CN105825257B - Information hiding and hiding information extracting method and system based on two-dimensional bar code - Google Patents

Information hiding and hiding information extracting method and system based on two-dimensional bar code Download PDF

Info

Publication number
CN105825257B
CN105825257B CN201610134624.1A CN201610134624A CN105825257B CN 105825257 B CN105825257 B CN 105825257B CN 201610134624 A CN201610134624 A CN 201610134624A CN 105825257 B CN105825257 B CN 105825257B
Authority
CN
China
Prior art keywords
information
bar code
dimensional bar
hiding
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610134624.1A
Other languages
Chinese (zh)
Other versions
CN105825257A (en
Inventor
王冬琦
司马东芳
王志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201610134624.1A priority Critical patent/CN105825257B/en
Publication of CN105825257A publication Critical patent/CN105825257A/en
Application granted granted Critical
Publication of CN105825257B publication Critical patent/CN105825257B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Information hiding and hiding information extracting method and system based on two-dimensional bar code, belong to information security field.Select carrier of the two-dimensional bar code as Information hiding, polishing code region belongs to redundant area in two-dimensional bar code, is ignored part under normal circumstances, therefore Information hiding will be difficult to be noticeable in the region, and suppressible information capacity can also meet demand.Secret information to be concealed is encrypted using the public key of cipher key pair using encoder, is decrypted using decoder using the hiding information after the private key pair encryption of cipher key pair, thereby ensures that the security of hidden secret information.Using the verification mode of C/S structures, user sends checking request by user end to server, is returned the result after server authentication, the user being only verified could continue decoding operate, thereby ensure that the legitimacy of user.

Description

Information hiding and hiding information extracting method and system based on two-dimensional bar code
Technical field
The invention belongs to information security fields, and in particular to a kind of to be carried based on the Information hiding of two-dimensional bar code with hiding information Take method and system.
Background technology
Information hiding is the technology in other message, picture or file by first message, picture or file hiding, because Information would generally be encrypted before being hidden, so Information Hiding Techniques are than simple encryption technical security higher, it can be effective Ensure the safety of information.Information Hiding Techniques be mainly used in secret communication, authentication, digital copyright protecting and tracking and Information integrity, authenticity identification and content recovery etc..Its application in secret communication is that secret information is hidden in It is transferred in digital carrier and using overt channel, this is in the fields such as military affairs, business, finance all generally existings.Fig. 1 is information The model of concealing technology, using key secret information is encrypted pretreatment in the Information hiding execution stage, afterwards using insertion Algorithm is embedded into encrypted ciphertext in carrier, and then the close carrier of the load comprising secret information is passed to via common signal channel connects Receipts person, recipient extract ciphertext using extraction algorithm and go out secret information using decryption key decryption.Wherein, Covers of Information Hiding Selection and be correspondingly embedded in, the design of extraction algorithm be Information hiding research important foundation problem.
Two-dimensional bar code is a kind of special barcode technology, and abbreviation Quick Response Code, it is using geometric graphs such as rectangle, point, hexagons Case represents information, represents word numerical information with the corresponding geometrical body of binary system using several during coding, during decoding Then pass through image input or photoelectric scanning device automatically identifying and reading information.Two-dimensional bar code has the excellent of quick readable and high storage capacity Gesture, therefore application is very extensive, particularly benefits from the development of intelligent mobile terminal technology, 2D bar code technology is widely used In a series of fields such as tracking of products, article mark, real-time tracing, document management, the marketing.For example, mobile immediate communication It can mutually add good friend by scanning two-dimension bar code between user in software, log in website etc., vending machine can also Commodity identification and purchase etc. are carried out using two-dimensional bar code.In short, two-dimensional bar code is just propagated as a kind of widely used information Carrier is popularized constantly.
The content of the invention
The technical scheme is that:
A kind of information concealing method based on two-dimensional bar code, i.e., will be secret using carrier of the two-dimensional bar code as Information hiding Confidential information, which is embedded into two-dimensional bar code, to be hidden, and is included the following steps:
Step 1:General information a and secret information plaintext m to be concealed in two-dimensional bar code need to be stored in by obtaining, and by a It is input to m in encoder;
Step 2:Secret information is encrypted pretreatment;
Step 2.1:Several keys pair are generated in the encoder, and are numbered to each key to being numbered, and by this It is set as each key to corresponding cipher key feature value;
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair in the cipher key pair generated, and utilizes the public key of this cipher key pair will The ciphertext for generating secret information to be concealed is encrypted in the plaintext m of the secret information to be concealed;
Step 2.3:The key of selection is added to corresponding cipher key feature value the stem of the ciphertext by encoder, together When the cipher key pair be used for the private key decrypted stored with the key to numbering to bundle to be sent in server;
Step 3:Both data analysis is carried out to the general information a and the ciphertext with cipher key feature value, determine Character types, and be converted into sign character by corresponding character set, and according to the length and type of the general information a and institute The length and type of the ciphertext with cipher key feature value are stated, select out the version of the two-dimensional bar code as Covers of Information Hiding and is entangled The grade of error code, and will be in the version of the two-dimensional bar code and the grade input coding device of error correcting code;
Step 4:Encoder is determined as Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code Two-dimensional bar code specification;
Step 5:According to QR barcode encodings rule, by the general information a and the number with cipher key feature value ciphertext The form of bit stream is respectively converted into according to character, is respectively formed the binary data code word of general information and secret to be concealed The binary data code word of information;
Step 6:The binary data code word of the code word data of the general information a and the secret information to be concealed is embedding Enter into the two-dimensional bar code, complete the coding to the two-dimensional bar code;
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes In, and in the last addition stop bits " 0000 " of general information code word data;
Step 6.2:Calibrate the last position of general information stored in the two-dimensional bar code and the first place of error correcting code, Jin Erxiang Ground is answered to obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;
Step 6.3:By the binary data code word of the secret information to be concealed from the polishing code region of the two-dimensional bar code Start bit start to be sequentially embedded, until the ciphertext terminates, if also rest position polishing code polishing, and complete final Two-dimensional bar code coding;
Step 7:The final coding of the two-dimensional bar code is successively filled in the corresponding region of two-dimensional bar code, completes the two dimension The construction of bar code matrix.
A kind of hiding information extracting method based on two-dimensional bar code is directed to the Information hiding based on two-dimensional bar code The extraction of hiding information, includes the following steps in method:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies having for its identity Effect property;
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user's body Part it is not that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user is by nothing Method gets the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, i.e., The two-dimensional bar code scanning interface for jumping to decoder in client is carved, and performs step S3;
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will after scanning The ciphertext of cipher key feature value and hiding information is got, while cipher key feature value is sent to server;
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, in client Decoder is decrypted the ciphertext of hiding information using the private key got to obtain the plaintext of hiding information immediately, and in client End is shown.
It is carried according to described based on the information concealing method of two-dimensional bar code and the hiding information based on two-dimensional bar code The Information hiding and hiding information extraction system based on two-dimensional bar code that method is established are taken, including:Encoder, server, decoding Device and client;The encoder is connected with the server;The decoder is deposited in client;
The encoder:(a) the general information a that need to be stored in two-dimensional bar code and secret information to be concealed are received in plain text m;(b) several keys pair are generated, and to each key to being numbered, and the key spy for being set as counterpart keys pair will be numbered Value indicative;(c) key pair is randomly selected in the cipher key pair generated, and is treated using the public key of this cipher key pair by described The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to pair The cipher key feature value answered is added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to compiling It number bundles and to be sent in server;(e) receiving will be as the version and error correcting code of the two-dimensional bar code of Covers of Information Hiding Grade, be determined as the specification of the two-dimensional bar code of Covers of Information Hiding;It (f), will be described common according to QR barcode encodings rule Information a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;It (g) will be described common After the code word data of information a is stored into the two-dimensional bar code, then the code word data by the ciphertext with cipher key feature value The polishing code region of embedded two-dimensional bar code, and complete the coding of the two-dimensional bar code;(h) by the final coding of the two-dimensional bar code successively It is filled into the corresponding region of two-dimensional bar code, completes the construction of the two-dimensional bar code matrix, and generate final two-dimensional barcode image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and With the number for the corresponding key pair that the private key bundles;(b) registered user's identity information is stored, and client is sent The subscriber identity information come is verified, and transmits verification result to client;(c) cipher key feature value is received from client, And pass through the cipher key feature value and find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to Server;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing authentication failed Prompt message, if being verified, jump at once decoder two-dimensional bar code scanning interface;(c) received from decoder The cipher key feature value and the ciphertext of hiding information that decoder scans, and cipher key feature value is sent to server;(d) client End receives private key from server, and the private key is sent to decoder;(e) decoder solution is provided on the display interface of client It is close go out hiding information plaintext;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, scanning The ciphertext of cipher key feature value and hiding information is got afterwards and reaches client;(b) private key is received from client, and utilizes the private Key is decrypted to obtain the plaintext of hiding information and sends it to client to the ciphertext of hiding information in two-dimensional bar code.
Beneficial effects of the present invention:The present invention has the advantages that following several respects:
1. selecting carrier of the two-dimensional bar code as Information hiding, polishing code region belongs to redundant area in two-dimensional bar code, just It is ignored part in the case of often, therefore Information hiding will be difficult to be noticeable in the region, and suppressible information is held Amount can also meet demand.
2. secret information to be concealed is encrypted using the public key of cipher key pair using encoder, made using decoder It is decrypted with the hiding information after the private key pair encryption of cipher key pair, thereby ensures that the safety of hidden secret information Property.
3. using the verification mode of C/S structures, user sends checking request, server authentication by user end to server After return the result, the user being only verified could continue decoding operate, thereby ensure that the legitimacy of user.
Description of the drawings
Fig. 1 is a kind of schematic diagram of information hiding model;
Fig. 2 is the information concealing method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 3 is that the two-dimensional barcode information of one embodiment of the present invention is embedded in schematic diagram;
Fig. 4 is the hiding information extracting method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 5 is the Information hiding and hiding information extraction system structure based on two-dimensional bar code of one embodiment of the present invention Block diagram;
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and detailed description.
The information concealing method based on two-dimensional bar code of present embodiment, as shown in Fig. 2, using two-dimensional bar code as information Secret information is embedded into two-dimensional bar code and is hidden, includes the following steps by hiding carrier:
Step 1:General information a and secret information plaintext m to be concealed in two-dimensional bar code need to be stored in by obtaining, and by a It is input to m in encoder;
Step 2:Secret information is encrypted pretreatment;
It is to recognize by server that hiding information is extracted from the two-dimensional bar code as Covers of Information Hiding under normal circumstances Card, still, if hiding information is directly stored in the form of information code word in two-dimensional bar code, once insertion is hidden in two-dimensional bar code The region for hiding information is found that attacker will be directly obtained the plaintext of hiding information by attacker, therefore in the present embodiment In select a kind of existing public key encryption algorithm that secret information to be concealed is encrypted first.
Step 2.1:A kind of existing public key encryption algorithm is selected to generate several keys pair in the encoder, and to each For key to being numbered, number code is metric double figures, and is set as each key to corresponding the number Cipher key feature value;Wherein each key to comprising a public key and a private key, public key for information is encrypted, And private key is for being decrypted information.
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair, (n, k) and (n, d) in the cipher key pair generated, wherein (n, k) is public affairs Key, (n, d) are private key;Wherein n is the product of prime number p, q two big, and n represents occupied digit when with binary representation, just It is so-called key length;K and d is a pair of relevant value, and k is the constant that can arbitrarily take, but k and (p-1) * (q-1) are relatively prime; And the requirement on d is (d*k) mod ((p-1) * (q-1))=1.
The plaintext m of the secret information to be concealed is encrypted using the public key (n, k) of this selected cipher key pair Processing generates the ciphertext m of secret information to be concealedk, and meet:M=mk^d mod n;mk=m^k mod n.
Step 2.3:Selected key is set to t to corresponding cipher key feature value and is added to t described close by encoder Literary mkStem, while the cipher key pair be used for the private key decrypted bundle number with the key to be sent to server In stored;
Step 3:According to the coding flow of QR bar codes, data analysis is carried out first, determines the general information a and with close The character types of the ciphertext of key characteristic value, and sign character is converted by corresponding character set, while according to character length and class Type selectes the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of the two-dimensional bar code and In the grade input coding device of error correcting code;
When selecting the version v of the two-dimensional bar code and error-correction level w, two-dimensional bar code version v is higher or error-correction level w is got over Low, then capacity C is higher.The two-dimensional bar code version and error-correction level of selection should meet capacity more than or equal to general information and to be concealed The final data stream that is formed of secret information needed for capacity size, i.e. C (v, w) >=C (a)+C (m);
Step 4:Encoder is determined as Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code Two-dimensional bar code specification;
Step 5:Respectively corresponding QR is selected according to the character types of the type of general information a and secret information to be concealed Barcode encoding pattern adds corresponding mode indicators and character count indicator etc..And according to QR barcode encodings rule, by institute The data character for stating general information a and the ciphertext with cipher key feature value is respectively converted into the form of bit stream, i.e., The method that a code word is formed according to every 8 bit is respectively formed the code word data of general information and secret letter to be concealed The code word data of breath;
By general information a and ciphertext mkData character according to the coding rule of QR bar codes in two-dimensional bar code be converted to two into The form of bit stream processed, wherein mkIn metric double figures cipher key feature value t represented with the binary number of 8.It converts General information data bit stream Sa and ciphertext data bit stream Sm is formed after finishingk, the digit of the bit stream formed is if not 8 Multiple, then at end with 0 polishing.Then respectively to Sa and SmkIt divides, is formed final by the processing mode of 8 code words The code word data of general information and the code word data of secret information to be concealed.
Step 6:The code word data of the code word data of the general information a and the ciphertext with cipher key feature value is embedding Enter into the two-dimensional bar code, and complete the coding to the two-dimensional bar code;
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes In, and in the last addition stop bits " 0000 " of general information code word data;
Step 6.2:Calibrate the last position of general information stored in the two-dimensional bar code and the first place of error correcting code, Jin Erxiang Ground is answered to obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;Due to shared by the numeric data code part in two-dimensional bar code The ratio of its entire area is smaller, and the information codeword portions capacity of indicated release and the two-dimensional bar code of error-correction level is fixed , and centainly not less than the capacity needed for embedding information, so general after information code word all can there are remainder codewords.Usually Residual capacity after two-dimensional bar code insertion general information is filled with polishing code, therefore can be in the general of embedded two-dimensional bar code The embedded secret information code word to be hidden on polishing code position after the code word of breath that communicates.
Step 6.3:The code word data of secret information ciphertext is added after the stop bits of the code word data of general information, i.e., By the code word data of the ciphertext of the secret information with cipher key feature value from the starting in the polishing code region of the two-dimensional bar code Position starts to be sequentially embedded, until the ciphertext terminates, if having added polishing code region after the code word data of secret information still has Remainder codewords then with polishing code (11101100 and/or 00010001) polishing, form the final code word sequence of two-dimensional bar code.
Step 7:After arranging functional graphic, the final coded sequence of the two-dimensional bar code is successively filled into two-dimensional bar code In corresponding region, the construction of the two-dimensional bar code matrix is completed.Two-dimensional barcode information insertion schematic diagram is illustrated in figure 3, it will be final Coding successively filled since figure the lower right position of two-dimensional bar code along continuous grey lines to corresponding region, formed The two-dimensional barcode image corresponding to bit stream finally encoded, the wherein filled black of binary number 1,0 is filled with white, If running into non-data area, get around or skip, the construction until completing entire two-dimensional barcode image.
The hiding information extracting method based on two-dimensional bar code of present embodiment, as shown in figure 4, being directed to described be based on The extraction of hiding information, includes the following steps in the information concealing method of two-dimensional bar code:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies having for its identity Effect property.
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user's body Part it is not that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user is by nothing Method gets the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, i.e., The two-dimensional bar code scanning interface for jumping to decoder in client is carved, and performs step S3.
It is only logged in using decoder+FTP client FTP designed in the present embodiment, and identity is had Effect is demonstrate,proved, and the decoder that could be connected by client scans the two-dimensional bar code with hiding information to get secret information; Without being to carrying hiding information using the arbitrary common decoder with barcode scanning function using the user of this system login Two-dimensional bar code be scanned, in scanning process only can perform common read functions, due to the polishing code in two-dimensional bar code Region belongs to redundant area, is the part ignored by common decoder under normal circumstances, so common decoder can only be read The code word data of general information a before to stop bits " 0000 ", therefore general information can only be got.
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will after scanning The ciphertext of cipher key feature value and hiding information is got, while cipher key feature value is sent to server;If user uses Common decoder is scanned the two-dimensional barcode image with hiding information generated, then can only read in two-dimensional bar code The general information of storage, and obtain less than being hidden in secret information therein;
The operation principle of decoder in client is to obtain the content of all information code words by scanning two-dimension bar code, The part of information code word foremost is the code word data of general information, until stop bits " until 0000 ", general information numeric data code Character segment terminates;Recorded successively since stop bits, due to the ciphertext of secret information be after the stop bits be embedded in, and key Characteristic value is filled in the foremost of ciphertext again, and the digit for setting cipher key feature value t is fixed as 8, therefore after stop bits 8 code word datas be t values;After cipher key feature value t is recorded, cipher key feature value is sent to server;Next start The code word data of the ciphertext for the secret information hidden is recorded, because the remainder codewords after ciphertext is embedded in are by fixed benefit Neat code field (11101100 and/or 00010001) is recorded come what is filled until there is polishing code, secret information The acquisition of ciphertext code word data terminates, so as to obtain hiding secret information ciphertext mk
If hiding information may be carried and attempt to crack this coding mode progress by having attacker to be found that in two-dimensional bar code The acquisition of secret information, then he just needs to find the start bit of the code word data of hiding secret information first, and this point is just There is certain difficulty;Even if attacker has found the start bit of secret information code word data insertion, but since we are also to secret Information also takes encryption preprocessing process, therefore can not crack ciphering process acquisition is also that encrypted secret information is close Text still can not obtain the plaintext of secret information.So the security for the secret information plaintext being finally hidden is secure.
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, in client Decoder is decrypted the ciphertext of hiding information using the private key got to obtain the plaintext of hiding information immediately, and in client End is shown.Server by the cipher key feature value received according to it i.e. selected by key pair number and the service of being stored in before All secret key pairs of device are compared successively, filter out the private key (n, d) of identical number, and the private key (n, d) is sent back visitor Family end, the decoder in client pass through known ciphertext mkWith decrypted private key (n, d), and according to the public affairs of public key encryption algorithm Formula:M=mk^d mod n;mk=m^k mod n, to the ciphertext m of hiding secret informationkIt is decrypted, most obtains at last To the plaintext m of the initial secret information to be hidden, and shown in client.
Being carried based on the information concealing method of two-dimensional bar code and the hiding information based on two-dimensional bar code according to the present embodiment The Information hiding and hiding information extraction system based on two-dimensional bar code of the present embodiment of method foundation are taken, as shown in figure 5, bag It includes:Encoder, server, decoder and client;The encoder is connected with the server;The decoder deposits in visitor In the end of family;
The encoder:(a) the general information a that need to be stored in two-dimensional bar code and secret information to be concealed are received in plain text m;(b) several keys pair are generated, and to each key to being numbered, and the key spy for being set as counterpart keys pair will be numbered Value indicative;(c) key pair is randomly selected in the cipher key pair generated, and is treated using the public key of this cipher key pair by described The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to pair The cipher key feature value answered is added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to compiling It number bundles and to be sent in server;(e) receiving will be as the version and error correcting code of the two-dimensional bar code of Covers of Information Hiding Grade, be determined as the specification of the two-dimensional bar code of Covers of Information Hiding;It (f), will be described common according to QR barcode encodings rule Information a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;It (g) will be described common After the code word data of information a is stored into the two-dimensional bar code, then the code word data by the ciphertext with cipher key feature value The polishing code region of embedded two-dimensional bar code, and complete the final code word sequence of the two-dimensional bar code;(h) by the final of the two-dimensional bar code Coding is successively filled in the corresponding region of two-dimensional bar code, is completed the construction of the two-dimensional bar code matrix, and is generated final two dimension Bar code image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and With the number for the corresponding key pair that the private key bundles;(b) registered user's identity information is stored, and client is sent The subscriber identity information come is verified, and transmits verification result to client;(c) cipher key feature value is received from client, And pass through the cipher key feature value and find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to Server;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing authentication failed Prompt message, if being verified, jump at once decoder two-dimensional bar code scanning interface;(c) receive and solve from decoder The cipher key feature value and the ciphertext of hiding information that code device scans, and cipher key feature value is sent to server;(d) client Private key is received from server, and the private key is sent to decoder;(e) decoder decryption is provided on the display interface of client The plaintext of the hiding information gone out;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, scanning The ciphertext of cipher key feature value and hiding information is got afterwards and reaches client;(b) private key is received from client, and utilizes the private Key is decrypted to obtain the plaintext of hiding information and sends it to client to the ciphertext of hiding information in two-dimensional bar code.

Claims (4)

1. a kind of information concealing method based on two-dimensional bar code, it is characterised in that:Using load of the two-dimensional bar code as Information hiding Secret information is embedded into two-dimensional bar code and is hidden, includes the following steps by body:
Step 1:General information a and the secret information plaintext m to be concealed that need to be stored in two-dimensional bar code are obtained, and a and m is defeated Enter into encoder;
Step 2:Secret information is encrypted pretreatment;
Step 2.1:Several keys pair are generated in the encoder, and are set to each key to being numbered, and by the number It is each key to corresponding cipher key feature value;
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair in the cipher key pair generated, and utilizes the public key of this cipher key pair by described in The ciphertext for generating secret information to be concealed is encrypted in the plaintext m of secret information to be concealed;
Step 2.3:The key of selection is added to corresponding cipher key feature value the stem of the ciphertext by encoder, simultaneously will The cipher key pair is used for the private key decrypted and is stored with the key to numbering to bundle to be sent in server;
Step 3:Data analysis is carried out to the general information a and the ciphertext with cipher key feature value, determines the word of the two Type is accorded with, and sign character is converted by corresponding character set, and according to the length and type of the general information a and the band There are the length and type of the ciphertext of cipher key feature value, select out the version and error correcting code of the two-dimensional bar code as Covers of Information Hiding Grade, and will be in the version of the two-dimensional bar code and the grade input coding device of error correcting code;
Step 4:Encoder is determined as the two of Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code Tie up the specification of bar code;
Step 5:According to QR barcode encodings rule, by the general information a and the data word with cipher key feature value ciphertext Symbol is respectively converted into the form of bit stream, is respectively formed the binary data code word of general information and secret information to be concealed Binary data code word;
Step 6:The binary data code word of the code word data of the general information a and the secret information to be concealed is embedded into In the two-dimensional bar code, and complete the coding final to the two-dimensional bar code;
Step 7:The final coding of the two-dimensional bar code is successively filled in the corresponding region of two-dimensional bar code, completes the two-dimensional bar code The construction of matrix.
2. the information concealing method according to claim 1 based on two-dimensional bar code, it is characterised in that:The step 6 includes Following steps:
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes, and In the last addition stop bits " 0000 " of general information code word data;
Step 6.2:The last position of general information stored in the two-dimensional bar code and the first place of error correcting code are calibrated, and then correspondingly Obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;
Step 6.3:By the binary data code word of the secret information to be concealed from the polishing code region of the two-dimensional bar code Beginning position starts to be sequentially embedded, until the ciphertext terminates, if also rest position polishing code polishing, and complete final two Tie up barcode encoding.
3. a kind of hiding information extracting method based on two-dimensional bar code, it is characterised in that:It is directed to such as 1 or 2 institute of claim The extraction of hiding information, includes the following steps in the information concealing method based on two-dimensional bar code stated:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies the validity of its identity;
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user identity is not It is that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user will be unable to obtain Get the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, jumps at once The two-dimensional bar code scanning interface of decoder in client is gone to, and performs step S3;
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will be obtained after scanning Server is sent to cipher key feature value and the ciphertext of hiding information, while by cipher key feature value;
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, the decoding in client Device is decrypted to obtain the plaintext of hiding information using the private key got to the ciphertext of hiding information immediately, and client into Row display.
4. a kind of Information hiding based on two-dimensional bar code and hiding information extraction system, it is characterised in that:Including:Encoder, clothes Business device, decoder and client;The encoder is connected with the server;The decoder is deposited in client;
The encoder:(a) general information a and the secret information plaintext m to be concealed that need to be stored in two-dimensional bar code are received; (b) several keys pair are generated, and to each key to being numbered, and the cipher key feature for being set as counterpart keys pair will be numbered Value;(c) randomly select a key pair in the cipher key pair generated, and using this cipher key pair public key by it is described treat it is hidden The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to corresponding Cipher key feature value be added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to number It bundles and is sent in server;(e) receiving will be as the version of the two-dimensional bar code of Covers of Information Hiding and error correcting code Grade is determined as the specification of the two-dimensional bar code of Covers of Information Hiding;(f) according to QR barcode encodings rule, by the letter by ordinary Breath a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;(g) by the letter by ordinary After the code word data of breath a is stored into the two-dimensional bar code, then the code word data of the ciphertext with cipher key feature value is embedding Enter the polishing code region of two-dimensional bar code, and complete the coding of the two-dimensional bar code;(h) the final coding of the two-dimensional bar code is filled out successively Enter into the corresponding region of two-dimensional bar code, complete the construction of the two-dimensional bar code matrix, and generate final two-dimensional barcode image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and with this The number for the corresponding key pair that private key bundles;(b) registered user's identity information is stored, and client is sent Subscriber identity information is verified, and transmits verification result to client;(c) cipher key feature value is received from client, and led to The cipher key feature value is crossed to find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to service Device;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing carrying for authentication failed Show information, if being verified, jump to the two-dimensional bar code scanning interface of decoder at once;(c) decoding is received from decoder The cipher key feature value and the ciphertext of hiding information that device scans, and cipher key feature value is sent to server;(d) client from Server receives private key, and the private key is sent to decoder;(e) decoder is provided on the display interface of client to decrypt Hiding information plaintext;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, obtained after scanning It gets the ciphertext of cipher key feature value and hiding information and reaches client;(b) private key is received from client, and utilizes the private key pair The ciphertext of hiding information is decrypted to obtain the plaintext of hiding information and sends it to client in two-dimensional bar code.
CN201610134624.1A 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code Active CN105825257B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610134624.1A CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610134624.1A CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Publications (2)

Publication Number Publication Date
CN105825257A CN105825257A (en) 2016-08-03
CN105825257B true CN105825257B (en) 2018-05-29

Family

ID=56987036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610134624.1A Active CN105825257B (en) 2016-03-09 2016-03-09 Information hiding and hiding information extracting method and system based on two-dimensional bar code

Country Status (1)

Country Link
CN (1) CN105825257B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485157A (en) * 2016-10-13 2017-03-08 北京奇虎科技有限公司 The processing method of logistics information, device server
CN106650869B (en) * 2016-10-18 2020-02-07 重庆文理学院 Information hiding method based on two-dimensional code
US10304174B2 (en) 2016-12-19 2019-05-28 Datamax-O'neil Corporation Printer-verifiers and systems and methods for verifying printed indicia
CN106815544B (en) * 2017-01-16 2019-05-10 武汉大学 A kind of information concealing method based on two dimensional code
CN108345925A (en) 2017-01-24 2018-07-31 北京大码技术有限公司 Generation, reading method and the device of composite type two-dimensional code
CN107016499B (en) * 2017-03-23 2020-12-15 国家电网公司 Transformer substation equipment inspection method based on two-dimensional code encryption identification
CN108898205A (en) * 2017-05-09 2018-11-27 罗伯特·博世有限公司 The creation of binary graphics coding, authentication method and system
CN107358284A (en) * 2017-07-11 2017-11-17 北京捷润科技有限公司 Generation method, read method, generating means and the reading device of Quick Response Code
CN109726786B (en) * 2017-10-31 2023-09-26 北京京东尚科信息技术有限公司 Two-dimensional code information reading and generating method and device
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read
CN110119643B (en) * 2018-02-07 2020-11-03 北京三快在线科技有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109325367B (en) * 2018-08-24 2020-07-14 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN112069850B (en) * 2020-09-04 2024-06-11 上海东普信息科技有限公司 Service providing method, device, equipment and storage medium based on two-dimension code
CN112561015B (en) * 2020-12-22 2022-04-05 珠海格力电器股份有限公司 Bar code encoding and decoding method, device, system, equipment and medium
CN113011543B (en) * 2021-03-10 2021-10-29 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN113204755B (en) * 2021-04-20 2022-10-14 重庆工业职业技术学院 Data capture method for block chain big data security
CN113435558A (en) * 2021-07-19 2021-09-24 三维码(厦门)网络科技有限公司 Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information
CN114580589B (en) * 2022-02-23 2024-03-08 复旦大学 Dual-channel two-dimensional code and control method for preventing copying and information hiding
CN114598529A (en) * 2022-03-09 2022-06-07 东北大学 Image information hiding method fusing encryption

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040087399A (en) * 2003-04-07 2004-10-14 주식회사 에스엠티 Insertion and detecting system of multi-dimension barcode and the control method
CN102831455A (en) * 2012-08-09 2012-12-19 陕西煤航安全印务有限公司 Multiple anti-fake method based on two-dimensional bar code
CN102916804A (en) * 2012-08-28 2013-02-06 华南农业大学 Two-dimension code coding and decoding method and device based on local color verification
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
CN104281866A (en) * 2013-07-09 2015-01-14 航天信息股份有限公司 Two-dimensional code application method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040087399A (en) * 2003-04-07 2004-10-14 주식회사 에스엠티 Insertion and detecting system of multi-dimension barcode and the control method
CN102831455A (en) * 2012-08-09 2012-12-19 陕西煤航安全印务有限公司 Multiple anti-fake method based on two-dimensional bar code
CN102916804A (en) * 2012-08-28 2013-02-06 华南农业大学 Two-dimension code coding and decoding method and device based on local color verification
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
CN104281866A (en) * 2013-07-09 2015-01-14 航天信息股份有限公司 Two-dimensional code application method and device

Also Published As

Publication number Publication date
CN105825257A (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN105825257B (en) Information hiding and hiding information extracting method and system based on two-dimensional bar code
CN103761702B (en) Image hiding and authentication method based on secret sharing
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
CN104835046B (en) A kind of data false distinguishing method for two-dimension code safe verification
CN101201886B (en) Three-he-code method for recognizing commodity
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
US20130077817A1 (en) Steganographic method
CN104268610B (en) One kind classification QR code generating methods and read method
CN109583894A (en) Offer, verification method and the device of two dimensional code
JP6489464B2 (en) Optical code, information transmission method, and authentication method
CN107992923A (en) A kind of QR Quick Response Codes generation and the method read
JPH11507141A (en) Method for encoding a sequence consisting of numerically coded information units
US20060045309A1 (en) Systems and methods for digital content security
CN103415007A (en) Mobile phone two-dimensional code safe use method based on information hiding
CN108667815A (en) Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN104766113A (en) Plain and secret code type anti-fake label and anti-fake method thereof
Liu et al. Rich QR codes with three-layer information using hamming code
CN104951827A (en) Compound two-dimensional code and identifying system thereof
CN111667039A (en) Two-dimensional code anti-counterfeiting method
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
GB2405978A (en) A method of preparing a document so that it can be authenticated
Yu et al. A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code
CN110197245B (en) Double-code two-dimensional code and cross-platform interaction method thereof
KR101242684B1 (en) User certification system and method for 2 dimensional barcode
CN105718978A (en) QR code generation method and apparatus, and decoding method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant