CN106886693A - A kind of software sensitive information hiding, extracting method and device - Google Patents

A kind of software sensitive information hiding, extracting method and device Download PDF

Info

Publication number
CN106886693A
CN106886693A CN201510934092.5A CN201510934092A CN106886693A CN 106886693 A CN106886693 A CN 106886693A CN 201510934092 A CN201510934092 A CN 201510934092A CN 106886693 A CN106886693 A CN 106886693A
Authority
CN
China
Prior art keywords
data
software
frame
target audio
audio file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510934092.5A
Other languages
Chinese (zh)
Inventor
刘芳
耿慧拯
石松泉
柏洪涛
左敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510934092.5A priority Critical patent/CN106886693A/en
Publication of CN106886693A publication Critical patent/CN106886693A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of software sensitive information hiding, extracting method and device.Software sensitive information hiding method includes:Software sensitive data to be protected is obtained, and determines to hide the target audio file of the software sensitive data;According to predetermined insertion rule, the software sensitive data is inserted into the target audio file as a data frame.Such scheme; changed by by the software sensitive data in software; hidden in the application with audio form; software sensitive data is avoided to occur in the application with plaintext version; allow that cracker obtains software sensitive data easily, cause the problem of shielding failure, this kind of mode; the crypticity of data is ensure that as far as possible, it is ensured that the data safety of software.

Description

A kind of software sensitive information hiding, extracting method and device
Technical field
The present invention relates to technical field of software security, more particularly to a kind of software sensitive information hiding, extraction side Method and device.
Background technology
In existing Android Software Protection Technique, software shelling (adding pre-start-up procedure) is relatively conventional. In adding the Android software of shell side sequence, the means protection such as original program is encrypted.The target of cracker is exactly to obtain Take original program.Therefore, in Android software protection, hiding for sensitive data (such as key) just turns into soft The important means of part protection.
No matter how ingenious cryptographic means are in theory, how complicated AES is, the Gao Shui for possessing professional technique Flat cracker can be decrypted after source program.In the feelings using complicated AES or cumbersome hidden method Under condition, the return of the expense more than cracker of decryption program is obtained, now cracker often abandons cracking behavior, But the shell side sequence in this case, shielding spends the time to be also significantly increased in decryption, reduces The toggle speed of application program, is user makes troubles.
Therefore, in Android software protection, typically perform simple and quick image watermarking side from ingenious Case.Traditional scheme is to break up key, is inserted into application software in certain or certain several files.Open in advance Dynamic program understands these data successively in decryption, pieces together out complete key, and former application program is solved It is close.
But existing technical scheme shortcoming is:Although sensitive data is broken up hiding, its content is with bright Literary form is inserted into the file of application program.And, the position of redundant data is may be inserted into each file It is relatively fixed, the cracker for being familiar with Android file structure has understood such Stealth Modus, can be more fast The acquisition integrity key of speed, salvo is also failed.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of software sensitive information hiding, extracting method and device, It is used to solve existing software protection mode and uses to break up software sensitive data mostly be hidden into clear-text way In the file of application program, but because the position that the file of application program may be inserted into redundant data is relatively fixed, The cracker for being familiar with Android file structure has understood such Stealth Modus, more can quickly obtain Whole key, causes the problem of shielding failure.
In order to solve the above-mentioned technical problem, the embodiment of the present invention provides a kind of software sensitive information hiding method, Including:
Software sensitive data to be protected is obtained, and determines to hide the target audio of the software sensitive data File;
According to predetermined insertion rule, the software sensitive data is inserted into the mesh as a data frame In mark with phonetic symbols frequency file.
Further, the software sensitive data includes:For checking the cryptographic Hash of software integrity, being used for One or more in decryption software in the personal watermark of the key of encryption data and developer.
Further, it is described according to predetermined insertion rule, by the software sensitive data with the shape of data frame The step that formula is inserted into the target audio file is specially:
The software sensitive data is converted into data character string;
Obtain the audio frame number evidence of the target audio file;
According to the audio frame number according to being filled to the data character string, pseudo- frame data are obtained;
According to predetermined insertion rule, the pseudo- frame data are inserted into the target audio file.
Further, it is described to be specially the step of the software sensitive data is converted into data character string:
The software sensitive data is converted into data character string according to the first preset rules.
Further, the audio frame number for obtaining the target audio file according to the step of be specially:
Obtain the characteristic of the target audio file;
According to the characteristic, the audio frame number evidence of the target audio file is calculated.
Further, the bit rate of the characteristic including audio file, sample frequency, file size, Flag bit, configuration index value and file verification position in one or more.
Further, the audio frame number is according to including in frame head length, frame solid data length and frame number One or more.
Further, it is described the data character string is filled according to audio frame number evidence, obtain puppet The step of frame data, is specially:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
Further, it is described according to predetermined insertion rule, the pseudo- frame data are inserted into the target sound Step in frequency file is specially:
The pseudo- frame data are carried out into format recovery, obtains filling frame data;
Filling frame data are inserted into the target audio file according to predetermined insertion rule.
Further, it is described that filling frame data are inserted into the target audio text according to predetermined insertion rule Step in part is specially:
According to predetermined insertion rule, filling frame data are inserted into the predeterminated position of the target audio file.
Further, the software sensitive information hiding method, also includes:
The target audio file for inserting software sensitive data is carried out into file repair process;
To be arranged under resource file catalogue by the target audio file after file repair process.
The embodiment of the present invention provides a kind of software sensitive information hiding device, including:
First acquisition module, for obtaining software sensitive data to be protected, and determines to hide the software The target audio file of sensitive data;
Insertion module, for according to predetermined insertion rule, by the software sensitive data with the shape of data frame Formula is inserted into the target audio file.
Further, the insertion module includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target In audio file.
Further, the acquisition submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file Data.
Further, the insertion submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule In part.
Further, the software sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process Under part catalogue.
The embodiment of the present invention provides a kind of software sensitive data extracting method, including:
The insertion rule of software sensitive data to be protected is obtained, wherein, the software sensitive data is according to institute Insertion rule is stated, is inserted into target audio file as a data frame;
It is determined that inserting the target audio file of the software sensitive data;
According to the insertion rule, the software sensitive data in the target audio file is extracted.
Further, described according to the insertion rule, the software extracted in the target audio file is sensitive The step of data, is specially:
According to the insertion rule, the data frame of software sensitive data described in the target audio file is determined Position;
The target audio file is decoded;
The position of the data frame according to the software sensitive data, the target audio file after the decoding is carried Take filling frame data;
Obtain the software sensitive data in the filling frame data.
Further, it is described obtain it is described filling data frame in software sensitive data the step of be specially:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
The embodiment of the present invention provides a kind of software sensitive data extraction element, including:
Second acquisition module, the insertion rule for obtaining software sensitive data to be protected, wherein, it is described Software sensitive data is inserted into target audio file as a data frame according to the insertion rule;
Determining module, the target audio file for determining the insertion software sensitive data;
Extraction module, for according to the insertion rule, the software extracted in the target audio file to be sensitive Data.
Further, the extraction module includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
Further, the data acquisition submodule includes:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
The beneficial effects of the invention are as follows:
Such scheme, is changed by by the software sensitive data in software, and being hidden in audio form should With in program, it is to avoid software sensitive data occurs in the application with plaintext version so that cracker can To obtain software sensitive data easily, the problem of shielding failure, this kind of mode is caused to ensure that as far as possible The crypticity of data, it is ensured that the data safety of software.
Brief description of the drawings
Fig. 1 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention one;
Fig. 2 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention two;
Fig. 3 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention three;
Fig. 4 represents the schematic flow sheet of the software sensitive information hiding device of the embodiment of the present invention four;
Fig. 5 represents the schematic flow sheet of the software sensitive data extracting method of the embodiment of the present invention five;
Fig. 6 represents the schematic flow sheet of the software sensitive data extraction element of the embodiment of the present invention six.
Specific embodiment
It is below in conjunction with accompanying drawing and specifically real to make the object, technical solutions and advantages of the present invention clearer The present invention will be described in detail to apply example.
The present invention is used and breaks up with clear-text way software sensitive data mostly for existing software protection mode It is hidden into the file of application program, but the position phase of redundant data is may be inserted into because of the file of application program To fixation, the cracker for being familiar with Android file structure has understood such Stealth Modus, can be more quick Acquisition integrity key, cause the problem of shielding failure, there is provided a kind of software sensitive information hiding, extraction side Method and device.
Embodiment one
As shown in figure 1, the software sensitive information hiding method of the embodiment of the present invention one includes:
Step 11, obtains software sensitive data to be protected, and determines to hide the software sensitive data Target audio file;
Step 12, according to predetermined insertion rule, the software sensitive data is inserted as a data frame To in the target audio file.
It should be noted that the software sensitive data include but is not limited to be:For checking software integrity One or more in the personal watermark of cryptographic Hash, the key for encryption data in decryption software and developer.
In the present embodiment, by the form for needing software sensitive data to be protected to be converted into audio file frame in software, Software sensitive data is disguised oneself as the audio resource file of Android software, realize as far as possible fascination cracker, The effect of protection software data safety.
Embodiment two
As shown in Fig. 2 the software sensitive information hiding method of the present embodiment two includes:
Step 21, obtains software sensitive data to be protected, and determines to hide the software sensitive data Target audio file;
Step 22, data character string is converted to by the software sensitive data;
Step 23, obtains the audio frame number evidence of the target audio file;
Step 24, according to the audio frame number according to being filled to the data character string, obtains pseudo- frame data;
The pseudo- frame data, according to predetermined insertion rule, are inserted into the target audio file by step 25 In.
It should be noted that the main implementation of above-mentioned steps 22 is:
The software sensitive data is converted into data character string according to the first preset rules.
It should be noted that first preset rules can be ASCII coding rules, or make by oneself The character string transformation rule of justice, after converting, the data character string is mainly two be made up of 0 and 1 Scale coding character string.
Explanation is needed further exist for, step 23 mainly includes when realizing:
Step 231, obtains the characteristic of the target audio file;
The step 231 lead it will be realized that according to target audio file file format (such as MP3 format or The audio format that the Android systems such as WAV are supported) target audio file is read in binary form, according to its official Structure explanation of the side to binary file is parsed to binary file, obtains the feature of target audio file Data;It should be noted that this feature data include but are not limited to:The bit rate of audio file, sampling frequency Rate, file size, flag bit (such as CRB of MP3 (Constant Bit-Rate, bit rates) and VRB (Variable Bit-Rate, variable bit rate) mark), configuration index value and file verification position in one or many Individual, it is accordingly required in particular to explanation, the characteristic acquired in the target audio file of different-format is probably not Identical.
Step 232, according to the characteristic, is calculated the audio frame number evidence of the target audio file;
It should be noted that in step 232, according to the characteristic of target audio file, according to audio knot Structure explanation, can obtain the audio frame number of target audio file according to, it is necessary to illustrate, this feature data include But it is not limited to one or more in frame head length, frame solid data length and frame number.With MP3 audios As a example by form, by characteristics such as bit rate, sample frequencys, frame head length, frame entity can be calculated The frame data such as length and frame number.
, it is necessary to data strings are filled after the audio frame number evidence for obtaining target audio file, obtain With the pseudo- frame data of audio frame data match, therefore, the main implementation of the step 24 is:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
It should be noted that filling after data character string pseudo- frame data string length be equal to n sound The length of frequency frame data, for example, if the frame of MP3 format, the pseudo- frame number of the data character string after filling According to length be equal to n frame solid data length.
When the filling of data character string is carried out, can select in length as the afterbody of the data character string of l is filled P-l 0 or 1 (wherein it is possible to Selective filling full 0 or complete 1, it is also possible to carry out 0 and 1 according to rule Pro rate);Or p-1 can also be inserted in length is for the data character string of l according to specific interval Individual 0 or 1, after the completion of filling so that the frame solid data length × n of p=audio frame number evidences.
After the completion of step 24 filling, n pseudo- frame data are just can obtain, just needed n pseudo- frame data afterwards It is inserted into target audio file, in the pseudo- frame data of insertion, step 25 mainly includes when realizing:
The pseudo- frame data are carried out format recovery by step 251, obtain filling frame data;
It should be noted that the step 251 mainly carries out stylistic reparation to pseudo- frame data, can As legal frame data;By taking MP3 as an example, format recovery mainly includes:Supplement header, form is repaiied It is multiple also to include repairing into the characteristic in frame head matching with the frame solid data for filling frame data.
Step 252, filling frame data are inserted into the target audio file according to predetermined insertion rule.
The main implementation of the step 252 is:According to predetermined insertion rule, by filling frame data insertion To the predeterminated position of the target audio file.
When implementing, the n after format recovery can be concealed the filling frame data of data, continuously It is inserted between the m frames of target audio file and m+1 frames;Can also be spaced according to customized insertion, By n filling, frame data are scattered is inserted into target audio file.
After above-mentioned steps have been carried out, just successfully software sensitive data is inserted into target audio file.
Embodiment three
In order that the target audio file that must insert software sensitive data is normally used in running software, such as Fig. 3 It is shown, the software sensitive information hiding method of the present embodiment three, including:
Step 31, obtains software sensitive data to be protected, and determines to hide the software sensitive data Target audio file;
Step 32, according to predetermined insertion rule, the software sensitive data is inserted as a data frame To in the target audio file;
Step 33, file repair process is carried out by the target audio file for inserting software sensitive data;
It should be noted that this document repair process is mainly accomplished that by file size reparation be insertion software The actual size of the file after sensitive data;By taking MP3 audio files as an example, this document repair process includes FRAME information is repaired, FRAME information is made up of series of frames;This document repair process includes will Frame number information in FRAME repair into insertion sensitive data after actual frame number match wait operate; This document repair process also include by the characteristic reparation of mp3 file be with insertion software sensitive data after Actual file matches.
Step 34, will be arranged on resource file catalogue by the target audio file after file repair process Under.
It should be noted that the audio file under the resource file catalogue is the resource file of Android software, In step 34, the money of the successful Android software that disguised oneself as of target audio file of software sensitive data will be inserted Source file, so as to preferably confuse cracker, protect the safety of software data.
Example IV
As shown in figure 4, the embodiment of the present invention provides a kind of software sensitive information hiding device, including:
First acquisition module 41, for obtaining software sensitive data to be protected, and determines to hide described soft The target audio file of part sensitive data;
Insertion module 42, for according to predetermined insertion rule, by the software sensitive data with data frame Form is inserted into the target audio file.
It should be noted that the software sensitive data includes:For checking the cryptographic Hash of software integrity, using One or more in decryption software in the personal watermark of the key of encryption data and developer.
Alternatively, the insertion module 42 includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target In audio file.
Specifically, the transform subblock specifically for:According to the first preset rules by the software sensitivity number According to being converted to data character string.
Specifically, the acquisition submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file Data.
It should be noted that bit rate of the characteristic including audio file, sample frequency, file are big Small, flag bit, configuration index value and file verification position in one or more;The audio frame number evidence includes One or more in frame head length, frame solid data length and frame number.
Specifically, it is described filling submodule specifically for:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
Further, the insertion submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule In part.
Alternatively, it is described insertion unit specifically for:According to predetermined insertion rule, filling frame data are inserted Enter the predeterminated position to the target audio file.
Alternatively, the software sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process Under part catalogue.
It should be noted that the software sensitive information hiding device embodiment is hidden with above-mentioned software sensitive data The corresponding software sensitive information hiding device of Tibetan method, all realities of above-mentioned software sensitive information hiding method Existing mode can also reach identical technique effect suitable for the software sensitive information hiding device embodiment.
Embodiment five
, it is necessary to be decrypted place to software first with software sensitive data before the running software for adding shell side sequence Reason, accordingly, it would be desirable to hiding software sensitive data is first extracted, as shown in figure 5, the embodiment of the present invention five is carried For a kind of software sensitive data extracting method, including:
Step 51, obtains the insertion rule of software sensitive data to be protected;
It should be noted that the software sensitive data is inserted as a data frame according to the insertion rule Enter in target audio file.
Step 52, it is determined that inserting the target audio file of the software sensitive data;
Step 53, according to the insertion rule, extracts the software sensitive data in the target audio file.
Step 53 is specifically included when realizing:
Step 531, according to the insertion rule, determines software sensitive data described in the target audio file Data frame position;
Step 532, decodes to the target audio file;
It should be noted that the step 532 can be supplied to the audio frequency process of developer to connect by using Android The audio processing tool that mouth or third party provide, according to the form (such as MP3) of target audio file, by adjusting With the loading method of respective audio form in interface, loaded targets audio file obtains the data of audio file Stream, the position of the data frame obtained according to previous step, by the frame abstracting method that is provided in used interface from number The target frame of data is concealed according to acquisition in stream;
The step 532 can also be supplied to the file process interface of developer by Android, or call third party The related tool of offer, is processed audio file as binary file.Processing method is to call file File reading in Processing Interface, opens file, the bit reading side provided by file process interface Method, the binary data string of correspondence position is read in the position of the data frame obtained according to previous step.
Step 533, the position of the data frame according to the software sensitive data, the target sound after the decoding Frequency file extracts filling frame data;
Step 534, obtains the software sensitive data in the filling frame data.
Further, the step 534 is specifically included when realizing:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
It should be noted that the software sensitive data extracting method is above-mentioned software sensitive information hiding method Inverse process, by the extraction to software sensitive data, carries out the decryption of software, it is ensured that the normal of software makes With.
Embodiment six
As shown in fig. 6, the embodiment of the present invention provides a kind of software sensitive data extraction element, including:
Second acquisition module 61, the insertion rule for obtaining software sensitive data to be protected;
It should be noted that the software sensitive data is inserted as a data frame according to the insertion rule Enter in target audio file.
Determining module 62, the target audio file for determining the insertion software sensitive data;
Extraction module 63, for according to the insertion rule, the software extracted in the target audio file to be quick Sense data.
Alternatively, the extraction module 63 includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
Further, the data acquisition submodule includes:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
It should be noted that the software sensitive data extraction element embodiment is carried with above-mentioned software sensitive data Take the corresponding software sensitive data extraction element of method, all realities of above-mentioned software sensitive data extracting method Existing mode can also reach identical technique effect suitable for the software sensitive data extraction element embodiment.
In the present invention, it is hidden with audio form by by software sensitive data, it is to avoid software sensitivity number During plaintext version appears in Android application program according to this, this kind of mode causes larger obstacle, together to cracking When the present invention as new barrier also for high-level cracker increases more expenses, be the secure dissemination of software Strive for more times.
Above-described is the preferred embodiment of the present invention, it should be pointed out that for the ordinary people of the art For member, some improvements and modifications can also be made under the premise of principle of the present invention is not departed from, these Improvements and modifications are also within the scope of the present invention.

Claims (22)

1. a kind of software sensitive information hiding method, it is characterised in that including:
Software sensitive data to be protected is obtained, and determines to hide the target audio of the software sensitive data File;
According to predetermined insertion rule, the software sensitive data is inserted into the mesh as a data frame In mark with phonetic symbols frequency file.
2. software sensitive information hiding method according to claim 1, it is characterised in that the software Sensitive data includes:For check software integrity cryptographic Hash, in decryption software encryption data it is close One or more in the personal watermark of key and developer.
3. software sensitive information hiding method according to claim 1, it is characterised in that it is described according to Predetermined insertion rule, the target audio text is inserted into by the software sensitive data as a data frame Step in part is specially:
The software sensitive data is converted into data character string;
Obtain the audio frame number evidence of the target audio file;
According to the audio frame number according to being filled to the data character string, pseudo- frame data are obtained;
According to predetermined insertion rule, the pseudo- frame data are inserted into the target audio file.
4. software sensitive information hiding method according to claim 3, it is characterised in that described by institute State the step of software sensitive data is converted to data character string and be specially:
The software sensitive data is converted into data character string according to the first preset rules.
5. software sensitive information hiding method according to claim 3, it is characterised in that the acquisition The audio frame number of the target audio file according to the step of be specially:
Obtain the characteristic of the target audio file;
According to the characteristic, the audio frame number evidence of the target audio file is calculated.
6. software sensitive information hiding method according to claim 5, it is characterised in that the feature Data include bit rate, sample frequency, file size, flag bit, configuration index value and the text of audio file One or more in part check bit.
7. software sensitive information hiding method according to claim 5, it is characterised in that the audio Frame data include one or more in frame head length, frame solid data length and frame number.
8. software sensitive information hiding method according to claim 3, it is characterised in that the basis The audio frame number is specially according to being filled to the data character string, the step of obtain pseudo- frame data:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
9. software sensitive information hiding method according to claim 3, it is characterised in that the foundation Predetermined insertion rule, the step that the pseudo- frame data are inserted into the target audio file is specially:
The pseudo- frame data are carried out into format recovery, obtains filling frame data;
Filling frame data are inserted into the target audio file according to predetermined insertion rule.
10. software sensitive information hiding method according to claim 9, it is characterised in that it is described will Filling frame data are specially according to the step that predetermined insertion rule is inserted into the target audio file:
According to predetermined insertion rule, filling frame data are inserted into the predeterminated position of the target audio file.
11. software sensitive information hiding methods according to claim 1, it is characterised in that described soft Part sensitive information hiding method, also includes:
The target audio file for inserting software sensitive data is carried out into file repair process;
To be arranged under resource file catalogue by the target audio file after file repair process.
A kind of 12. software sensitive information hiding devices, it is characterised in that including:
First acquisition module, for obtaining software sensitive data to be protected, and determines to hide the software The target audio file of sensitive data;
Insertion module, for according to predetermined insertion rule, by the software sensitive data with the shape of data frame Formula is inserted into the target audio file.
13. software sensitive information hiding devices according to claim 12, it is characterised in that described to insert Entering module includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target In audio file.
14. software sensitive information hiding devices according to claim 13, it is characterised in that described to obtain Taking submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file Data.
15. software sensitive information hiding devices according to claim 13, it is characterised in that described to insert Entering submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule In part.
16. software sensitive information hiding devices according to claim 12, it is characterised in that described soft Part sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process Under part catalogue.
A kind of 17. software sensitive data extracting methods, it is characterised in that including:
The insertion rule of software sensitive data to be protected is obtained, wherein, the software sensitive data is according to institute Insertion rule is stated, is inserted into target audio file as a data frame;
It is determined that inserting the target audio file of the software sensitive data;
According to the insertion rule, the software sensitive data in the target audio file is extracted.
18. software sensitive data extracting methods according to claim 17, it is characterised in that described It is specially according to the insertion rule, the step of extract the software sensitive data in the target audio file:
According to the insertion rule, the data frame of software sensitive data described in the target audio file is determined Position;
The target audio file is decoded;
The position of the data frame according to the software sensitive data, the target audio file after the decoding is carried Take filling frame data;
Obtain the software sensitive data in the filling frame data.
19. software sensitive data extracting methods according to claim 18, it is characterised in that described to obtain The step of taking the software sensitive data in the filling data frame is specially:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
A kind of 20. software sensitive data extraction elements, it is characterised in that including:
Second acquisition module, the insertion rule for obtaining software sensitive data to be protected, wherein, it is described Software sensitive data is inserted into target audio file as a data frame according to the insertion rule;
Determining module, the target audio file for determining the insertion software sensitive data;
Extraction module, for according to the insertion rule, the software extracted in the target audio file to be sensitive Data.
21. software sensitive data extraction elements according to claim 20, it is characterised in that described to carry Modulus block includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
22. software sensitive data extraction elements according to claim 21, it is characterised in that the number Include according to acquisition submodule:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
CN201510934092.5A 2015-12-15 2015-12-15 A kind of software sensitive information hiding, extracting method and device Pending CN106886693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510934092.5A CN106886693A (en) 2015-12-15 2015-12-15 A kind of software sensitive information hiding, extracting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510934092.5A CN106886693A (en) 2015-12-15 2015-12-15 A kind of software sensitive information hiding, extracting method and device

Publications (1)

Publication Number Publication Date
CN106886693A true CN106886693A (en) 2017-06-23

Family

ID=59174123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510934092.5A Pending CN106886693A (en) 2015-12-15 2015-12-15 A kind of software sensitive information hiding, extracting method and device

Country Status (1)

Country Link
CN (1) CN106886693A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188480A (en) * 2020-09-29 2021-01-05 北京百瑞互联技术有限公司 Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101185121A (en) * 2005-06-02 2008-05-21 汤姆森许可贸易公司 Method and apparatus for watermarking an audio or video signal with watermark data using a spread spectrum
CN101206861A (en) * 2007-12-25 2008-06-25 宁波大学 Method for imbedding digital music production authentication information and method for authentication of said production
CN102842309A (en) * 2008-03-14 2012-12-26 弗劳恩霍夫应用研究促进协会 Embedder for embedding watermark into information representation, detector for detecting watermark in information representation, method and computer program and information signal
CN103138860A (en) * 2011-12-02 2013-06-05 国家广播电影电视总局广播科学研究院 Automatic monitoring method and automatic monitoring device of simulated broadcast signals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101185121A (en) * 2005-06-02 2008-05-21 汤姆森许可贸易公司 Method and apparatus for watermarking an audio or video signal with watermark data using a spread spectrum
CN101206861A (en) * 2007-12-25 2008-06-25 宁波大学 Method for imbedding digital music production authentication information and method for authentication of said production
CN102842309A (en) * 2008-03-14 2012-12-26 弗劳恩霍夫应用研究促进协会 Embedder for embedding watermark into information representation, detector for detecting watermark in information representation, method and computer program and information signal
CN103138860A (en) * 2011-12-02 2013-06-05 国家广播电影电视总局广播科学研究院 Automatic monitoring method and automatic monitoring device of simulated broadcast signals

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188480A (en) * 2020-09-29 2021-01-05 北京百瑞互联技术有限公司 Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec
CN112188480B (en) * 2020-09-29 2023-03-10 北京百瑞互联技术有限公司 Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec

Similar Documents

Publication Publication Date Title
US7017045B1 (en) Multimedia watermarking system and method
CN103049682B (en) Character pitch encoding-based dual-watermark embedded text watermarking method
Renza et al. Authenticity verification of audio signals based on fragile watermarking for audio forensics
US9892661B2 (en) Steganographic embedding of hidden payload
US20150134971A1 (en) Apparatus and method for decrypting encrypted file
CN102542212B (en) Text information hiding method and device
Kaur et al. An existential review on text watermarking techniques
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
CN101977319A (en) Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
CN106531176B (en) The digital watermarking algorithm of audio signal tampering detection and recovery
CN107888591A (en) The method and system that a kind of electronic data is saved from damage
KR102108192B1 (en) Method, Apparatus and System for Inserting Watermark
Al-Wesabi et al. A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship.
US20110225634A1 (en) CAPTCHA (Completely Automated Public Test to Tell Computers and Humans Apart) Data Generation Methods and Related Data Management Systems and Computer Program Products Thereof
CN105989253A (en) Watermark embedding method as well as extraction method and apparatus
CN105577376A (en) Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device
CN106886693A (en) A kind of software sensitive information hiding, extracting method and device
Alginahi et al. A zero-watermarking verification approach for Quranic verses in online text documents
CN102158768A (en) MP4 file encapsulation format-based video authentication watermark embedding and extraction method
CN104765986B (en) A kind of code protection and restoring method based on Steganography
CN106548098A (en) For detecting the method and system of fault attacks
CN108595920A (en) Network video listens management support rights service subsystem
Saini A survey on watermarking web contents for protecting copyright
Tayan et al. A review of recent advances on multimedia watermarking security and design implications for digital Quran computing
CN107330340A (en) File encrypting method, equipment, file decryption method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170623

RJ01 Rejection of invention patent application after publication