CN107545390A - Information concealing method, device and logistics implementation method, apparatus and system - Google Patents
Information concealing method, device and logistics implementation method, apparatus and system Download PDFInfo
- Publication number
- CN107545390A CN107545390A CN201710797144.8A CN201710797144A CN107545390A CN 107545390 A CN107545390 A CN 107545390A CN 201710797144 A CN201710797144 A CN 201710797144A CN 107545390 A CN107545390 A CN 107545390A
- Authority
- CN
- China
- Prior art keywords
- information
- code
- image
- addressee
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of information concealing method, device and logistics implementation method, apparatus and system, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained, then the embedded information to be concealed in the carrier Quick Response Code of texture enhancing.So, the anti-detectability of 2 D code information is enhanced, the security of hiding information has obtained very big guarantee in Quick Response Code.In addition, cleartext information in addressee information is generated into Quick Response Code, cipher-text information is hidden in the Quick Response Code of texture enhancing, so, during whole logistics is realized, the fact that addressee's cipher-text information is present not only is concealed, and be hidden in the cipher-text information in Quick Response Code and also be difficult to be detected, the compromised risk of user profile is reduced, ensure that the information security of user.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of information concealing method, device and logistics implementation method, dress
Put and system.
Background technology
The chequered with black and white figure that Quick Response Code is distributed in the plane according to certain rules using certain specific geometric figure,
Dexterously using the concept of " 0 " and " 1 " bit stream for forming computer-internal logical foundations on coding, using several with
Binary system corresponding geometrical body represents word numerical information, is realized and set by image output device or photoelectric scanning device
Standby automatically identifying and reading.Quick Response Code is compared with traditional bar code, can accommodate more information, and therefore, Quick Response Code obtains at present
It is widely applied.
Because information security is increasingly taken seriously, in order to prevent malicious person from getting important information, can incite somebody to action
Important information is hidden in some images.
But in the prior art, due to the graphic structure of Quick Response Code, it is not appropriate for for hiding information, even if hiding letter
Breath is also easily detected.
The content of the invention
In view of this, the embodiment of the invention discloses a kind of information concealing method, device and logistics implementation method, device and
System, by the method for the present embodiment, solve in the prior art, the problem of hiding information is easily identified in Quick Response Code,
Improve the anti-detection of image in 2 D code.
Present embodiment discloses a kind of information concealing method, this method includes:
By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image in 2 D code.
Optionally, it is described to be embedded into information to be concealed in the carrier image in 2 D code of the texture enhancing, including:
The embedded distortion function of definition;
According to the embedded distortion function, the information to be concealed is being embedded in the carrier Quick Response Code figure of the texture enhancing
Additivity distortion is minimized as during and obtains carrying close image in 2 D code.
Optionally, in addition to:
The information to be concealed is encrypted.
Optionally, including:
First Fusion Module, for by image in 2 D code and default image co-registration, the carrier for obtaining texture enhancing to be two-dimentional
Code image;
First insertion module, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing, obtain
To the close image in 2 D code of load.
A kind of logistics implementation method disclosed in the embodiment of the present invention, including:
Obtain addressee information;
Cleartext information and cipher-text information are distinguished from the addressee information;
Cleartext information in the addressee information is generated into image in 2 D code;
The image in 2 D code and pre-set image are merged, obtain the carrier image in 2 D code of texture enhancing;
The cipher-text information of the addressee is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close two
Tie up code image.
Optionally, it is described to distinguish cleartext information and cipher-text information from the addressee information, including:
Determine the attribute of each information in the addressee information;
The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as ciphertext letter
Breath.
Optionally, in addition to:
The close image in 2 D code of load is identified, obtains addressee information;
Generate identifying code corresponding to the image in 2 D code;
The identifying code is sent to sender and logistics transfer end according to the addressee information.
Optionally, in addition to:
The cipher-text information is encrypted.
A kind of logistics realization device disclosed in the embodiment of the present invention, including;
Acquisition module, for obtaining addressee information;
Discriminating module, for distinguishing cleartext information and cipher-text information from the addressee information;
Generation module, for the cleartext information in the addressee information to be generated into image in 2 D code;
Second Fusion Module, for the image in 2 D code and pre-set image to be merged, obtain the carrier two of texture enhancing
Tie up code image;
Second insertion module, for the cipher-text information of the addressee to be embedded into the carrier Quick Response Code of the texture enhancing
In image, obtain carrying close image in 2 D code.
System is realized in a kind of logistics disclosed in the embodiment of the present invention, including:
User posts part unit, and for obtaining addressee information, cleartext information and close is distinguished from the addressee information
Literary information, and the cleartext information and cipher-text information are sent in trusted cloud platform;
Trusted cloud platform, for the cleartext information to be generated into image in 2 D code, by the image in 2 D code of generation
Merged with default image, obtain the carrier Quick Response Code of texture enhancing, and by the cipher-text information in the addressee information
It is embedded into the carrier Quick Response Code of the texture enhancing, obtains carrying close image in 2 D code;
Logistics distribution unit, for obtaining sender's information from the trusted cloud platform and including addressee information
Carry close image in 2 D code, by scan it is described carry close image in 2 D code, obtain the cleartext information in the addressee information, and according to
According to the cleartext information of the addressee, express mail is dispensed into corresponding terminal;
Relay unit, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform extraction load close two
The cipher-text information in code image is tieed up, and generates identifying code corresponding with the close image in 2 D code of load, the ciphertext according to addressee
Information, the identifying code is sent to relay unit and addressee.
In the present embodiment, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained,
Then information to be concealed can be embedded in the carrier Quick Response Code that texture strengthens.So, the anti-detection of 2 D code information is enhanced
Ability, the security of hiding information has obtained very big guarantee in Quick Response Code.
In addition, the cleartext information in addressee information is generated into Quick Response Code, cipher-text information is hidden in texture enhancing
Quick Response Code in, so, whole logistics realize during, not only conceal the fact that addressee's cipher-text information is present, and
And be hidden in the cipher-text information in Quick Response Code and also be difficult to be detected, the compromised risk of user profile is reduced, ensure that use
The information security at family.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of information concealing method provided in an embodiment of the present invention;
Fig. 2 shows standard testing image schematic diagram;
Fig. 3 shows the schematic diagram of the carrier image in 2 D code of texture enhancing;
Fig. 4 shows the schematic diagram for the close image in 2 D code of load that embedded in hiding information;
Fig. 5 shows a kind of structural representation of information concealment device provided in an embodiment of the present invention;
Fig. 6 shows a kind of schematic flow sheet of logistics implementation method provided in an embodiment of the present invention;
Fig. 7 shows that the structural representation of system is realized in a kind of logistics provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
With reference to figure 1, a kind of schematic flow sheet of information concealing method provided in an embodiment of the present invention is shown, in this implementation
In example, this method includes:
S101:By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
In the present embodiment, default image can be the image with stronger textural characteristics, for example, can be character image,
Animal painting, landscape image etc..
Illustrate:Assuming that image in 2 D code and image A are merged, then can be merged by equation below,
1) S (i, j)=α I (i, j)+β J (i, j);
Wherein, I (i, j) is the pixel value of (i, j) opening position of image in 2 D code, and J (i, j) is image A (i, j) position
The pixel value at place, S (i, j) are the pixel value of (i, j) opening position of the carrier image in 2 D code of texture enhancing.
In addition, other methods can also be used to realize image in 2 D code and default image co-registration, herein
Specific restriction is not done.
S102:Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image;
In the present embodiment, image is being hidden constantly, image fault can caused, therefore, it is necessary to ensureing additivity mistake
In the case of true value minimum, information to be concealed is embedded in the picture, and S102 includes:
The embedded distortion function of definition;
According to the embedded distortion function, the information to be concealed is being embedded in the carrier Quick Response Code of the texture enhancing
During minimize additivity distortion and, obtain carrying close image in 2 D code.
In the present embodiment, it is assumed that carrier image in 2 D code sequence is x=(x1,x2,…,xn), information Xu sequence to be concealed is
M=(m1,m2,…,mq), embedded in the close image in 2 D code sequence of the load after information to be concealed is y=(y1,y2,…,yn);Additivity
Distortion and formula 1 can be expressed as) shown in:
During insertion information to be concealed, it is assumed that embedded distortion caused by each pixel is changed because of embedding information
All be it is separate, then the additivity distortion that is obtained after D (x, y) is cumulative equivalent to the insertion distortion of all pixels and;Also, 0
≤ρi(xi,yi)≤+∞。
For example, STC codings (Syndrome-Trellis Codes) are the strong works for designing high security steganographic algorithm
Tool, during to image embedding information, it can be minimized using STC codings during insertion information to be concealed overall
Embedded distortion.
Illustrate:J-UNIWARD algorithms are the stronger image latent writing algorithms of anti-detection property, therefore in the present embodiment, can
So that information to be concealed to be embedded into the carrier Quick Response Code of texture enhancing using J-UNIWARD algorithms.It is assumed that texture is strengthened
Carrier image in 2 D code is decoded as spatial domain picture X, to some quantization DCT coefficient x in the carrier image in 2 D code of texture enhancingi
During definition insertion distortion, first to quantization DCT coefficient xiCarry out plus one or the operation that subtracts one, will embedded hiding information load close two
Dimension code is decoded as spatial domain picture Y, by the Linear Wavelets wave filter of 3 different directions respectively to spatial domain picture X and spatial domain picture Y
Filtering, obtains the filtered frequency coefficient matrix W of three different directions(k)And W (X)(k)(Y), wherein k ∈ { 1,2,3 }.
So, 2) image insertion distortion can define with as follows.
In formula (2), u, v are the coordinates of quantization DCT coefficient, and parameter ε is for smooth constant.
In the present embodiment, in order to improve the security of information to be concealed, it is being embedded into the carrier two dimension of the texture enhancing
Before code image, in addition to:
The information to be concealed is encrypted.
In the present embodiment, by the way that Quick Response Code and other images are merged, the carrier Quick Response Code of texture enhancing is obtained,
Then information to be concealed can be embedded in the carrier Quick Response Code that texture strengthens.So, the anti-detection of 2 D code information is enhanced
Ability, the security of hiding information has obtained very big guarantee in Quick Response Code.
On in the technical program, the anti-detectability of Quick Response Code, experimental data explanation introduced below can be passed through:
Using standard testing image Lena (as shown in Figure 2) as the pre-set image for strengthening texture, the standard is surveyed
Attempt to merge with image in 2 D code as Lena, obtain the carrier image in 2 D code that texture strengthens, as shown in figure 3, by letter to be concealed
Breath " scientific and technological laboratory building " is embedded into the carrier image in 2 D code of texture enhancing, obtains carrying close image in 2 D code, as shown in Figure 4.
Quality is carried out using Objective image quality evaluation index PSNR to the close image in 2 D code of the load containing hiding information shown in Fig. 4 to comment
Valency, it is 71.5389dB to measure PSNR values, illustrates the close image in 2 D code of load of the jpeg image steganographic algorithm generation for Quick Response Code
With higher picture quality.1000 Quick Response Code code images of generation at random, and using in BOSSbase1.01 image libraries
1000 images merge the image in 2 D code of the image of texture enhancing and generation, generation as the image for texture enhancing
The image in 2 D code of 1000 texture enhancings.Carried using image latent writing analysis method CHEN486, CCPEV548 and DCTR of classics
Feature is taken, the characteristic dimension of these three methods extraction is respectively 486,548 and 8000.
Grader Ensemble Classifier are used in steganalysis experiment, wherein, information insertion rate to be concealed makes
The bit number bpac being embedded in averagely each AC DCT coefficients is weighed.The insertion rate of information to be concealed is respectively set to
0.05bpac, 0.1bpac, 0.2bpac, 0.3bpac, 0.4bpac and 0.5bpac.Use minimum average B configuration probability of false detection PE
Weigh anti-detection performance, equation below 3) shown in:
Wherein, PFAAnd PMDIt is false-alarm probability and false dismissal probability respectively.
As shown in table 1, the anti-detection performance of the JPEG image steganography method based on Quick Response Code is described.If resolution ratio is
The carrier image in 2 D code of 512 × 512 texture enhancing is encoded to contain cleartext information " Huangshan Road, Hefei City, Anhui Province 443
Number China Science & Technology University ", embedded information to be concealed is " scientific and technological laboratory building ".Now the exchange in carrier image quantifies
DCT coefficient number is 258048, and bit number needed for embedded information to be concealed " scientific and technological laboratory building " is 80, then actual treating is hidden
The insertion rate for hiding information is about 0.0003bpac.Anti- detection performance in table 1 compares, and is detected in three kinds of steganalysis methods
Under minimum average B configuration false detection rate be above 0.4, there is higher anti-detection performance, meet protect privacy of user the needs of.
If it is 0.1bpac to choose embedded rate, then bit number needed for the cipher-text information of actual insertion is in 25804, about 1600
Literary Chinese character, can meet the length requirement of information in the list of express delivery face, while have higher anti-detection performance.
1 anti-detection performance of table compares
With reference to figure 5, a kind of structural representation of information concealment device provided in an embodiment of the present invention is shown, in this implementation
In example, the device includes:
First Fusion Module 100, for by image in 2 D code and default image co-registration, obtaining the carrier two of texture enhancing
Tie up code image;
First insertion module 200, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing,
Obtain carrying close image in 2 D code.
Optionally, the first insertion module 200, is specifically used for:
The embedded distortion function of definition;
According to the carrier image in 2 D code of the embedded distortion function, information to be concealed and texture enhancing, treated in insertion hidden
Additivity distortion is minimized during hiding information and obtains carrying close image in 2 D code.Optionally, in addition to:
Encrypting module, for the information to be concealed to be encrypted.
By the device of the present embodiment, image in 2 D code and other images are merged, obtain the load of texture enhancing
Body image in 2 D code, information to be concealed then can be embedded in the carrier image in 2 D code that texture strengthens.So, two are enhanced
The anti-detectability of code information is tieed up, the security of hiding information has obtained very big guarantee in image in 2 D code.
With reference to figure 6, a kind of schematic flow sheet of logistics implementation method provided in an embodiment of the present invention is shown, in this implementation
In example, this method includes:
S601:Obtain addressee information;
In the present embodiment, sender can fill in addressee information when sending express mail, wherein, sender can be in papery
Express delivery list in fill in, can also be filled in some APP equipment either related software or can also be staff's root
According to the relevant information of customer Completion, it is input in the software of correlation.
S602:Cleartext information and cipher-text information are distinguished from the addressee information;
In the present embodiment, addressee information includes:Addressee's name, addressee's phone, address of the addressee etc.;On addressee
People address is specifically divided into:Province, city, district and better address.
Wherein, in addressee information, cleartext information includes:Province, city, district etc. in address of the addressee;Cipher-text information can
With including:Addressee's name, addressee's phone, the better address etc. of addressee.For example, person of good sense's information includes:Hefei in Anhui
The China Science & Technology University of city Mount Huang road 443, cipher-text information include:Addressee's name:Guo Jing;Addressee's phone:136****
9999;Better address:No. zero building 123 Room.
Wherein, it is directed to from addressee information and distinguishes cleartext information and cipher-text information, following two realities can be passed through
The mode of applying is carried out, including:
Embodiment one:
Determine the attribute of each information in the addressee information;
The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as ciphertext letter
Breath.
In the present embodiment, when addressee information is filled into related software, different information is on different positions,
Therefore, the attribute of addressee information can be determined according to the position of addressee information, if such as addressee information belong to:Addressee
Address major class, the then information flag for belonging to the attribute are cleartext information;If addressee information belongs to:Addressee's name, addressee
Phone and addressee's better address etc., the then information for belonging to these attributes belong to cipher-text information.
Embodiment two:According to the addressee information and the machine learning model trained, addressee's letter is determined
Cleartext information and cipher-text information in breath;
In the present embodiment, default machine learning model can be trained by substantial amounts of addressee information, obtained
The machine learning model trained, wherein the machine learning model trained can identify cleartext information and cipher-text information.
Wherein, machine learning model can be SVM (English full name:Support Vector Machine, Chinese full name:
SVMs), fuzzy clustering algorithm etc..
S603:Cleartext information in addressee information is generated into image in 2 D code;
S504:By the Quick Response Code of generation and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;
S605:Cipher-text information in the addressee information is embedded into the carrier image in 2 D code of the texture enhancing
In, obtain carrying close image in 2 D code.
In the present embodiment, S604 and S605 step of realizing with S101 and S102 are consistent, are just repeated no more herein.
In the present embodiment, in the carrier image in 2 D code that the cipher-text information in addressee information is embedded into texture enhancing
Before, in addition to:
The cipher-text information is encrypted.
In the present embodiment, in the express mail of transport, the Quick Response Code for including addressee information can be only pasted, so, is appointed
Even if who member, by the Quick Response Code on machine scans express mail, also be able to not can only be obtained by visually seeing addressee information
The cleartext information of addressee, the important information of addressee can not be got, and thus avoid user to a certain extent
The problem of information leakage.
In the present embodiment, when express mail needs to be dispatched or need to notify addressee's pickup, it is also necessary to fast by identifying
The close Quick Response Code of load on part, specifically, also including:
The close image in 2 D code of load is identified, obtains addressee information;
Generate identifying code corresponding to the image in 2 D code;
The identifying code is sent to sender and logistics transfer end according to the addressee information.
In the present embodiment, after addressee receives identifying code, express mail can be taken into logistics terminal, if addressee
When identifying code is identical with the identifying code that logistics transfer termination receives, addressee can take express mail away.
In the present embodiment, a number that the identifying code can be randomly generated, or a number being randomly generated
Accelerate part numbering, such logistics transfer end can mark the numbering of the express mail in the express mail when receiving identifying code, this
For sample when addressee is taking express delivery, terminal can quickly find the express delivery of addressee according to the numbering of addressee's offer.
It should be noted that sender's information can also carry out the operation of the above, when express mail can not be sent to addressee,
Need express mail being transmitted back to sender, then by identifying the information of the sender in Quick Response Code, express mail is sent back to and posted
Part people.
In the present embodiment, in the implementation process of logistics, after getting addressee information, addressee information is divided into bright
Literary information and cipher-text information, image in 2 D code is generated by cleartext information, and image in 2 D code and default image are incorporated, obtained
To the carrier image in 2 D code of texture enhancing, the ciphertext letter in the image in 2 D code of texture enhancing in embedded addressee information
Breath.Therefore, by the way that image in 2 D code and default image are incorporated, the texture of image in 2 D code is enhanced, and in line
On the basis of reason enhancing, embedded cipher-text information, the anti-detection for carrying close image in 2 D code is strengthened.It is moreover, real in whole logistics
In existing process, any staff can't see the information of addressee, reduce the compromised risk of addressee information, ensure
The information security of user.
With reference to figure 7, show that the structural representation of system is realized in a kind of logistics provided in an embodiment of the present invention, in this implementation
In example, the system includes:
User posts part unit 300, and for obtaining addressee information, the addressee information is divided into cleartext information and close
Literary information, and the cleartext information and cipher-text information are sent in trusted cloud platform;
Trusted cloud platform 400, for the cleartext information to be generated into image in 2 D code, by the Quick Response Code figure of generation
Picture and default image are merged, and obtain the carrier Quick Response Code of texture enhancing, and the ciphertext in the addressee information is believed
Breath is embedded into the carrier Quick Response Code of the texture enhancing, obtains carrying close Quick Response Code;
Logistics distribution unit 500, for obtaining sender's information from trusted cloud platform 400 and including addressee information
The close image in 2 D code of load, by scanning the close image in 2 D code of the load, obtain the cleartext information in the addressee information, foundation
Cleartext information in the addressee information, express mail is dispensed into corresponding express mail terminal;
Relay unit 600, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform 400 and extract
The cipher-text information carried in close image in 2 D code, identifying code corresponding to the close image in 2 D code of load is generated, and tested described
Demonstration is sent to relay unit and addressee.
In the present embodiment, addressee can go relay unit to take express mail after identifying code is received according to the identifying code.
It should be noted that user, which posts part unit, can also obtain sender's information, and sender's information is sent to can
Trust cloud platform, when express mail can not be sent to addressee, it is necessary to which express mail is transmitted back into sender, then pass through trusted
The information of sender in cloud platform identification Quick Response Code, then express mail is sent back to by sender by logistics distribution unit.This implementation
In example, after addressee receives identifying code, express mail can be taken into logistics terminal, if in the identifying code and logistics of addressee
Turn the identifying code that receives of termination it is identical when, addressee can take express mail away.
In the present embodiment, a number that the identifying code can be randomly generated, or a number being randomly generated
Accelerate part numbering, such logistics transfer end can mark the numbering of the express mail in the express mail when receiving identifying code, this
For sample when addressee is taking express delivery, terminal can quickly find the express delivery of addressee according to the numbering of addressee's offer.
By the system of the present embodiment, during whole logistics is realized, not only conceal addressee's cipher-text information and deposit
The fact, and be hidden in the cipher-text information in image in 2 D code and also be difficult to be detected, it is compromised to reduce user profile
Risk, ensure that the information security of user.
In addition, in the present embodiment, the close image in 2 D code of load of generation is stored in trusted cloud platform, when transfer list
For first or related courier when the close image in 2 D code of load pasted in express mail is scanned, trusted cloud platform can be straight
The close image in 2 D code of load that extraction preserves is connect, is avoided because the close image in 2 D code of load caused by outside cause is not known and is caused
None- identified goes out the problem of information.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (10)
- A kind of 1. information concealing method, it is characterised in that including:By image in 2 D code and default image co-registration, the carrier image in 2 D code of texture enhancing is obtained;Information to be concealed is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close image in 2 D code.
- 2. according to the method for claim 1, it is characterised in that described that information to be concealed is embedded into the texture enhancing In carrier image in 2 D code, including:The embedded distortion function of definition;According to the embedded distortion function, the information to be concealed is being embedded in the carrier image in 2 D code of the texture enhancing During minimize additivity distortion and, obtain carrying close image in 2 D code.
- 3. according to the method for claim 1, it is characterised in that also include:The information to be concealed is encrypted.
- A kind of 4. information concealment device, it is characterised in that including:First Fusion Module, for by image in 2 D code and default image co-registration, obtaining the carrier Quick Response Code figure of texture enhancing Picture;First insertion module, for information to be concealed to be embedded into the carrier image in 2 D code of the texture enhancing, carried Close image in 2 D code.
- A kind of 5. logistics implementation method, it is characterised in that including:Obtain addressee information;Cleartext information and cipher-text information are distinguished from the addressee information;Cleartext information in the addressee information is generated into image in 2 D code;The image in 2 D code and pre-set image are merged, obtain the carrier image in 2 D code of texture enhancing;The cipher-text information of the addressee is embedded into the carrier image in 2 D code of the texture enhancing, obtains carrying close Quick Response Code Image.
- 6. according to the method for claim 5, it is characterised in that described to distinguish cleartext information from the addressee information And cipher-text information, including:Determine the attribute of each information in the addressee information;The information for belonging to plaintext attribute is defined as cleartext information, the information that will determine as ciphertext attribute is defined as cipher-text information.
- 7. according to the method for claim 6, it is characterised in that also include:The close image in 2 D code of load is identified, obtains addressee information;Generate identifying code corresponding to the image in 2 D code;The identifying code is sent to sender and logistics transfer end according to the addressee information.
- 8. according to the method for claim 6, it is characterised in that also include:The cipher-text information is encrypted.
- A kind of 9. logistics realization device, it is characterised in that including;Acquisition module, for obtaining addressee information;Discriminating module, for distinguishing cleartext information and cipher-text information from the addressee information;Generation module, for the cleartext information in the addressee information to be generated into image in 2 D code;Second Fusion Module, for the image in 2 D code and pre-set image to be merged, obtain the carrier Quick Response Code of texture enhancing Image;Second insertion module, for the cipher-text information of the addressee to be embedded into the carrier image in 2 D code of the texture enhancing In, obtain carrying close image in 2 D code.
- 10. system is realized in a kind of logistics, it is characterised in that including:User posts part unit, and for obtaining addressee information, cleartext information and ciphertext letter are distinguished from the addressee information Breath, and the cleartext information and cipher-text information are sent in trusted cloud platform;Trusted cloud platform, for the cleartext information to be generated into image in 2 D code, by the image in 2 D code of generation and in advance If image merged, obtain texture enhancing carrier Quick Response Code, and by the addressee information cipher-text information be embedded in Into the carrier image in 2 D code of texture enhancing, obtain carrying close image in 2 D code;Logistics distribution unit, it is close for acquisition sender's information from the trusted cloud platform and the load comprising addressee information Image in 2 D code, by scanning the close image in 2 D code of load, the cleartext information in the addressee information is obtained, and according to institute The cleartext information of addressee is stated, express mail is dispensed into corresponding terminal;Relay unit, for scanning the close image in 2 D code of load, and trigger the trusted cloud platform extraction load close two The cipher-text information in code image is tieed up, and generates identifying code corresponding with the close image in 2 D code of load, the ciphertext according to addressee Information, the identifying code is sent to relay unit and addressee.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710797144.8A CN107545390A (en) | 2017-09-06 | 2017-09-06 | Information concealing method, device and logistics implementation method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710797144.8A CN107545390A (en) | 2017-09-06 | 2017-09-06 | Information concealing method, device and logistics implementation method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107545390A true CN107545390A (en) | 2018-01-05 |
Family
ID=60959410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710797144.8A Pending CN107545390A (en) | 2017-09-06 | 2017-09-06 | Information concealing method, device and logistics implementation method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107545390A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109145889A (en) * | 2018-11-02 | 2019-01-04 | 中国电子科技网络信息安全有限公司 | A kind of bright ciphertext Modulation recognition detection method carrying out blind estimate for wireless signal |
CN111050021A (en) * | 2019-12-17 | 2020-04-21 | 中国科学技术大学 | Image privacy protection method based on two-dimensional code and reversible visual watermark |
CN111598198A (en) * | 2020-05-18 | 2020-08-28 | 南京工程学院 | Image two-dimensional code generation method and reading method based on LSB information hiding |
CN112134687A (en) * | 2020-09-15 | 2020-12-25 | 武汉工程大学 | Information encryption and decryption method based on two-dimensional code |
CN112668954A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Method for acquiring logistics mailing and receiving information based on mobile terminal |
CN112668953A (en) * | 2020-08-31 | 2021-04-16 | 浙江万里学院 | Method for embedding secret information of intelligent logistics mail and receiving information |
CN112668955A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Intelligent settlement method for modern logistics expenses |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778732A (en) * | 2015-01-30 | 2015-07-15 | 北大方正集团有限公司 | Method and device for generating two-dimensional code of image |
CN104835108A (en) * | 2015-05-14 | 2015-08-12 | 上海交通大学 | Method for generating visualized two-dimensional code |
CN105069497A (en) * | 2015-07-27 | 2015-11-18 | 南京风力舰信息技术有限公司 | Method for generating beautified two-dimensional code |
CN105117872A (en) * | 2015-07-27 | 2015-12-02 | 深圳市传达科技有限公司 | Express delivery parcel self-service receiving and sending system and implementation method thereof |
-
2017
- 2017-09-06 CN CN201710797144.8A patent/CN107545390A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778732A (en) * | 2015-01-30 | 2015-07-15 | 北大方正集团有限公司 | Method and device for generating two-dimensional code of image |
CN104835108A (en) * | 2015-05-14 | 2015-08-12 | 上海交通大学 | Method for generating visualized two-dimensional code |
CN105069497A (en) * | 2015-07-27 | 2015-11-18 | 南京风力舰信息技术有限公司 | Method for generating beautified two-dimensional code |
CN105117872A (en) * | 2015-07-27 | 2015-12-02 | 深圳市传达科技有限公司 | Express delivery parcel self-service receiving and sending system and implementation method thereof |
Non-Patent Citations (1)
Title |
---|
李宁波等: "基于S-UNIWARD的图像自适应空域隐写术", 《计算机工程与设计》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256807A (en) * | 2018-02-10 | 2018-07-06 | 西安科技大学 | Courier's article receiving and sending system and method based on Quick Response Code identification |
CN108256807B (en) * | 2018-02-10 | 2023-10-03 | 西安科技大学 | Express delivery person receiving and dispatching system and method based on two-dimension code identification |
CN108921261A (en) * | 2018-04-17 | 2018-11-30 | 新大陆(福建)公共服务有限公司 | A kind of safe two-dimensional code generation method and analytic method |
CN109145889B (en) * | 2018-11-02 | 2022-03-18 | 中国电子科技网络信息安全有限公司 | Bright and ciphertext signal classification detection method for blind estimation of wireless signals |
CN109145889A (en) * | 2018-11-02 | 2019-01-04 | 中国电子科技网络信息安全有限公司 | A kind of bright ciphertext Modulation recognition detection method carrying out blind estimate for wireless signal |
CN111050021A (en) * | 2019-12-17 | 2020-04-21 | 中国科学技术大学 | Image privacy protection method based on two-dimensional code and reversible visual watermark |
CN111598198A (en) * | 2020-05-18 | 2020-08-28 | 南京工程学院 | Image two-dimensional code generation method and reading method based on LSB information hiding |
CN111598198B (en) * | 2020-05-18 | 2024-04-26 | 南京工程学院 | Image two-dimensional code generation method and reading method based on LSB information hiding |
CN112668953A (en) * | 2020-08-31 | 2021-04-16 | 浙江万里学院 | Method for embedding secret information of intelligent logistics mail and receiving information |
CN112668953B (en) * | 2020-08-31 | 2023-09-29 | 浙江万里学院 | Method for embedding intelligent logistics sending and receiving information |
CN112668954A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Method for acquiring logistics mailing and receiving information based on mobile terminal |
CN112668955A (en) * | 2020-09-03 | 2021-04-16 | 浙江万里学院 | Intelligent settlement method for modern logistics expenses |
CN112668955B (en) * | 2020-09-03 | 2023-09-22 | 浙江万里学院 | Modern logistics cost intelligent settlement method |
CN112668954B (en) * | 2020-09-03 | 2023-09-26 | 浙江万里学院 | Logistics mail receiving information acquisition method based on mobile terminal |
CN112134687A (en) * | 2020-09-15 | 2020-12-25 | 武汉工程大学 | Information encryption and decryption method based on two-dimensional code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107545390A (en) | Information concealing method, device and logistics implementation method, apparatus and system | |
Emad et al. | A secure image steganography algorithm based on least significant bit and integer wavelet transform | |
US12079368B2 (en) | Methods and apparatus for securely displaying digital images | |
Fridrich et al. | Reliable detection of LSB steganography in color and grayscale images | |
US20180089459A1 (en) | Methods and apparatus for securely displaying digital images | |
US7630513B2 (en) | System and method for network-based object authentication | |
USRE40477E1 (en) | Reliable detection of LSB steganography in color and grayscale images | |
Tiwari et al. | Evaluation of various LSB based methods of image steganography on GIF file format | |
CN105719120A (en) | Method for encrypting privacy information on express waybills | |
CN104820817A (en) | Four-dimensional code, image identification system and method as well as retrieval system and method based on four-dimensional code | |
CN106056183B (en) | The printed medium of printing press readable image and the system and method for scanning the image | |
Nie et al. | The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image | |
Lu et al. | Lossless information hiding in images | |
CN106033543A (en) | Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system | |
AU2011200831B8 (en) | Dynamic thresholds for document tamper detection | |
CN105741222B (en) | A kind of steganography information locating method based on the estimation of pixel subset insertion rate | |
JP3394988B2 (en) | Image processing system | |
Kumar et al. | A hybrid hash-stego for secured message transmission using stegnography | |
CN106650874A (en) | Display method and device for paper fiber characteristics, and anti-counterfeiting method for paper fiber characteristics | |
Chhajed et al. | Information security by hiding data in binary images based on block-diagonal partition pattern | |
Lo et al. | Probability-based image authentication scheme for indexed color images | |
Chhajed et al. | Efficient embedding in B&W picture images | |
CN205827416U (en) | A kind of express delivery, logistics real name system | |
WO2020247765A1 (en) | Method for marking visuals of information for subsequent identification or authentication | |
CN110427891A (en) | The method, apparatus, system and medium of contract for identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180105 |
|
RJ01 | Rejection of invention patent application after publication |