CN106886693A - A kind of software sensitive information hiding, extracting method and device - Google Patents
A kind of software sensitive information hiding, extracting method and device Download PDFInfo
- Publication number
- CN106886693A CN106886693A CN201510934092.5A CN201510934092A CN106886693A CN 106886693 A CN106886693 A CN 106886693A CN 201510934092 A CN201510934092 A CN 201510934092A CN 106886693 A CN106886693 A CN 106886693A
- Authority
- CN
- China
- Prior art keywords
- data
- software
- frame
- target audio
- audio file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000037431 insertion Effects 0.000 claims abstract description 79
- 238000003780 insertion Methods 0.000 claims abstract description 74
- 230000008439 repair process Effects 0.000 claims description 20
- 239000007787 solid Substances 0.000 claims description 11
- 238000013075 data extraction Methods 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 8
- 238000011084 recovery Methods 0.000 claims description 8
- 239000000284 extract Substances 0.000 claims description 6
- 230000008569 process Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 208000027534 Emotional disease Diseases 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011068 loading method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a kind of software sensitive information hiding, extracting method and device.Software sensitive information hiding method includes:Software sensitive data to be protected is obtained, and determines to hide the target audio file of the software sensitive data;According to predetermined insertion rule, the software sensitive data is inserted into the target audio file as a data frame.Such scheme; changed by by the software sensitive data in software; hidden in the application with audio form; software sensitive data is avoided to occur in the application with plaintext version; allow that cracker obtains software sensitive data easily, cause the problem of shielding failure, this kind of mode; the crypticity of data is ensure that as far as possible, it is ensured that the data safety of software.
Description
Technical field
The present invention relates to technical field of software security, more particularly to a kind of software sensitive information hiding, extraction side
Method and device.
Background technology
In existing Android Software Protection Technique, software shelling (adding pre-start-up procedure) is relatively conventional.
In adding the Android software of shell side sequence, the means protection such as original program is encrypted.The target of cracker is exactly to obtain
Take original program.Therefore, in Android software protection, hiding for sensitive data (such as key) just turns into soft
The important means of part protection.
No matter how ingenious cryptographic means are in theory, how complicated AES is, the Gao Shui for possessing professional technique
Flat cracker can be decrypted after source program.In the feelings using complicated AES or cumbersome hidden method
Under condition, the return of the expense more than cracker of decryption program is obtained, now cracker often abandons cracking behavior,
But the shell side sequence in this case, shielding spends the time to be also significantly increased in decryption, reduces
The toggle speed of application program, is user makes troubles.
Therefore, in Android software protection, typically perform simple and quick image watermarking side from ingenious
Case.Traditional scheme is to break up key, is inserted into application software in certain or certain several files.Open in advance
Dynamic program understands these data successively in decryption, pieces together out complete key, and former application program is solved
It is close.
But existing technical scheme shortcoming is:Although sensitive data is broken up hiding, its content is with bright
Literary form is inserted into the file of application program.And, the position of redundant data is may be inserted into each file
It is relatively fixed, the cracker for being familiar with Android file structure has understood such Stealth Modus, can be more fast
The acquisition integrity key of speed, salvo is also failed.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of software sensitive information hiding, extracting method and device,
It is used to solve existing software protection mode and uses to break up software sensitive data mostly be hidden into clear-text way
In the file of application program, but because the position that the file of application program may be inserted into redundant data is relatively fixed,
The cracker for being familiar with Android file structure has understood such Stealth Modus, more can quickly obtain
Whole key, causes the problem of shielding failure.
In order to solve the above-mentioned technical problem, the embodiment of the present invention provides a kind of software sensitive information hiding method,
Including:
Software sensitive data to be protected is obtained, and determines to hide the target audio of the software sensitive data
File;
According to predetermined insertion rule, the software sensitive data is inserted into the mesh as a data frame
In mark with phonetic symbols frequency file.
Further, the software sensitive data includes:For checking the cryptographic Hash of software integrity, being used for
One or more in decryption software in the personal watermark of the key of encryption data and developer.
Further, it is described according to predetermined insertion rule, by the software sensitive data with the shape of data frame
The step that formula is inserted into the target audio file is specially:
The software sensitive data is converted into data character string;
Obtain the audio frame number evidence of the target audio file;
According to the audio frame number according to being filled to the data character string, pseudo- frame data are obtained;
According to predetermined insertion rule, the pseudo- frame data are inserted into the target audio file.
Further, it is described to be specially the step of the software sensitive data is converted into data character string:
The software sensitive data is converted into data character string according to the first preset rules.
Further, the audio frame number for obtaining the target audio file according to the step of be specially:
Obtain the characteristic of the target audio file;
According to the characteristic, the audio frame number evidence of the target audio file is calculated.
Further, the bit rate of the characteristic including audio file, sample frequency, file size,
Flag bit, configuration index value and file verification position in one or more.
Further, the audio frame number is according to including in frame head length, frame solid data length and frame number
One or more.
Further, it is described the data character string is filled according to audio frame number evidence, obtain puppet
The step of frame data, is specially:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
Further, it is described according to predetermined insertion rule, the pseudo- frame data are inserted into the target sound
Step in frequency file is specially:
The pseudo- frame data are carried out into format recovery, obtains filling frame data;
Filling frame data are inserted into the target audio file according to predetermined insertion rule.
Further, it is described that filling frame data are inserted into the target audio text according to predetermined insertion rule
Step in part is specially:
According to predetermined insertion rule, filling frame data are inserted into the predeterminated position of the target audio file.
Further, the software sensitive information hiding method, also includes:
The target audio file for inserting software sensitive data is carried out into file repair process;
To be arranged under resource file catalogue by the target audio file after file repair process.
The embodiment of the present invention provides a kind of software sensitive information hiding device, including:
First acquisition module, for obtaining software sensitive data to be protected, and determines to hide the software
The target audio file of sensitive data;
Insertion module, for according to predetermined insertion rule, by the software sensitive data with the shape of data frame
Formula is inserted into the target audio file.
Further, the insertion module includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number
Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target
In audio file.
Further, the acquisition submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file
Data.
Further, the insertion submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule
In part.
Further, the software sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place
Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process
Under part catalogue.
The embodiment of the present invention provides a kind of software sensitive data extracting method, including:
The insertion rule of software sensitive data to be protected is obtained, wherein, the software sensitive data is according to institute
Insertion rule is stated, is inserted into target audio file as a data frame;
It is determined that inserting the target audio file of the software sensitive data;
According to the insertion rule, the software sensitive data in the target audio file is extracted.
Further, described according to the insertion rule, the software extracted in the target audio file is sensitive
The step of data, is specially:
According to the insertion rule, the data frame of software sensitive data described in the target audio file is determined
Position;
The target audio file is decoded;
The position of the data frame according to the software sensitive data, the target audio file after the decoding is carried
Take filling frame data;
Obtain the software sensitive data in the filling frame data.
Further, it is described obtain it is described filling data frame in software sensitive data the step of be specially:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
The embodiment of the present invention provides a kind of software sensitive data extraction element, including:
Second acquisition module, the insertion rule for obtaining software sensitive data to be protected, wherein, it is described
Software sensitive data is inserted into target audio file as a data frame according to the insertion rule;
Determining module, the target audio file for determining the insertion software sensitive data;
Extraction module, for according to the insertion rule, the software extracted in the target audio file to be sensitive
Data.
Further, the extraction module includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file
The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding
State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
Further, the data acquisition submodule includes:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data
Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
The beneficial effects of the invention are as follows:
Such scheme, is changed by by the software sensitive data in software, and being hidden in audio form should
With in program, it is to avoid software sensitive data occurs in the application with plaintext version so that cracker can
To obtain software sensitive data easily, the problem of shielding failure, this kind of mode is caused to ensure that as far as possible
The crypticity of data, it is ensured that the data safety of software.
Brief description of the drawings
Fig. 1 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention one;
Fig. 2 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention two;
Fig. 3 represents the schematic flow sheet of the software sensitive information hiding method of the embodiment of the present invention three;
Fig. 4 represents the schematic flow sheet of the software sensitive information hiding device of the embodiment of the present invention four;
Fig. 5 represents the schematic flow sheet of the software sensitive data extracting method of the embodiment of the present invention five;
Fig. 6 represents the schematic flow sheet of the software sensitive data extraction element of the embodiment of the present invention six.
Specific embodiment
It is below in conjunction with accompanying drawing and specifically real to make the object, technical solutions and advantages of the present invention clearer
The present invention will be described in detail to apply example.
The present invention is used and breaks up with clear-text way software sensitive data mostly for existing software protection mode
It is hidden into the file of application program, but the position phase of redundant data is may be inserted into because of the file of application program
To fixation, the cracker for being familiar with Android file structure has understood such Stealth Modus, can be more quick
Acquisition integrity key, cause the problem of shielding failure, there is provided a kind of software sensitive information hiding, extraction side
Method and device.
Embodiment one
As shown in figure 1, the software sensitive information hiding method of the embodiment of the present invention one includes:
Step 11, obtains software sensitive data to be protected, and determines to hide the software sensitive data
Target audio file;
Step 12, according to predetermined insertion rule, the software sensitive data is inserted as a data frame
To in the target audio file.
It should be noted that the software sensitive data include but is not limited to be:For checking software integrity
One or more in the personal watermark of cryptographic Hash, the key for encryption data in decryption software and developer.
In the present embodiment, by the form for needing software sensitive data to be protected to be converted into audio file frame in software,
Software sensitive data is disguised oneself as the audio resource file of Android software, realize as far as possible fascination cracker,
The effect of protection software data safety.
Embodiment two
As shown in Fig. 2 the software sensitive information hiding method of the present embodiment two includes:
Step 21, obtains software sensitive data to be protected, and determines to hide the software sensitive data
Target audio file;
Step 22, data character string is converted to by the software sensitive data;
Step 23, obtains the audio frame number evidence of the target audio file;
Step 24, according to the audio frame number according to being filled to the data character string, obtains pseudo- frame data;
The pseudo- frame data, according to predetermined insertion rule, are inserted into the target audio file by step 25
In.
It should be noted that the main implementation of above-mentioned steps 22 is:
The software sensitive data is converted into data character string according to the first preset rules.
It should be noted that first preset rules can be ASCII coding rules, or make by oneself
The character string transformation rule of justice, after converting, the data character string is mainly two be made up of 0 and 1
Scale coding character string.
Explanation is needed further exist for, step 23 mainly includes when realizing:
Step 231, obtains the characteristic of the target audio file;
The step 231 lead it will be realized that according to target audio file file format (such as MP3 format or
The audio format that the Android systems such as WAV are supported) target audio file is read in binary form, according to its official
Structure explanation of the side to binary file is parsed to binary file, obtains the feature of target audio file
Data;It should be noted that this feature data include but are not limited to:The bit rate of audio file, sampling frequency
Rate, file size, flag bit (such as CRB of MP3 (Constant Bit-Rate, bit rates) and VRB
(Variable Bit-Rate, variable bit rate) mark), configuration index value and file verification position in one or many
Individual, it is accordingly required in particular to explanation, the characteristic acquired in the target audio file of different-format is probably not
Identical.
Step 232, according to the characteristic, is calculated the audio frame number evidence of the target audio file;
It should be noted that in step 232, according to the characteristic of target audio file, according to audio knot
Structure explanation, can obtain the audio frame number of target audio file according to, it is necessary to illustrate, this feature data include
But it is not limited to one or more in frame head length, frame solid data length and frame number.With MP3 audios
As a example by form, by characteristics such as bit rate, sample frequencys, frame head length, frame entity can be calculated
The frame data such as length and frame number.
, it is necessary to data strings are filled after the audio frame number evidence for obtaining target audio file, obtain
With the pseudo- frame data of audio frame data match, therefore, the main implementation of the step 24 is:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
It should be noted that filling after data character string pseudo- frame data string length be equal to n sound
The length of frequency frame data, for example, if the frame of MP3 format, the pseudo- frame number of the data character string after filling
According to length be equal to n frame solid data length.
When the filling of data character string is carried out, can select in length as the afterbody of the data character string of l is filled
P-l 0 or 1 (wherein it is possible to Selective filling full 0 or complete 1, it is also possible to carry out 0 and 1 according to rule
Pro rate);Or p-1 can also be inserted in length is for the data character string of l according to specific interval
Individual 0 or 1, after the completion of filling so that the frame solid data length × n of p=audio frame number evidences.
After the completion of step 24 filling, n pseudo- frame data are just can obtain, just needed n pseudo- frame data afterwards
It is inserted into target audio file, in the pseudo- frame data of insertion, step 25 mainly includes when realizing:
The pseudo- frame data are carried out format recovery by step 251, obtain filling frame data;
It should be noted that the step 251 mainly carries out stylistic reparation to pseudo- frame data, can
As legal frame data;By taking MP3 as an example, format recovery mainly includes:Supplement header, form is repaiied
It is multiple also to include repairing into the characteristic in frame head matching with the frame solid data for filling frame data.
Step 252, filling frame data are inserted into the target audio file according to predetermined insertion rule.
The main implementation of the step 252 is:According to predetermined insertion rule, by filling frame data insertion
To the predeterminated position of the target audio file.
When implementing, the n after format recovery can be concealed the filling frame data of data, continuously
It is inserted between the m frames of target audio file and m+1 frames;Can also be spaced according to customized insertion,
By n filling, frame data are scattered is inserted into target audio file.
After above-mentioned steps have been carried out, just successfully software sensitive data is inserted into target audio file.
Embodiment three
In order that the target audio file that must insert software sensitive data is normally used in running software, such as Fig. 3
It is shown, the software sensitive information hiding method of the present embodiment three, including:
Step 31, obtains software sensitive data to be protected, and determines to hide the software sensitive data
Target audio file;
Step 32, according to predetermined insertion rule, the software sensitive data is inserted as a data frame
To in the target audio file;
Step 33, file repair process is carried out by the target audio file for inserting software sensitive data;
It should be noted that this document repair process is mainly accomplished that by file size reparation be insertion software
The actual size of the file after sensitive data;By taking MP3 audio files as an example, this document repair process includes
FRAME information is repaired, FRAME information is made up of series of frames;This document repair process includes will
Frame number information in FRAME repair into insertion sensitive data after actual frame number match wait operate;
This document repair process also include by the characteristic reparation of mp3 file be with insertion software sensitive data after
Actual file matches.
Step 34, will be arranged on resource file catalogue by the target audio file after file repair process
Under.
It should be noted that the audio file under the resource file catalogue is the resource file of Android software,
In step 34, the money of the successful Android software that disguised oneself as of target audio file of software sensitive data will be inserted
Source file, so as to preferably confuse cracker, protect the safety of software data.
Example IV
As shown in figure 4, the embodiment of the present invention provides a kind of software sensitive information hiding device, including:
First acquisition module 41, for obtaining software sensitive data to be protected, and determines to hide described soft
The target audio file of part sensitive data;
Insertion module 42, for according to predetermined insertion rule, by the software sensitive data with data frame
Form is inserted into the target audio file.
It should be noted that the software sensitive data includes:For checking the cryptographic Hash of software integrity, using
One or more in decryption software in the personal watermark of the key of encryption data and developer.
Alternatively, the insertion module 42 includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number
Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target
In audio file.
Specifically, the transform subblock specifically for:According to the first preset rules by the software sensitivity number
According to being converted to data character string.
Specifically, the acquisition submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file
Data.
It should be noted that bit rate of the characteristic including audio file, sample frequency, file are big
Small, flag bit, configuration index value and file verification position in one or more;The audio frame number evidence includes
One or more in frame head length, frame solid data length and frame number.
Specifically, it is described filling submodule specifically for:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
Further, the insertion submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule
In part.
Alternatively, it is described insertion unit specifically for:According to predetermined insertion rule, filling frame data are inserted
Enter the predeterminated position to the target audio file.
Alternatively, the software sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place
Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process
Under part catalogue.
It should be noted that the software sensitive information hiding device embodiment is hidden with above-mentioned software sensitive data
The corresponding software sensitive information hiding device of Tibetan method, all realities of above-mentioned software sensitive information hiding method
Existing mode can also reach identical technique effect suitable for the software sensitive information hiding device embodiment.
Embodiment five
, it is necessary to be decrypted place to software first with software sensitive data before the running software for adding shell side sequence
Reason, accordingly, it would be desirable to hiding software sensitive data is first extracted, as shown in figure 5, the embodiment of the present invention five is carried
For a kind of software sensitive data extracting method, including:
Step 51, obtains the insertion rule of software sensitive data to be protected;
It should be noted that the software sensitive data is inserted as a data frame according to the insertion rule
Enter in target audio file.
Step 52, it is determined that inserting the target audio file of the software sensitive data;
Step 53, according to the insertion rule, extracts the software sensitive data in the target audio file.
Step 53 is specifically included when realizing:
Step 531, according to the insertion rule, determines software sensitive data described in the target audio file
Data frame position;
Step 532, decodes to the target audio file;
It should be noted that the step 532 can be supplied to the audio frequency process of developer to connect by using Android
The audio processing tool that mouth or third party provide, according to the form (such as MP3) of target audio file, by adjusting
With the loading method of respective audio form in interface, loaded targets audio file obtains the data of audio file
Stream, the position of the data frame obtained according to previous step, by the frame abstracting method that is provided in used interface from number
The target frame of data is concealed according to acquisition in stream;
The step 532 can also be supplied to the file process interface of developer by Android, or call third party
The related tool of offer, is processed audio file as binary file.Processing method is to call file
File reading in Processing Interface, opens file, the bit reading side provided by file process interface
Method, the binary data string of correspondence position is read in the position of the data frame obtained according to previous step.
Step 533, the position of the data frame according to the software sensitive data, the target sound after the decoding
Frequency file extracts filling frame data;
Step 534, obtains the software sensitive data in the filling frame data.
Further, the step 534 is specifically included when realizing:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
It should be noted that the software sensitive data extracting method is above-mentioned software sensitive information hiding method
Inverse process, by the extraction to software sensitive data, carries out the decryption of software, it is ensured that the normal of software makes
With.
Embodiment six
As shown in fig. 6, the embodiment of the present invention provides a kind of software sensitive data extraction element, including:
Second acquisition module 61, the insertion rule for obtaining software sensitive data to be protected;
It should be noted that the software sensitive data is inserted as a data frame according to the insertion rule
Enter in target audio file.
Determining module 62, the target audio file for determining the insertion software sensitive data;
Extraction module 63, for according to the insertion rule, the software extracted in the target audio file to be quick
Sense data.
Alternatively, the extraction module 63 includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file
The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding
State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
Further, the data acquisition submodule includes:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data
Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
It should be noted that the software sensitive data extraction element embodiment is carried with above-mentioned software sensitive data
Take the corresponding software sensitive data extraction element of method, all realities of above-mentioned software sensitive data extracting method
Existing mode can also reach identical technique effect suitable for the software sensitive data extraction element embodiment.
In the present invention, it is hidden with audio form by by software sensitive data, it is to avoid software sensitivity number
During plaintext version appears in Android application program according to this, this kind of mode causes larger obstacle, together to cracking
When the present invention as new barrier also for high-level cracker increases more expenses, be the secure dissemination of software
Strive for more times.
Above-described is the preferred embodiment of the present invention, it should be pointed out that for the ordinary people of the art
For member, some improvements and modifications can also be made under the premise of principle of the present invention is not departed from, these
Improvements and modifications are also within the scope of the present invention.
Claims (22)
1. a kind of software sensitive information hiding method, it is characterised in that including:
Software sensitive data to be protected is obtained, and determines to hide the target audio of the software sensitive data
File;
According to predetermined insertion rule, the software sensitive data is inserted into the mesh as a data frame
In mark with phonetic symbols frequency file.
2. software sensitive information hiding method according to claim 1, it is characterised in that the software
Sensitive data includes:For check software integrity cryptographic Hash, in decryption software encryption data it is close
One or more in the personal watermark of key and developer.
3. software sensitive information hiding method according to claim 1, it is characterised in that it is described according to
Predetermined insertion rule, the target audio text is inserted into by the software sensitive data as a data frame
Step in part is specially:
The software sensitive data is converted into data character string;
Obtain the audio frame number evidence of the target audio file;
According to the audio frame number according to being filled to the data character string, pseudo- frame data are obtained;
According to predetermined insertion rule, the pseudo- frame data are inserted into the target audio file.
4. software sensitive information hiding method according to claim 3, it is characterised in that described by institute
State the step of software sensitive data is converted to data character string and be specially:
The software sensitive data is converted into data character string according to the first preset rules.
5. software sensitive information hiding method according to claim 3, it is characterised in that the acquisition
The audio frame number of the target audio file according to the step of be specially:
Obtain the characteristic of the target audio file;
According to the characteristic, the audio frame number evidence of the target audio file is calculated.
6. software sensitive information hiding method according to claim 5, it is characterised in that the feature
Data include bit rate, sample frequency, file size, flag bit, configuration index value and the text of audio file
One or more in part check bit.
7. software sensitive information hiding method according to claim 5, it is characterised in that the audio
Frame data include one or more in frame head length, frame solid data length and frame number.
8. software sensitive information hiding method according to claim 3, it is characterised in that the basis
The audio frame number is specially according to being filled to the data character string, the step of obtain pseudo- frame data:
At least one 0 or 1 are filled in the predeterminated position of data character string, pseudo- frame data are obtained;Wherein,
The frame solid data length × n of the length of the pseudo- frame data=audio frame number evidence, wherein, n is integer.
9. software sensitive information hiding method according to claim 3, it is characterised in that the foundation
Predetermined insertion rule, the step that the pseudo- frame data are inserted into the target audio file is specially:
The pseudo- frame data are carried out into format recovery, obtains filling frame data;
Filling frame data are inserted into the target audio file according to predetermined insertion rule.
10. software sensitive information hiding method according to claim 9, it is characterised in that it is described will
Filling frame data are specially according to the step that predetermined insertion rule is inserted into the target audio file:
According to predetermined insertion rule, filling frame data are inserted into the predeterminated position of the target audio file.
11. software sensitive information hiding methods according to claim 1, it is characterised in that described soft
Part sensitive information hiding method, also includes:
The target audio file for inserting software sensitive data is carried out into file repair process;
To be arranged under resource file catalogue by the target audio file after file repair process.
A kind of 12. software sensitive information hiding devices, it is characterised in that including:
First acquisition module, for obtaining software sensitive data to be protected, and determines to hide the software
The target audio file of sensitive data;
Insertion module, for according to predetermined insertion rule, by the software sensitive data with the shape of data frame
Formula is inserted into the target audio file.
13. software sensitive information hiding devices according to claim 12, it is characterised in that described to insert
Entering module includes:
Transform subblock, for the software sensitive data to be converted into data character string;
Acquisition submodule, the audio frame number evidence for obtaining the target audio file;
Filling submodule, according to being filled to the data character string, obtains for according to the audio frame number
Pseudo- frame data;
Insertion submodule, for according to predetermined insertion rule, the pseudo- frame data being inserted into the target
In audio file.
14. software sensitive information hiding devices according to claim 13, it is characterised in that described to obtain
Taking submodule includes:
First acquisition unit, the characteristic for obtaining the target audio file;
Computing unit, for according to the characteristic, being calculated the audio frame of the target audio file
Data.
15. software sensitive information hiding devices according to claim 13, it is characterised in that described to insert
Entering submodule includes:
Unit is repaired, for the pseudo- frame data to be carried out into format recovery, obtains filling frame data;
Insertion unit, for filling frame data to be inserted into the target audio text according to predetermined insertion rule
In part.
16. software sensitive information hiding devices according to claim 12, it is characterised in that described soft
Part sensitive information hiding device also includes:
File repair module, for the target audio file for inserting software sensitive data to be carried out into file repair place
Reason;
Setup module, for resource text will to be arranged on by the target audio file after file repair process
Under part catalogue.
A kind of 17. software sensitive data extracting methods, it is characterised in that including:
The insertion rule of software sensitive data to be protected is obtained, wherein, the software sensitive data is according to institute
Insertion rule is stated, is inserted into target audio file as a data frame;
It is determined that inserting the target audio file of the software sensitive data;
According to the insertion rule, the software sensitive data in the target audio file is extracted.
18. software sensitive data extracting methods according to claim 17, it is characterised in that described
It is specially according to the insertion rule, the step of extract the software sensitive data in the target audio file:
According to the insertion rule, the data frame of software sensitive data described in the target audio file is determined
Position;
The target audio file is decoded;
The position of the data frame according to the software sensitive data, the target audio file after the decoding is carried
Take filling frame data;
Obtain the software sensitive data in the filling frame data.
19. software sensitive data extracting methods according to claim 18, it is characterised in that described to obtain
The step of taking the software sensitive data in the filling data frame is specially:
According to the filling frame data, pseudo- frame data are obtained;
According to the pseudo- frame data, the data character string of the software sensitive data is obtained;
Software sensitive data is obtained according to the data character string.
A kind of 20. software sensitive data extraction elements, it is characterised in that including:
Second acquisition module, the insertion rule for obtaining software sensitive data to be protected, wherein, it is described
Software sensitive data is inserted into target audio file as a data frame according to the insertion rule;
Determining module, the target audio file for determining the insertion software sensitive data;
Extraction module, for according to the insertion rule, the software extracted in the target audio file to be sensitive
Data.
21. software sensitive data extraction elements according to claim 20, it is characterised in that described to carry
Modulus block includes:
Determination sub-module, for according to the insertion rule, determining software described in the target audio file
The position of the data frame of sensitive data;
Decoding sub-module, for being decoded to the target audio file;
Extracting sub-module, for the position of the data frame according to the software sensitive data, institute after the decoding
State target audio file and extract filling frame data;
Data acquisition submodule, for obtaining the software sensitive data in the filling frame data.
22. software sensitive data extraction elements according to claim 21, it is characterised in that the number
Include according to acquisition submodule:
Second acquisition unit, for according to the filling frame data, obtaining pseudo- frame data;
3rd acquiring unit, for according to the pseudo- frame data, obtaining the data word of the software sensitive data
Symbol string;
4th acquiring unit, for obtaining software sensitive data according to the data character string.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510934092.5A CN106886693A (en) | 2015-12-15 | 2015-12-15 | A kind of software sensitive information hiding, extracting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510934092.5A CN106886693A (en) | 2015-12-15 | 2015-12-15 | A kind of software sensitive information hiding, extracting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106886693A true CN106886693A (en) | 2017-06-23 |
Family
ID=59174123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510934092.5A Pending CN106886693A (en) | 2015-12-15 | 2015-12-15 | A kind of software sensitive information hiding, extracting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106886693A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112188480A (en) * | 2020-09-29 | 2021-01-05 | 北京百瑞互联技术有限公司 | Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101185121A (en) * | 2005-06-02 | 2008-05-21 | 汤姆森许可贸易公司 | Method and apparatus for watermarking an audio or video signal with watermark data using a spread spectrum |
CN101206861A (en) * | 2007-12-25 | 2008-06-25 | 宁波大学 | Method for imbedding digital music production authentication information and method for authentication of said production |
CN102842309A (en) * | 2008-03-14 | 2012-12-26 | 弗劳恩霍夫应用研究促进协会 | Embedder for embedding watermark into information representation, detector for detecting watermark in information representation, method and computer program and information signal |
CN103138860A (en) * | 2011-12-02 | 2013-06-05 | 国家广播电影电视总局广播科学研究院 | Automatic monitoring method and automatic monitoring device of simulated broadcast signals |
-
2015
- 2015-12-15 CN CN201510934092.5A patent/CN106886693A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101185121A (en) * | 2005-06-02 | 2008-05-21 | 汤姆森许可贸易公司 | Method and apparatus for watermarking an audio or video signal with watermark data using a spread spectrum |
CN101206861A (en) * | 2007-12-25 | 2008-06-25 | 宁波大学 | Method for imbedding digital music production authentication information and method for authentication of said production |
CN102842309A (en) * | 2008-03-14 | 2012-12-26 | 弗劳恩霍夫应用研究促进协会 | Embedder for embedding watermark into information representation, detector for detecting watermark in information representation, method and computer program and information signal |
CN103138860A (en) * | 2011-12-02 | 2013-06-05 | 国家广播电影电视总局广播科学研究院 | Automatic monitoring method and automatic monitoring device of simulated broadcast signals |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112188480A (en) * | 2020-09-29 | 2021-01-05 | 北京百瑞互联技术有限公司 | Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec |
CN112188480B (en) * | 2020-09-29 | 2023-03-10 | 北京百瑞互联技术有限公司 | Method, device and storage medium for OTA (over the air) upgrade of Bluetooth equipment by utilizing LC3 audio codec |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7017045B1 (en) | Multimedia watermarking system and method | |
CN103049682B (en) | Character pitch encoding-based dual-watermark embedded text watermarking method | |
Renza et al. | Authenticity verification of audio signals based on fragile watermarking for audio forensics | |
US9892661B2 (en) | Steganographic embedding of hidden payload | |
US20150134971A1 (en) | Apparatus and method for decrypting encrypted file | |
CN102542212B (en) | Text information hiding method and device | |
Kaur et al. | An existential review on text watermarking techniques | |
Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
CN101977319A (en) | Method for generating and authenticating hidden video tags based on video characteristics and digital signatures | |
CN106531176B (en) | The digital watermarking algorithm of audio signal tampering detection and recovery | |
CN107888591A (en) | The method and system that a kind of electronic data is saved from damage | |
KR102108192B1 (en) | Method, Apparatus and System for Inserting Watermark | |
Al-Wesabi et al. | A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. | |
US20110225634A1 (en) | CAPTCHA (Completely Automated Public Test to Tell Computers and Humans Apart) Data Generation Methods and Related Data Management Systems and Computer Program Products Thereof | |
CN105989253A (en) | Watermark embedding method as well as extraction method and apparatus | |
CN105577376A (en) | Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device | |
CN106886693A (en) | A kind of software sensitive information hiding, extracting method and device | |
Alginahi et al. | A zero-watermarking verification approach for Quranic verses in online text documents | |
CN102158768A (en) | MP4 file encapsulation format-based video authentication watermark embedding and extraction method | |
CN104765986B (en) | A kind of code protection and restoring method based on Steganography | |
CN106548098A (en) | For detecting the method and system of fault attacks | |
CN108595920A (en) | Network video listens management support rights service subsystem | |
Saini | A survey on watermarking web contents for protecting copyright | |
Tayan et al. | A review of recent advances on multimedia watermarking security and design implications for digital Quran computing | |
CN107330340A (en) | File encrypting method, equipment, file decryption method, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170623 |
|
RJ01 | Rejection of invention patent application after publication |