CN107786555A - Information steganography method and system, information extracting method and system based on big data - Google Patents

Information steganography method and system, information extracting method and system based on big data Download PDF

Info

Publication number
CN107786555A
CN107786555A CN201710998187.2A CN201710998187A CN107786555A CN 107786555 A CN107786555 A CN 107786555A CN 201710998187 A CN201710998187 A CN 201710998187A CN 107786555 A CN107786555 A CN 107786555A
Authority
CN
China
Prior art keywords
information
secret information
secret
big data
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710998187.2A
Other languages
Chinese (zh)
Other versions
CN107786555B (en
Inventor
朱定局
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Original Assignee
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Power Innovative Intelligent Technology (dongguan) Co Ltd filed Critical Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Priority to CN202010221323.9A priority Critical patent/CN111526123B/en
Priority to CN201710998187.2A priority patent/CN107786555B/en
Publication of CN107786555A publication Critical patent/CN107786555A/en
Priority to JP2018199600A priority patent/JP2019079051A/en
Application granted granted Critical
Publication of CN107786555B publication Critical patent/CN107786555B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information steganography method based on big data and system, information extracting method and system, described information steganography method includes:Receiving needs the secret information of steganography;The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent to the person of being authorized;Described information extracting method includes:Receive the secret information relevant information in the big data that the person of being authorized provides;Secret information relevant information extraction secret information in big data, and secret information is sent to the person of being authorized.The present invention can both make all users to disclose access big data, each user can be made to have access to the user in big data again and obtain the information authorized, so that big data is existing open and there is security, due to inserting big data, so that the steganographic capacity of information steganography has obtained great extension in big data carrier, traditional carrier size is no longer limited by, drastically increases the capacity of information steganography.

Description

Information steganography method and system, information extracting method and system based on big data
Technical field
The present invention relates to a kind of information steganography method based on big data and system, information extracting method and system, belong to Information privacy protection technical field.
Background technology
Information steganography is different from big well known " password ", and information steganography is a kind of " shape of hideing art ", is directed to by setting Count exquisite method so that unauthorized person has no way of learning the presence or absence of secret information, can not more learn that secret information is deposited at all Where.
" the data scale of construction is huge, value density is low " is the key characteristic that big data is different from " little data ", and these are new The characteristic of type causes existing information steganography technology can not copy slavishly in big data environment.
Big data (carrier) data scale of construction is huge, and existing information steganography is set for the little carrier of the scale of construction What meter was realized.If handling the huge carrier (big data) of such scale of construction with existing information steganography, need what is grown very much Time could have been handled so that existing information steganography lost in big data it is ageing.
Big data (carrier) value density is low, and wherein data are possible to be treated as junk data at any time to go to delete or treated as When data go to update, and existing information steganography is designed realization for metastable carrier.If will be existing Information steganography technology is used for so variable carrier (big data), then the secret information of steganography is possible to be broken at any time in the carrier It is bad, so that existing information steganography loses reliability in big data.
The content of the invention
First purpose of the present invention is to solve the defects of above-mentioned prior art, there is provided a kind of information steganography side Method, this method while Large Copacity steganography is realized, can fully be protected in the rapidly steganography secret information of the position in big data The highly concealed type of secret information is demonstrate,proved.
Second object of the present invention is to provide a kind of information extracting method, and this method enables the person's of being authorized basis Secret information relevant information in big data is quickly located and extracted to secret information.
Third object of the present invention is to provide a kind of information steganography system.
Fourth object of the present invention is to provide a kind of information extracting system.
First purpose of the present invention can be reached by adopting the following technical scheme that:
Information steganography method, methods described include:
Receiving needs the secret information of steganography;
The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent out Give the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data Information related information is sent to the person of being authorized, and specifically includes:
Secret information is cut into multiple secret information pieces;
Position of each secret information piece in secret information is numbered;
Multiple positions that multiple secret information pieces are inserted in big data;
Position of position and multiple secret information piece of multiple secret information pieces in big data in secret information is compiled Number it is sent to the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data Information related information is sent to the person of being authorized, and specifically includes:
Secret information is copied into more parts of secret informations;
Multiple positions that more parts of secret informations are inserted in big data;
Using the partial information or attribute information of secret information as check information;
Position of the more parts of secret informations in big data and check information are sent to the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data Information related information is sent to the person of being authorized, and specifically includes:
Secret information is copied into more parts of secret informations;
Every part of secret information is cut into multiple secret information pieces;
According to the positional information of all secret informations inserted in big data, the secret information calculated in each data block exists Distribution density in big data;
Distribute multiple distribution densities minimum position for multiple secret information pieces of every part of secret information;
According to the characteristic information of the characteristic information of each secret information piece of every part of secret information and its required carrier, this The conversion demand of secret information piece and its required carrier, enter line translation to each secret information piece using information steganography technology and insert Enter;
Using the partial information or attribute information of secret information as check information;
For every part of secret information, by the characteristic information of the insertion position information of multiple secret information pieces, required carrier with And check information is sent to the person of being authorized.
Second object of the present invention can be reached by adopting the following technical scheme that:
Information extracting method, methods described include:
Receive the secret information relevant information in the big data that the person of being authorized provides;
Secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized Person.
Further, the secret information relevant information in the big data includes multiple secret information pieces in big data The Position Number of position and multiple secret information pieces in secret information;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted Quan Zhe, specifically include:
Positioned by position of multiple secret information pieces in big data from big data and obtain multiple secret information pieces;
According to Position Number of multiple secret information pieces in secret information and multiple secret information pieces, merging obtains secret Information;
Secret information is sent to the person of being authorized.
Further, the secret information relevant information in the big data includes more parts of secret informations the position in big data Put and check information;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted Quan Zhe, specifically include:
Positioned by position of the more parts of secret informations in big data from big data and obtain more parts of secret informations;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information differs with other secret informations When, select a copy of it secret information to be sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information is identical with other K part secret informations When, select that part of secret information corresponding to maximum K values to be sent to authenticated user;Wherein, K >=1, and be natural number.
Further, the secret information relevant information in the big data includes multiple secret informations of every part of secret information The insertion position information of piece, the characteristic information and check information of required carrier;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted Quan Zhe, specifically include:
According to the insertion position information of multiple secret information pieces of every part of secret information, the characteristic information of required carrier and Check information, inverse transformation is carried out to each secret information piece using information steganography technology;
For every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part of secret information;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information differs with other secret informations When, select a copy of it secret information to be sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information is identical with other K part secret informations When, select that part of secret information corresponding to maximum K values to be sent to authenticated user;Wherein, K >=1, and be natural number.
Third object of the present invention can be reached by adopting the following technical scheme that:
Information steganography system, the system include:
First receiving module, the secret information of steganography is needed for receiving;
Insertion and sending module, for the position for being handled secret information and being inserted in big data, by big data Secret information relevant information be sent to the person of being authorized.
Further, the insertion and sending module, are specifically included:
First cutting unit, for secret information to be cut into multiple secret information pieces;
Numbered cell, for position of each secret information piece in secret information to be numbered;
First insertion unit, for the multiple positions for inserting multiple secret information pieces in big data;
First transmitting element, for by position of multiple secret information pieces in big data and multiple secret information pieces secret Position Number in confidential information is sent to the person of being authorized.
Further, the insertion and sending module, are specifically included:
First copied cells, for secret information to be copied into more parts of secret informations;
Second insertion unit, for the multiple positions for inserting more parts of secret informations in big data;
First check information acquiring unit, for using the partial information or attribute information of secret information as check information;
Second transmitting element, for position of the more parts of secret informations in big data and check information to be sent to and be authorized Person.
Further, the insertion and sending module, are specifically included:
Second copied cells, for secret information to be copied into more parts of secret informations;
Second cutting unit, for every part of secret information to be cut into multiple secret information pieces;
Computing unit, for the positional information according to all secret informations inserted in big data, calculate each data block In distribution density of the secret information in big data;
Allocation unit is minimum for distributing multiple distribution densities for multiple secret information pieces of every part of secret information Position;
3rd insertion unit, characteristic information and its required load for each secret information piece according to every part of secret information The conversion demand of the characteristic information of body, this secret information piece and its required carrier, using information steganography technology to each secret Message slot enters line translation and insertion;
Second check information acquiring unit, using the partial information or attribute information of secret information as check information;
3rd transmitting element, for for every part of secret information, by the insertion position information of multiple secret information pieces, required The characteristic information and check information of carrier are sent to the person of being authorized.
Fourth object of the present invention can be reached by adopting the following technical scheme that:
Information extracting system, the system include:
Second receiving module, the secret information relevant information in big data for receiving the person's of being authorized offer;
Extraction and sending module, secret information is extracted for the secret information relevant information in big data, and will be secret Confidential information is sent to the person of being authorized.
Further, the secret information relevant information in the big data includes multiple secret information pieces in big data The Position Number of position and multiple secret information pieces in secret information;
The extraction and sending module, are specifically included:
First positioning unit, for positioning and obtaining from big data by position of multiple secret information pieces in big data Take multiple secret information pieces;
First combining unit, for according to Position Number of multiple secret information pieces in secret information and multiple secret believing Piece is ceased, merging obtains secret information;
4th transmitting element, for secret information to be sent into the person of being authorized.
Further, the secret information relevant information in the big data includes more parts of secret informations the position in big data Put and check information;
The extraction and sending module, are specifically included:
Second positioning unit, for positioning and obtaining from big data by position of the more parts of secret informations in big data More parts of secret informations;
First verification unit, for selecting the secret information consistent with check information from more parts of secret informations;
5th transmitting element, when the secret information for passing through when verification only has a, this part of secret information is sent to Authenticated user;
6th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its When his secret information differs, a copy of it secret information is selected to be sent to authenticated user;
7th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its When his K part secret informations are identical, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1, And it is natural number.
Further, the secret information relevant information in the big data includes multiple secret informations of every part of secret information The insertion position information of piece, the characteristic information and check information of required carrier;
The extraction and sending module, are specifically included:
Inverse transformation block, insertion position information, required load for multiple secret information pieces according to every part of secret information The characteristic information and check information of body, inverse transformation is carried out to each secret information piece using information steganography technology;
Second combining unit, for for every part of secret information, multiple secret information pieces after inverse transformation to be merged, Obtain this part of secret information;
Second verification unit, for selecting the secret information consistent with check information from more parts of secret informations;
8th transmitting element, when the secret information for passing through when verification only has a, this part of secret information is sent to Authenticated user;
9th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its When his secret information differs, a copy of it secret information is selected to be sent to authenticated user
Tenth transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its When his K part secret informations are identical, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1, And it is natural number.
The present invention has following beneficial effect relative to prior art:
1st, the present invention discloses big data for network, passes through the position for being handled secret information and being inserted in big data Put, to protect the information privacy in big data, all users can both disclose and accessed big data, each user can be made again The user in big data can only be had access to and obtain the information authorized so that big data is existing open and has security, due to inserting Big data is entered so that the steganographic capacity of information steganography has obtained great extension in big data carrier, is no longer limited by passing The carrier size of system, drastically increase the capacity of information steganography.
2nd, the present invention can be distributed in big data by the way that secret information is cut into many secret information pieces, big realizing While capacity steganography, the highly concealed type of secret information is fully ensured that, using the insertion position of secret information piece as processing Object, can be in the rapidly steganography secret information, while at the information extraction stage, the person of being authorized also can of the position in big data It is enough that secret information is quickly located and extracted according to position of the secret information piece in big data, to realize secret information High-timeliness.
3rd, the present invention can carry out redundant storage, can not only resist big data load by the way that secret information is copied into more parts The change of body, and it is even more more reliable than the steganography based on conventional carriers, because there is bigger memory space in big data More redundancy backups are carried out to secret information, and the probability that multiple redundancy backups are damaged simultaneously is relatively smaller, is carried in information When taking the stage, the secret information that has damaged can be excluded by verification so that the secret information of " having passed through verification " can By property height;When there are multiple secret informations all to pass through verification, then the mutual confirmation between multiple secret informations, gained can make it that To the reliability of secret information be further greatly improved.
4th, the present invention profit slit mode can cut into slices at the information steganography stage to every part of secret information of duplication, adopt Further secret information piece is converted with existing information steganography, at the information extraction stage, verified and mutual Every part of secret information after mutually confirming inverse transformation and merging, the further earth polar of reliability of resulting secret information can make it that It is big to improve, while the distribution by suitable " insertion " scheduling secret information in big data is as far as possible remote, and cause secret Distribution of the information in big data tries not the phenomenon that flocks together occur, then distribution of the high-volume secret information in big data is still It is so extremely sparse, it can be ensured that the highly concealed type and high security of secret information.
5th, the present invention has started the new paragon different from conventional information steganography and transmission means, i.e. network-oriented discloses big number According to information steganography and transmission means, from " secret information is directly transmitted to and is authorized by the user for possessing secret information by network User " be changed into that " secret information is passed to big data by the user for possessing secret information by internet or cloud client, then Again secret information is extracted from big data by internet or cloud client by the user being authorized ", it is this based on big data Information steganography and transmission new paragon, can cause secret information in big data by more authenticated users longer time It is interior to may have access to, and the popular access that big data is disclosed for network is not influenceed, user is very easy to secret information Steganography and transmission.
Brief description of the drawings
Fig. 1 is the information steganography method flow chart of the embodiment of the present invention 1.
Fig. 2 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 1 Cheng Tu.
Fig. 3 is the information extracting method flow chart of the embodiment of the present invention 1.
Fig. 4 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 1.
Fig. 5 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 2 Cheng Tu.
Fig. 6 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 2.
Fig. 7 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 3 Cheng Tu.
Fig. 8 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 3.
Fig. 9 is the information steganography system architecture diagram of the embodiment of the present invention 4.
Figure 10 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 4.
Figure 11 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 5.
Figure 12 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 6.
Figure 13 is the information extracting system structured flowchart of the embodiment of the present invention 7.
Figure 14 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 7.
Figure 15 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 8.
Figure 16 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 9.
Embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are unlimited In this.
Embodiment 1:
As shown in figure 1, present embodiments providing a kind of information steganography method, this method comprises the following steps:
S101, reception need the secret information of steganography.
S102, the position for being handled secret information and being inserted in big data are related by the secret information in big data Information is sent to the person of being authorized.
The information steganography method of the present embodiment and the contrast of prior art, prior art is by secret information steganography little In data, and the present embodiment by secret information steganography in big data.
Prior art steganography secret information in little data as family is ensconced in gold, silver, treasures and jewels, is only hidden a small amount of Gold, silver, treasures and jewels, always can by shrewdness thief find.
The present embodiment steganography secret information in big data such as " never hearing of since then ", can sink largely " stone " (secret Information), the difficulty cracked is such as " looking for a needle in a haystack ".
Illustrated with an example, thousands of terra cotta warriors and horses (" secret letter in Qin Shihuang Tomb under ground (" big data ") Breath ") just it was found by 1974, " steganography " more than 2,000 years fully., whereas if these terra cotta warriors and horses are hidden within warehouse by we (" little data ") are inner, or terra cotta warriors and horses are placed on be covered with office room (" information encryption ") it is inner, these terra cotta warriors and horses necessarily morning Just it is found!
Illustrated with another example, in current position universe (" big data ") with the presence or absence of outman's (" secret letter Breath ") Nobody Knows, do not know that more outman on earth exist where;, whereas if outman is ensconced into family's (" little number According to ") inner, or that outman is locked in into combination lock (" information encryption ") is inner, outman, which is then easy to be found, to come.
By the comparison of said circumstances and example, can apparently see relative to existing information steganography technology and It is bigger in the capacity of the information steganography technology based on big data for information encryption, it is more unbreakable.
In the present embodiment, the position for being handled secret information and being inserted in big data refers to carry out secret information Cutting, multiple secret information pieces are obtained, and the position of multiple secret information pieces is numbered, then by multiple secret information pieces The multiple positions inserted in big data;Secret information relevant information in big data includes multiple secret information pieces in secret information In position in big data of Position Number and multiple secret information pieces.
As shown in Fig. 2 step S102 specifically includes following steps:
S1021, secret information is cut into multiple secret information pieces.
S1022, position of each secret information piece in secret information is numbered, and each secret information piece is existed Position Number in secret information is as the first numbering.
S1023, the multiple positions for inserting multiple secret information pieces in big data, and multiple secret information pieces are being counted greatly Position in is as multiple first positions.
Because the scale of construction of big data is huge, such as boundless ocean, unauthorized person is not due to knowing the positional information, from whole Secret information is extracted in body big data, such as " looking for a needle in a haystack ", " can only be deeply aware of one's own helplessness when faced with a great task " forever;Simultaneously by the way that secret information is cut Be divided into many secret information pieces to be distributed in big data, as " by stone be broken into sand be spread to it is big marine ", unauthorized person is just more Have no way of having looked for.
Though big data is big, need the secret information of steganography relatively little, it is only necessary to " place " less, " to shelter oneself Institute ", therefore using the insertion position of multiple secret information pieces as processing object, without using big data carrier in itself as The object of processing, can be in the rapidly steganography secret information of the position in big data.
Even if secret information is very big, but also seems very negligible in the big data carrier of the huge scale of construction, and passes through Secret information is cut into smaller secret information piece to be distributed in big data so that each secret information piece is in big data carrier In it is more insignificant, so as to while Large Copacity steganography is realized, fully ensured that the highly concealed type of secret information.
S1024, by multiple first positions and it is multiple first numbering be sent to the person of being authorized.
As shown in figure 3, the present embodiment additionally provides a kind of information extracting method, this method and above- mentioned information steganography method phase It is corresponding, comprise the following steps:
Secret information relevant information in the big data that S301, the reception person of being authorized provide.
S302, the secret information relevant information extraction secret information in big data, and secret information is sent to and obtained Authorized person.
Because the information extracting method of the present embodiment is corresponding with above- mentioned information steganography method, therefore the secret in big data Information related information includes position and multiple secret information piece of multiple secret information pieces in big data in secret information Position Number, i.e., including multiple first positions and multiple first numberings.
As shown in figure 4, step S302 specifically includes following steps:
S3021, positioned by multiple first positions from big data and obtain multiple secret information pieces.
S3022, according to multiple first numbering and multiple secret information pieces, merging obtain secret information.
S3023, secret information is sent to the person of being authorized.
It can be seen that the person of being authorized can be carried out rapidly according to multiple first positions and multiple first numberings to secret information Positioning and extraction.
Embodiment 2:
The present embodiment is handled secret information with being step S102 in place of the difference of embodiment 1 and inserts big number Position in refers to secret information being copied into more parts of secret informations, and will be in more parts of secret informations insertion big datas it is multiple Position;Secret information relevant information in big data includes more parts of secret informations position and check information in big data.
As shown in figure 5, step S102 specifically includes following steps:
S1021, secret information is copied into more parts of secret informations.
S1022, the multiple positions for inserting more parts of secret informations in big data, and by more parts of secret informations in big data Position as multiple first positions.
Although big data value density is low, cause it variable, it is more by the way that secret information is copied into information steganography Part, carry out redundant storage, can not only resist the change of big data carrier, and even more may be used than the steganography based on conventional carriers Lean on, because there is bigger memory space to carry out more redundancy backups to secret information in big data, and multiple redundancy backups The probability damaged simultaneously is relatively smaller.
S1023, using the partial information or attribute information of secret information as check information.
S1024, multiple first positions and check information are sent to the person of being authorized.
Correspondingly, in the information extracting method of the present embodiment, the secret information relevant information in big data includes more parts Position and check information of the secret information in big data, i.e., including multiple first positions and check information.
As shown in fig. 6, step S302 specifically includes following steps:
S3021, positioned by multiple first positions from big data and obtain more parts of secret informations.
S3022, the secret information consistent with check information is selected from more parts of secret informations, if the secret letter that verification passes through Breath only has portion, into step S3023;If verify the secret information that passes through more than portion, and wherein every part of secret information and its He differs secret information, into step S3024;If verifying the secret information passed through is more than portion, and wherein every part of secret Information is identical with other K part secret informations, into step S3025;Wherein, K >=1, and be natural number.
S3023, this part of secret information be sent to authenticated user.
S3024, selection a copy of it secret information are sent to authenticated user;
Exemplified by verifying the secret information passed through and have three parts, first part, second part, the 3rd part of secret information and other two parts Secret information differs, and selects a copy of it secret information to be sent to authenticated user.
That part of secret information corresponding to S3025, the maximum K values of selection is sent to authenticated user.
Exemplified by verifying the secret information passed through and have five parts, first part, second part of secret information and other two parts are secret to be believed Manner of breathing is same, K values be 2, the 3rd part, the 4th part, three parts of secret informations of the 5th part of secret information and other it is identical, K values be 3, it is seen that Maximum K values are 3, then take any part in the 3rd part, the 4th part, the 5th part to be sent to authenticated user.
Exemplified by verifying the secret information passed through and have three parts, first part, second part, the 3rd part of secret information and other two parts Secret information is identical, and K values are 2, due to the K values not compared, it is seen that maximum K values are 2, then take first part, second part, the Any part in three parts is sent to authenticated user.
The secret information that the present embodiment can exclude to have damaged by verification so that the secret information of " having passed through verification " Reliability is high;When there is multiple secret informations all to pass through verification, then the mutual confirmation between multiple secret informations can cause institute The reliability of obtained secret information is further greatly improved.
Embodiment 3:
The present embodiment in place of the difference of embodiment 1,2 with being step S102, as shown in fig. 7, step S102 is specifically included Following steps:
S1021, secret information is copied into more parts of secret informations, copy mode is the same as embodiment 2.
S1022, every part of secret information is cut into multiple secret information pieces, slit mode is the same as embodiment 1.
Although the scale of construction of big data carrier is huge, variable, after the cutting for applying embodiment 1, each secret information Data block in place of piece insertion position is all little data medium, and little data medium belongs to existing information steganography skill The competent category of art, so that existing information steganography technology can be used in " secret information piece ".
S1023, the positional information according to all secret informations inserted in big data, calculate the secret in each data block Distribution density of the information in big data.
S1024, multiple secret information pieces for every part of secret information distribute multiple distribution densities minimum position.
For every part of secret information, due to the secret information piece at least two of cutting, therefore the position that distribution density is minimum Also at least two are put, multiple secret information pieces of a secret information distribute multiple distribution densities minimum position wherein Postpone, then re-execute step S1023, distribute multiple distribution densities minimum position for lower a multiple secret information pieces Put, until multiple secret information pieces of every part of secret information distribute multiple distribution densities minimum position.
Although big data is open, having the high-volume secret information of mass users needs to be inserted into big data, Because high-volume secret information for the big data of flood tide, is still very inappreciable, as long as by suitable " insertion ", which is dispatched, make it that distribution of the related secret information in big data is as far as possible remote, while causes secret information in big data Distribution try not the phenomenon that flocks together occur, then distribution of the high-volume secret information in big data is still extremely sparse , it can be ensured that the highly concealed type and high security of secret information.
S1025, characteristic information and its required carrier (this secret according to each secret information piece of every part of secret information The data block that information is inserted) characteristic information, the conversion demand of this secret information piece and its required carrier, it is hidden using information Writing technology enters line translation and insertion to each secret information piece;Wherein, information steganography technology can use existing information steganography skill Art.
S1026, using the partial information or attribute information of secret information as check information.
S1027, for every part of secret information, by the insertion position information of multiple secret information pieces, the feature of required carrier Information and check information are sent to the person of being authorized.
Correspondingly, in the information extracting method of the present embodiment, the secret information relevant information in big data includes every part The insertion position information of multiple secret information pieces of secret information, the characteristic information and check information of required carrier.
As shown in figure 8, step S302 specifically includes following steps:
S3021, believed according to insertion position information, the feature of required carrier of multiple secret information pieces of every part of secret information Breath and check information, inverse transformation is carried out to each secret information piece using information steganography technology;Wherein, information steganography technology can To use existing information steganography.
S3022, for every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part it is secret Confidential information, the merging mode is the same as embodiment 1.
S3023, the secret information consistent with check information is selected from more parts of secret informations, if the secret letter that verification passes through Breath only has portion, into step S3024;If verify the secret information that passes through more than portion, and wherein every part of secret information and its He differs secret information, into step S3025;If verifying the secret information passed through is more than portion, and wherein every part of secret Information is identical with other K part secret informations, into step S3026;Wherein, K >=1, and be natural number.
Although at the information steganography stage using the slit mode of embodiment 1 to " every part of secret information in embodiment 2 " To be cut into slices, existing information steganography further is converted to secret information piece, but in the information extraction stage When verify and corroborate each other be inverse transformation and merge after every part of secret information, so complying fully with the processor of embodiment 2 System.
S3024, this part of secret information be sent to authenticated user.
S3025, selection a copy of it secret information are sent to authenticated user;
That part of secret information corresponding to S3026, the maximum K values of selection is sent to authenticated user;Wherein, K >=1, and for certainly So number.
Step S3023~S3026 verification mode is the same as embodiment 2.
It is as follows for the concrete application example of the present embodiment:
Two kinds of the most frequently used frameworks for building big data cloud computing environment are Hadoop and Spark, intend choosing in experimentation With Spark, because Spark is the universal parallel frame for the class Hadoop MapReduce that UC Berkeley AMP lab are increased income Frame, Spark, possess advantage possessed by Hadoop MapReduce;But what it is different from MapReduce is output knot among Job Fruit can be stored in internal memory, and so as to which intermediate input output no longer needs to read and write HDFS, therefore Spark can preferably be applied to number The MapReduce of iteration algorithm is needed according to excavation and machine learning etc..Spark is a kind of increase income cluster similar to Hadoop Computing environment, but some differences between the two also be present, these useful differences make Spark be born in some work Show more superior in terms of load, in other words, Spark enables internal memory distributed data collection, is looked into except that can provide interactive mode Outside asking, it can be with Optimized Iterative workload.
In actual applications, then selected according to the framework disposed in the big data cloud computing environment of reality.For example, If having deployed Spark in actual environment, Spark processing is utilized;If having deployed Hadoop in actual environment, Then utilize Hadoop processing.Below with illustrated under Spark frameworks with the Hdfs processing modes being combined ( Processing mode under Hadoop frameworks is identical with the principle of the processing mode under Spark, repeats no more), key step is as follows:
(1) the information steganography stage:
1) the Master nodes that Spark is managed in big data environment are by the high-volume secret information of the mass users received Steganography request be dispatched to the first different Worker nodes and handled.
2) each first Worker nodes that Spark is managed in big data environment call Hdfs (Hadoop distributed field systems System) secret information in steganography request task is replicated according to the copy mode of embodiment 2, then further according to embodiment 1 Slit mode carry out cutting.
3) each first Worker nodes that Spark is managed in big data environment are by the characteristic information of secret information piece and its institute The characteristic information (such as size of secret information piece and its size of required carrier) of carrier is needed to be sent to the Master of Spark management Node, and the Master node distributions insertion position for asking Spark to manage.
4) the secret letter that the Master nodes that Spark is managed in big data environment are sent according to each first Worker nodes Characteristic information, the characteristic information of required carrier of piece are ceased, and the distribution density of secret information has been inserted in big data, is calculated (" insertion " dispatching algorithm referred here to can be based on Hdfs (increasing income) for the most suitable insertion position of each secret information piece Data block is cut into slices and redundant arithmetic is improved to realize), return to each first Worker nodes.
5) the Master nodes point that each first Worker nodes that Spark is managed in big data environment manage according to Spark The position matched somebody with somebody, the conversion demand of each secret information piece and its required carrier is sent to each second where the position of each distribution Worker nodes.
6) in big data environment each 2nd Worker nodes according to the characteristic information of secret information piece and its required carrier Conversion demand needed for characteristic information, the secret information piece and its required carrier, " existing information steganography " is called to secret Message slot enters line translation and insertion, and feedback " being successively inserted into " information gives each first Worker nodes after completing operation.
7) in big data environment each first Worker nodes by the insertion position information of each secret information piece, required carrier Characteristic information and the check information of generation be sent to authenticated user.
(2) the information extraction stage:
1) the Master nodes that Spark is managed in big data environment ask the extraction of the high-volume secret information received The 3rd different Worker nodes are dispatched to be handled.
2) information (example that is authorized that each 3rd Worker nodes that Spark is managed in big data environment provide according to user Such as:The positional information of secret information piece, the characteristic information of required carrier, check information) secret information piece is obtained in big data Insertion position information and secret information piece needed for carrier characteristic information.
3) each 3rd Worker nodes that Spark is managed in big data environment by the extraction of each secret information piece request and its Characteristic information is sent to each 4th Worker nodes of each secret information piece position;
4) each 4th Worker nodes call " existing information steganography " to carry out secret information piece in big data environment Secret information piece is sent to each 3rd Worker nodes after inverse transformation.
5) each 3rd Worker nodes call Hdfs (Hadoop distributed file systems) to each secret in big data environment Message slot merges according to the merging mode of embodiment 1, then further according to embodiment 2 verification mode to more parts after merging Secret information carries out verification and mutually confirmation.
6) each 3rd Worker nodes send each secret information for having passed through verification and mutually having confirmed in big data environment To the person of being authorized.
Wherein, in " the first Worker nodes, the 2nd Worker nodes, the 3rd Worker nodes, the 4th Worker nodes " " first, second, third, fourth ", without particular meaning, be intended merely to distinguish the needs of inhomogeneity Worker nodes.
Embodiment 4:
As shown in figure 9, present embodiments providing a kind of information steganography system, the system includes the first receiving module 901, with And insertion and sending module 902.
First receiving module 901, the secret information relevant information in big data for receiving the person's of being authorized offer.
The insertion and sending module 902, secret information is extracted for the secret information relevant information in big data, And secret information is sent to the person of being authorized.
As shown in Figure 10, the insertion of the present embodiment specifically includes with sending module 902:
First cutting unit 9021, for secret information to be cut into multiple secret information pieces.
Numbered cell 9022, for position of each secret information piece in secret information to be numbered, and will be each Position Number of the secret information piece in secret information is as the first numbering.
First insertion unit 9023, for the multiple positions for inserting multiple secret information pieces in big data, and will be multiple Position of the secret information piece in big data is as multiple first positions;
First transmitting element 9024, for multiple first positions and multiple first numberings to be sent into the person of being authorized.
Embodiment 5:
The present embodiment inserts and sending module 902, as shown in figure 11, insertion and hair with being in place of the difference of embodiment 4 Module 902 is sent to specifically include:
First copied cells 9021, for secret information to be copied into more parts of secret informations.
Second insertion unit 9022, for the multiple positions for inserting more parts of secret informations in big datas, and it is secret by more parts Position of the confidential information in big data is as multiple first positions.
First check information acquiring unit 9023, for the partial information of secret information or attribute information to be believed as verification Breath.
Second transmitting element 9024, for position of the more parts of secret informations in big data and check information to be sent to and obtain Authorized person.
Embodiment 6:
Be to insert in place of the difference of the present embodiment and embodiment 4,5 with sending module 902, as shown in figure 12, insertion with Sending module 902 specifically includes:
Second copied cells 9021, for secret information to be copied into more parts of secret informations.
Second cutting unit 9022, for every part of secret information to be cut into multiple secret information pieces.
Computing unit 9023, for the positional information according to all secret informations inserted in big data, calculate each number According to distribution density of the secret information in block in big data.
Allocation unit 9024, for distributing multiple distribution densities most for multiple secret information pieces of every part of secret information Low position.
3rd insertion unit 9025, characteristic information and its institute for each secret information piece according to every part of secret information The conversion demand of the characteristic information of carrier, this secret information piece and its required carrier is needed, using information steganography technology to each Secret information piece enters line translation and insertion.
Second check information acquiring unit 9026, using the partial information or attribute information of secret information as check information.
3rd transmitting element 9027, for for every part of secret information, by the insertion position information of multiple secret information pieces, The characteristic information and check information of required carrier are sent to the person of being authorized.
Embodiment 7:
As shown in figure 13, a kind of information extracting system is present embodiments provided, the information steganography system of the system and embodiment 4 Unite corresponding, it includes the second receiving module 1101, and extraction and sending module 1102.
Second receiving module 1101, the related letter of the secret information in big data for receiving the person's of being authorized offer Breath;
The extraction and sending module 1102, for the secret letter of secret information relevant information extraction in big data Breath, and secret information is sent to the person of being authorized.
Because the information extracting system of the present embodiment and the information steganography system of embodiment 4 are corresponding, therefore in big data Secret information relevant information include position of multiple secret information pieces in big data and multiple secret information pieces and believe in secret Position Number in breath, i.e., including multiple first positions and multiple first numberings.
As shown in figure 14, the extraction of the present embodiment specifically includes with sending module 1102:
First positioning unit 11021, for positioning and obtaining multiple secret letters from big data by multiple first positions Cease piece;
First combining unit 11022, for obtaining secret letter according to the multiple first numberings and multiple secret information pieces, merging Breath;
4th transmitting element 11023, for secret information to be sent into the person of being authorized.
Embodiment 8:
The present embodiment in place of the difference of embodiment 7 with being, the information extracting system of the present embodiment and the information of embodiment 5 Steganographic system is corresponding, and the secret information relevant information in big data includes more parts of secret informations position and school in big data Information is tested, i.e., including multiple first positions and check information.
As shown in figure 15, the extraction of the present embodiment specifically includes with sending module 1102:
Second positioning unit 11021, for being positioned by position of the more parts of secret informations in big data from big data And obtain more parts of secret informations.
First verification unit 11022, for selecting the secret information consistent with check information from more parts of secret informations.
5th transmitting element 11023, when the secret information for passing through when verification only has a, this part of secret information is sent out Give authenticated user.
6th transmitting element 11024, the secret information for passing through when verification are more than portion, and wherein every part of secret information When being differed with other secret informations, a copy of it secret information is selected to be sent to authenticated user.
7th transmitting element 11025, the secret information for passing through when verification are more than portion, and wherein every part of secret information When identical with other K part secret informations, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1, and be natural number.
Embodiment 9:
The present embodiment in place of the difference of embodiment 7,8 with being, the information extracting system of the present embodiment and the letter of embodiment 6 Breath steganographic system is corresponding, and the secret information relevant information in big data includes multiple secret information pieces of every part of secret information The characteristic information and check information of insertion position information, required carrier.
As shown in figure 16, the extraction of the present embodiment specifically includes with sending module 1102:
Inverse transformation block 11021, insertion position information, institute for multiple secret information pieces according to every part of secret information The characteristic information and check information of carrier are needed, inverse transformation is carried out to each secret information piece using information steganography technology;
Second combining unit 11022, for for every part of secret information, multiple secret information pieces after inverse transformation to be carried out Merge, obtain this part of secret information;
Second verification unit 11023, for selecting the secret information consistent with check information from more parts of secret informations;
8th transmitting element 11024, when the secret information for passing through when verification only has a, this part of secret information is sent out Give authenticated user;
9th transmitting element 11025, the secret information for passing through when verification are more than portion, and wherein every part of secret information When being differed with other secret informations, a copy of it secret information is selected to be sent to authenticated user
Tenth transmitting element 11026, the secret information for passing through when verification are more than portion, and wherein every part of secret information When identical with other K part secret informations, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1, and be natural number.
Can one of ordinary skill in the art will appreciate that realizing that all or part of step in the various embodiments described above method is To instruct the hardware of correlation to complete by program, corresponding program can be stored in a computer read/write memory medium In, described storage medium, such as ROM/RAM, disk or CD.
Herein it should be noted that the system that the various embodiments described above provide only is lifted with the division of above-mentioned each functional module Example explanation, in actual applications, it can be completed as needed and by above-mentioned function distribution by different functional modules, will be internal Structure is divided into different functional modules, to complete all or part of function described above.
It is appreciated that term " first ", " second " etc. used in the system of the various embodiments described above are various available for describing Module, but these modules should not be limited by these terms.These terms are only used for distinguishing first module and another module.Lift For example, without departing from the scope of the invention, the first receiving module can be referred to as the second receiving module, and it is similar Second receiving module, can be referred to as the first receiving module by ground, and the first receiving module and the second receiving module both judge mould Block, but it is not same receiving module.
It is described above, patent preferred embodiment only of the present invention, but the protection domain of patent of the present invention is not limited to This, any one skilled in the art is in the scope disclosed in patent of the present invention, according to the skill of patent of the present invention Art scheme and its inventive concept are subject to equivalent substitution or change, belong to the protection domain of patent of the present invention.

Claims (10)

1. information steganography method, it is characterised in that:Methods described includes:
Receiving needs the secret information of steganography;
The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent to The person of being authorized.
2. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is cut into multiple secret information pieces;
Position of each secret information piece in secret information is numbered;
Multiple positions that multiple secret information pieces are inserted in big data;
Position Number of position and multiple secret information piece of multiple secret information pieces in big data in secret information is sent out Give the person of being authorized.
3. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is copied into more parts of secret informations;
Multiple positions that more parts of secret informations are inserted in big data;
Using the partial information or attribute information of secret information as check information;
Position of the more parts of secret informations in big data and check information are sent to the person of being authorized.
4. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is copied into more parts of secret informations;
Every part of secret information is cut into multiple secret information pieces;
According to the positional information of all secret informations inserted in big data, the secret information calculated in each data block is counting greatly Distribution density in;
Distribute multiple distribution densities minimum position for multiple secret information pieces of every part of secret information;
According to characteristic information, this secret of the characteristic information of each secret information piece of every part of secret information and its required carrier The conversion demand of message slot and its required carrier, line translation and insertion are entered to each secret information piece using information steganography technology;
Using the partial information or attribute information of secret information as check information;
For every part of secret information, by the insertion position information of multiple secret information pieces, the characteristic information of required carrier and school Test information and be sent to the person of being authorized.
5. information extracting method, it is characterised in that:Methods described includes:
Receive the secret information relevant information in the big data that the person of being authorized provides;
Secret information relevant information extraction secret information in big data, and secret information is sent to the person of being authorized.
6. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data Breath includes position and multiple secret information piece Position Number in secret information of multiple secret information pieces in big data;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized Person, specifically include:
Positioned by position of multiple secret information pieces in big data from big data and obtain multiple secret information pieces;
According to Position Number of multiple secret information pieces in secret information and multiple secret information pieces, merging obtains secret letter Breath;
Secret information is sent to the person of being authorized.
7. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data Breath includes position and check information of the more parts of secret informations in big data;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized Person, specifically include:
Positioned by position of the more parts of secret informations in big data from big data and obtain more parts of secret informations;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information differs with other secret informations, Selection a copy of it secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information is identical with other K part secret informations, choosing That part of secret information corresponding to selecting maximum K values is sent to authenticated user;Wherein, K >=1, and be natural number.
8. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data Breath includes the insertion position information of multiple secret information pieces, the characteristic information of required carrier and the verification letter of every part of secret information Breath;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized Person, specifically include:
According to the insertion position information of multiple secret information pieces of every part of secret information, the characteristic information of required carrier and verification Information, inverse transformation is carried out to each secret information piece using information steganography technology;
For every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part of secret information;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information differs with other secret informations, Selection a copy of it secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information is identical with other K part secret informations, choosing That part of secret information corresponding to selecting maximum K values is sent to authenticated user;Wherein, K >=1, and be natural number.
9. information steganography system, it is characterised in that:The system includes:
First receiving module, the secret information of steganography is needed for receiving;
Insertion and sending module, will be secret in big data for the position for being handled secret information and being inserted in big data Confidential information relevant information is sent to the person of being authorized.
10. information extracting system, it is characterised in that:The system includes:
Second receiving module, the secret information relevant information in big data for receiving the person's of being authorized offer;
Extraction and sending module, secret information is extracted for the secret information relevant information in big data, and secret is believed Breath is sent to the person of being authorized.
CN201710998187.2A 2017-10-24 2017-10-24 Big data-based information steganography method and system and information extraction method and system Active CN107786555B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010221323.9A CN111526123B (en) 2017-10-24 2017-10-24 Big data-based information steganography method, extraction method, system, equipment and medium
CN201710998187.2A CN107786555B (en) 2017-10-24 2017-10-24 Big data-based information steganography method and system and information extraction method and system
JP2018199600A JP2019079051A (en) 2017-10-24 2018-10-23 Information secrecy method and system based upon big data, and information extraction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710998187.2A CN107786555B (en) 2017-10-24 2017-10-24 Big data-based information steganography method and system and information extraction method and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010221323.9A Division CN111526123B (en) 2017-10-24 2017-10-24 Big data-based information steganography method, extraction method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN107786555A true CN107786555A (en) 2018-03-09
CN107786555B CN107786555B (en) 2020-05-15

Family

ID=61434865

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010221323.9A Active CN111526123B (en) 2017-10-24 2017-10-24 Big data-based information steganography method, extraction method, system, equipment and medium
CN201710998187.2A Active CN107786555B (en) 2017-10-24 2017-10-24 Big data-based information steganography method and system and information extraction method and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010221323.9A Active CN111526123B (en) 2017-10-24 2017-10-24 Big data-based information steganography method, extraction method, system, equipment and medium

Country Status (2)

Country Link
JP (1) JP2019079051A (en)
CN (2) CN111526123B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595291A (en) * 2018-04-01 2018-09-28 陈丽霞 A kind of medical data standby system
CN110135181A (en) * 2019-05-29 2019-08-16 华南师范大学 Information concealing method and robot based on big data search and Fourier transform
CN110162990A (en) * 2019-05-29 2019-08-23 华南师范大学 Information concealing method and robot system based on big data and position
CN110175463A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data search and functional transformation
CN110175472A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data insertion and address of cache
CN110188553A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and dynamic environment
CN110188569A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and Fourier transform
CN110188561A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and noise
CN110191111A (en) * 2019-05-29 2019-08-30 华南师范大学 The information concealing method and robot system verified based on big data and function
CN110188552A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and difference
CN110188557A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data search
CN110188560A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data insertion and local behavior
CN110188554A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and functional transformation
CN113114507A (en) * 2021-04-15 2021-07-13 泉州文学士信息科技有限公司 Data identification device system for transmission of sensor equipment of Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065969A (en) * 2014-05-30 2014-09-24 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
US20140289518A1 (en) * 2013-03-15 2014-09-25 Tuhin Sinha Method and Apparatus for Privately and Securely Sharing Information Using Public Social or Sharing Network Infrastructure
CN104125467A (en) * 2014-08-01 2014-10-29 郑州师范学院 Embedding and extracting methods for video steganography information
US20170126631A1 (en) * 2015-11-03 2017-05-04 Box, Inc. Securing shared documents using dynamic natural language steganography

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63248240A (en) * 1987-04-03 1988-10-14 Canon Inc Coder
JPH1013404A (en) * 1996-06-25 1998-01-16 Yazaki Corp Transmission information generation method, information transmission/reception system and portable transmitter-receiver
JPH1049048A (en) * 1996-07-31 1998-02-20 Matsushita Electric Works Ltd Formation of encryption data and apparatus therefor
EP1125189A4 (en) * 1998-10-28 2001-11-28 Datamark Technologies Pte Ltd Methods of digital steganography for multimedia data
JP2000201144A (en) * 1999-01-05 2000-07-18 Nippon Telegr & Teleph Corp <Ntt> Method and device for authentication communication
JP2002281021A (en) * 2001-03-21 2002-09-27 Gaia:Kk Distributed data management system using network
JP2003298832A (en) * 2002-03-29 2003-10-17 Hitachi Koukiyou Syst Eng Kk Method for keeping information secret and method for extracting information
JP2006127136A (en) * 2004-10-28 2006-05-18 Institute Of Physical & Chemical Research Data distributed storage method and its system, data alteration identification method and its system, and storage medium capable of reading program and computer
JP2011060008A (en) * 2009-09-10 2011-03-24 Kddi Corp File distribution arrangement method and file distribution arrangement device
CN102938888B (en) * 2012-10-31 2015-06-03 华南理工大学 Secret document steganography and extraction method suitable for wireless communication environment
JP5955285B2 (en) * 2013-08-27 2016-07-20 株式会社 日立産業制御ソリューションズ ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND COMPUTER PROGRAM
CN106254074A (en) * 2016-08-12 2016-12-21 南京航空航天大学 A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption
CN106815529A (en) * 2016-12-20 2017-06-09 合肥高维数据技术有限公司 Cell phone pictures safety protection system and method based on Steganography

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140289518A1 (en) * 2013-03-15 2014-09-25 Tuhin Sinha Method and Apparatus for Privately and Securely Sharing Information Using Public Social or Sharing Network Infrastructure
CN104065969A (en) * 2014-05-30 2014-09-24 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
CN104125467A (en) * 2014-08-01 2014-10-29 郑州师范学院 Embedding and extracting methods for video steganography information
US20170126631A1 (en) * 2015-11-03 2017-05-04 Box, Inc. Securing shared documents using dynamic natural language steganography

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
阳溢,刘博文,张文静: "信息隐藏技术在大数据环境中的应用探讨", 《电脑编程技巧与维护》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595291A (en) * 2018-04-01 2018-09-28 陈丽霞 A kind of medical data standby system
CN110188557A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data search
CN110188552B (en) * 2019-05-29 2023-05-23 华南师范大学 Information hiding method based on big data and difference value and robot system
CN110175463A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data search and functional transformation
CN110175472A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data insertion and address of cache
CN110188553A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and dynamic environment
CN110188569A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and Fourier transform
CN110188561A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and noise
CN110188560A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data insertion and local behavior
CN110175463B (en) * 2019-05-29 2023-07-07 华南师范大学 Information hiding method and robot system based on big data search and function transformation
CN110162990A (en) * 2019-05-29 2019-08-23 华南师范大学 Information concealing method and robot system based on big data and position
CN110191111A (en) * 2019-05-29 2019-08-30 华南师范大学 The information concealing method and robot system verified based on big data and function
CN110188554A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and functional transformation
CN110188552A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and difference
CN110191111B (en) * 2019-05-29 2021-12-03 华南师范大学 Information hiding method based on big data and function verification and robot system
CN110188553B (en) * 2019-05-29 2022-07-12 华南师范大学 Information hiding method based on big data and dynamic environment and robot system
CN110188569B (en) * 2019-05-29 2022-07-26 华南师范大学 Information hiding method based on big data and Fourier transform and robot system
CN110135181B (en) * 2019-05-29 2022-09-16 华南师范大学 Information hiding method and robot based on big data search and Fourier transform
CN110135181A (en) * 2019-05-29 2019-08-16 华南师范大学 Information concealing method and robot based on big data search and Fourier transform
CN110188557B (en) * 2019-05-29 2023-07-04 华南师范大学 Information hiding method based on big data search and robot system
CN113114507A (en) * 2021-04-15 2021-07-13 泉州文学士信息科技有限公司 Data identification device system for transmission of sensor equipment of Internet of things

Also Published As

Publication number Publication date
CN111526123A (en) 2020-08-11
CN107786555B (en) 2020-05-15
CN111526123B (en) 2022-02-25
JP2019079051A (en) 2019-05-23

Similar Documents

Publication Publication Date Title
CN107786555A (en) Information steganography method and system, information extracting method and system based on big data
van Beek et al. Digital forensics as a service: Game on
Zhu et al. Dynamic audit services for integrity verification of outsourced storages in clouds
US5530757A (en) Distributed fingerprints for information integrity verification
CN102170440B (en) Method suitable for safely migrating data between storage clouds
US20100058476A1 (en) Electronic information retention method/system, electronic information split retention method/system, electronic information split restoration processing method/system, and programs for the same
CN105164971A (en) Verification system and method with extra security for lower-entropy input records
CN105025012A (en) An access control system and an access control method thereof oriented towards a cloud storage service platform
TW201123807A (en) Verifiable trust for data through wrapper composition
US20060117016A1 (en) Method and apparatus for efficient electronic document management
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
CN110413652A (en) A kind of big data privacy search method based on edge calculations
Gopal et al. Evaluating RC-interconnect using moment-matching approximations
Bertoin Sizes of the largest clusters for supercritical percolation on random recursive trees
CN106356066A (en) Speech recognition system based on cloud computing
CN110225012A (en) The ownership inspection and update method of one outer bag data based on alliance&#39;s chain
Atan et al. Formulating a security layer of cloud data storage framework based on multi agent system architecture
CN106161654A (en) A kind of cloud educational system
CN109040173A (en) A kind of reliable storage method and device of government affairs big data
CN100561516C (en) Network gridding service system of national geolopy spatial data
KR101241792B1 (en) Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information
CN114500103A (en) Internet of things privacy data segmentation and encryption method and block chain system
CN114547698A (en) CORS service data storage system and method based on block chain
KR102051454B1 (en) A decision-making system using blockchains by verifying conditions
Du et al. Secure and verifiable keyword search in multiple clouds

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant