CN105825257B - Information hiding and hiding information extracting method and system based on two-dimensional bar code - Google Patents
Information hiding and hiding information extracting method and system based on two-dimensional bar code Download PDFInfo
- Publication number
- CN105825257B CN105825257B CN201610134624.1A CN201610134624A CN105825257B CN 105825257 B CN105825257 B CN 105825257B CN 201610134624 A CN201610134624 A CN 201610134624A CN 105825257 B CN105825257 B CN 105825257B
- Authority
- CN
- China
- Prior art keywords
- information
- bar code
- dimensional bar
- hiding
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Information hiding and hiding information extracting method and system based on two-dimensional bar code, belong to information security field.Select carrier of the two-dimensional bar code as Information hiding, polishing code region belongs to redundant area in two-dimensional bar code, is ignored part under normal circumstances, therefore Information hiding will be difficult to be noticeable in the region, and suppressible information capacity can also meet demand.Secret information to be concealed is encrypted using the public key of cipher key pair using encoder, is decrypted using decoder using the hiding information after the private key pair encryption of cipher key pair, thereby ensures that the security of hidden secret information.Using the verification mode of C/S structures, user sends checking request by user end to server, is returned the result after server authentication, the user being only verified could continue decoding operate, thereby ensure that the legitimacy of user.
Description
Technical field
The invention belongs to information security fields, and in particular to a kind of to be carried based on the Information hiding of two-dimensional bar code with hiding information
Take method and system.
Background technology
Information hiding is the technology in other message, picture or file by first message, picture or file hiding, because
Information would generally be encrypted before being hidden, so Information Hiding Techniques are than simple encryption technical security higher, it can be effective
Ensure the safety of information.Information Hiding Techniques be mainly used in secret communication, authentication, digital copyright protecting and tracking and
Information integrity, authenticity identification and content recovery etc..Its application in secret communication is that secret information is hidden in
It is transferred in digital carrier and using overt channel, this is in the fields such as military affairs, business, finance all generally existings.Fig. 1 is information
The model of concealing technology, using key secret information is encrypted pretreatment in the Information hiding execution stage, afterwards using insertion
Algorithm is embedded into encrypted ciphertext in carrier, and then the close carrier of the load comprising secret information is passed to via common signal channel connects
Receipts person, recipient extract ciphertext using extraction algorithm and go out secret information using decryption key decryption.Wherein, Covers of Information Hiding
Selection and be correspondingly embedded in, the design of extraction algorithm be Information hiding research important foundation problem.
Two-dimensional bar code is a kind of special barcode technology, and abbreviation Quick Response Code, it is using geometric graphs such as rectangle, point, hexagons
Case represents information, represents word numerical information with the corresponding geometrical body of binary system using several during coding, during decoding
Then pass through image input or photoelectric scanning device automatically identifying and reading information.Two-dimensional bar code has the excellent of quick readable and high storage capacity
Gesture, therefore application is very extensive, particularly benefits from the development of intelligent mobile terminal technology, 2D bar code technology is widely used
In a series of fields such as tracking of products, article mark, real-time tracing, document management, the marketing.For example, mobile immediate communication
It can mutually add good friend by scanning two-dimension bar code between user in software, log in website etc., vending machine can also
Commodity identification and purchase etc. are carried out using two-dimensional bar code.In short, two-dimensional bar code is just propagated as a kind of widely used information
Carrier is popularized constantly.
The content of the invention
The technical scheme is that:
A kind of information concealing method based on two-dimensional bar code, i.e., will be secret using carrier of the two-dimensional bar code as Information hiding
Confidential information, which is embedded into two-dimensional bar code, to be hidden, and is included the following steps:
Step 1:General information a and secret information plaintext m to be concealed in two-dimensional bar code need to be stored in by obtaining, and by a
It is input to m in encoder;
Step 2:Secret information is encrypted pretreatment;
Step 2.1:Several keys pair are generated in the encoder, and are numbered to each key to being numbered, and by this
It is set as each key to corresponding cipher key feature value;
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair in the cipher key pair generated, and utilizes the public key of this cipher key pair will
The ciphertext for generating secret information to be concealed is encrypted in the plaintext m of the secret information to be concealed;
Step 2.3:The key of selection is added to corresponding cipher key feature value the stem of the ciphertext by encoder, together
When the cipher key pair be used for the private key decrypted stored with the key to numbering to bundle to be sent in server;
Step 3:Both data analysis is carried out to the general information a and the ciphertext with cipher key feature value, determine
Character types, and be converted into sign character by corresponding character set, and according to the length and type of the general information a and institute
The length and type of the ciphertext with cipher key feature value are stated, select out the version of the two-dimensional bar code as Covers of Information Hiding and is entangled
The grade of error code, and will be in the version of the two-dimensional bar code and the grade input coding device of error correcting code;
Step 4:Encoder is determined as Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code
Two-dimensional bar code specification;
Step 5:According to QR barcode encodings rule, by the general information a and the number with cipher key feature value ciphertext
The form of bit stream is respectively converted into according to character, is respectively formed the binary data code word of general information and secret to be concealed
The binary data code word of information;
Step 6:The binary data code word of the code word data of the general information a and the secret information to be concealed is embedding
Enter into the two-dimensional bar code, complete the coding to the two-dimensional bar code;
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes
In, and in the last addition stop bits " 0000 " of general information code word data;
Step 6.2:Calibrate the last position of general information stored in the two-dimensional bar code and the first place of error correcting code, Jin Erxiang
Ground is answered to obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;
Step 6.3:By the binary data code word of the secret information to be concealed from the polishing code region of the two-dimensional bar code
Start bit start to be sequentially embedded, until the ciphertext terminates, if also rest position polishing code polishing, and complete final
Two-dimensional bar code coding;
Step 7:The final coding of the two-dimensional bar code is successively filled in the corresponding region of two-dimensional bar code, completes the two dimension
The construction of bar code matrix.
A kind of hiding information extracting method based on two-dimensional bar code is directed to the Information hiding based on two-dimensional bar code
The extraction of hiding information, includes the following steps in method:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies having for its identity
Effect property;
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user's body
Part it is not that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user is by nothing
Method gets the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, i.e.,
The two-dimensional bar code scanning interface for jumping to decoder in client is carved, and performs step S3;
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will after scanning
The ciphertext of cipher key feature value and hiding information is got, while cipher key feature value is sent to server;
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, in client
Decoder is decrypted the ciphertext of hiding information using the private key got to obtain the plaintext of hiding information immediately, and in client
End is shown.
It is carried according to described based on the information concealing method of two-dimensional bar code and the hiding information based on two-dimensional bar code
The Information hiding and hiding information extraction system based on two-dimensional bar code that method is established are taken, including:Encoder, server, decoding
Device and client;The encoder is connected with the server;The decoder is deposited in client;
The encoder:(a) the general information a that need to be stored in two-dimensional bar code and secret information to be concealed are received in plain text
m;(b) several keys pair are generated, and to each key to being numbered, and the key spy for being set as counterpart keys pair will be numbered
Value indicative;(c) key pair is randomly selected in the cipher key pair generated, and is treated using the public key of this cipher key pair by described
The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to pair
The cipher key feature value answered is added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to compiling
It number bundles and to be sent in server;(e) receiving will be as the version and error correcting code of the two-dimensional bar code of Covers of Information Hiding
Grade, be determined as the specification of the two-dimensional bar code of Covers of Information Hiding;It (f), will be described common according to QR barcode encodings rule
Information a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;It (g) will be described common
After the code word data of information a is stored into the two-dimensional bar code, then the code word data by the ciphertext with cipher key feature value
The polishing code region of embedded two-dimensional bar code, and complete the coding of the two-dimensional bar code;(h) by the final coding of the two-dimensional bar code successively
It is filled into the corresponding region of two-dimensional bar code, completes the construction of the two-dimensional bar code matrix, and generate final two-dimensional barcode image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and
With the number for the corresponding key pair that the private key bundles;(b) registered user's identity information is stored, and client is sent
The subscriber identity information come is verified, and transmits verification result to client;(c) cipher key feature value is received from client,
And pass through the cipher key feature value and find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to
Server;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing authentication failed
Prompt message, if being verified, jump at once decoder two-dimensional bar code scanning interface;(c) received from decoder
The cipher key feature value and the ciphertext of hiding information that decoder scans, and cipher key feature value is sent to server;(d) client
End receives private key from server, and the private key is sent to decoder;(e) decoder solution is provided on the display interface of client
It is close go out hiding information plaintext;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, scanning
The ciphertext of cipher key feature value and hiding information is got afterwards and reaches client;(b) private key is received from client, and utilizes the private
Key is decrypted to obtain the plaintext of hiding information and sends it to client to the ciphertext of hiding information in two-dimensional bar code.
Beneficial effects of the present invention:The present invention has the advantages that following several respects:
1. selecting carrier of the two-dimensional bar code as Information hiding, polishing code region belongs to redundant area in two-dimensional bar code, just
It is ignored part in the case of often, therefore Information hiding will be difficult to be noticeable in the region, and suppressible information is held
Amount can also meet demand.
2. secret information to be concealed is encrypted using the public key of cipher key pair using encoder, made using decoder
It is decrypted with the hiding information after the private key pair encryption of cipher key pair, thereby ensures that the safety of hidden secret information
Property.
3. using the verification mode of C/S structures, user sends checking request, server authentication by user end to server
After return the result, the user being only verified could continue decoding operate, thereby ensure that the legitimacy of user.
Description of the drawings
Fig. 1 is a kind of schematic diagram of information hiding model;
Fig. 2 is the information concealing method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 3 is that the two-dimensional barcode information of one embodiment of the present invention is embedded in schematic diagram;
Fig. 4 is the hiding information extracting method flow chart based on two-dimensional bar code of one embodiment of the present invention;
Fig. 5 is the Information hiding and hiding information extraction system structure based on two-dimensional bar code of one embodiment of the present invention
Block diagram;
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and detailed description.
The information concealing method based on two-dimensional bar code of present embodiment, as shown in Fig. 2, using two-dimensional bar code as information
Secret information is embedded into two-dimensional bar code and is hidden, includes the following steps by hiding carrier:
Step 1:General information a and secret information plaintext m to be concealed in two-dimensional bar code need to be stored in by obtaining, and by a
It is input to m in encoder;
Step 2:Secret information is encrypted pretreatment;
It is to recognize by server that hiding information is extracted from the two-dimensional bar code as Covers of Information Hiding under normal circumstances
Card, still, if hiding information is directly stored in the form of information code word in two-dimensional bar code, once insertion is hidden in two-dimensional bar code
The region for hiding information is found that attacker will be directly obtained the plaintext of hiding information by attacker, therefore in the present embodiment
In select a kind of existing public key encryption algorithm that secret information to be concealed is encrypted first.
Step 2.1:A kind of existing public key encryption algorithm is selected to generate several keys pair in the encoder, and to each
For key to being numbered, number code is metric double figures, and is set as each key to corresponding the number
Cipher key feature value;Wherein each key to comprising a public key and a private key, public key for information is encrypted,
And private key is for being decrypted information.
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair, (n, k) and (n, d) in the cipher key pair generated, wherein (n, k) is public affairs
Key, (n, d) are private key;Wherein n is the product of prime number p, q two big, and n represents occupied digit when with binary representation, just
It is so-called key length;K and d is a pair of relevant value, and k is the constant that can arbitrarily take, but k and (p-1) * (q-1) are relatively prime;
And the requirement on d is (d*k) mod ((p-1) * (q-1))=1.
The plaintext m of the secret information to be concealed is encrypted using the public key (n, k) of this selected cipher key pair
Processing generates the ciphertext m of secret information to be concealedk, and meet:M=mk^d mod n;mk=m^k mod n.
Step 2.3:Selected key is set to t to corresponding cipher key feature value and is added to t described close by encoder
Literary mkStem, while the cipher key pair be used for the private key decrypted bundle number with the key to be sent to server
In stored;
Step 3:According to the coding flow of QR bar codes, data analysis is carried out first, determines the general information a and with close
The character types of the ciphertext of key characteristic value, and sign character is converted by corresponding character set, while according to character length and class
Type selectes the version of the two-dimensional bar code as Covers of Information Hiding and the grade of error correcting code, and by the version of the two-dimensional bar code and
In the grade input coding device of error correcting code;
When selecting the version v of the two-dimensional bar code and error-correction level w, two-dimensional bar code version v is higher or error-correction level w is got over
Low, then capacity C is higher.The two-dimensional bar code version and error-correction level of selection should meet capacity more than or equal to general information and to be concealed
The final data stream that is formed of secret information needed for capacity size, i.e. C (v, w) >=C (a)+C (m);
Step 4:Encoder is determined as Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code
Two-dimensional bar code specification;
Step 5:Respectively corresponding QR is selected according to the character types of the type of general information a and secret information to be concealed
Barcode encoding pattern adds corresponding mode indicators and character count indicator etc..And according to QR barcode encodings rule, by institute
The data character for stating general information a and the ciphertext with cipher key feature value is respectively converted into the form of bit stream, i.e.,
The method that a code word is formed according to every 8 bit is respectively formed the code word data of general information and secret letter to be concealed
The code word data of breath;
By general information a and ciphertext mkData character according to the coding rule of QR bar codes in two-dimensional bar code be converted to two into
The form of bit stream processed, wherein mkIn metric double figures cipher key feature value t represented with the binary number of 8.It converts
General information data bit stream Sa and ciphertext data bit stream Sm is formed after finishingk, the digit of the bit stream formed is if not 8
Multiple, then at end with 0 polishing.Then respectively to Sa and SmkIt divides, is formed final by the processing mode of 8 code words
The code word data of general information and the code word data of secret information to be concealed.
Step 6:The code word data of the code word data of the general information a and the ciphertext with cipher key feature value is embedding
Enter into the two-dimensional bar code, and complete the coding to the two-dimensional bar code;
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes
In, and in the last addition stop bits " 0000 " of general information code word data;
Step 6.2:Calibrate the last position of general information stored in the two-dimensional bar code and the first place of error correcting code, Jin Erxiang
Ground is answered to obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;Due to shared by the numeric data code part in two-dimensional bar code
The ratio of its entire area is smaller, and the information codeword portions capacity of indicated release and the two-dimensional bar code of error-correction level is fixed
, and centainly not less than the capacity needed for embedding information, so general after information code word all can there are remainder codewords.Usually
Residual capacity after two-dimensional bar code insertion general information is filled with polishing code, therefore can be in the general of embedded two-dimensional bar code
The embedded secret information code word to be hidden on polishing code position after the code word of breath that communicates.
Step 6.3:The code word data of secret information ciphertext is added after the stop bits of the code word data of general information, i.e.,
By the code word data of the ciphertext of the secret information with cipher key feature value from the starting in the polishing code region of the two-dimensional bar code
Position starts to be sequentially embedded, until the ciphertext terminates, if having added polishing code region after the code word data of secret information still has
Remainder codewords then with polishing code (11101100 and/or 00010001) polishing, form the final code word sequence of two-dimensional bar code.
Step 7:After arranging functional graphic, the final coded sequence of the two-dimensional bar code is successively filled into two-dimensional bar code
In corresponding region, the construction of the two-dimensional bar code matrix is completed.Two-dimensional barcode information insertion schematic diagram is illustrated in figure 3, it will be final
Coding successively filled since figure the lower right position of two-dimensional bar code along continuous grey lines to corresponding region, formed
The two-dimensional barcode image corresponding to bit stream finally encoded, the wherein filled black of binary number 1,0 is filled with white,
If running into non-data area, get around or skip, the construction until completing entire two-dimensional barcode image.
The hiding information extracting method based on two-dimensional bar code of present embodiment, as shown in figure 4, being directed to described be based on
The extraction of hiding information, includes the following steps in the information concealing method of two-dimensional bar code:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies having for its identity
Effect property.
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user's body
Part it is not that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user is by nothing
Method gets the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, i.e.,
The two-dimensional bar code scanning interface for jumping to decoder in client is carved, and performs step S3.
It is only logged in using decoder+FTP client FTP designed in the present embodiment, and identity is had
Effect is demonstrate,proved, and the decoder that could be connected by client scans the two-dimensional bar code with hiding information to get secret information;
Without being to carrying hiding information using the arbitrary common decoder with barcode scanning function using the user of this system login
Two-dimensional bar code be scanned, in scanning process only can perform common read functions, due to the polishing code in two-dimensional bar code
Region belongs to redundant area, is the part ignored by common decoder under normal circumstances, so common decoder can only be read
The code word data of general information a before to stop bits " 0000 ", therefore general information can only be got.
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will after scanning
The ciphertext of cipher key feature value and hiding information is got, while cipher key feature value is sent to server;If user uses
Common decoder is scanned the two-dimensional barcode image with hiding information generated, then can only read in two-dimensional bar code
The general information of storage, and obtain less than being hidden in secret information therein;
The operation principle of decoder in client is to obtain the content of all information code words by scanning two-dimension bar code,
The part of information code word foremost is the code word data of general information, until stop bits " until 0000 ", general information numeric data code
Character segment terminates;Recorded successively since stop bits, due to the ciphertext of secret information be after the stop bits be embedded in, and key
Characteristic value is filled in the foremost of ciphertext again, and the digit for setting cipher key feature value t is fixed as 8, therefore after stop bits
8 code word datas be t values;After cipher key feature value t is recorded, cipher key feature value is sent to server;Next start
The code word data of the ciphertext for the secret information hidden is recorded, because the remainder codewords after ciphertext is embedded in are by fixed benefit
Neat code field (11101100 and/or 00010001) is recorded come what is filled until there is polishing code, secret information
The acquisition of ciphertext code word data terminates, so as to obtain hiding secret information ciphertext mk。
If hiding information may be carried and attempt to crack this coding mode progress by having attacker to be found that in two-dimensional bar code
The acquisition of secret information, then he just needs to find the start bit of the code word data of hiding secret information first, and this point is just
There is certain difficulty;Even if attacker has found the start bit of secret information code word data insertion, but since we are also to secret
Information also takes encryption preprocessing process, therefore can not crack ciphering process acquisition is also that encrypted secret information is close
Text still can not obtain the plaintext of secret information.So the security for the secret information plaintext being finally hidden is secure.
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, in client
Decoder is decrypted the ciphertext of hiding information using the private key got to obtain the plaintext of hiding information immediately, and in client
End is shown.Server by the cipher key feature value received according to it i.e. selected by key pair number and the service of being stored in before
All secret key pairs of device are compared successively, filter out the private key (n, d) of identical number, and the private key (n, d) is sent back visitor
Family end, the decoder in client pass through known ciphertext mkWith decrypted private key (n, d), and according to the public affairs of public key encryption algorithm
Formula:M=mk^d mod n;mk=m^k mod n, to the ciphertext m of hiding secret informationkIt is decrypted, most obtains at last
To the plaintext m of the initial secret information to be hidden, and shown in client.
Being carried based on the information concealing method of two-dimensional bar code and the hiding information based on two-dimensional bar code according to the present embodiment
The Information hiding and hiding information extraction system based on two-dimensional bar code of the present embodiment of method foundation are taken, as shown in figure 5, bag
It includes:Encoder, server, decoder and client;The encoder is connected with the server;The decoder deposits in visitor
In the end of family;
The encoder:(a) the general information a that need to be stored in two-dimensional bar code and secret information to be concealed are received in plain text
m;(b) several keys pair are generated, and to each key to being numbered, and the key spy for being set as counterpart keys pair will be numbered
Value indicative;(c) key pair is randomly selected in the cipher key pair generated, and is treated using the public key of this cipher key pair by described
The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to pair
The cipher key feature value answered is added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to compiling
It number bundles and to be sent in server;(e) receiving will be as the version and error correcting code of the two-dimensional bar code of Covers of Information Hiding
Grade, be determined as the specification of the two-dimensional bar code of Covers of Information Hiding;It (f), will be described common according to QR barcode encodings rule
Information a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;It (g) will be described common
After the code word data of information a is stored into the two-dimensional bar code, then the code word data by the ciphertext with cipher key feature value
The polishing code region of embedded two-dimensional bar code, and complete the final code word sequence of the two-dimensional bar code;(h) by the final of the two-dimensional bar code
Coding is successively filled in the corresponding region of two-dimensional bar code, is completed the construction of the two-dimensional bar code matrix, and is generated final two dimension
Bar code image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and
With the number for the corresponding key pair that the private key bundles;(b) registered user's identity information is stored, and client is sent
The subscriber identity information come is verified, and transmits verification result to client;(c) cipher key feature value is received from client,
And pass through the cipher key feature value and find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to
Server;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing authentication failed
Prompt message, if being verified, jump at once decoder two-dimensional bar code scanning interface;(c) receive and solve from decoder
The cipher key feature value and the ciphertext of hiding information that code device scans, and cipher key feature value is sent to server;(d) client
Private key is received from server, and the private key is sent to decoder;(e) decoder decryption is provided on the display interface of client
The plaintext of the hiding information gone out;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, scanning
The ciphertext of cipher key feature value and hiding information is got afterwards and reaches client;(b) private key is received from client, and utilizes the private
Key is decrypted to obtain the plaintext of hiding information and sends it to client to the ciphertext of hiding information in two-dimensional bar code.
Claims (4)
1. a kind of information concealing method based on two-dimensional bar code, it is characterised in that:Using load of the two-dimensional bar code as Information hiding
Secret information is embedded into two-dimensional bar code and is hidden, includes the following steps by body:
Step 1:General information a and the secret information plaintext m to be concealed that need to be stored in two-dimensional bar code are obtained, and a and m is defeated
Enter into encoder;
Step 2:Secret information is encrypted pretreatment;
Step 2.1:Several keys pair are generated in the encoder, and are set to each key to being numbered, and by the number
It is each key to corresponding cipher key feature value;
Step 2.2:Secret information is done the encryption process using the public key of cipher key pair;
Encoder randomly selects a key pair in the cipher key pair generated, and utilizes the public key of this cipher key pair by described in
The ciphertext for generating secret information to be concealed is encrypted in the plaintext m of secret information to be concealed;
Step 2.3:The key of selection is added to corresponding cipher key feature value the stem of the ciphertext by encoder, simultaneously will
The cipher key pair is used for the private key decrypted and is stored with the key to numbering to bundle to be sent in server;
Step 3:Data analysis is carried out to the general information a and the ciphertext with cipher key feature value, determines the word of the two
Type is accorded with, and sign character is converted by corresponding character set, and according to the length and type of the general information a and the band
There are the length and type of the ciphertext of cipher key feature value, select out the version and error correcting code of the two-dimensional bar code as Covers of Information Hiding
Grade, and will be in the version of the two-dimensional bar code and the grade input coding device of error correcting code;
Step 4:Encoder is determined as the two of Covers of Information Hiding according to the version of the two-dimensional bar code and the grade of error correcting code
Tie up the specification of bar code;
Step 5:According to QR barcode encodings rule, by the general information a and the data word with cipher key feature value ciphertext
Symbol is respectively converted into the form of bit stream, is respectively formed the binary data code word of general information and secret information to be concealed
Binary data code word;
Step 6:The binary data code word of the code word data of the general information a and the secret information to be concealed is embedded into
In the two-dimensional bar code, and complete the coding final to the two-dimensional bar code;
Step 7:The final coding of the two-dimensional bar code is successively filled in the corresponding region of two-dimensional bar code, completes the two-dimensional bar code
The construction of matrix.
2. the information concealing method according to claim 1 based on two-dimensional bar code, it is characterised in that:The step 6 includes
Following steps:
Step 6.1:The code word data of general information a is embedded into the two-dimensional bar code by the coding rule according to QR bar codes, and
In the last addition stop bits " 0000 " of general information code word data;
Step 6.2:The last position of general information stored in the two-dimensional bar code and the first place of error correcting code are calibrated, and then correspondingly
Obtain the start bit and stop bit in the polishing code region of the two-dimensional bar code;
Step 6.3:By the binary data code word of the secret information to be concealed from the polishing code region of the two-dimensional bar code
Beginning position starts to be sequentially embedded, until the ciphertext terminates, if also rest position polishing code polishing, and complete final two
Tie up barcode encoding.
3. a kind of hiding information extracting method based on two-dimensional bar code, it is characterised in that:It is directed to such as 1 or 2 institute of claim
The extraction of hiding information, includes the following steps in the information concealing method based on two-dimensional bar code stated:
Step S1:User inputs the log-on message of its people in client, while waiting for server verifies the validity of its identity;
Step S2:Whether server authentication the user identity is legal registered user, if server authentication the user identity is not
It is that legal user is then verified not by the way that client display content is the prompt message of authentication failed, i.e. the user will be unable to obtain
Get the permission of scanning two-dimension bar code;It is verified if being legal user if server authentication the user's identity, jumps at once
The two-dimensional bar code scanning interface of decoder in client is gone to, and performs step S3;
Step S3:User is scanned by the use of the two-dimensional bar code that decoder is aligned as Covers of Information Hiding, will be obtained after scanning
Server is sent to cipher key feature value and the ciphertext of hiding information, while by cipher key feature value;
Step S4:Server selects corresponding private key according to cipher key feature value and sends back client, the decoding in client
Device is decrypted to obtain the plaintext of hiding information using the private key got to the ciphertext of hiding information immediately, and client into
Row display.
4. a kind of Information hiding based on two-dimensional bar code and hiding information extraction system, it is characterised in that:Including:Encoder, clothes
Business device, decoder and client;The encoder is connected with the server;The decoder is deposited in client;
The encoder:(a) general information a and the secret information plaintext m to be concealed that need to be stored in two-dimensional bar code are received;
(b) several keys pair are generated, and to each key to being numbered, and the cipher key feature for being set as counterpart keys pair will be numbered
Value;(c) randomly select a key pair in the cipher key pair generated, and using this cipher key pair public key by it is described treat it is hidden
The ciphertext for generating secret information to be concealed is encrypted in the plaintext m for hiding secret information;(d) by the key of selection to corresponding
Cipher key feature value be added to the stem of the ciphertext, while the cipher key pair is used for the private key decrypted with the key to number
It bundles and is sent in server;(e) receiving will be as the version of the two-dimensional bar code of Covers of Information Hiding and error correcting code
Grade is determined as the specification of the two-dimensional bar code of Covers of Information Hiding;(f) according to QR barcode encodings rule, by the letter by ordinary
Breath a and the ciphertext with cipher key feature value are respectively converted into its respective binary data code word;(g) by the letter by ordinary
After the code word data of breath a is stored into the two-dimensional bar code, then the code word data of the ciphertext with cipher key feature value is embedding
Enter the polishing code region of two-dimensional bar code, and complete the coding of the two-dimensional bar code;(h) the final coding of the two-dimensional bar code is filled out successively
Enter into the corresponding region of two-dimensional bar code, complete the construction of the two-dimensional bar code matrix, and generate final two-dimensional barcode image;
The server, (a) from encoder receive for decrypt the secret information hidden in two-dimensional bar code private key and with this
The number for the corresponding key pair that private key bundles;(b) registered user's identity information is stored, and client is sent
Subscriber identity information is verified, and transmits verification result to client;(c) cipher key feature value is received from client, and led to
The cipher key feature value is crossed to find out corresponding private key and the private key is sent to client;
The client, (a) are used to receive the log-on message of its people input by user, and the log-on message is sent to service
Device;It (b) is used to receive subscriber authentication from server as a result, if verification result is not by showing carrying for authentication failed
Show information, if being verified, jump to the two-dimensional bar code scanning interface of decoder at once;(c) decoding is received from decoder
The cipher key feature value and the ciphertext of hiding information that device scans, and cipher key feature value is sent to server;(d) client from
Server receives private key, and the private key is sent to decoder;(e) decoder is provided on the display interface of client to decrypt
Hiding information plaintext;
The decoder, (a) for user using alignment be scanned as the two-dimensional bar code of Covers of Information Hiding, obtained after scanning
It gets the ciphertext of cipher key feature value and hiding information and reaches client;(b) private key is received from client, and utilizes the private key pair
The ciphertext of hiding information is decrypted to obtain the plaintext of hiding information and sends it to client in two-dimensional bar code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134624.1A CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134624.1A CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825257A CN105825257A (en) | 2016-08-03 |
CN105825257B true CN105825257B (en) | 2018-05-29 |
Family
ID=56987036
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610134624.1A Active CN105825257B (en) | 2016-03-09 | 2016-03-09 | Information hiding and hiding information extracting method and system based on two-dimensional bar code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825257B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485157A (en) * | 2016-10-13 | 2017-03-08 | 北京奇虎科技有限公司 | The processing method of logistics information, device server |
CN106650869B (en) * | 2016-10-18 | 2020-02-07 | 重庆文理学院 | Information hiding method based on two-dimensional code |
US10304174B2 (en) | 2016-12-19 | 2019-05-28 | Datamax-O'neil Corporation | Printer-verifiers and systems and methods for verifying printed indicia |
CN106815544B (en) * | 2017-01-16 | 2019-05-10 | 武汉大学 | A kind of information concealing method based on two dimensional code |
CN108345925A (en) | 2017-01-24 | 2018-07-31 | 北京大码技术有限公司 | Generation, reading method and the device of composite type two-dimensional code |
CN107016499B (en) * | 2017-03-23 | 2020-12-15 | 国家电网公司 | Transformer substation equipment inspection method based on two-dimensional code encryption identification |
CN108898205A (en) * | 2017-05-09 | 2018-11-27 | 罗伯特·博世有限公司 | The creation of binary graphics coding, authentication method and system |
CN107358284A (en) * | 2017-07-11 | 2017-11-17 | 北京捷润科技有限公司 | Generation method, read method, generating means and the reading device of Quick Response Code |
CN109726786B (en) * | 2017-10-31 | 2023-09-26 | 北京京东尚科信息技术有限公司 | Two-dimensional code information reading and generating method and device |
CN107992923A (en) * | 2017-12-22 | 2018-05-04 | 北京中星仝创科技有限公司 | A kind of QR Quick Response Codes generation and the method read |
CN110119643B (en) * | 2018-02-07 | 2020-11-03 | 北京三快在线科技有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109325367B (en) * | 2018-08-24 | 2020-07-14 | 中国人民解放军国防科技大学 | Information hiding method, device, equipment and computer readable storage medium |
CN112069850B (en) * | 2020-09-04 | 2024-06-11 | 上海东普信息科技有限公司 | Service providing method, device, equipment and storage medium based on two-dimension code |
CN112561015B (en) * | 2020-12-22 | 2022-04-05 | 珠海格力电器股份有限公司 | Bar code encoding and decoding method, device, system, equipment and medium |
CN113011543B (en) * | 2021-03-10 | 2021-10-29 | 南京信息职业技术学院 | Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system |
CN113204755B (en) * | 2021-04-20 | 2022-10-14 | 重庆工业职业技术学院 | Data capture method for block chain big data security |
CN113435558A (en) * | 2021-07-19 | 2021-09-24 | 三维码(厦门)网络科技有限公司 | Three-dimensional code encoding method, decoding method and anti-counterfeiting method containing hidden information |
CN114580589B (en) * | 2022-02-23 | 2024-03-08 | 复旦大学 | Dual-channel two-dimensional code and control method for preventing copying and information hiding |
CN114598529A (en) * | 2022-03-09 | 2022-06-07 | 东北大学 | Image information hiding method fusing encryption |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040087399A (en) * | 2003-04-07 | 2004-10-14 | 주식회사 에스엠티 | Insertion and detecting system of multi-dimension barcode and the control method |
CN102831455A (en) * | 2012-08-09 | 2012-12-19 | 陕西煤航安全印务有限公司 | Multiple anti-fake method based on two-dimensional bar code |
CN102916804A (en) * | 2012-08-28 | 2013-02-06 | 华南农业大学 | Two-dimension code coding and decoding method and device based on local color verification |
CN103020682A (en) * | 2012-11-30 | 2013-04-03 | 中企永联数据交换技术(北京)有限公司 | Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book |
CN103415007A (en) * | 2013-07-09 | 2013-11-27 | 南京邮电大学 | Mobile phone two-dimensional code safe use method based on information hiding |
CN104281866A (en) * | 2013-07-09 | 2015-01-14 | 航天信息股份有限公司 | Two-dimensional code application method and device |
-
2016
- 2016-03-09 CN CN201610134624.1A patent/CN105825257B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040087399A (en) * | 2003-04-07 | 2004-10-14 | 주식회사 에스엠티 | Insertion and detecting system of multi-dimension barcode and the control method |
CN102831455A (en) * | 2012-08-09 | 2012-12-19 | 陕西煤航安全印务有限公司 | Multiple anti-fake method based on two-dimensional bar code |
CN102916804A (en) * | 2012-08-28 | 2013-02-06 | 华南农业大学 | Two-dimension code coding and decoding method and device based on local color verification |
CN103020682A (en) * | 2012-11-30 | 2013-04-03 | 中企永联数据交换技术(北京)有限公司 | Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book |
CN103415007A (en) * | 2013-07-09 | 2013-11-27 | 南京邮电大学 | Mobile phone two-dimensional code safe use method based on information hiding |
CN104281866A (en) * | 2013-07-09 | 2015-01-14 | 航天信息股份有限公司 | Two-dimensional code application method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105825257A (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105825257B (en) | Information hiding and hiding information extracting method and system based on two-dimensional bar code | |
CN103761702B (en) | Image hiding and authentication method based on secret sharing | |
US9800408B2 (en) | Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof | |
CN104835046B (en) | A kind of data false distinguishing method for two-dimension code safe verification | |
CN101201886B (en) | Three-he-code method for recognizing commodity | |
CN103778590B (en) | Using digital picture storage and the method and apparatus of transmission information | |
US20130077817A1 (en) | Steganographic method | |
CN104268610B (en) | One kind classification QR code generating methods and read method | |
CN109583894A (en) | Offer, verification method and the device of two dimensional code | |
JP6489464B2 (en) | Optical code, information transmission method, and authentication method | |
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
JPH11507141A (en) | Method for encoding a sequence consisting of numerically coded information units | |
US20060045309A1 (en) | Systems and methods for digital content security | |
CN103415007A (en) | Mobile phone two-dimensional code safe use method based on information hiding | |
CN108667815A (en) | Block chain secret key encipher-decipher method, device and terminal based on bio-identification | |
CN104766113A (en) | Plain and secret code type anti-fake label and anti-fake method thereof | |
Liu et al. | Rich QR codes with three-layer information using hamming code | |
CN104951827A (en) | Compound two-dimensional code and identifying system thereof | |
CN111667039A (en) | Two-dimensional code anti-counterfeiting method | |
CN105912894B (en) | A method of it is anti-fake that passport NO. being used for E-seal printed text | |
GB2405978A (en) | A method of preparing a document so that it can be authenticated | |
Yu et al. | A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code | |
CN110197245B (en) | Double-code two-dimensional code and cross-platform interaction method thereof | |
KR101242684B1 (en) | User certification system and method for 2 dimensional barcode | |
CN105718978A (en) | QR code generation method and apparatus, and decoding method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |