CN105825257A - Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof - Google Patents

Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof Download PDF

Info

Publication number
CN105825257A
CN105825257A CN201610134624.1A CN201610134624A CN105825257A CN 105825257 A CN105825257 A CN 105825257A CN 201610134624 A CN201610134624 A CN 201610134624A CN 105825257 A CN105825257 A CN 105825257A
Authority
CN
China
Prior art keywords
information
bar code
dimensional bar
hiding
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610134624.1A
Other languages
Chinese (zh)
Other versions
CN105825257B (en
Inventor
王冬琦
司马东芳
王志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201610134624.1A priority Critical patent/CN105825257B/en
Publication of CN105825257A publication Critical patent/CN105825257A/en
Application granted granted Critical
Publication of CN105825257B publication Critical patent/CN105825257B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information hiding and hidden information extraction method based on a two-dimensional barcode and an information hiding and hidden information extraction system thereof, and belongs to the field of information security. The two-dimensional barcode is selected to act as the carrier for information hiding. The padding code area of the two-dimensional barcode belongs to a redundant area and is a neglected part under the normal circumstance so that information is hidden in the area and difficult to perceive, and the capacity of the information which can be hidden can also meet the requirements. Secret information to be hidden is encrypted by using a public key of a key pair by utilizing an encoder, and the encrypted hidden information is decrypted by using a private key of the key pair by utilizing a decoder so that security of the hidden secret information can be guaranteed. The verification mode of the C/S structure is adopted, a user transmits a verification request to a server through a client side, the server performs verification and then returns the result, and the user passing verification can continue decoding operation so that legitimacy of the user can be guaranteed.

Description

Information hiding based on two-dimensional bar code and hiding information extracting method and system
Technical field
The invention belongs to information security field, be specifically related to a kind of Information hiding based on two-dimensional bar code and hiding information extracting method and system.
Background technology
Information hiding is by technology in other message, picture or file of message first, picture or file hiding; because information would generally be encrypted before being hidden; so Information Hiding Techniques is higher than simple encryption technical security, can be with the safety of effective guarantee information.Information Hiding Techniques is mainly used in the aspect such as secret communication, authentication, digital copyright protecting and tracking and information integrity, authenticity identification and content recovery.Its application in secret communication is secret information to be hidden in digital carrier and utilizes overt channel to transmit, and this most generally exists in fields such as military affairs, business, finance.Fig. 1 is the model of Information Hiding Techniques, Information hiding performs stage use double secret key secret information and is encrypted pretreatment, use embedded mobile GIS that the ciphertext after encryption is embedded in carrier afterwards, then the close carrier of load comprising secret information passes to recipient via common signal channel, and recipient uses extraction algorithm extract ciphertext and use decryption key decryption to go out secret information.Wherein, the selection of Covers of Information Hiding and be correspondingly embedded in, the design of extraction algorithm is the important foundation problem of Information hiding research.
Two-dimensional bar code is a kind of special barcode technology, it is called for short Quick Response Code, it uses the geometrical patterns such as rectangle, point, hexagon to represent information, use several geometrical bodies corresponding with binary system to represent word numerical information during coding, then inputted by image during decoding or photoelectric scanning device automatically identifying and reading information.Two-dimensional bar code has quick readability and the advantage of high storage capacity, therefore applies quite varied, particularly benefits from the development of intelligent mobile terminal technology, 2D bar code technology is widely used in tracking of products, article mark, real-time tracing, document management, a series of fields such as marketing.Such as, can mutually be added good friend by scanning two-dimension bar code, log in website etc. in mobile immediate communication software between user, vending machine can also use two-dimensional bar code to carry out commodity identification and purchase etc..In a word, two-dimensional bar code is just constantly being popularized as a kind of widely used Information Communication carrier.
Summary of the invention
The technical scheme is that
A kind of information concealing method based on two-dimensional bar code, uses two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and be hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Step 2.1: generate several double secret key in the encoder, and be numbered to each double secret key, and this numbering is set as the cipher key feature value corresponding to each double secret key;
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and utilizes the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;
Step 2.3: the cipher key feature value corresponding to the double secret key that encoder will be chosen adds the stem of described ciphertext to, the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server deposit;
Step 3: described general information a and the described ciphertext with cipher key feature value are carried out data analysis, determine the character types of the two, and it is converted into sign character by corresponding character set, and according to the length of described general information a and type and the length of the described ciphertext with cipher key feature value and type, select out the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: according to QR barcode encoding rule, described general information a and the described data character with cipher key feature value ciphertext are respectively converted into the form of bit stream, form the binary data code word of general information and the binary data code word of secret information to be concealed respectively;
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, complete the coding to this two-dimensional bar code;
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;
Step 6.3: start to be sequentially embedded by the code word data of the ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code, until this ciphertext terminates, if also rest position polishing code polishing, and complete final two-dimensional bar code coding;
Step 7: be filled into successively in the corresponding region of two-dimensional bar code by coding final for this two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.
A kind of hiding information extracting method based on two-dimensional bar code, is directed to hide in described information concealing method based on two-dimensional bar code the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously;
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3;
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.
The Information hiding based on two-dimensional bar code set up with described based on two-dimensional bar code hiding information extracting method according to described information concealing method based on two-dimensional bar code and hiding information extracting system, including: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the coding of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;(c) cipher key feature value that Rcv decoder scanning obtains from decoder and the ciphertext of hiding information, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.
Beneficial effects of the present invention: the advantage that the present invention has following several respects:
1. select two-dimensional bar code as the carrier of Information hiding, in two-dimensional bar code, polishing code region belongs to redundant area, it is unheeded part under normal circumstances, therefore will be difficult to Information hiding in the region be noticeable, and suppressible information capacity can also meet demand.
2. utilizing encoder to use the PKI of cipher key pair to be encrypted secret information to be concealed, the hiding information after utilizing decoder to use the private key pair encryption of cipher key pair is decrypted, and thereby ensures that the safety of hidden secret information.
3. using the verification mode of C/S structure, user sends checking request by user end to server, returns result after server authentication, and the user being only verified could continue decoding operation, thereby ensures that the legitimacy of user.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of a kind of information hiding model;
Fig. 2 is the information concealing method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 3 is that the two-dimensional barcode information of one embodiment of the present invention embeds schematic diagram;
Fig. 4 is based on two-dimensional bar code the hiding information extracting method flow chart of one embodiment of the present invention;
Fig. 5 is the Information hiding based on two-dimensional bar code of one embodiment of the present invention and hiding information extracting system structured flowchart;
Detailed description of the invention
With detailed description of the invention, the present invention is described in further detail below in conjunction with the accompanying drawings.
The information concealing method based on two-dimensional bar code of present embodiment, as in figure 2 it is shown, use two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and is hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Under normal circumstances from being intended to through server authentication as the hiding information of extraction the two-dimensional bar code of Covers of Information Hiding, but, if the information of hiding directly is stored in two-dimensional bar code with the form of information code word, the region person of being hacked once embedding the information of hiding in two-dimensional bar code is found that, assailant will be directly obtained the plaintext of hiding information, first selects a kind of existing public key encryption algorithm to be encrypted secret information to be concealed.
Step 2.1: selecting a kind of existing public key encryption algorithm to generate several double secret key in the encoder, and be numbered to each double secret key, numbered code is metric double figures, and this numbering is set as the cipher key feature value corresponding to each double secret key;The most each double secret key comprises a PKI and a private key, and PKI is used to be encrypted information, and what private key was used to be decrypted information.
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and (n, k) with (n, d), wherein (n, k) is PKI, and (n d) is private key;Wherein n is the long-pending of two big prime number p, q, and n represents figure place shared when with binary representation, it is simply that so-called key length;K and d is a pair relevant value, and k is the constant that can arbitrarily take, but k is relatively prime with (p-1) * (q-1);And the requirement about d is (d*k) mod ((p-1) * (q-1))=1.
(the plaintext m of described secret information to be concealed k) is encrypted and generates ciphertext m of secret information to be concealed by n to utilize the PKI of this selected cipher key pairk, and meet: m=mk^dmodn;mk=m^kmodn.
Step 2.3: the cipher key feature value corresponding to selected double secret key is set to t and t adds to described ciphertext m by encoderkStem, this cipher key pair is used for the private key deciphered simultaneously and numbers to bundle with this double secret key and be sent in server deposit;
Step 3: according to the coding flow process of QR bar code, first data analysis is carried out, determine described general information a and the character types of the ciphertext with cipher key feature value, and it is converted into sign character by corresponding character set, simultaneously according to version and the grade of error correcting code of the selected two-dimensional bar code as Covers of Information Hiding of character length and type, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
When selecting version v and error-correction level w of this two-dimensional bar code, version v is the highest for two-dimensional bar code, or error-correction level w is the lowest, then capacity C is the highest.The two-dimensional bar code version selected and error-correction level should meet the size of the final data stream desired volume that capacity is formed, i.e. C (v, w) >=C (a)+C (m) more than or equal to general information and secret information to be concealed;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: select corresponding QR barcode encoding pattern according to the type of general information a and the character types of secret information to be concealed respectively, add corresponding mode indicators and character count designator etc..And according to QR barcode encoding rule, described general information a and the described data character with the ciphertext of cipher key feature value are respectively converted into the form of bit stream, the method i.e. forming a code word according to every 8 bits, forms code word data and the code word data of secret information to be concealed of general information respectively;
By general information a and ciphertext mkData character be converted to the form of bit stream, wherein m according to the coding rule of QR bar code in two-dimensional bar codekIn metric double figures cipher key feature value t all represent with the binary number of 8.General information data bit stream Sa and ciphertext data bit stream Sm is formed after conversionk, the figure place of the bit stream formed if not 8 multiple, then at end with 0 polishing.The most respectively to Sa and SmkDivide by the processing mode of 8 code words, form code word data and the code word data of secret information to be concealed of final general information.
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, and complete the coding to this two-dimensional bar code;
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;Shared by the numeric data code part in two-dimensional bar code, the ratio of its entire area is less, and the information code character segment capacity of the two-dimensional bar code of indicated release and error-correction level is fixing, and necessarily not less than the capacity needed for embedding information, so typically remainder codewords all can be there is after information code word.Residual capacity after generally two-dimensional bar code embeds general information is all to fill with polishing code, therefore can embed secret information code word to be hidden on the polishing code position after embedding the code word of general information of two-dimensional bar code.
Step 6.3: after the stop bits of the code word data that the code word data of secret information ciphertext is added on general information, will the code word data of ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code start to be sequentially embedded, until this ciphertext terminates, if still there is remainder codewords in polishing code region after having added the code word data of secret information, then with polishing code (11101100 and/or 00010001) polishing, form the final code word sequence of two-dimensional bar code.
Step 7: after arranging functional graphic, is filled into the final coded sequence of this two-dimensional bar code successively in the corresponding region of two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.It is illustrated in figure 3 two-dimensional barcode information and embeds schematic diagram, start to be filled into corresponding region successively along continuous print Lycoperdon polymorphum Vitt lines by final coding lower right position of two-dimensional bar code from figure, form the two-dimensional barcode image corresponding to bit stream of final coding, wherein binary number 1 filled black, 0 fills by white, if running into non-data area, then get around or skip, until completing the structure of whole two-dimensional barcode image.
Based on two-dimensional bar code the hiding information extracting method of present embodiment, as shown in Figure 4, is directed to hide in described information concealing method based on two-dimensional bar code the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously.
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3.
Only use decoder+FTP client FTP designed in the present embodiment to log in, and identity is effectively verified, the two-dimensional bar code with hiding information could be scanned by the decoder that client connects and get secret information;And do not use the user of this system login simply to use the most common decoder with barcode scanning function that the two-dimensional bar code with hiding information is scanned, its scanning process only can perform common read functions, owing to the polishing code region in two-dimensional bar code belongs to redundant area, the part ignored by common decoder under normal circumstances, so common decoder can only read the code word data of general information a before stop bits " 0000 ", general information therefore can only be got.
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;If user uses common decoder to be scanned the two-dimensional barcode image with hiding information generated, then can only read the general information of storage in two-dimensional bar code, and obtain less than being hidden in secret information therein;
The operation principle of the decoder in client is the content being obtained all information code words by scanning two-dimension bar code, at the code word data that part is general information of information code word foremost, until stop bits " 0000 ", general information code word data part terminates;Record successively is started from stop bits, owing to the ciphertext of secret information is to start to embed after stop bits, and cipher key feature value is filled in the foremost of ciphertext, and the figure place setting cipher key feature value t is fixed as 8, and therefore 8 bit data code words after stop bits are t value;After cipher key feature value t record, cipher key feature value is sent to server;Next the code word data of the ciphertext of the secret information that record is hidden is started, because it is to be filled by the polishing code field (11101100 and/or 00010001) fixed that ciphertext embeds the remainder codewords after terminating, therefore record is until there is polishing code, the ciphertext code word data of secret information obtains and terminates, thus obtains secret information ciphertext m hiddenk
May be with hiding information and attempt to crack this coded system and carry out the acquisition of secret information if there being assailant to be found that in two-dimensional bar code, then first he is accomplished by finding the start bit of the code word data of hiding secret information, this point just to have certain difficulty;Even if assailant have found the start bit that secret information code word data embeds, but also secret information is also taken encryption preprocessing process due to us, therefore cannot crack ciphering process acquisition is also the secret information ciphertext after encrypting, and still cannot obtain the plaintext of secret information.So the safety that the secret information being finally hidden is in plain text is secure.
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.The numbering of the most selected for the cipher key feature value received according to it double secret key is carried out comparison successively with all secret key pairs leaving server before in by server, filter out the private key (n of identical numbering, d), and by this private key (n, d) sending back client, the decoder in client is by known ciphertext mkWith decrypted private key (n, d), and according to the formula of public key encryption algorithm: m=mk^dmodn;mk=m^kmodn, ciphertext m to hiding secret informationkIt is decrypted process, gets the plaintext m of secret information to be hidden the most at last, and show in client.
The Information hiding based on two-dimensional bar code of the present embodiment that the information concealing method based on two-dimensional bar code according to present embodiment is set up with hiding information extracting method based on two-dimensional bar code and hiding information extracting system, as it is shown in figure 5, include: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the final code word sequence of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;C () scans the cipher key feature value and the ciphertext of hiding information obtained from decoder Rcv decoder, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.

Claims (4)

1. an information concealing method based on two-dimensional bar code, it is characterised in that: use two-dimensional bar code as the carrier of Information hiding, will be embedded in two-dimensional bar code and be hidden by secret information, comprise the steps:
Step 1: obtain and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text, and a and m is input in encoder;
Step 2: secret information is encrypted pretreatment;
Step 2.1: generate several double secret key in the encoder, and be numbered to each double secret key, and this numbering is set as the cipher key feature value corresponding to each double secret key;
Step 2.2: utilize the PKI of cipher key pair that secret information is done the encryption process;
Encoder randomly selects a double secret key in the cipher key pair generated, and utilizes the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;
Step 2.3: the cipher key feature value corresponding to the double secret key that encoder will be chosen adds the stem of described ciphertext to, the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server deposit;
Step 3: described general information a and the described ciphertext with cipher key feature value are carried out data analysis, determine the character types of the two, and it is converted into sign character by corresponding character set, and according to the length of described general information a and type and the length of the described ciphertext with cipher key feature value and type, select out the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of described two-dimensional bar code and the grade input coding device of error correcting code;
Step 4: the encoder version according to described two-dimensional bar code and the grade of error correcting code, determines the specification of the two-dimensional bar code as Covers of Information Hiding;
Step 5: according to QR barcode encoding rule, described general information a and the described data character with cipher key feature value ciphertext are respectively converted into the form of bit stream, form the binary data code word of general information and the binary data code word of secret information to be concealed respectively;
Step 6: code word data and the described code word data with the ciphertext of cipher key feature value of described general information a are embedded in described two-dimensional bar code, and complete the coding final to this two-dimensional bar code;
Step 7: be filled into successively in the corresponding region of two-dimensional bar code by coding final for this two-dimensional bar code, completes the structure of this two-dimensional bar code matrix.
Information concealing method based on two-dimensional bar code the most according to claim 1, it is characterised in that: described step 6 comprises the steps:
Step 6.1: the code word data of general information a is embedded in described two-dimensional bar code according to the coding rule of QR bar code, and finally add stop bits " 0000 " at general information code word data;
Step 6.2: calibrate last position and the first place of error correcting code of the general information stored in this two-dimensional bar code, and then correspondingly obtain start bit and the stop bit in the polishing code region of this two-dimensional bar code;
Step 6.3: start to be sequentially embedded by the code word data of the ciphertext of the described secret information with the cipher key feature value start bit from the polishing code region of this two-dimensional bar code, until this ciphertext terminates, if also rest position polishing code polishing, and complete final two-dimensional bar code coding.
3. a hiding information extracting method based on two-dimensional bar code, it is characterised in that: it is directed to described information concealing method based on two-dimensional bar code is hidden the extraction of information, comprises the steps:
Step S1: user inputs the log-on message of its people in client, and waiting for server verifies the effectiveness of its identity simultaneously;
Step S2: whether this user identity of server authentication is legal registration user, if this user identity of server authentication is not legal user, verifies and do not pass through, client display content is the information of authentication failed, i.e. this user will be unable to get the authority of scanning two-dimension bar code;If this user identity of server authentication is legal user, it is verified, the most at once jumps to the two-dimensional bar code scanning interface of decoder in client, and perform step S3;
Step S3: user utilizes decoder alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding, by getting cipher key feature value and the ciphertext of hiding information after scanning, cipher key feature value is sent to server simultaneously;
Step S4: server is selected the private key of correspondence according to cipher key feature value and sends back client, the decoder in client utilizes the private key got that the ciphertext of hiding information is decrypted the plaintext obtaining information of hiding immediately, and shows in client.
4. an Information hiding based on two-dimensional bar code and hiding information extracting system, it is characterised in that: including: encoder, server, decoder and client;Described encoder is connected with described server;Described decoder is deposited in client;
Described encoder: (a) receives and need to be stored in general information a in two-dimensional bar code and secret information to be concealed m in plain text;B () generates several double secret key, and be numbered to each double secret key, and numbering is set as the cipher key feature value of counterpart keys pair;C () randomly selects a double secret key in the cipher key pair generated, and utilize the PKI of this cipher key pair that the plaintext m of described secret information to be concealed is encrypted the ciphertext generating secret information to be concealed;Cipher key feature value corresponding to d double secret key that () will be chosen adds the stem of described ciphertext to, and the private key that this cipher key pair is used for decipher simultaneously bundles with this double secret key numbering and is sent in server;E () receives the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, determine the specification of the two-dimensional bar code as Covers of Information Hiding;F described general information a and the described ciphertext with cipher key feature value, according to QR barcode encoding rule, are respectively converted into its respective binary data code word by ();G the code word data of described general information a is stored in described two-dimensional bar code by () after, then the polishing code region by the code word data embedding two-dimensional bar code of the described ciphertext with cipher key feature value, and complete the coding of this two-dimensional bar code;H the final coding of this two-dimensional bar code is filled in the corresponding region of two-dimensional bar code by () successively, complete the structure of this two-dimensional bar code matrix, and generate final two-dimensional barcode image;
Described server, (a) receives the private key being used for deciphering the secret information hidden two-dimensional bar code and the numbering of the corresponding double secret key bundled with this private key from encoder;(b) storage registration subscriber identity information, and the subscriber identity information that client transmission is next is verified, and transmit verification result to client;C () receives cipher key feature value from client, and find out the private key of correspondence by this cipher key feature value and send this private key to client;
Described client, (a) is for receiving the log-on message of its people of user's input, and this log-on message is sent to server;B (), for receiving subscriber authentication result from server, if the result is not for pass through, then shows the information of authentication failed, if being verified, the most at once jump to the two-dimensional bar code scanning interface of decoder;(c) cipher key feature value that Rcv decoder scanning obtains from decoder and the ciphertext of hiding information, and cipher key feature value is sent to server;D () client receives private key from server, and this private key is sent to decoder;E () provides the plaintext of the hiding information that decoder decrypts on the display interface of client;
Described decoder, (a) is used alignment to be scanned as the two-dimensional bar code of Covers of Information Hiding by user, gets cipher key feature value and the ciphertext of hiding information and reach client after scanning;B () receives private key from client, and utilize this private key to be decrypted the ciphertext hiding information in two-dimensional bar code to obtain hiding the plaintext of information and sending it to client.
CN201610134624.1A 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code Active CN105825257B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610134624.1A CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610134624.1A CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Publications (2)

Publication Number Publication Date
CN105825257A true CN105825257A (en) 2016-08-03
CN105825257B CN105825257B (en) 2018-05-29

Family

ID=56987036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610134624.1A Active CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Country Status (1)

Country Link
CN (1) CN105825257B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485157A (en) * 2016-10-13 2017-03-08 北京奇虎科技有限公司 The processing method of logistics information, device server
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code
CN106815544A (en) * 2017-01-16 2017-06-09 武汉大学 A kind of information concealing method based on Quick Response Code
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption
CN107358284A (en) * 2017-07-11 2017-11-17 北京捷润科技有限公司 Generation method, read method, generating means and the reading device of Quick Response Code
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read
WO2018137602A1 (en) * 2017-01-24 2018-08-02 北京大码技术有限公司 Method and apparatus for generating and reading composite two-dimensional code
CN108898205A (en) * 2017-05-09 2018-11-27 罗伯特·博世有限公司 The creation of binary graphics coding, authentication method and system
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN109726786A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional barcode information reading, generation method and device
CN110119643A (en) * 2018-02-07 2019-08-13 北京三快在线科技有限公司 Two-dimensional code generation method and device, two-dimensional code identification method and device
CN112069850A (en) * 2020-09-04 2020-12-11 上海东普信息科技有限公司 Service providing method, device, equipment and storage medium based on two-dimension code
CN112561015A (en) * 2020-12-22 2021-03-26 珠海格力电器股份有限公司 Bar code encoding and decoding method, device, system, equipment and medium
CN113011543A (en) * 2021-03-10 2021-06-22 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN113111673A (en) * 2021-04-09 2021-07-13 北京复兴华创技术有限公司 Production line two-dimensional code rapid decoding method and device
CN113204755A (en) * 2021-04-20 2021-08-03 重庆工业职业技术学院 English data capture method for block chain big data security
CN113435558A (en) * 2021-07-19 2021-09-24 三维码(厦门)网络科技有限公司 Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information
CN114580589A (en) * 2022-02-23 2022-06-03 复旦大学 Double-channel two-dimensional code and control method for preventing copying and information hiding
CN114598529A (en) * 2022-03-09 2022-06-07 东北大学 Image information hiding method fusing encryption
US11430100B2 (en) 2016-12-19 2022-08-30 Datamax-O'neil Corporation Printer-verifiers and systems and methods for verifying printed indicia

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100491649B1 (en) * 2003-04-07 2005-05-27 주식회사 에스엠티 Insertion and detecting system of multi-dimension barcode and the control method
CN102831455A (en) * 2012-08-09 2012-12-19 陕西煤航安全印务有限公司 Multiple anti-fake method based on two-dimensional bar code
CN102916804B (en) * 2012-08-28 2015-05-20 华南农业大学 Two-dimension code coding and decoding method and device based on local color verification
CN103020682B (en) * 2012-11-30 2015-12-02 中企永联数据交换技术(北京)有限公司 Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
CN104281866A (en) * 2013-07-09 2015-01-14 航天信息股份有限公司 Two-dimensional code application method and device
CN103415007B (en) * 2013-07-09 2016-06-01 南京邮电大学 A kind of mobile phone two-dimension code safe handling method based on Information hiding

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485157A (en) * 2016-10-13 2017-03-08 北京奇虎科技有限公司 The processing method of logistics information, device server
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code
CN106650869B (en) * 2016-10-18 2020-02-07 重庆文理学院 Information hiding method based on two-dimensional code
US11430100B2 (en) 2016-12-19 2022-08-30 Datamax-O'neil Corporation Printer-verifiers and systems and methods for verifying printed indicia
CN106815544A (en) * 2017-01-16 2017-06-09 武汉大学 A kind of information concealing method based on Quick Response Code
CN106815544B (en) * 2017-01-16 2019-05-10 武汉大学 A kind of information concealing method based on two dimensional code
US11042791B2 (en) 2017-01-24 2021-06-22 Beijing Bigcode Technology Co., Ltd. Method and apparatus for generating and reading composite two-dimensional code
WO2018137602A1 (en) * 2017-01-24 2018-08-02 北京大码技术有限公司 Method and apparatus for generating and reading composite two-dimensional code
CN107016499A (en) * 2017-03-23 2017-08-04 国家电网公司 A kind of substation equipment patrol method recognized based on two-dimentional code encryption
CN108898205A (en) * 2017-05-09 2018-11-27 罗伯特·博世有限公司 The creation of binary graphics coding, authentication method and system
CN107358284A (en) * 2017-07-11 2017-11-17 北京捷润科技有限公司 Generation method, read method, generating means and the reading device of Quick Response Code
CN109726786B (en) * 2017-10-31 2023-09-26 北京京东尚科信息技术有限公司 Two-dimensional code information reading and generating method and device
CN109726786A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional barcode information reading, generation method and device
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read
CN110119643A (en) * 2018-02-07 2019-08-13 北京三快在线科技有限公司 Two-dimensional code generation method and device, two-dimensional code identification method and device
CN110119643B (en) * 2018-02-07 2020-11-03 北京三快在线科技有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
US11263416B2 (en) 2018-02-07 2022-03-01 Beijing Sankuai Online Technology Co., Ltd Two-dimensional code generation and identification
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109325367B (en) * 2018-08-24 2020-07-14 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN112069850A (en) * 2020-09-04 2020-12-11 上海东普信息科技有限公司 Service providing method, device, equipment and storage medium based on two-dimension code
CN112561015A (en) * 2020-12-22 2021-03-26 珠海格力电器股份有限公司 Bar code encoding and decoding method, device, system, equipment and medium
CN112561015B (en) * 2020-12-22 2022-04-05 珠海格力电器股份有限公司 Bar code encoding and decoding method, device, system, equipment and medium
CN113011543A (en) * 2021-03-10 2021-06-22 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN113011543B (en) * 2021-03-10 2021-10-29 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN113111673A (en) * 2021-04-09 2021-07-13 北京复兴华创技术有限公司 Production line two-dimensional code rapid decoding method and device
CN113204755A (en) * 2021-04-20 2021-08-03 重庆工业职业技术学院 English data capture method for block chain big data security
CN113435558A (en) * 2021-07-19 2021-09-24 三维码(厦门)网络科技有限公司 Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information
CN114580589A (en) * 2022-02-23 2022-06-03 复旦大学 Double-channel two-dimensional code and control method for preventing copying and information hiding
CN114580589B (en) * 2022-02-23 2024-03-08 复旦大学 Dual-channel two-dimensional code and control method for preventing copying and information hiding
CN114598529A (en) * 2022-03-09 2022-06-07 东北大学 Image information hiding method fusing encryption

Also Published As

Publication number Publication date
CN105825257B (en) 2018-05-29

Similar Documents

Publication Publication Date Title
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN105719120B (en) A method of encryption express delivery list privacy information
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
AU2005255946C1 (en) Systems and methods for digital content security
CN101295343A (en) Two-dimensional code multi-enciphering anti-fake printing method
TWI335546B (en)
CN102779263A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN107992923A (en) A kind of QR Quick Response Codes generation and the method read
CN102799990A (en) Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)
JP6489464B2 (en) Optical code, information transmission method, and authentication method
CN106599964A (en) Two-dimensional code generation and verification method and device
CN101201886A (en) Three-he-code for recognizing commodity
CN107294964B (en) Information transmission method
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN110210270A (en) Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system
Liu et al. Rich QR codes with three-layer information using hamming code
CN111667039A (en) Two-dimensional code anti-counterfeiting method
CN104951827A (en) Compound two-dimensional code and identifying system thereof
CN107944526A (en) A kind of dimension code anti-counterfeit method of anti-tamper anti-copying
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
CN116611082A (en) File electronic signature algorithm capable of improving electronic signature security
Mark et al. A secured online voting system by using blockchain as the medium
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
Yu et al. A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant