2003-12-10 2005-06-15 联想(北京)有限公司 Secure data transmission method
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof
CN104933668A (en) * 2015-06-11 2015-09-23 广东工业大学 Processing method of reversible watermark on the basis of local positioning and ALattar integer transform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
白冬慧等: "抗几何攻击的最低有效位数字水印算法", 《电视技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017128788A1 (en) * 2016-01-25 2017-08-03 上海斐讯数据通信技术有限公司 Sharing method and sharing system of wifi password
WO2017143817A1 (en) * 2016-02-26 2017-08-31 上海斐讯数据通信技术有限公司 Wifi password sharing method and system
CN106131828A (en) * 2016-06-30 2016-11-16 维沃移动通信有限公司 A kind of WiFi password sharing method, mobile terminal and Cloud Server

Also Published As

Publication number Publication date
WO2017128788A1 (en) 2017-08-03

Similar Documents

Publication Publication Date Title
Liu et al. Blind dual watermarking for color images’ authentication and copyright protection
Mahto et al. A survey of color image watermarking: State-of-the-art and research directions
CN111784556B (en) Method, device, terminal and storage medium for adding digital watermark in image
CN108961138B (en) Watermark data embedding and extracting method
CN110084733A (en) The embedding grammar and system of text image watermark, extracting method and system
Begum et al. Analysis of digital image watermarking techniques through hybrid methods
Panchal et al. A comprehensive survey on digital image watermarking techniques
CN105701757B (en) Product anti-counterfeiting method and device based on digital watermark and graphic code
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
CN105427234A (en) Sharing method and sharing system for WIFI password
Agilandeeswari et al. RST invariant robust video watermarking algorithm using quaternion curvelet transform
CN113538197A (en) Watermark extraction method, device, storage medium and electronic equipment
Kavitha et al. Implementation of DWM for medical images using IWT and QR code as a watermark
CN113240569A (en) Fingerprint image encryption method, device and system
Riad et al. Pre-processing the cover image before embedding improves the watermark detection rate
O'Ruanaidh et al. Secure robust digital image watermark
CN111861847A (en) GF-2 image double watermarking method applying DWT and SIFT
Liu et al. An image trading system using amplitude-only images for privacy-and copyright-protection
Hassan et al. Proposed video watermarking algorithm based on edge or corner regions
CN112418371B (en) Secure three-dimensional code for blockchains and methods of generating and decoding
CN114330621A (en) Two-dimensional code anti-counterfeiting method and device based on identification information and storage medium
CN109977778B (en) Safety protection method and device in process of transmitting, storing and displaying three-dimensional data of object
CN115526282A (en) Watermark encryption method, watermark extraction method, device and storage medium
Singh et al. Blind detection attack resistant image watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160323