CN107786555A - Information steganography method and system, information extracting method and system based on big data - Google Patents
Information steganography method and system, information extracting method and system based on big data Download PDFInfo
- Publication number
- CN107786555A CN107786555A CN201710998187.2A CN201710998187A CN107786555A CN 107786555 A CN107786555 A CN 107786555A CN 201710998187 A CN201710998187 A CN 201710998187A CN 107786555 A CN107786555 A CN 107786555A
- Authority
- CN
- China
- Prior art keywords
- information
- secret information
- secret
- big data
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of information steganography method based on big data and system, information extracting method and system, described information steganography method includes:Receiving needs the secret information of steganography;The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent to the person of being authorized;Described information extracting method includes:Receive the secret information relevant information in the big data that the person of being authorized provides;Secret information relevant information extraction secret information in big data, and secret information is sent to the person of being authorized.The present invention can both make all users to disclose access big data, each user can be made to have access to the user in big data again and obtain the information authorized, so that big data is existing open and there is security, due to inserting big data, so that the steganographic capacity of information steganography has obtained great extension in big data carrier, traditional carrier size is no longer limited by, drastically increases the capacity of information steganography.
Description
Technical field
The present invention relates to a kind of information steganography method based on big data and system, information extracting method and system, belong to
Information privacy protection technical field.
Background technology
Information steganography is different from big well known " password ", and information steganography is a kind of " shape of hideing art ", is directed to by setting
Count exquisite method so that unauthorized person has no way of learning the presence or absence of secret information, can not more learn that secret information is deposited at all
Where.
" the data scale of construction is huge, value density is low " is the key characteristic that big data is different from " little data ", and these are new
The characteristic of type causes existing information steganography technology can not copy slavishly in big data environment.
Big data (carrier) data scale of construction is huge, and existing information steganography is set for the little carrier of the scale of construction
What meter was realized.If handling the huge carrier (big data) of such scale of construction with existing information steganography, need what is grown very much
Time could have been handled so that existing information steganography lost in big data it is ageing.
Big data (carrier) value density is low, and wherein data are possible to be treated as junk data at any time to go to delete or treated as
When data go to update, and existing information steganography is designed realization for metastable carrier.If will be existing
Information steganography technology is used for so variable carrier (big data), then the secret information of steganography is possible to be broken at any time in the carrier
It is bad, so that existing information steganography loses reliability in big data.
The content of the invention
First purpose of the present invention is to solve the defects of above-mentioned prior art, there is provided a kind of information steganography side
Method, this method while Large Copacity steganography is realized, can fully be protected in the rapidly steganography secret information of the position in big data
The highly concealed type of secret information is demonstrate,proved.
Second object of the present invention is to provide a kind of information extracting method, and this method enables the person's of being authorized basis
Secret information relevant information in big data is quickly located and extracted to secret information.
Third object of the present invention is to provide a kind of information steganography system.
Fourth object of the present invention is to provide a kind of information extracting system.
First purpose of the present invention can be reached by adopting the following technical scheme that:
Information steganography method, methods described include:
Receiving needs the secret information of steganography;
The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent out
Give the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data
Information related information is sent to the person of being authorized, and specifically includes:
Secret information is cut into multiple secret information pieces;
Position of each secret information piece in secret information is numbered;
Multiple positions that multiple secret information pieces are inserted in big data;
Position of position and multiple secret information piece of multiple secret information pieces in big data in secret information is compiled
Number it is sent to the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data
Information related information is sent to the person of being authorized, and specifically includes:
Secret information is copied into more parts of secret informations;
Multiple positions that more parts of secret informations are inserted in big data;
Using the partial information or attribute information of secret information as check information;
Position of the more parts of secret informations in big data and check information are sent to the person of being authorized.
Further, the position for being handled secret information and being inserted in big data, by the secret in big data
Information related information is sent to the person of being authorized, and specifically includes:
Secret information is copied into more parts of secret informations;
Every part of secret information is cut into multiple secret information pieces;
According to the positional information of all secret informations inserted in big data, the secret information calculated in each data block exists
Distribution density in big data;
Distribute multiple distribution densities minimum position for multiple secret information pieces of every part of secret information;
According to the characteristic information of the characteristic information of each secret information piece of every part of secret information and its required carrier, this
The conversion demand of secret information piece and its required carrier, enter line translation to each secret information piece using information steganography technology and insert
Enter;
Using the partial information or attribute information of secret information as check information;
For every part of secret information, by the characteristic information of the insertion position information of multiple secret information pieces, required carrier with
And check information is sent to the person of being authorized.
Second object of the present invention can be reached by adopting the following technical scheme that:
Information extracting method, methods described include:
Receive the secret information relevant information in the big data that the person of being authorized provides;
Secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized
Person.
Further, the secret information relevant information in the big data includes multiple secret information pieces in big data
The Position Number of position and multiple secret information pieces in secret information;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted
Quan Zhe, specifically include:
Positioned by position of multiple secret information pieces in big data from big data and obtain multiple secret information pieces;
According to Position Number of multiple secret information pieces in secret information and multiple secret information pieces, merging obtains secret
Information;
Secret information is sent to the person of being authorized.
Further, the secret information relevant information in the big data includes more parts of secret informations the position in big data
Put and check information;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted
Quan Zhe, specifically include:
Positioned by position of the more parts of secret informations in big data from big data and obtain more parts of secret informations;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information differs with other secret informations
When, select a copy of it secret information to be sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information is identical with other K part secret informations
When, select that part of secret information corresponding to maximum K values to be sent to authenticated user;Wherein, K >=1, and be natural number.
Further, the secret information relevant information in the big data includes multiple secret informations of every part of secret information
The insertion position information of piece, the characteristic information and check information of required carrier;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is granted
Quan Zhe, specifically include:
According to the insertion position information of multiple secret information pieces of every part of secret information, the characteristic information of required carrier and
Check information, inverse transformation is carried out to each secret information piece using information steganography technology;
For every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part of secret information;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information differs with other secret informations
When, select a copy of it secret information to be sent to authenticated user;
When the secret information that passes through of verification is more than portion, and wherein every part of secret information is identical with other K part secret informations
When, select that part of secret information corresponding to maximum K values to be sent to authenticated user;Wherein, K >=1, and be natural number.
Third object of the present invention can be reached by adopting the following technical scheme that:
Information steganography system, the system include:
First receiving module, the secret information of steganography is needed for receiving;
Insertion and sending module, for the position for being handled secret information and being inserted in big data, by big data
Secret information relevant information be sent to the person of being authorized.
Further, the insertion and sending module, are specifically included:
First cutting unit, for secret information to be cut into multiple secret information pieces;
Numbered cell, for position of each secret information piece in secret information to be numbered;
First insertion unit, for the multiple positions for inserting multiple secret information pieces in big data;
First transmitting element, for by position of multiple secret information pieces in big data and multiple secret information pieces secret
Position Number in confidential information is sent to the person of being authorized.
Further, the insertion and sending module, are specifically included:
First copied cells, for secret information to be copied into more parts of secret informations;
Second insertion unit, for the multiple positions for inserting more parts of secret informations in big data;
First check information acquiring unit, for using the partial information or attribute information of secret information as check information;
Second transmitting element, for position of the more parts of secret informations in big data and check information to be sent to and be authorized
Person.
Further, the insertion and sending module, are specifically included:
Second copied cells, for secret information to be copied into more parts of secret informations;
Second cutting unit, for every part of secret information to be cut into multiple secret information pieces;
Computing unit, for the positional information according to all secret informations inserted in big data, calculate each data block
In distribution density of the secret information in big data;
Allocation unit is minimum for distributing multiple distribution densities for multiple secret information pieces of every part of secret information
Position;
3rd insertion unit, characteristic information and its required load for each secret information piece according to every part of secret information
The conversion demand of the characteristic information of body, this secret information piece and its required carrier, using information steganography technology to each secret
Message slot enters line translation and insertion;
Second check information acquiring unit, using the partial information or attribute information of secret information as check information;
3rd transmitting element, for for every part of secret information, by the insertion position information of multiple secret information pieces, required
The characteristic information and check information of carrier are sent to the person of being authorized.
Fourth object of the present invention can be reached by adopting the following technical scheme that:
Information extracting system, the system include:
Second receiving module, the secret information relevant information in big data for receiving the person's of being authorized offer;
Extraction and sending module, secret information is extracted for the secret information relevant information in big data, and will be secret
Confidential information is sent to the person of being authorized.
Further, the secret information relevant information in the big data includes multiple secret information pieces in big data
The Position Number of position and multiple secret information pieces in secret information;
The extraction and sending module, are specifically included:
First positioning unit, for positioning and obtaining from big data by position of multiple secret information pieces in big data
Take multiple secret information pieces;
First combining unit, for according to Position Number of multiple secret information pieces in secret information and multiple secret believing
Piece is ceased, merging obtains secret information;
4th transmitting element, for secret information to be sent into the person of being authorized.
Further, the secret information relevant information in the big data includes more parts of secret informations the position in big data
Put and check information;
The extraction and sending module, are specifically included:
Second positioning unit, for positioning and obtaining from big data by position of the more parts of secret informations in big data
More parts of secret informations;
First verification unit, for selecting the secret information consistent with check information from more parts of secret informations;
5th transmitting element, when the secret information for passing through when verification only has a, this part of secret information is sent to
Authenticated user;
6th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its
When his secret information differs, a copy of it secret information is selected to be sent to authenticated user;
7th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its
When his K part secret informations are identical, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1,
And it is natural number.
Further, the secret information relevant information in the big data includes multiple secret informations of every part of secret information
The insertion position information of piece, the characteristic information and check information of required carrier;
The extraction and sending module, are specifically included:
Inverse transformation block, insertion position information, required load for multiple secret information pieces according to every part of secret information
The characteristic information and check information of body, inverse transformation is carried out to each secret information piece using information steganography technology;
Second combining unit, for for every part of secret information, multiple secret information pieces after inverse transformation to be merged,
Obtain this part of secret information;
Second verification unit, for selecting the secret information consistent with check information from more parts of secret informations;
8th transmitting element, when the secret information for passing through when verification only has a, this part of secret information is sent to
Authenticated user;
9th transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its
When his secret information differs, a copy of it secret information is selected to be sent to authenticated user
Tenth transmitting element, for when the secret information that passes through of verification is more than portion, and wherein every part of secret information and its
When his K part secret informations are identical, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K >=1,
And it is natural number.
The present invention has following beneficial effect relative to prior art:
1st, the present invention discloses big data for network, passes through the position for being handled secret information and being inserted in big data
Put, to protect the information privacy in big data, all users can both disclose and accessed big data, each user can be made again
The user in big data can only be had access to and obtain the information authorized so that big data is existing open and has security, due to inserting
Big data is entered so that the steganographic capacity of information steganography has obtained great extension in big data carrier, is no longer limited by passing
The carrier size of system, drastically increase the capacity of information steganography.
2nd, the present invention can be distributed in big data by the way that secret information is cut into many secret information pieces, big realizing
While capacity steganography, the highly concealed type of secret information is fully ensured that, using the insertion position of secret information piece as processing
Object, can be in the rapidly steganography secret information, while at the information extraction stage, the person of being authorized also can of the position in big data
It is enough that secret information is quickly located and extracted according to position of the secret information piece in big data, to realize secret information
High-timeliness.
3rd, the present invention can carry out redundant storage, can not only resist big data load by the way that secret information is copied into more parts
The change of body, and it is even more more reliable than the steganography based on conventional carriers, because there is bigger memory space in big data
More redundancy backups are carried out to secret information, and the probability that multiple redundancy backups are damaged simultaneously is relatively smaller, is carried in information
When taking the stage, the secret information that has damaged can be excluded by verification so that the secret information of " having passed through verification " can
By property height;When there are multiple secret informations all to pass through verification, then the mutual confirmation between multiple secret informations, gained can make it that
To the reliability of secret information be further greatly improved.
4th, the present invention profit slit mode can cut into slices at the information steganography stage to every part of secret information of duplication, adopt
Further secret information piece is converted with existing information steganography, at the information extraction stage, verified and mutual
Every part of secret information after mutually confirming inverse transformation and merging, the further earth polar of reliability of resulting secret information can make it that
It is big to improve, while the distribution by suitable " insertion " scheduling secret information in big data is as far as possible remote, and cause secret
Distribution of the information in big data tries not the phenomenon that flocks together occur, then distribution of the high-volume secret information in big data is still
It is so extremely sparse, it can be ensured that the highly concealed type and high security of secret information.
5th, the present invention has started the new paragon different from conventional information steganography and transmission means, i.e. network-oriented discloses big number
According to information steganography and transmission means, from " secret information is directly transmitted to and is authorized by the user for possessing secret information by network
User " be changed into that " secret information is passed to big data by the user for possessing secret information by internet or cloud client, then
Again secret information is extracted from big data by internet or cloud client by the user being authorized ", it is this based on big data
Information steganography and transmission new paragon, can cause secret information in big data by more authenticated users longer time
It is interior to may have access to, and the popular access that big data is disclosed for network is not influenceed, user is very easy to secret information
Steganography and transmission.
Brief description of the drawings
Fig. 1 is the information steganography method flow chart of the embodiment of the present invention 1.
Fig. 2 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 1
Cheng Tu.
Fig. 3 is the information extracting method flow chart of the embodiment of the present invention 1.
Fig. 4 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 1.
Fig. 5 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 2
Cheng Tu.
Fig. 6 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 2.
Fig. 7 is the stream for being handled secret information, being inserted and being sent in the information steganography method of the embodiment of the present invention 3
Cheng Tu.
Fig. 8 is the flow chart for being extracted, being sent to secret information in the information extracting method of the embodiment of the present invention 3.
Fig. 9 is the information steganography system architecture diagram of the embodiment of the present invention 4.
Figure 10 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 4.
Figure 11 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 5.
Figure 12 is to be inserted and sending module structured flowchart in the information steganography system of the embodiment of the present invention 6.
Figure 13 is the information extracting system structured flowchart of the embodiment of the present invention 7.
Figure 14 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 7.
Figure 15 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 8.
Figure 16 is to be extracted and sending module structured flowchart in the information extracting system of the embodiment of the present invention 9.
Embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are unlimited
In this.
Embodiment 1:
As shown in figure 1, present embodiments providing a kind of information steganography method, this method comprises the following steps:
S101, reception need the secret information of steganography.
S102, the position for being handled secret information and being inserted in big data are related by the secret information in big data
Information is sent to the person of being authorized.
The information steganography method of the present embodiment and the contrast of prior art, prior art is by secret information steganography little
In data, and the present embodiment by secret information steganography in big data.
Prior art steganography secret information in little data as family is ensconced in gold, silver, treasures and jewels, is only hidden a small amount of
Gold, silver, treasures and jewels, always can by shrewdness thief find.
The present embodiment steganography secret information in big data such as " never hearing of since then ", can sink largely " stone " (secret
Information), the difficulty cracked is such as " looking for a needle in a haystack ".
Illustrated with an example, thousands of terra cotta warriors and horses (" secret letter in Qin Shihuang Tomb under ground (" big data ")
Breath ") just it was found by 1974, " steganography " more than 2,000 years fully., whereas if these terra cotta warriors and horses are hidden within warehouse by we
(" little data ") are inner, or terra cotta warriors and horses are placed on be covered with office room (" information encryption ") it is inner, these terra cotta warriors and horses necessarily morning
Just it is found!
Illustrated with another example, in current position universe (" big data ") with the presence or absence of outman's (" secret letter
Breath ") Nobody Knows, do not know that more outman on earth exist where;, whereas if outman is ensconced into family's (" little number
According to ") inner, or that outman is locked in into combination lock (" information encryption ") is inner, outman, which is then easy to be found, to come.
By the comparison of said circumstances and example, can apparently see relative to existing information steganography technology and
It is bigger in the capacity of the information steganography technology based on big data for information encryption, it is more unbreakable.
In the present embodiment, the position for being handled secret information and being inserted in big data refers to carry out secret information
Cutting, multiple secret information pieces are obtained, and the position of multiple secret information pieces is numbered, then by multiple secret information pieces
The multiple positions inserted in big data;Secret information relevant information in big data includes multiple secret information pieces in secret information
In position in big data of Position Number and multiple secret information pieces.
As shown in Fig. 2 step S102 specifically includes following steps:
S1021, secret information is cut into multiple secret information pieces.
S1022, position of each secret information piece in secret information is numbered, and each secret information piece is existed
Position Number in secret information is as the first numbering.
S1023, the multiple positions for inserting multiple secret information pieces in big data, and multiple secret information pieces are being counted greatly
Position in is as multiple first positions.
Because the scale of construction of big data is huge, such as boundless ocean, unauthorized person is not due to knowing the positional information, from whole
Secret information is extracted in body big data, such as " looking for a needle in a haystack ", " can only be deeply aware of one's own helplessness when faced with a great task " forever;Simultaneously by the way that secret information is cut
Be divided into many secret information pieces to be distributed in big data, as " by stone be broken into sand be spread to it is big marine ", unauthorized person is just more
Have no way of having looked for.
Though big data is big, need the secret information of steganography relatively little, it is only necessary to " place " less, " to shelter oneself
Institute ", therefore using the insertion position of multiple secret information pieces as processing object, without using big data carrier in itself as
The object of processing, can be in the rapidly steganography secret information of the position in big data.
Even if secret information is very big, but also seems very negligible in the big data carrier of the huge scale of construction, and passes through
Secret information is cut into smaller secret information piece to be distributed in big data so that each secret information piece is in big data carrier
In it is more insignificant, so as to while Large Copacity steganography is realized, fully ensured that the highly concealed type of secret information.
S1024, by multiple first positions and it is multiple first numbering be sent to the person of being authorized.
As shown in figure 3, the present embodiment additionally provides a kind of information extracting method, this method and above- mentioned information steganography method phase
It is corresponding, comprise the following steps:
Secret information relevant information in the big data that S301, the reception person of being authorized provide.
S302, the secret information relevant information extraction secret information in big data, and secret information is sent to and obtained
Authorized person.
Because the information extracting method of the present embodiment is corresponding with above- mentioned information steganography method, therefore the secret in big data
Information related information includes position and multiple secret information piece of multiple secret information pieces in big data in secret information
Position Number, i.e., including multiple first positions and multiple first numberings.
As shown in figure 4, step S302 specifically includes following steps:
S3021, positioned by multiple first positions from big data and obtain multiple secret information pieces.
S3022, according to multiple first numbering and multiple secret information pieces, merging obtain secret information.
S3023, secret information is sent to the person of being authorized.
It can be seen that the person of being authorized can be carried out rapidly according to multiple first positions and multiple first numberings to secret information
Positioning and extraction.
Embodiment 2:
The present embodiment is handled secret information with being step S102 in place of the difference of embodiment 1 and inserts big number
Position in refers to secret information being copied into more parts of secret informations, and will be in more parts of secret informations insertion big datas it is multiple
Position;Secret information relevant information in big data includes more parts of secret informations position and check information in big data.
As shown in figure 5, step S102 specifically includes following steps:
S1021, secret information is copied into more parts of secret informations.
S1022, the multiple positions for inserting more parts of secret informations in big data, and by more parts of secret informations in big data
Position as multiple first positions.
Although big data value density is low, cause it variable, it is more by the way that secret information is copied into information steganography
Part, carry out redundant storage, can not only resist the change of big data carrier, and even more may be used than the steganography based on conventional carriers
Lean on, because there is bigger memory space to carry out more redundancy backups to secret information in big data, and multiple redundancy backups
The probability damaged simultaneously is relatively smaller.
S1023, using the partial information or attribute information of secret information as check information.
S1024, multiple first positions and check information are sent to the person of being authorized.
Correspondingly, in the information extracting method of the present embodiment, the secret information relevant information in big data includes more parts
Position and check information of the secret information in big data, i.e., including multiple first positions and check information.
As shown in fig. 6, step S302 specifically includes following steps:
S3021, positioned by multiple first positions from big data and obtain more parts of secret informations.
S3022, the secret information consistent with check information is selected from more parts of secret informations, if the secret letter that verification passes through
Breath only has portion, into step S3023;If verify the secret information that passes through more than portion, and wherein every part of secret information and its
He differs secret information, into step S3024;If verifying the secret information passed through is more than portion, and wherein every part of secret
Information is identical with other K part secret informations, into step S3025;Wherein, K >=1, and be natural number.
S3023, this part of secret information be sent to authenticated user.
S3024, selection a copy of it secret information are sent to authenticated user;
Exemplified by verifying the secret information passed through and have three parts, first part, second part, the 3rd part of secret information and other two parts
Secret information differs, and selects a copy of it secret information to be sent to authenticated user.
That part of secret information corresponding to S3025, the maximum K values of selection is sent to authenticated user.
Exemplified by verifying the secret information passed through and have five parts, first part, second part of secret information and other two parts are secret to be believed
Manner of breathing is same, K values be 2, the 3rd part, the 4th part, three parts of secret informations of the 5th part of secret information and other it is identical, K values be 3, it is seen that
Maximum K values are 3, then take any part in the 3rd part, the 4th part, the 5th part to be sent to authenticated user.
Exemplified by verifying the secret information passed through and have three parts, first part, second part, the 3rd part of secret information and other two parts
Secret information is identical, and K values are 2, due to the K values not compared, it is seen that maximum K values are 2, then take first part, second part, the
Any part in three parts is sent to authenticated user.
The secret information that the present embodiment can exclude to have damaged by verification so that the secret information of " having passed through verification "
Reliability is high;When there is multiple secret informations all to pass through verification, then the mutual confirmation between multiple secret informations can cause institute
The reliability of obtained secret information is further greatly improved.
Embodiment 3:
The present embodiment in place of the difference of embodiment 1,2 with being step S102, as shown in fig. 7, step S102 is specifically included
Following steps:
S1021, secret information is copied into more parts of secret informations, copy mode is the same as embodiment 2.
S1022, every part of secret information is cut into multiple secret information pieces, slit mode is the same as embodiment 1.
Although the scale of construction of big data carrier is huge, variable, after the cutting for applying embodiment 1, each secret information
Data block in place of piece insertion position is all little data medium, and little data medium belongs to existing information steganography skill
The competent category of art, so that existing information steganography technology can be used in " secret information piece ".
S1023, the positional information according to all secret informations inserted in big data, calculate the secret in each data block
Distribution density of the information in big data.
S1024, multiple secret information pieces for every part of secret information distribute multiple distribution densities minimum position.
For every part of secret information, due to the secret information piece at least two of cutting, therefore the position that distribution density is minimum
Also at least two are put, multiple secret information pieces of a secret information distribute multiple distribution densities minimum position wherein
Postpone, then re-execute step S1023, distribute multiple distribution densities minimum position for lower a multiple secret information pieces
Put, until multiple secret information pieces of every part of secret information distribute multiple distribution densities minimum position.
Although big data is open, having the high-volume secret information of mass users needs to be inserted into big data,
Because high-volume secret information for the big data of flood tide, is still very inappreciable, as long as by suitable
" insertion ", which is dispatched, make it that distribution of the related secret information in big data is as far as possible remote, while causes secret information in big data
Distribution try not the phenomenon that flocks together occur, then distribution of the high-volume secret information in big data is still extremely sparse
, it can be ensured that the highly concealed type and high security of secret information.
S1025, characteristic information and its required carrier (this secret according to each secret information piece of every part of secret information
The data block that information is inserted) characteristic information, the conversion demand of this secret information piece and its required carrier, it is hidden using information
Writing technology enters line translation and insertion to each secret information piece;Wherein, information steganography technology can use existing information steganography skill
Art.
S1026, using the partial information or attribute information of secret information as check information.
S1027, for every part of secret information, by the insertion position information of multiple secret information pieces, the feature of required carrier
Information and check information are sent to the person of being authorized.
Correspondingly, in the information extracting method of the present embodiment, the secret information relevant information in big data includes every part
The insertion position information of multiple secret information pieces of secret information, the characteristic information and check information of required carrier.
As shown in figure 8, step S302 specifically includes following steps:
S3021, believed according to insertion position information, the feature of required carrier of multiple secret information pieces of every part of secret information
Breath and check information, inverse transformation is carried out to each secret information piece using information steganography technology;Wherein, information steganography technology can
To use existing information steganography.
S3022, for every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part it is secret
Confidential information, the merging mode is the same as embodiment 1.
S3023, the secret information consistent with check information is selected from more parts of secret informations, if the secret letter that verification passes through
Breath only has portion, into step S3024;If verify the secret information that passes through more than portion, and wherein every part of secret information and its
He differs secret information, into step S3025;If verifying the secret information passed through is more than portion, and wherein every part of secret
Information is identical with other K part secret informations, into step S3026;Wherein, K >=1, and be natural number.
Although at the information steganography stage using the slit mode of embodiment 1 to " every part of secret information in embodiment 2 "
To be cut into slices, existing information steganography further is converted to secret information piece, but in the information extraction stage
When verify and corroborate each other be inverse transformation and merge after every part of secret information, so complying fully with the processor of embodiment 2
System.
S3024, this part of secret information be sent to authenticated user.
S3025, selection a copy of it secret information are sent to authenticated user;
That part of secret information corresponding to S3026, the maximum K values of selection is sent to authenticated user;Wherein, K >=1, and for certainly
So number.
Step S3023~S3026 verification mode is the same as embodiment 2.
It is as follows for the concrete application example of the present embodiment:
Two kinds of the most frequently used frameworks for building big data cloud computing environment are Hadoop and Spark, intend choosing in experimentation
With Spark, because Spark is the universal parallel frame for the class Hadoop MapReduce that UC Berkeley AMP lab are increased income
Frame, Spark, possess advantage possessed by Hadoop MapReduce;But what it is different from MapReduce is output knot among Job
Fruit can be stored in internal memory, and so as to which intermediate input output no longer needs to read and write HDFS, therefore Spark can preferably be applied to number
The MapReduce of iteration algorithm is needed according to excavation and machine learning etc..Spark is a kind of increase income cluster similar to Hadoop
Computing environment, but some differences between the two also be present, these useful differences make Spark be born in some work
Show more superior in terms of load, in other words, Spark enables internal memory distributed data collection, is looked into except that can provide interactive mode
Outside asking, it can be with Optimized Iterative workload.
In actual applications, then selected according to the framework disposed in the big data cloud computing environment of reality.For example,
If having deployed Spark in actual environment, Spark processing is utilized;If having deployed Hadoop in actual environment,
Then utilize Hadoop processing.Below with illustrated under Spark frameworks with the Hdfs processing modes being combined (
Processing mode under Hadoop frameworks is identical with the principle of the processing mode under Spark, repeats no more), key step is as follows:
(1) the information steganography stage:
1) the Master nodes that Spark is managed in big data environment are by the high-volume secret information of the mass users received
Steganography request be dispatched to the first different Worker nodes and handled.
2) each first Worker nodes that Spark is managed in big data environment call Hdfs (Hadoop distributed field systems
System) secret information in steganography request task is replicated according to the copy mode of embodiment 2, then further according to embodiment 1
Slit mode carry out cutting.
3) each first Worker nodes that Spark is managed in big data environment are by the characteristic information of secret information piece and its institute
The characteristic information (such as size of secret information piece and its size of required carrier) of carrier is needed to be sent to the Master of Spark management
Node, and the Master node distributions insertion position for asking Spark to manage.
4) the secret letter that the Master nodes that Spark is managed in big data environment are sent according to each first Worker nodes
Characteristic information, the characteristic information of required carrier of piece are ceased, and the distribution density of secret information has been inserted in big data, is calculated
(" insertion " dispatching algorithm referred here to can be based on Hdfs (increasing income) for the most suitable insertion position of each secret information piece
Data block is cut into slices and redundant arithmetic is improved to realize), return to each first Worker nodes.
5) the Master nodes point that each first Worker nodes that Spark is managed in big data environment manage according to Spark
The position matched somebody with somebody, the conversion demand of each secret information piece and its required carrier is sent to each second where the position of each distribution
Worker nodes.
6) in big data environment each 2nd Worker nodes according to the characteristic information of secret information piece and its required carrier
Conversion demand needed for characteristic information, the secret information piece and its required carrier, " existing information steganography " is called to secret
Message slot enters line translation and insertion, and feedback " being successively inserted into " information gives each first Worker nodes after completing operation.
7) in big data environment each first Worker nodes by the insertion position information of each secret information piece, required carrier
Characteristic information and the check information of generation be sent to authenticated user.
(2) the information extraction stage:
1) the Master nodes that Spark is managed in big data environment ask the extraction of the high-volume secret information received
The 3rd different Worker nodes are dispatched to be handled.
2) information (example that is authorized that each 3rd Worker nodes that Spark is managed in big data environment provide according to user
Such as:The positional information of secret information piece, the characteristic information of required carrier, check information) secret information piece is obtained in big data
Insertion position information and secret information piece needed for carrier characteristic information.
3) each 3rd Worker nodes that Spark is managed in big data environment by the extraction of each secret information piece request and its
Characteristic information is sent to each 4th Worker nodes of each secret information piece position;
4) each 4th Worker nodes call " existing information steganography " to carry out secret information piece in big data environment
Secret information piece is sent to each 3rd Worker nodes after inverse transformation.
5) each 3rd Worker nodes call Hdfs (Hadoop distributed file systems) to each secret in big data environment
Message slot merges according to the merging mode of embodiment 1, then further according to embodiment 2 verification mode to more parts after merging
Secret information carries out verification and mutually confirmation.
6) each 3rd Worker nodes send each secret information for having passed through verification and mutually having confirmed in big data environment
To the person of being authorized.
Wherein, in " the first Worker nodes, the 2nd Worker nodes, the 3rd Worker nodes, the 4th Worker nodes "
" first, second, third, fourth ", without particular meaning, be intended merely to distinguish the needs of inhomogeneity Worker nodes.
Embodiment 4:
As shown in figure 9, present embodiments providing a kind of information steganography system, the system includes the first receiving module 901, with
And insertion and sending module 902.
First receiving module 901, the secret information relevant information in big data for receiving the person's of being authorized offer.
The insertion and sending module 902, secret information is extracted for the secret information relevant information in big data,
And secret information is sent to the person of being authorized.
As shown in Figure 10, the insertion of the present embodiment specifically includes with sending module 902:
First cutting unit 9021, for secret information to be cut into multiple secret information pieces.
Numbered cell 9022, for position of each secret information piece in secret information to be numbered, and will be each
Position Number of the secret information piece in secret information is as the first numbering.
First insertion unit 9023, for the multiple positions for inserting multiple secret information pieces in big data, and will be multiple
Position of the secret information piece in big data is as multiple first positions;
First transmitting element 9024, for multiple first positions and multiple first numberings to be sent into the person of being authorized.
Embodiment 5:
The present embodiment inserts and sending module 902, as shown in figure 11, insertion and hair with being in place of the difference of embodiment 4
Module 902 is sent to specifically include:
First copied cells 9021, for secret information to be copied into more parts of secret informations.
Second insertion unit 9022, for the multiple positions for inserting more parts of secret informations in big datas, and it is secret by more parts
Position of the confidential information in big data is as multiple first positions.
First check information acquiring unit 9023, for the partial information of secret information or attribute information to be believed as verification
Breath.
Second transmitting element 9024, for position of the more parts of secret informations in big data and check information to be sent to and obtain
Authorized person.
Embodiment 6:
Be to insert in place of the difference of the present embodiment and embodiment 4,5 with sending module 902, as shown in figure 12, insertion with
Sending module 902 specifically includes:
Second copied cells 9021, for secret information to be copied into more parts of secret informations.
Second cutting unit 9022, for every part of secret information to be cut into multiple secret information pieces.
Computing unit 9023, for the positional information according to all secret informations inserted in big data, calculate each number
According to distribution density of the secret information in block in big data.
Allocation unit 9024, for distributing multiple distribution densities most for multiple secret information pieces of every part of secret information
Low position.
3rd insertion unit 9025, characteristic information and its institute for each secret information piece according to every part of secret information
The conversion demand of the characteristic information of carrier, this secret information piece and its required carrier is needed, using information steganography technology to each
Secret information piece enters line translation and insertion.
Second check information acquiring unit 9026, using the partial information or attribute information of secret information as check information.
3rd transmitting element 9027, for for every part of secret information, by the insertion position information of multiple secret information pieces,
The characteristic information and check information of required carrier are sent to the person of being authorized.
Embodiment 7:
As shown in figure 13, a kind of information extracting system is present embodiments provided, the information steganography system of the system and embodiment 4
Unite corresponding, it includes the second receiving module 1101, and extraction and sending module 1102.
Second receiving module 1101, the related letter of the secret information in big data for receiving the person's of being authorized offer
Breath;
The extraction and sending module 1102, for the secret letter of secret information relevant information extraction in big data
Breath, and secret information is sent to the person of being authorized.
Because the information extracting system of the present embodiment and the information steganography system of embodiment 4 are corresponding, therefore in big data
Secret information relevant information include position of multiple secret information pieces in big data and multiple secret information pieces and believe in secret
Position Number in breath, i.e., including multiple first positions and multiple first numberings.
As shown in figure 14, the extraction of the present embodiment specifically includes with sending module 1102:
First positioning unit 11021, for positioning and obtaining multiple secret letters from big data by multiple first positions
Cease piece;
First combining unit 11022, for obtaining secret letter according to the multiple first numberings and multiple secret information pieces, merging
Breath;
4th transmitting element 11023, for secret information to be sent into the person of being authorized.
Embodiment 8:
The present embodiment in place of the difference of embodiment 7 with being, the information extracting system of the present embodiment and the information of embodiment 5
Steganographic system is corresponding, and the secret information relevant information in big data includes more parts of secret informations position and school in big data
Information is tested, i.e., including multiple first positions and check information.
As shown in figure 15, the extraction of the present embodiment specifically includes with sending module 1102:
Second positioning unit 11021, for being positioned by position of the more parts of secret informations in big data from big data
And obtain more parts of secret informations.
First verification unit 11022, for selecting the secret information consistent with check information from more parts of secret informations.
5th transmitting element 11023, when the secret information for passing through when verification only has a, this part of secret information is sent out
Give authenticated user.
6th transmitting element 11024, the secret information for passing through when verification are more than portion, and wherein every part of secret information
When being differed with other secret informations, a copy of it secret information is selected to be sent to authenticated user.
7th transmitting element 11025, the secret information for passing through when verification are more than portion, and wherein every part of secret information
When identical with other K part secret informations, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K
>=1, and be natural number.
Embodiment 9:
The present embodiment in place of the difference of embodiment 7,8 with being, the information extracting system of the present embodiment and the letter of embodiment 6
Breath steganographic system is corresponding, and the secret information relevant information in big data includes multiple secret information pieces of every part of secret information
The characteristic information and check information of insertion position information, required carrier.
As shown in figure 16, the extraction of the present embodiment specifically includes with sending module 1102:
Inverse transformation block 11021, insertion position information, institute for multiple secret information pieces according to every part of secret information
The characteristic information and check information of carrier are needed, inverse transformation is carried out to each secret information piece using information steganography technology;
Second combining unit 11022, for for every part of secret information, multiple secret information pieces after inverse transformation to be carried out
Merge, obtain this part of secret information;
Second verification unit 11023, for selecting the secret information consistent with check information from more parts of secret informations;
8th transmitting element 11024, when the secret information for passing through when verification only has a, this part of secret information is sent out
Give authenticated user;
9th transmitting element 11025, the secret information for passing through when verification are more than portion, and wherein every part of secret information
When being differed with other secret informations, a copy of it secret information is selected to be sent to authenticated user
Tenth transmitting element 11026, the secret information for passing through when verification are more than portion, and wherein every part of secret information
When identical with other K part secret informations, that part of secret information corresponding to maximum K values is selected to be sent to authenticated user;Wherein, K
>=1, and be natural number.
Can one of ordinary skill in the art will appreciate that realizing that all or part of step in the various embodiments described above method is
To instruct the hardware of correlation to complete by program, corresponding program can be stored in a computer read/write memory medium
In, described storage medium, such as ROM/RAM, disk or CD.
Herein it should be noted that the system that the various embodiments described above provide only is lifted with the division of above-mentioned each functional module
Example explanation, in actual applications, it can be completed as needed and by above-mentioned function distribution by different functional modules, will be internal
Structure is divided into different functional modules, to complete all or part of function described above.
It is appreciated that term " first ", " second " etc. used in the system of the various embodiments described above are various available for describing
Module, but these modules should not be limited by these terms.These terms are only used for distinguishing first module and another module.Lift
For example, without departing from the scope of the invention, the first receiving module can be referred to as the second receiving module, and it is similar
Second receiving module, can be referred to as the first receiving module by ground, and the first receiving module and the second receiving module both judge mould
Block, but it is not same receiving module.
It is described above, patent preferred embodiment only of the present invention, but the protection domain of patent of the present invention is not limited to
This, any one skilled in the art is in the scope disclosed in patent of the present invention, according to the skill of patent of the present invention
Art scheme and its inventive concept are subject to equivalent substitution or change, belong to the protection domain of patent of the present invention.
Claims (10)
1. information steganography method, it is characterised in that:Methods described includes:
Receiving needs the secret information of steganography;
The position for being handled secret information and being inserted in big data, the secret information relevant information in big data is sent to
The person of being authorized.
2. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted
Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is cut into multiple secret information pieces;
Position of each secret information piece in secret information is numbered;
Multiple positions that multiple secret information pieces are inserted in big data;
Position Number of position and multiple secret information piece of multiple secret information pieces in big data in secret information is sent out
Give the person of being authorized.
3. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted
Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is copied into more parts of secret informations;
Multiple positions that more parts of secret informations are inserted in big data;
Using the partial information or attribute information of secret information as check information;
Position of the more parts of secret informations in big data and check information are sent to the person of being authorized.
4. information steganography method according to claim 1, it is characterised in that:It is described that secret information is handled and inserted
Position in big data, the secret information relevant information in big data is sent to the person of being authorized, specifically included:
Secret information is copied into more parts of secret informations;
Every part of secret information is cut into multiple secret information pieces;
According to the positional information of all secret informations inserted in big data, the secret information calculated in each data block is counting greatly
Distribution density in;
Distribute multiple distribution densities minimum position for multiple secret information pieces of every part of secret information;
According to characteristic information, this secret of the characteristic information of each secret information piece of every part of secret information and its required carrier
The conversion demand of message slot and its required carrier, line translation and insertion are entered to each secret information piece using information steganography technology;
Using the partial information or attribute information of secret information as check information;
For every part of secret information, by the insertion position information of multiple secret information pieces, the characteristic information of required carrier and school
Test information and be sent to the person of being authorized.
5. information extracting method, it is characterised in that:Methods described includes:
Receive the secret information relevant information in the big data that the person of being authorized provides;
Secret information relevant information extraction secret information in big data, and secret information is sent to the person of being authorized.
6. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data
Breath includes position and multiple secret information piece Position Number in secret information of multiple secret information pieces in big data;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized
Person, specifically include:
Positioned by position of multiple secret information pieces in big data from big data and obtain multiple secret information pieces;
According to Position Number of multiple secret information pieces in secret information and multiple secret information pieces, merging obtains secret letter
Breath;
Secret information is sent to the person of being authorized.
7. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data
Breath includes position and check information of the more parts of secret informations in big data;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized
Person, specifically include:
Positioned by position of the more parts of secret informations in big data from big data and obtain more parts of secret informations;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information differs with other secret informations,
Selection a copy of it secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information is identical with other K part secret informations, choosing
That part of secret information corresponding to selecting maximum K values is sent to authenticated user;Wherein, K >=1, and be natural number.
8. information extracting method according to claim 5, it is characterised in that:The related letter of secret information in the big data
Breath includes the insertion position information of multiple secret information pieces, the characteristic information of required carrier and the verification letter of every part of secret information
Breath;
The secret information relevant information extraction secret information in big data, and secret information is sent to and is authorized
Person, specifically include:
According to the insertion position information of multiple secret information pieces of every part of secret information, the characteristic information of required carrier and verification
Information, inverse transformation is carried out to each secret information piece using information steganography technology;
For every part of secret information, multiple secret information pieces after inverse transformation are merged, obtain this part of secret information;
The secret information consistent with check information is selected from more parts of secret informations;
When the secret information that verification passes through only has a, this part of secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information differs with other secret informations,
Selection a copy of it secret information is sent to authenticated user;
When the secret information that verification passes through is more than portion, and wherein every part of secret information is identical with other K part secret informations, choosing
That part of secret information corresponding to selecting maximum K values is sent to authenticated user;Wherein, K >=1, and be natural number.
9. information steganography system, it is characterised in that:The system includes:
First receiving module, the secret information of steganography is needed for receiving;
Insertion and sending module, will be secret in big data for the position for being handled secret information and being inserted in big data
Confidential information relevant information is sent to the person of being authorized.
10. information extracting system, it is characterised in that:The system includes:
Second receiving module, the secret information relevant information in big data for receiving the person's of being authorized offer;
Extraction and sending module, secret information is extracted for the secret information relevant information in big data, and secret is believed
Breath is sent to the person of being authorized.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010221323.9A CN111526123B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method, extraction method, system, equipment and medium |
CN201710998187.2A CN107786555B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method and system and information extraction method and system |
JP2018199600A JP2019079051A (en) | 2017-10-24 | 2018-10-23 | Information secrecy method and system based upon big data, and information extraction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710998187.2A CN107786555B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method and system and information extraction method and system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010221323.9A Division CN111526123B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method, extraction method, system, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107786555A true CN107786555A (en) | 2018-03-09 |
CN107786555B CN107786555B (en) | 2020-05-15 |
Family
ID=61434865
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010221323.9A Active CN111526123B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method, extraction method, system, equipment and medium |
CN201710998187.2A Active CN107786555B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method and system and information extraction method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010221323.9A Active CN111526123B (en) | 2017-10-24 | 2017-10-24 | Big data-based information steganography method, extraction method, system, equipment and medium |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2019079051A (en) |
CN (2) | CN111526123B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595291A (en) * | 2018-04-01 | 2018-09-28 | 陈丽霞 | A kind of medical data standby system |
CN110135181A (en) * | 2019-05-29 | 2019-08-16 | 华南师范大学 | Information concealing method and robot based on big data search and Fourier transform |
CN110162990A (en) * | 2019-05-29 | 2019-08-23 | 华南师范大学 | Information concealing method and robot system based on big data and position |
CN110175463A (en) * | 2019-05-29 | 2019-08-27 | 华南师范大学 | Information concealing method and robot system based on big data search and functional transformation |
CN110175472A (en) * | 2019-05-29 | 2019-08-27 | 华南师范大学 | Information concealing method and robot system based on big data insertion and address of cache |
CN110188553A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and dynamic environment |
CN110188569A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and Fourier transform |
CN110188561A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and noise |
CN110191111A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | The information concealing method and robot system verified based on big data and function |
CN110188552A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and difference |
CN110188557A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data search |
CN110188560A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data insertion and local behavior |
CN110188554A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and functional transformation |
CN113114507A (en) * | 2021-04-15 | 2021-07-13 | 泉州文学士信息科技有限公司 | Data identification device system for transmission of sensor equipment of Internet of things |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065969A (en) * | 2014-05-30 | 2014-09-24 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
US20140289518A1 (en) * | 2013-03-15 | 2014-09-25 | Tuhin Sinha | Method and Apparatus for Privately and Securely Sharing Information Using Public Social or Sharing Network Infrastructure |
CN104125467A (en) * | 2014-08-01 | 2014-10-29 | 郑州师范学院 | Embedding and extracting methods for video steganography information |
US20170126631A1 (en) * | 2015-11-03 | 2017-05-04 | Box, Inc. | Securing shared documents using dynamic natural language steganography |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63248240A (en) * | 1987-04-03 | 1988-10-14 | Canon Inc | Coder |
JPH1013404A (en) * | 1996-06-25 | 1998-01-16 | Yazaki Corp | Transmission information generation method, information transmission/reception system and portable transmitter-receiver |
JPH1049048A (en) * | 1996-07-31 | 1998-02-20 | Matsushita Electric Works Ltd | Formation of encryption data and apparatus therefor |
EP1125189A4 (en) * | 1998-10-28 | 2001-11-28 | Datamark Technologies Pte Ltd | Methods of digital steganography for multimedia data |
JP2000201144A (en) * | 1999-01-05 | 2000-07-18 | Nippon Telegr & Teleph Corp <Ntt> | Method and device for authentication communication |
JP2002281021A (en) * | 2001-03-21 | 2002-09-27 | Gaia:Kk | Distributed data management system using network |
JP2003298832A (en) * | 2002-03-29 | 2003-10-17 | Hitachi Koukiyou Syst Eng Kk | Method for keeping information secret and method for extracting information |
JP2006127136A (en) * | 2004-10-28 | 2006-05-18 | Institute Of Physical & Chemical Research | Data distributed storage method and its system, data alteration identification method and its system, and storage medium capable of reading program and computer |
JP2011060008A (en) * | 2009-09-10 | 2011-03-24 | Kddi Corp | File distribution arrangement method and file distribution arrangement device |
CN102938888B (en) * | 2012-10-31 | 2015-06-03 | 华南理工大学 | Secret document steganography and extraction method suitable for wireless communication environment |
JP5955285B2 (en) * | 2013-08-27 | 2016-07-20 | 株式会社 日立産業制御ソリューションズ | ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND COMPUTER PROGRAM |
CN106254074A (en) * | 2016-08-12 | 2016-12-21 | 南京航空航天大学 | A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption |
CN106815529A (en) * | 2016-12-20 | 2017-06-09 | 合肥高维数据技术有限公司 | Cell phone pictures safety protection system and method based on Steganography |
-
2017
- 2017-10-24 CN CN202010221323.9A patent/CN111526123B/en active Active
- 2017-10-24 CN CN201710998187.2A patent/CN107786555B/en active Active
-
2018
- 2018-10-23 JP JP2018199600A patent/JP2019079051A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140289518A1 (en) * | 2013-03-15 | 2014-09-25 | Tuhin Sinha | Method and Apparatus for Privately and Securely Sharing Information Using Public Social or Sharing Network Infrastructure |
CN104065969A (en) * | 2014-05-30 | 2014-09-24 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
CN104125467A (en) * | 2014-08-01 | 2014-10-29 | 郑州师范学院 | Embedding and extracting methods for video steganography information |
US20170126631A1 (en) * | 2015-11-03 | 2017-05-04 | Box, Inc. | Securing shared documents using dynamic natural language steganography |
Non-Patent Citations (1)
Title |
---|
阳溢,刘博文,张文静: "信息隐藏技术在大数据环境中的应用探讨", 《电脑编程技巧与维护》 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595291A (en) * | 2018-04-01 | 2018-09-28 | 陈丽霞 | A kind of medical data standby system |
CN110188557A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data search |
CN110188552B (en) * | 2019-05-29 | 2023-05-23 | 华南师范大学 | Information hiding method based on big data and difference value and robot system |
CN110175463A (en) * | 2019-05-29 | 2019-08-27 | 华南师范大学 | Information concealing method and robot system based on big data search and functional transformation |
CN110175472A (en) * | 2019-05-29 | 2019-08-27 | 华南师范大学 | Information concealing method and robot system based on big data insertion and address of cache |
CN110188553A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and dynamic environment |
CN110188569A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and Fourier transform |
CN110188561A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and noise |
CN110188560A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data insertion and local behavior |
CN110175463B (en) * | 2019-05-29 | 2023-07-07 | 华南师范大学 | Information hiding method and robot system based on big data search and function transformation |
CN110162990A (en) * | 2019-05-29 | 2019-08-23 | 华南师范大学 | Information concealing method and robot system based on big data and position |
CN110191111A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | The information concealing method and robot system verified based on big data and function |
CN110188554A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and functional transformation |
CN110188552A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and difference |
CN110191111B (en) * | 2019-05-29 | 2021-12-03 | 华南师范大学 | Information hiding method based on big data and function verification and robot system |
CN110188553B (en) * | 2019-05-29 | 2022-07-12 | 华南师范大学 | Information hiding method based on big data and dynamic environment and robot system |
CN110188569B (en) * | 2019-05-29 | 2022-07-26 | 华南师范大学 | Information hiding method based on big data and Fourier transform and robot system |
CN110135181B (en) * | 2019-05-29 | 2022-09-16 | 华南师范大学 | Information hiding method and robot based on big data search and Fourier transform |
CN110135181A (en) * | 2019-05-29 | 2019-08-16 | 华南师范大学 | Information concealing method and robot based on big data search and Fourier transform |
CN110188557B (en) * | 2019-05-29 | 2023-07-04 | 华南师范大学 | Information hiding method based on big data search and robot system |
CN113114507A (en) * | 2021-04-15 | 2021-07-13 | 泉州文学士信息科技有限公司 | Data identification device system for transmission of sensor equipment of Internet of things |
Also Published As
Publication number | Publication date |
---|---|
CN111526123A (en) | 2020-08-11 |
CN107786555B (en) | 2020-05-15 |
CN111526123B (en) | 2022-02-25 |
JP2019079051A (en) | 2019-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107786555A (en) | Information steganography method and system, information extracting method and system based on big data | |
van Beek et al. | Digital forensics as a service: Game on | |
Zhu et al. | Dynamic audit services for integrity verification of outsourced storages in clouds | |
US5530757A (en) | Distributed fingerprints for information integrity verification | |
CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
US20100058476A1 (en) | Electronic information retention method/system, electronic information split retention method/system, electronic information split restoration processing method/system, and programs for the same | |
CN105164971A (en) | Verification system and method with extra security for lower-entropy input records | |
CN105025012A (en) | An access control system and an access control method thereof oriented towards a cloud storage service platform | |
TW201123807A (en) | Verifiable trust for data through wrapper composition | |
US20060117016A1 (en) | Method and apparatus for efficient electronic document management | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
CN110413652A (en) | A kind of big data privacy search method based on edge calculations | |
Gopal et al. | Evaluating RC-interconnect using moment-matching approximations | |
Bertoin | Sizes of the largest clusters for supercritical percolation on random recursive trees | |
CN106356066A (en) | Speech recognition system based on cloud computing | |
CN110225012A (en) | The ownership inspection and update method of one outer bag data based on alliance's chain | |
Atan et al. | Formulating a security layer of cloud data storage framework based on multi agent system architecture | |
CN106161654A (en) | A kind of cloud educational system | |
CN109040173A (en) | A kind of reliable storage method and device of government affairs big data | |
CN100561516C (en) | Network gridding service system of national geolopy spatial data | |
KR101241792B1 (en) | Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information | |
CN114500103A (en) | Internet of things privacy data segmentation and encryption method and block chain system | |
CN114547698A (en) | CORS service data storage system and method based on block chain | |
KR102051454B1 (en) | A decision-making system using blockchains by verifying conditions | |
Du et al. | Secure and verifiable keyword search in multiple clouds |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |