CN107545390A - Information concealing method, device and logistics implementation method, apparatus and system - Google Patents

Information concealing method, device and logistics implementation method, apparatus and system Download PDF

Info

Publication number
CN107545390A
CN107545390A CN201710797144.8A CN201710797144A CN107545390A CN 107545390 A CN107545390 A CN 107545390A CN 201710797144 A CN201710797144 A CN 201710797144A CN 107545390 A CN107545390 A CN 107545390A
Authority
CN
China
Prior art keywords
information
code
image
addressee
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710797144.8A
Other languages
Chinese (zh)
Inventor
严文博
姚远志
张卫明
俞能海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201710797144.8A priority Critical patent/CN107545390A/en
Publication of CN107545390A publication Critical patent/CN107545390A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information concealing method, device and logistics implementation method, apparatus and system, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained, then the embedded information to be concealed in the carrier Quick Response Code of texture enhancing.So, the anti-detectability of 2 D code information is enhanced, the security of hiding information has obtained very big guarantee in Quick Response Code.In addition, cleartext information in addressee information is generated into Quick Response Code, cipher-text information is hidden in the Quick Response Code of texture enhancing, so, during whole logistics is realized, the fact that addressee's cipher-text information is present not only is concealed, and be hidden in the cipher-text information in Quick Response Code and also be difficult to be detected, the compromised risk of user profile is reduced, ensure that the information security of user.

Description

Information concealing method, device and logistics implementation method, apparatus and system
Technical field
The present invention relates to information security field, more particularly to a kind of information concealing method, device and logistics implementation method, dress Put and system.
Background technology
The chequered with black and white figure that Quick Response Code is distributed in the plane according to certain rules using certain specific geometric figure, Dexterously using the concept of " 0 " and " 1 " bit stream for forming computer-internal logical foundations on coding, using several with Binary system corresponding geometrical body represents word numerical information, is realized and set by image output device or photoelectric scanning device Standby automatically identifying and reading.Quick Response Code is compared with traditional bar code, can accommodate more information, and therefore, Quick Response Code obtains at present It is widely applied.
Because information security is increasingly taken seriously, in order to prevent malicious person from getting important information, can incite somebody to action Important information is hidden in some images.
But in the prior art, due to the graphic structure of Quick Response Code, it is not appropriate for for hiding information, even if hiding letter Breath is also easily detected.
The content of the invention
In view of this, the embodiment of the invention discloses a kind of information concealing method, device and logistics implementation method, device and System, by the method for the present embodiment, solve in the prior art, the problem of hiding information is easily identified in Quick Response Code, Improve the anti-detection of image in 2 D code.
Present embodiment discloses a kind of information concealing method, this method includes:
By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image in 2 D code.
Optionally, it is described to be embedded into information to be concealed in the carrier image in 2 D code of the texture enhancing, including:
The embedded distortion function of definition;
According to the embedded distortion function, the information to be concealed is being embedded in the carrier Quick Response Code figure of the texture enhancing Additivity distortion is minimized as during and obtains carrying close image in 2 D code.
Optionally, in addition to:
The information to be concealed is encrypted.
Optionally, including:
First Fusion Module, for by image in 2 D code and default image co-registration, the carrier for obtaining texture enhancing to be two-dimentional Code image;
First insertion module, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing, obtain To the close image in 2 D code of load.
A kind of logistics implementation method disclosed in the embodiment of the present invention, including:
Obtain addressee information;
Cleartext information and cipher-text information are distinguished from the addressee information;
Cleartext information in the addressee information is generated into image in 2 D code;
The image in 2 D code and pre-set image are merged, obtain the carrier image in 2 D code of texture enhancing;
The cipher-text information of the addressee is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close two Tie up code image.
Optionally, it is described to distinguish cleartext information and cipher-text information from the addressee information, including:
Determine the attribute of each information in the addressee information;
The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as ciphertext letter Breath.
Optionally, in addition to:
The close image in 2 D code of load is identified, obtains addressee information;
Generate identifying code corresponding to the image in 2 D code;
The identifying code is sent to sender and logistics transfer end according to the addressee information.
Optionally, in addition to:
The cipher-text information is encrypted.
A kind of logistics realization device disclosed in the embodiment of the present invention, including;
Acquisition module, for obtaining addressee information;
Discriminating module, for distinguishing cleartext information and cipher-text information from the addressee information;
Generation module, for the cleartext information in the addressee information to be generated into image in 2 D code;
Second Fusion Module, for the image in 2 D code and pre-set image to be merged, obtain the carrier two of texture enhancing Tie up code image;
Second insertion module, for the cipher-text information of the addressee to be embedded into the carrier Quick Response Code of the texture enhancing In image, obtain carrying close image in 2 D code.
System is realized in a kind of logistics disclosed in the embodiment of the present invention, including:
User posts part unit, and for obtaining addressee information, cleartext information and close is distinguished from the addressee information Literary information, and the cleartext information and cipher-text information are sent in trusted cloud platform;
Trusted cloud platform, for the cleartext information to be generated into image in 2 D code, by the image in 2 D code of generation Merged with default image, obtain the carrier Quick Response Code of texture enhancing, and by the cipher-text information in the addressee information It is embedded into the carrier Quick Response Code of the texture enhancing, obtains carrying close image in 2 D code;
Logistics distribution unit, for obtaining sender's information from the trusted cloud platform and including addressee information Carry close image in 2 D code, by scan it is described carry close image in 2 D code, obtain the cleartext information in the addressee information, and according to According to the cleartext information of the addressee, express mail is dispensed into corresponding terminal;
Relay unit, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform extraction load close two The cipher-text information in code image is tieed up, and generates identifying code corresponding with the close image in 2 D code of load, the ciphertext according to addressee Information, the identifying code is sent to relay unit and addressee.
In the present embodiment, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained, Then information to be concealed can be embedded in the carrier Quick Response Code that texture strengthens.So, the anti-detection of 2 D code information is enhanced Ability, the security of hiding information has obtained very big guarantee in Quick Response Code.
In addition, the cleartext information in addressee information is generated into Quick Response Code, cipher-text information is hidden in texture enhancing Quick Response Code in, so, whole logistics realize during, not only conceal the fact that addressee's cipher-text information is present, and And be hidden in the cipher-text information in Quick Response Code and also be difficult to be detected, the compromised risk of user profile is reduced, ensure that use The information security at family.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of information concealing method provided in an embodiment of the present invention;
Fig. 2 shows standard testing image schematic diagram;
Fig. 3 shows the schematic diagram of the carrier image in 2 D code of texture enhancing;
Fig. 4 shows the schematic diagram for the close image in 2 D code of load that embedded in hiding information;
Fig. 5 shows a kind of structural representation of information concealment device provided in an embodiment of the present invention;
Fig. 6 shows a kind of schematic flow sheet of logistics implementation method provided in an embodiment of the present invention;
Fig. 7 shows that the structural representation of system is realized in a kind of logistics provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
With reference to figure 1, a kind of schematic flow sheet of information concealing method provided in an embodiment of the present invention is shown, in this implementation In example, this method includes:
S101:By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
In the present embodiment, default image can be the image with stronger textural characteristics, for example, can be character image, Animal painting, landscape image etc..
Illustrate:Assuming that image in 2 D code and image A are merged, then can be merged by equation below,
1) S (i, j)=α I (i, j)+β J (i, j);
Wherein, I (i, j) is the pixel value of (i, j) opening position of image in 2 D code, and J (i, j) is image A (i, j) position The pixel value at place, S (i, j) are the pixel value of (i, j) opening position of the carrier image in 2 D code of texture enhancing.
In addition, other methods can also be used to realize image in 2 D code and default image co-registration, herein Specific restriction is not done.
S102:Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image;
In the present embodiment, image is being hidden constantly, image fault can caused, therefore, it is necessary to ensureing additivity mistake In the case of true value minimum, information to be concealed is embedded in the picture, and S102 includes:
The embedded distortion function of definition;
According to the embedded distortion function, the information to be concealed is being embedded in the carrier Quick Response Code of the texture enhancing During minimize additivity distortion and, obtain carrying close image in 2 D code.
In the present embodiment, it is assumed that carrier image in 2 D code sequence is x=(x1,x2,…,xn), information Xu sequence to be concealed is M=(m1,m2,…,mq), embedded in the close image in 2 D code sequence of the load after information to be concealed is y=(y1,y2,…,yn);Additivity Distortion and formula 1 can be expressed as) shown in:
During insertion information to be concealed, it is assumed that embedded distortion caused by each pixel is changed because of embedding information All be it is separate, then the additivity distortion that is obtained after D (x, y) is cumulative equivalent to the insertion distortion of all pixels and;Also, 0 ≤ρi(xi,yi)≤+∞。
For example, STC codings (Syndrome-Trellis Codes) are the strong works for designing high security steganographic algorithm Tool, during to image embedding information, it can be minimized using STC codings during insertion information to be concealed overall Embedded distortion.
Illustrate:J-UNIWARD algorithms are the stronger image latent writing algorithms of anti-detection property, therefore in the present embodiment, can So that information to be concealed to be embedded into the carrier Quick Response Code of texture enhancing using J-UNIWARD algorithms.It is assumed that texture is strengthened Carrier image in 2 D code is decoded as spatial domain picture X, to some quantization DCT coefficient x in the carrier image in 2 D code of texture enhancingi During definition insertion distortion, first to quantization DCT coefficient xiCarry out plus one or the operation that subtracts one, will embedded hiding information load close two Dimension code is decoded as spatial domain picture Y, by the Linear Wavelets wave filter of 3 different directions respectively to spatial domain picture X and spatial domain picture Y Filtering, obtains the filtered frequency coefficient matrix W of three different directions(k)And W (X)(k)(Y), wherein k ∈ { 1,2,3 }.
So, 2) image insertion distortion can define with as follows.
In formula (2), u, v are the coordinates of quantization DCT coefficient, and parameter ε is for smooth constant.
In the present embodiment, in order to improve the security of information to be concealed, it is being embedded into the carrier two dimension of the texture enhancing Before code image, in addition to:
The information to be concealed is encrypted.
In the present embodiment, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained, Then information to be concealed can be embedded in the carrier Quick Response Code that texture strengthens.So, the anti-detection of 2 D code information is enhanced Ability, the security of hiding information has obtained very big guarantee in Quick Response Code.
On in the technical program, the anti-detectability of Quick Response Code, experimental data explanation introduced below can be passed through:
Using standard testing image Lena (as shown in Figure 2) as the pre-set image for strengthening texture, the standard is surveyed Attempt to merge with image in 2 D code as Lena, obtain the carrier image in 2 D code that texture strengthens, as shown in figure 3, by letter to be concealed Breath " scientific and technological laboratory building " is embedded into the carrier image in 2 D code of texture enhancing, obtains carrying close image in 2 D code, as shown in Figure 4. Quality is carried out using Objective image quality evaluation index PSNR to the close image in 2 D code of the load containing hiding information shown in Fig. 4 to comment Valency, it is 71.5389dB to measure PSNR values, illustrates the close image in 2 D code of load of the jpeg image steganographic algorithm generation for Quick Response Code With higher picture quality.1000 Quick Response Code code images of generation at random, and using in BOSSbase1.01 image libraries 1000 images merge the image in 2 D code of the image of texture enhancing and generation, generation as the image for texture enhancing The image in 2 D code of 1000 texture enhancings.Carried using image latent writing analysis method CHEN486, CCPEV548 and DCTR of classics Feature is taken, the characteristic dimension of these three methods extraction is respectively 486,548 and 8000.
Grader Ensemble Classifier are used in steganalysis experiment, wherein, information insertion rate to be concealed makes The bit number bpac being embedded in averagely each AC DCT coefficients is weighed.The insertion rate of information to be concealed is respectively set to 0.05bpac, 0.1bpac, 0.2bpac, 0.3bpac, 0.4bpac and 0.5bpac.Use minimum average B configuration probability of false detection PE Weigh anti-detection performance, equation below 3) shown in:
Wherein, PFAAnd PMDIt is false-alarm probability and false dismissal probability respectively.
As shown in table 1, the anti-detection performance of the JPEG image steganography method based on Quick Response Code is described.If resolution ratio is The carrier image in 2 D code of 512 × 512 texture enhancing is encoded to contain cleartext information " Huangshan Road, Hefei City, Anhui Province 443 Number China Science & Technology University ", embedded information to be concealed is " scientific and technological laboratory building ".Now the exchange in carrier image quantifies DCT coefficient number is 258048, and bit number needed for embedded information to be concealed " scientific and technological laboratory building " is 80, then actual treating is hidden The insertion rate for hiding information is about 0.0003bpac.Anti- detection performance in table 1 compares, and is detected in three kinds of steganalysis methods Under minimum average B configuration false detection rate be above 0.4, there is higher anti-detection performance, meet protect privacy of user the needs of. If it is 0.1bpac to choose embedded rate, then bit number needed for the cipher-text information of actual insertion is in 25804, about 1600 Literary Chinese character, can meet the length requirement of information in the list of express delivery face, while have higher anti-detection performance.
1 anti-detection performance of table compares
With reference to figure 5, a kind of structural representation of information concealment device provided in an embodiment of the present invention is shown, in this implementation In example, the device includes:
First Fusion Module 100, for by image in 2 D code and default image co-registration, obtaining the carrier two of texture enhancing Tie up code image;
First insertion module 200, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing, Obtain carrying close image in 2 D code.
Optionally, the first insertion module 200, is specifically used for:
The embedded distortion function of definition;
According to the carrier image in 2 D code of the embedded distortion function, information to be concealed and texture enhancing, treated in insertion hidden Additivity distortion is minimized during hiding information and obtains carrying close image in 2 D code.Optionally, in addition to:
Encrypting module, for the information to be concealed to be encrypted.
By the device of the present embodiment, image in 2 D code and other images are merged, obtain the load of texture enhancing Body image in 2 D code, information to be concealed then can be embedded in the carrier image in 2 D code that texture strengthens.So, two are enhanced The anti-detectability of code information is tieed up, the security of hiding information has obtained very big guarantee in image in 2 D code.
With reference to figure 6, a kind of schematic flow sheet of logistics implementation method provided in an embodiment of the present invention is shown, in this implementation In example, this method includes:
S601:Obtain addressee information;
In the present embodiment, sender can fill in addressee information when sending express mail, wherein, sender can be in papery Express delivery list in fill in, can also be filled in some APP equipment either related software or can also be staff's root According to the relevant information of customer Completion, it is input in the software of correlation.
S602:Cleartext information and cipher-text information are distinguished from the addressee information;
In the present embodiment, addressee information includes:Addressee's name, addressee's phone, address of the addressee etc.;On addressee People address is specifically divided into:Province, city, district and better address.
Wherein, in addressee information, cleartext information includes:Province, city, district etc. in address of the addressee;Cipher-text information can With including:Addressee's name, addressee's phone, the better address etc. of addressee.For example, person of good sense's information includes:Hefei in Anhui The China Science & Technology University of city Mount Huang road 443, cipher-text information include:Addressee's name:Guo Jing;Addressee's phone:136**** 9999;Better address:No. zero building 123 Room.
Wherein, it is directed to from addressee information and distinguishes cleartext information and cipher-text information, following two realities can be passed through The mode of applying is carried out, including:
Embodiment one:
Determine the attribute of each information in the addressee information;
The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as ciphertext letter Breath.
In the present embodiment, when addressee information is filled into related software, different information is on different positions, Therefore, the attribute of addressee information can be determined according to the position of addressee information, if such as addressee information belong to:Addressee Address major class, the then information flag for belonging to the attribute are cleartext information;If addressee information belongs to:Addressee's name, addressee Phone and addressee's better address etc., the then information for belonging to these attributes belong to cipher-text information.
Embodiment two:According to the addressee information and the machine learning model trained, addressee's letter is determined Cleartext information and cipher-text information in breath;
In the present embodiment, default machine learning model can be trained by substantial amounts of addressee information, obtained The machine learning model trained, wherein the machine learning model trained can identify cleartext information and cipher-text information.
Wherein, machine learning model can be SVM (English full name:Support Vector Machine, Chinese full name: SVMs), fuzzy clustering algorithm etc..
S603:Cleartext information in addressee information is generated into image in 2 D code;
S504:By the Quick Response Code of generation and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
S605:Cipher-text information in the addressee information is embedded into the carrier image in 2 D code of the texture enhancing In, obtain carrying close image in 2 D code.
In the present embodiment, S604 and S605 step of realizing with S101 and S102 are consistent, are just repeated no more herein.
In the present embodiment, in the carrier image in 2 D code that the cipher-text information in addressee information is embedded into texture enhancing Before, in addition to:
The cipher-text information is encrypted.
In the present embodiment, in the express mail of transport, the Quick Response Code for including addressee information can be only pasted, so, is appointed Even if who member, by the Quick Response Code on machine scans express mail, also be able to not can only be obtained by visually seeing addressee information The cleartext information of addressee, the important information of addressee can not be got, and thus avoid user to a certain extent The problem of information leakage.
In the present embodiment, when express mail needs to be dispatched or need to notify addressee's pickup, it is also necessary to fast by identifying The close Quick Response Code of load on part, specifically, also including:
The close image in 2 D code of load is identified, obtains addressee information;
Generate identifying code corresponding to the image in 2 D code;
The identifying code is sent to sender and logistics transfer end according to the addressee information.
In the present embodiment, after addressee receives identifying code, express mail can be taken into logistics terminal, if addressee When identifying code is identical with the identifying code that logistics transfer termination receives, addressee can take express mail away.
In the present embodiment, a number that the identifying code can be randomly generated, or a number being randomly generated Accelerate part numbering, such logistics transfer end can mark the numbering of the express mail in the express mail when receiving identifying code, this For sample when addressee is taking express delivery, terminal can quickly find the express delivery of addressee according to the numbering of addressee's offer.
It should be noted that sender's information can also carry out the operation of the above, when express mail can not be sent to addressee, Need express mail being transmitted back to sender, then by identifying the information of the sender in Quick Response Code, express mail is sent back to and posted Part people.
In the present embodiment, in the implementation process of logistics, after getting addressee information, addressee information is divided into bright Literary information and cipher-text information, image in 2 D code is generated by cleartext information, and image in 2 D code and default image are incorporated, obtained To the carrier image in 2 D code of texture enhancing, the ciphertext letter in the image in 2 D code of texture enhancing in embedded addressee information Breath.Therefore, by the way that image in 2 D code and default image are incorporated, the texture of image in 2 D code is enhanced, and in line On the basis of reason enhancing, embedded cipher-text information, the anti-detection for carrying close image in 2 D code is strengthened.It is moreover, real in whole logistics In existing process, any staff can't see the information of addressee, reduce the compromised risk of addressee information, ensure The information security of user.
With reference to figure 7, show that the structural representation of system is realized in a kind of logistics provided in an embodiment of the present invention, in this implementation In example, the system includes:
User posts part unit 300, and for obtaining addressee information, the addressee information is divided into cleartext information and close Literary information, and the cleartext information and cipher-text information are sent in trusted cloud platform;
Trusted cloud platform 400, for the cleartext information to be generated into image in 2 D code, by the Quick Response Code figure of generation Picture and default image are merged, and obtain the carrier Quick Response Code of texture enhancing, and the ciphertext in the addressee information is believed Breath is embedded into the carrier Quick Response Code of the texture enhancing, obtains carrying close Quick Response Code;
Logistics distribution unit 500, for obtaining sender's information from trusted cloud platform 400 and including addressee information The close image in 2 D code of load, by scanning the close image in 2 D code of the load, obtain the cleartext information in the addressee information, foundation Cleartext information in the addressee information, express mail is dispensed into corresponding express mail terminal;
Relay unit 600, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform 400 and extract The cipher-text information carried in close image in 2 D code, identifying code corresponding to the close image in 2 D code of load is generated, and tested described Demonstration is sent to relay unit and addressee.
In the present embodiment, addressee can go relay unit to take express mail after identifying code is received according to the identifying code.
It should be noted that user, which posts part unit, can also obtain sender's information, and sender's information is sent to can Trust cloud platform, when express mail can not be sent to addressee, it is necessary to which express mail is transmitted back into sender, then pass through trusted The information of sender in cloud platform identification Quick Response Code, then express mail is sent back to by sender by logistics distribution unit.This implementation In example, after addressee receives identifying code, express mail can be taken into logistics terminal, if in the identifying code and logistics of addressee Turn the identifying code that receives of termination it is identical when, addressee can take express mail away.
In the present embodiment, a number that the identifying code can be randomly generated, or a number being randomly generated Accelerate part numbering, such logistics transfer end can mark the numbering of the express mail in the express mail when receiving identifying code, this For sample when addressee is taking express delivery, terminal can quickly find the express delivery of addressee according to the numbering of addressee's offer.
By the system of the present embodiment, during whole logistics is realized, not only conceal addressee's cipher-text information and deposit The fact, and be hidden in the cipher-text information in image in 2 D code and also be difficult to be detected, it is compromised to reduce user profile Risk, ensure that the information security of user.
In addition, in the present embodiment, the close image in 2 D code of load of generation is stored in trusted cloud platform, when transfer list For first or related courier when the close image in 2 D code of load pasted in express mail is scanned, trusted cloud platform can be straight The close image in 2 D code of load that extraction preserves is connect, is avoided because the close image in 2 D code of load caused by outside cause is not known and is caused None- identified goes out the problem of information.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

  1. A kind of 1. information concealing method, it is characterised in that including:
    By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
    Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image in 2 D code.
  2. 2. according to the method for claim 1, it is characterised in that described that information to be concealed is embedded into the texture enhancing In carrier image in 2 D code, including:
    The embedded distortion function of definition;
    According to the embedded distortion function, the information to be concealed is being embedded in the carrier image in 2 D code of the texture enhancing During minimize additivity distortion and, obtain carrying close image in 2 D code.
  3. 3. according to the method for claim 1, it is characterised in that also include:
    The information to be concealed is encrypted.
  4. A kind of 4. information concealment device, it is characterised in that including:
    First Fusion Module, for by image in 2 D code and default image co-registration, obtaining the carrier Quick Response Code figure of texture enhancing Picture;
    First insertion module, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing, carried Close image in 2 D code.
  5. A kind of 5. logistics implementation method, it is characterised in that including:
    Obtain addressee information;
    Cleartext information and cipher-text information are distinguished from the addressee information;
    Cleartext information in the addressee information is generated into image in 2 D code;
    The image in 2 D code and pre-set image are merged, obtain the carrier image in 2 D code of texture enhancing;
    The cipher-text information of the addressee is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close Quick Response Code Image.
  6. 6. according to the method for claim 5, it is characterised in that described to distinguish cleartext information from the addressee information And cipher-text information, including:
    Determine the attribute of each information in the addressee information;
    The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as cipher-text information.
  7. 7. according to the method for claim 6, it is characterised in that also include:
    The close image in 2 D code of load is identified, obtains addressee information;
    Generate identifying code corresponding to the image in 2 D code;
    The identifying code is sent to sender and logistics transfer end according to the addressee information.
  8. 8. according to the method for claim 6, it is characterised in that also include:
    The cipher-text information is encrypted.
  9. A kind of 9. logistics realization device, it is characterised in that including;
    Acquisition module, for obtaining addressee information;
    Discriminating module, for distinguishing cleartext information and cipher-text information from the addressee information;
    Generation module, for the cleartext information in the addressee information to be generated into image in 2 D code;
    Second Fusion Module, for the image in 2 D code and pre-set image to be merged, obtain the carrier Quick Response Code of texture enhancing Image;
    Second insertion module, for the cipher-text information of the addressee to be embedded into the carrier image in 2 D code of the texture enhancing In, obtain carrying close image in 2 D code.
  10. 10. system is realized in a kind of logistics, it is characterised in that including:
    User posts part unit, and for obtaining addressee information, cleartext information and ciphertext letter are distinguished from the addressee information Breath, and the cleartext information and cipher-text information are sent in trusted cloud platform;
    Trusted cloud platform, for the cleartext information to be generated into image in 2 D code, by the image in 2 D code of generation and in advance If image merged, obtain texture enhancing carrier Quick Response Code, and by the addressee information cipher-text information be embedded in Into the carrier image in 2 D code of texture enhancing, obtain carrying close image in 2 D code;
    Logistics distribution unit, it is close for acquisition sender's information from the trusted cloud platform and the load comprising addressee information Image in 2 D code, by scanning the close image in 2 D code of load, the cleartext information in the addressee information is obtained, and according to institute The cleartext information of addressee is stated, express mail is dispensed into corresponding terminal;
    Relay unit, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform extraction load close two The cipher-text information in code image is tieed up, and generates identifying code corresponding with the close image in 2 D code of load, the ciphertext according to addressee Information, the identifying code is sent to relay unit and addressee.
CN201710797144.8A 2017-09-06 2017-09-06 Information concealing method, device and logistics implementation method, apparatus and system Pending CN107545390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710797144.8A CN107545390A (en) 2017-09-06 2017-09-06 Information concealing method, device and logistics implementation method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710797144.8A CN107545390A (en) 2017-09-06 2017-09-06 Information concealing method, device and logistics implementation method, apparatus and system

Publications (1)

Publication Number Publication Date
CN107545390A true CN107545390A (en) 2018-01-05

Family

ID=60959410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710797144.8A Pending CN107545390A (en) 2017-09-06 2017-09-06 Information concealing method, device and logistics implementation method, apparatus and system

Country Status (1)

Country Link
CN (1) CN107545390A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256807A (en) * 2018-02-10 2018-07-06 西安科技大学 Courier's article receiving and sending system and method based on Quick Response Code identification
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109145889A (en) * 2018-11-02 2019-01-04 中国电子科技网络信息安全有限公司 A kind of bright ciphertext Modulation recognition detection method carrying out blind estimate for wireless signal
CN111050021A (en) * 2019-12-17 2020-04-21 中国科学技术大学 Image privacy protection method based on two-dimensional code and reversible visual watermark
CN111598198A (en) * 2020-05-18 2020-08-28 南京工程学院 Image two-dimensional code generation method and reading method based on LSB information hiding
CN112134687A (en) * 2020-09-15 2020-12-25 武汉工程大学 Information encryption and decryption method based on two-dimensional code
CN112668954A (en) * 2020-09-03 2021-04-16 浙江万里学院 Method for acquiring logistics mailing and receiving information based on mobile terminal
CN112668953A (en) * 2020-08-31 2021-04-16 浙江万里学院 Method for embedding secret information of intelligent logistics mail and receiving information
CN112668955A (en) * 2020-09-03 2021-04-16 浙江万里学院 Intelligent settlement method for modern logistics expenses

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778732A (en) * 2015-01-30 2015-07-15 北大方正集团有限公司 Method and device for generating two-dimensional code of image
CN104835108A (en) * 2015-05-14 2015-08-12 上海交通大学 Method for generating visualized two-dimensional code
CN105069497A (en) * 2015-07-27 2015-11-18 南京风力舰信息技术有限公司 Method for generating beautified two-dimensional code
CN105117872A (en) * 2015-07-27 2015-12-02 深圳市传达科技有限公司 Express delivery parcel self-service receiving and sending system and implementation method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778732A (en) * 2015-01-30 2015-07-15 北大方正集团有限公司 Method and device for generating two-dimensional code of image
CN104835108A (en) * 2015-05-14 2015-08-12 上海交通大学 Method for generating visualized two-dimensional code
CN105069497A (en) * 2015-07-27 2015-11-18 南京风力舰信息技术有限公司 Method for generating beautified two-dimensional code
CN105117872A (en) * 2015-07-27 2015-12-02 深圳市传达科技有限公司 Express delivery parcel self-service receiving and sending system and implementation method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李宁波等: "基于S-UNIWARD的图像自适应空域隐写术", 《计算机工程与设计》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256807A (en) * 2018-02-10 2018-07-06 西安科技大学 Courier's article receiving and sending system and method based on Quick Response Code identification
CN108256807B (en) * 2018-02-10 2023-10-03 西安科技大学 Express delivery person receiving and dispatching system and method based on two-dimension code identification
CN108921261A (en) * 2018-04-17 2018-11-30 新大陆(福建)公共服务有限公司 A kind of safe two-dimensional code generation method and analytic method
CN109145889B (en) * 2018-11-02 2022-03-18 中国电子科技网络信息安全有限公司 Bright and ciphertext signal classification detection method for blind estimation of wireless signals
CN109145889A (en) * 2018-11-02 2019-01-04 中国电子科技网络信息安全有限公司 A kind of bright ciphertext Modulation recognition detection method carrying out blind estimate for wireless signal
CN111050021A (en) * 2019-12-17 2020-04-21 中国科学技术大学 Image privacy protection method based on two-dimensional code and reversible visual watermark
CN111598198A (en) * 2020-05-18 2020-08-28 南京工程学院 Image two-dimensional code generation method and reading method based on LSB information hiding
CN111598198B (en) * 2020-05-18 2024-04-26 南京工程学院 Image two-dimensional code generation method and reading method based on LSB information hiding
CN112668953A (en) * 2020-08-31 2021-04-16 浙江万里学院 Method for embedding secret information of intelligent logistics mail and receiving information
CN112668953B (en) * 2020-08-31 2023-09-29 浙江万里学院 Method for embedding intelligent logistics sending and receiving information
CN112668954A (en) * 2020-09-03 2021-04-16 浙江万里学院 Method for acquiring logistics mailing and receiving information based on mobile terminal
CN112668955A (en) * 2020-09-03 2021-04-16 浙江万里学院 Intelligent settlement method for modern logistics expenses
CN112668955B (en) * 2020-09-03 2023-09-22 浙江万里学院 Modern logistics cost intelligent settlement method
CN112668954B (en) * 2020-09-03 2023-09-26 浙江万里学院 Logistics mail receiving information acquisition method based on mobile terminal
CN112134687A (en) * 2020-09-15 2020-12-25 武汉工程大学 Information encryption and decryption method based on two-dimensional code

Similar Documents

Publication Publication Date Title
CN107545390A (en) Information concealing method, device and logistics implementation method, apparatus and system
Emad et al. A secure image steganography algorithm based on least significant bit and integer wavelet transform
US12079368B2 (en) Methods and apparatus for securely displaying digital images
Fridrich et al. Reliable detection of LSB steganography in color and grayscale images
US20180089459A1 (en) Methods and apparatus for securely displaying digital images
US7630513B2 (en) System and method for network-based object authentication
USRE40477E1 (en) Reliable detection of LSB steganography in color and grayscale images
Tiwari et al. Evaluation of various LSB based methods of image steganography on GIF file format
CN105719120A (en) Method for encrypting privacy information on express waybills
CN104820817A (en) Four-dimensional code, image identification system and method as well as retrieval system and method based on four-dimensional code
CN106056183B (en) The printed medium of printing press readable image and the system and method for scanning the image
Nie et al. The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image
Lu et al. Lossless information hiding in images
CN106033543A (en) Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system
AU2011200831B8 (en) Dynamic thresholds for document tamper detection
CN105741222B (en) A kind of steganography information locating method based on the estimation of pixel subset insertion rate
JP3394988B2 (en) Image processing system
Kumar et al. A hybrid hash-stego for secured message transmission using stegnography
CN106650874A (en) Display method and device for paper fiber characteristics, and anti-counterfeiting method for paper fiber characteristics
Chhajed et al. Information security by hiding data in binary images based on block-diagonal partition pattern
Lo et al. Probability-based image authentication scheme for indexed color images
Chhajed et al. Efficient embedding in B&W picture images
CN205827416U (en) A kind of express delivery, logistics real name system
WO2020247765A1 (en) Method for marking visuals of information for subsequent identification or authentication
CN110427891A (en) The method, apparatus, system and medium of contract for identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180105

RJ01 Rejection of invention patent application after publication