CN105825257A - Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof - Google Patents
Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof Download PDFInfo
- Publication number
- CN105825257A CN105825257A CN201610134624.1A CN201610134624A CN105825257A CN 105825257 A CN105825257 A CN 105825257A CN 201610134624 A CN201610134624 A CN 201610134624A CN 105825257 A CN105825257 A CN 105825257A
- Authority
- CN
- China
- Prior art keywords
- information
- bar code
- dimensional bar
- hiding
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides an information hiding and hidden information extraction method based on a two-dimensional barcode and an information hiding and hidden information extraction system thereof, and belongs to the field of information security. The two-dimensional barcode is selected to act as the carrier for information hiding. The padding code area of the two-dimensional barcode belongs to a redundant area and is a neglected part under the normal circumstance so that information is hidden in the area and difficult to perceive, and the capacity of the information which can be hidden can also meet the requirements. Secret information to be hidden is encrypted by using a public key of a key pair by utilizing an encoder, and the encrypted hidden information is decrypted by using a private key of the key pair by utilizing a decoder so that security of the hidden secret information can be guaranteed. The verification mode of the C/S structure is adopted, a user transmits a verification request to a server through a client side, the server performs verification and then returns the result, and the user passing verification can continue decoding operation so that legitimacy of the user can be guaranteed.
Description
Technical field
The invention belongs to information security field, be specifically related to a kind of Information hiding based on two-dimensional bar code and hiding information extracting method and system.
Background technology
Information hiding is by technology in other message, picture or file of message first, picture or file hiding; because information would generally be encrypted before being hidden; so Information Hiding Techniques is higher than simple encryption technical security, can be with the safety of effective guarantee information.Information Hiding Techniques is mainly used in the aspect such as secret communication, authentication, digital copyright protecting and tracking and information integrity, authenticity identification and content recovery.Its application in secret communication is secret information to be hidden in digital carrier and utilizes overt channel to transmit, and this most generally exists in fields such as military affairs, business, finance.Fig. 1 is the model of Information Hiding Techniques, Information hiding performs stage use double secret key secret information and is encrypted pretreatment, use embedded mobile GIS that the ciphertext after encryption is embedded in carrier afterwards, then the close carrier of load comprising secret information passes to recipient via common signal channel, and recipient uses extraction algorithm extract ciphertext and use decryption key decryption to go out secret information.Wherein, the selection of Covers of Information Hiding and be correspondingly embedded in, the design of extraction algorithm is the important foundation problem of Information hiding research.
Two-dimensional bar code is a kind of special barcode technology, it is called for short Quick Response Code, it uses the geometrical patterns such as rectangle, point, hexagon to represent information, use several geometrical bodies corresponding with binary system to represent word numerical information during coding, then inputted by image during decoding or photoelectric scanning device automatically identifying and reading information.Two-dimensional bar code has quick readability and the advantage of high storage capacity, therefore applies quite varied, particularly benefits from the development of intelligent mobile terminal technology, 2D bar code technology is widely used in tracking of products, article mark, real-time tracing, document management, a series of fields such as marketing.Such as, can mutually be added good friend by scanning two-dimension bar code, log in website etc. in mobile immediate communication software between user, vending machine can also use two-dimensional bar code to carry out commodity identification and purchase etc..In a word, two-dimensional bar code is just constantly being popularized as a kind of widely used Information Communication carrier.
Summary of the invention
The technical scheme is that
A kind of information concealing method based on two-dimensional bar code, uses two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and be hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Step 2.1: generate several double secret key in the encoder, and be numbered to each double secret key, and this numbering is set as the cipher key feature value corresponding to each double secret key;
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and utilizes the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;
Step 2.3: the cipher key feature value corresponding to the double secret key that encoder will be chosen adds the stem of described ciphertext to, the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server deposit;
Step 3: described general information a and the described ciphertext with cipher key feature value are carried out data analysis, determine the character types of the two, and it is converted into sign character by corresponding character set, and according to the length of described general information a and type and the length of the described ciphertext with cipher key feature value and type, select out the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: according to QR barcode encoding rule, described general information a and the described data character with cipher key feature value ciphertext are respectively converted into the form of bit stream, form the binary data code word of general information and the binary data code word of secret information to be concealed respectively;
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, complete the coding to this two-dimensional bar code;
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;
Step 6.3: start to be sequentially embedded by the code word data of the ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code, until this ciphertext terminates, if also rest position polishing code polishing, and complete final two-dimensional bar code coding;
Step 7: be filled into successively in the corresponding region of two-dimensional bar code by coding final for this two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.
A kind of hiding information extracting method based on two-dimensional bar code, is directed to hide in described information concealing method based on two-dimensional bar code the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously;
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3;
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.
The Information hiding based on two-dimensional bar code set up with described based on two-dimensional bar code hiding information extracting method according to described information concealing method based on two-dimensional bar code and hiding information extracting system, including: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the coding of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;(c) cipher key feature value that Rcv decoder scanning obtains from decoder and the ciphertext of hiding information, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.
Beneficial effects of the present invention: the advantage that the present invention has following several respects:
1. select two-dimensional bar code as the carrier of Information hiding, in two-dimensional bar code, polishing code region belongs to redundant area, it is unheeded part under normal circumstances, therefore will be difficult to Information hiding in the region be noticeable, and suppressible information capacity can also meet demand.
2. utilizing encoder to use the PKI of cipher key pair to be encrypted secret information to be concealed, the hiding information after utilizing decoder to use the private key pair encryption of cipher key pair is decrypted, and thereby ensures that the safety of hidden secret information.
3. using the verification mode of C/S structure, user sends checking request by user end to server, returns result after server authentication, and the user being only verified could continue decoding operation, thereby ensures that the legitimacy of user.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of a kind of information hiding model;
Fig. 2 is the information concealing method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 3 is that the two-dimensional barcode information of one embodiment of the present invention embeds schematic diagram;
Fig. 4 is based on two-dimensional bar code the hiding information extracting method flow chart of one embodiment of the present invention;
Fig. 5 is the Information hiding based on two-dimensional bar code of one embodiment of the present invention and hiding information extracting system structured flowchart;
Detailed description of the invention
With detailed description of the invention, the present invention is described in further detail below in conjunction with the accompanying drawings.
The information concealing method based on two-dimensional bar code of present embodiment, as in figure 2 it is shown, use two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and is hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Under normal circumstances from being intended to through server authentication as the hiding information of extraction the two-dimensional bar code of Covers of Information Hiding, but, if the information of hiding directly is stored in two-dimensional bar code with the form of information code word, the region person of being hacked once embedding the information of hiding in two-dimensional bar code is found that, assailant will be directly obtained the plaintext of hiding information, first selects a kind of existing public key encryption algorithm to be encrypted secret information to be concealed.
Step 2.1: selecting a kind of existing public key encryption algorithm to generate several double secret key in the encoder, and be numbered to each double secret key, numbered code is metric double figures, and this numbering is set as the cipher key feature value corresponding to each double secret key;The most each double secret key comprises a PKI and a private key, and PKI is used to be encrypted information, and what private key was used to be decrypted information.
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and (n, k) with (n, d), wherein (n, k) is PKI, and (n d) is private key;Wherein n is the long-pending of two big prime number p, q, and n represents figure place shared when with binary representation, it is simply that so-called key length;K and d is a pair relevant value, and k is the constant that can arbitrarily take, but k is relatively prime with (p-1) * (q-1);And the requirement about d is (d*k) mod ((p-1) * (q-1))=1.
(the plaintext m of described secret information to be concealed k) is encrypted and generates ciphertext m of secret information to be concealed by n to utilize the PKI of this selected cipher key pairk, and meet: m=mk^dmodn;mk=m^kmodn.
Step 2.3: the cipher key feature value corresponding to selected double secret key is set to t and t adds to described ciphertext m by encoderkStem, this cipher key pair is used for the private key deciphered simultaneously and numbers to bundle with this double secret key and be sent in server deposit;
Step 3: according to the coding flow process of QR bar code, first data analysis is carried out, determine described general information a and the character types of the ciphertext with cipher key feature value, and it is converted into sign character by corresponding character set, simultaneously according to version and the grade of error correcting code of the selected two-dimensional bar code as Covers of Information Hiding of character length and type, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
When selecting version v and error-correction level w of this two-dimensional bar code, version v is the highest for two-dimensional bar code, or error-correction level w is the lowest, then capacity C is the highest.The two-dimensional bar code version selected and error-correction level should meet the size of the final data stream desired volume that capacity is formed, i.e. C (v, w) >=C (a)+C (m) more than or equal to general information and secret information to be concealed;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: select corresponding QR barcode encoding pattern according to the type of general information a and the character types of secret information to be concealed respectively, add corresponding mode indicators and character count designator etc..And according to QR barcode encoding rule, described general information a and the described data character with the ciphertext of cipher key feature value are respectively converted into the form of bit stream, the method i.e. forming a code word according to every 8 bits, forms code word data and the code word data of secret information to be concealed of general information respectively;
By general information a and ciphertext mkData character be converted to the form of bit stream, wherein m according to the coding rule of QR bar code in two-dimensional bar codekIn metric double figures cipher key feature value t all represent with the binary number of 8.General information data bit stream Sa and ciphertext data bit stream Sm is formed after conversionk, the figure place of the bit stream formed if not 8 multiple, then at end with 0 polishing.The most respectively to Sa and SmkDivide by the processing mode of 8 code words, form code word data and the code word data of secret information to be concealed of final general information.
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, and complete the coding to this two-dimensional bar code;
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;Shared by the numeric data code part in two-dimensional bar code, the ratio of its entire area is less, and the information code character segment capacity of the two-dimensional bar code of indicated release and error-correction level is fixing, and necessarily not less than the capacity needed for embedding information, so typically remainder codewords all can be there is after information code word.Residual capacity after generally two-dimensional bar code embeds general information is all to fill with polishing code, therefore can embed secret information code word to be hidden on the polishing code position after embedding the code word of general information of two-dimensional bar code.
Step 6.3: after the stop bits of the code word data that the code word data of secret information ciphertext is added on general information, will the code word data of ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code start to be sequentially embedded, until this ciphertext terminates, if still there is remainder codewords in polishing code region after having added the code word data of secret information, then with polishing code (11101100 and/or 00010001) polishing, form the final code word sequence of two-dimensional bar code.
Step 7: after arranging functional graphic, is filled into the final coded sequence of this two-dimensional bar code successively in the corresponding region of two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.It is illustrated in figure 3 two-dimensional barcode information and embeds schematic diagram, start to be filled into corresponding region successively along continuous print Lycoperdon polymorphum Vitt lines by final coding lower right position of two-dimensional bar code from figure, form the two-dimensional barcode image corresponding to bit stream of final coding, wherein binary number 1 filled black, 0 fills by white, if running into non-data area, then get around or skip, until completing the structure of whole two-dimensional barcode image.
Based on two-dimensional bar code the hiding information extracting method of present embodiment, as shown in Figure 4, is directed to hide in described information concealing method based on two-dimensional bar code the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously.
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3.
Only use decoder+FTP client FTP designed in the present embodiment to log in, and identity is effectively verified, the two-dimensional bar code with hiding information could be scanned by the decoder that client connects and get secret information;And do not use the user of this system login simply to use the most common decoder with barcode scanning function that the two-dimensional bar code with hiding information is scanned, its scanning process only can perform common read functions, owing to the polishing code region in two-dimensional bar code belongs to redundant area, the part ignored by common decoder under normal circumstances, so common decoder can only read the code word data of general information a before stop bits " 0000 ", general information therefore can only be got.
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;If user uses common decoder to be scanned the two-dimensional barcode image with hiding information generated, then can only read the general information of storage in two-dimensional bar code, and obtain less than being hidden in secret information therein;
The operation principle of the decoder in client is the content being obtained all information code words by scanning two-dimension bar code, at the code word data that part is general information of information code word foremost, until stop bits " 0000 ", general information code word data part terminates;Record successively is started from stop bits, owing to the ciphertext of secret information is to start to embed after stop bits, and cipher key feature value is filled in the foremost of ciphertext, and the figure place setting cipher key feature value t is fixed as 8, and therefore 8 bit data code words after stop bits are t value;After cipher key feature value t record, cipher key feature value is sent to server;Next the code word data of the ciphertext of the secret information that record is hidden is started, because it is to be filled by the polishing code field (11101100 and/or 00010001) fixed that ciphertext embeds the remainder codewords after terminating, therefore record is until there is polishing code, the ciphertext code word data of secret information obtains and terminates, thus obtains secret information ciphertext m hiddenk。
May be with hiding information and attempt to crack this coded system and carry out the acquisition of secret information if there being assailant to be found that in two-dimensional bar code, then first he is accomplished by finding the start bit of the code word data of hiding secret information, this point just to have certain difficulty;Even if assailant have found the start bit that secret information code word data embeds, but also secret information is also taken encryption preprocessing process due to us, therefore cannot crack ciphering process acquisition is also the secret information ciphertext after encrypting, and still cannot obtain the plaintext of secret information.So the safety that the secret information being finally hidden is in plain text is secure.
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.The numbering of the most selected for the cipher key feature value received according to it double secret key is carried out comparison successively with all secret key pairs leaving server before in by server, filter out the private key (n of identical numbering, d), and by this private key (n, d) sending back client, the decoder in client is by known ciphertext mkWith decrypted private key (n, d), and according to the formula of public key encryption algorithm: m=mk^dmodn;mk=m^kmodn, ciphertext m to hiding secret informationkIt is decrypted process, gets the plaintext m of secret information to be hidden the most at last, and show in client.
The Information hiding based on two-dimensional bar code of the present embodiment that the information concealing method based on two-dimensional bar code according to present embodiment is set up with hiding information extracting method based on two-dimensional bar code and hiding information extracting system, as it is shown in figure 5, include: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the final code word sequence of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;C () scans the cipher key feature value and the ciphertext of hiding information obtained from decoder Rcv decoder, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.
Claims (4)
1. an information concealing method based on two-dimensional bar code, it is characterised in that: use two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and be hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Step 2.1: generate several double secret key in the encoder, and be numbered to each double secret key, and this numbering is set as the cipher key feature value corresponding to each double secret key;
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and utilizes the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;
Step 2.3: the cipher key feature value corresponding to the double secret key that encoder will be chosen adds the stem of described ciphertext to, the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server deposit;
Step 3: described general information a and the described ciphertext with cipher key feature value are carried out data analysis, determine the character types of the two, and it is converted into sign character by corresponding character set, and according to the length of described general information a and type and the length of the described ciphertext with cipher key feature value and type, select out the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: according to QR barcode encoding rule, described general information a and the described data character with cipher key feature value ciphertext are respectively converted into the form of bit stream, form the binary data code word of general information and the binary data code word of secret information to be concealed respectively;
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, and complete the coding final to this two-dimensional bar code;
Step 7: be filled into successively in the corresponding region of two-dimensional bar code by coding final for this two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.
Information concealing method based on two-dimensional bar code the most according to claim 1, it is characterised in that: described step 6 comprises the steps:
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;
Step 6.3: start to be sequentially embedded by the code word data of the ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code, until this ciphertext terminates, if also rest position polishing code polishing, and complete final two-dimensional bar code coding.
3. a hiding information extracting method based on two-dimensional bar code, it is characterised in that: it is directed to described information concealing method based on two-dimensional bar code is hidden the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously;
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3;
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.
4. an Information hiding based on two-dimensional bar code and hiding information extracting system, it is characterised in that: including: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the coding of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;(c) cipher key feature value that Rcv decoder scanning obtains from decoder and the ciphertext of hiding information, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134624.1A CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134624.1A CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825257A true CN105825257A (en) | 2016-08-03 |
CN105825257B CN105825257B (en) | 2018-05-29 |
Family
ID=56987036
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610134624.1A Active CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825257B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485157A (en) * | 2016-10-13 | 2017-03-08 | 北京奇虎科技有限公司 | The processing method of logistics information, device server |
CN106650869A (en) * | 2016-10-18 | 2017-05-10 | 重庆文理学院 | Information hiding method based on two-dimensional code |
CN106815544A (en) * | 2017-01-16 | 2017-06-09 | 武汉大学 | A kind of information concealing method based on Quick Response Code |
CN107016499A (en) * | 2017-03-23 | 2017-08-04 | 国家电网公司 | A kind of substation equipment patrol method recognized based on two-dimentional code encryption |
CN107358284A (en) * | 2017-07-11 | 2017-11-17 | 北京捷润科技有限公司 | Generation method, read method, generating means and the reading device of Quick Response Code |
CN107992923A (en) * | 2017-12-22 | 2018-05-04 | 北京中星仝创科技有限公司 | A kind of QR Quick Response Codes generation and the method read |
WO2018137602A1 (en) * | 2017-01-24 | 2018-08-02 | 北京大码技术有限公司 | Method and apparatus for generating and reading composite two-dimensional code |
CN108898205A (en) * | 2017-05-09 | 2018-11-27 | 罗伯特·博世有限公司 | The creation of binary graphics coding, authentication method and system |
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109325367A (en) * | 2018-08-24 | 2019-02-12 | 中国人民解放军国防科技大学 | Information hiding method, device, equipment and computer readable storage medium |
CN109726786A (en) * | 2017-10-31 | 2019-05-07 | 北京京东尚科信息技术有限公司 | Two-dimensional barcode information reading, generation method and device |
CN110119643A (en) * | 2018-02-07 | 2019-08-13 | 北京三快在线科技有限公司 | Two-dimensional code generation method and device, two-dimensional code identification method and device |
CN112069850A (en) * | 2020-09-04 | 2020-12-11 | 上海东普信息科技有限公司 | Service providing method, device, equipment and storage medium based on two-dimension code |
CN112561015A (en) * | 2020-12-22 | 2021-03-26 | 珠海格力电器股份有限公司 | Bar code encoding and decoding method, device, system, equipment and medium |
CN113011543A (en) * | 2021-03-10 | 2021-06-22 | 南京信息职业技术学院 | Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system |
CN113111673A (en) * | 2021-04-09 | 2021-07-13 | 北京复兴华创技术有限公司 | Production line two-dimensional code rapid decoding method and device |
CN113204755A (en) * | 2021-04-20 | 2021-08-03 | 重庆工业职业技术学院 | English data capture method for block chain big data security |
CN113435558A (en) * | 2021-07-19 | 2021-09-24 | 三维码(厦门)网络科技有限公司 | Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information |
CN114580589A (en) * | 2022-02-23 | 2022-06-03 | 复旦大学 | Double-channel two-dimensional code and control method for preventing copying and information hiding |
CN114598529A (en) * | 2022-03-09 | 2022-06-07 | 东北大学 | Image information hiding method fusing encryption |
US11430100B2 (en) | 2016-12-19 | 2022-08-30 | Datamax-O'neil Corporation | Printer-verifiers and systems and methods for verifying printed indicia |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100491649B1 (en) * | 2003-04-07 | 2005-05-27 | 주식회사 에스엠티 | Insertion and detecting system of multi-dimension barcode and the control method |
CN102831455A (en) * | 2012-08-09 | 2012-12-19 | 陕西煤航安全印务有限公司 | Multiple anti-fake method based on two-dimensional bar code |
CN102916804B (en) * | 2012-08-28 | 2015-05-20 | 华南农业大学 | Two-dimension code coding and decoding method and device based on local color verification |
CN103020682B (en) * | 2012-11-30 | 2015-12-02 | 中企永联数据交换技术(北京)有限公司 | Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system |
CN104281866A (en) * | 2013-07-09 | 2015-01-14 | 航天信息股份有限公司 | Two-dimensional code application method and device |
CN103415007B (en) * | 2013-07-09 | 2016-06-01 | 南京邮电大学 | A kind of mobile phone two-dimension code safe handling method based on Information hiding |
-
2016
- 2016-03-09 CN CN201610134624.1A patent/CN105825257B/en active Active
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485157A (en) * | 2016-10-13 | 2017-03-08 | 北京奇虎科技有限公司 | The processing method of logistics information, device server |
CN106650869A (en) * | 2016-10-18 | 2017-05-10 | 重庆文理学院 | Information hiding method based on two-dimensional code |
CN106650869B (en) * | 2016-10-18 | 2020-02-07 | 重庆文理学院 | Information hiding method based on two-dimensional code |
US11430100B2 (en) | 2016-12-19 | 2022-08-30 | Datamax-O'neil Corporation | Printer-verifiers and systems and methods for verifying printed indicia |
CN106815544A (en) * | 2017-01-16 | 2017-06-09 | 武汉大学 | A kind of information concealing method based on Quick Response Code |
CN106815544B (en) * | 2017-01-16 | 2019-05-10 | 武汉大学 | A kind of information concealing method based on two dimensional code |
US11042791B2 (en) | 2017-01-24 | 2021-06-22 | Beijing Bigcode Technology Co., Ltd. | Method and apparatus for generating and reading composite two-dimensional code |
WO2018137602A1 (en) * | 2017-01-24 | 2018-08-02 | 北京大码技术有限公司 | Method and apparatus for generating and reading composite two-dimensional code |
CN107016499A (en) * | 2017-03-23 | 2017-08-04 | 国家电网公司 | A kind of substation equipment patrol method recognized based on two-dimentional code encryption |
CN108898205A (en) * | 2017-05-09 | 2018-11-27 | 罗伯特·博世有限公司 | The creation of binary graphics coding, authentication method and system |
CN107358284A (en) * | 2017-07-11 | 2017-11-17 | 北京捷润科技有限公司 | Generation method, read method, generating means and the reading device of Quick Response Code |
CN109726786B (en) * | 2017-10-31 | 2023-09-26 | 北京京东尚科信息技术有限公司 | Two-dimensional code information reading and generating method and device |
CN109726786A (en) * | 2017-10-31 | 2019-05-07 | 北京京东尚科信息技术有限公司 | Two-dimensional barcode information reading, generation method and device |
CN107992923A (en) * | 2017-12-22 | 2018-05-04 | 北京中星仝创科技有限公司 | A kind of QR Quick Response Codes generation and the method read |
CN110119643A (en) * | 2018-02-07 | 2019-08-13 | 北京三快在线科技有限公司 | Two-dimensional code generation method and device, two-dimensional code identification method and device |
CN110119643B (en) * | 2018-02-07 | 2020-11-03 | 北京三快在线科技有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
US11263416B2 (en) | 2018-02-07 | 2022-03-01 | Beijing Sankuai Online Technology Co., Ltd | Two-dimensional code generation and identification |
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109325367B (en) * | 2018-08-24 | 2020-07-14 | 中国人民解放军国防科技大学 | Information hiding method, device, equipment and computer readable storage medium |
CN109325367A (en) * | 2018-08-24 | 2019-02-12 | 中国人民解放军国防科技大学 | Information hiding method, device, equipment and computer readable storage medium |
CN112069850A (en) * | 2020-09-04 | 2020-12-11 | 上海东普信息科技有限公司 | Service providing method, device, equipment and storage medium based on two-dimension code |
CN112561015A (en) * | 2020-12-22 | 2021-03-26 | 珠海格力电器股份有限公司 | Bar code encoding and decoding method, device, system, equipment and medium |
CN112561015B (en) * | 2020-12-22 | 2022-04-05 | 珠海格力电器股份有限公司 | Bar code encoding and decoding method, device, system, equipment and medium |
CN113011543A (en) * | 2021-03-10 | 2021-06-22 | 南京信息职业技术学院 | Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system |
CN113011543B (en) * | 2021-03-10 | 2021-10-29 | 南京信息职业技术学院 | Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system |
CN113111673A (en) * | 2021-04-09 | 2021-07-13 | 北京复兴华创技术有限公司 | Production line two-dimensional code rapid decoding method and device |
CN113204755A (en) * | 2021-04-20 | 2021-08-03 | 重庆工业职业技术学院 | English data capture method for block chain big data security |
CN113435558A (en) * | 2021-07-19 | 2021-09-24 | 三维码(厦门)网络科技有限公司 | Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information |
CN114580589A (en) * | 2022-02-23 | 2022-06-03 | 复旦大学 | Double-channel two-dimensional code and control method for preventing copying and information hiding |
CN114580589B (en) * | 2022-02-23 | 2024-03-08 | 复旦大学 | Dual-channel two-dimensional code and control method for preventing copying and information hiding |
CN114598529A (en) * | 2022-03-09 | 2022-06-07 | 东北大学 | Image information hiding method fusing encryption |
Also Published As
Publication number | Publication date |
---|---|
CN105825257B (en) | 2018-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
CN103778590B (en) | Using digital picture storage and the method and apparatus of transmission information | |
AU2005255946C1 (en) | Systems and methods for digital content security | |
CN101295343A (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
TWI335546B (en) | ||
CN102779263A (en) | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature | |
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
CN102799990A (en) | Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure) | |
JP6489464B2 (en) | Optical code, information transmission method, and authentication method | |
CN106599964A (en) | Two-dimensional code generation and verification method and device | |
CN101201886A (en) | Three-he-code for recognizing commodity | |
CN107294964B (en) | Information transmission method | |
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
CN102073977A (en) | Methods and equipment for generating and authenticating digital signatures and digital signature system | |
CN110210270A (en) | Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system | |
Liu et al. | Rich QR codes with three-layer information using hamming code | |
CN111667039A (en) | Two-dimensional code anti-counterfeiting method | |
CN104951827A (en) | Compound two-dimensional code and identifying system thereof | |
CN107944526A (en) | A kind of dimension code anti-counterfeit method of anti-tamper anti-copying | |
CN102842053B (en) | A kind of false proof figure code label and manufacture method thereof | |
CN116611082A (en) | File electronic signature algorithm capable of improving electronic signature security | |
Mark et al. | A secured online voting system by using blockchain as the medium | |
CN105912894B (en) | A method of it is anti-fake that passport NO. being used for E-seal printed text | |
Yu et al. | A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |