CN110175472A - Information concealing method and robot system based on big data insertion and address of cache - Google Patents

Information concealing method and robot system based on big data insertion and address of cache Download PDF

Info

Publication number
CN110175472A
CN110175472A CN201910458126.6A CN201910458126A CN110175472A CN 110175472 A CN110175472 A CN 110175472A CN 201910458126 A CN201910458126 A CN 201910458126A CN 110175472 A CN110175472 A CN 110175472A
Authority
CN
China
Prior art keywords
information
presupposed
secret
secret information
preset function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910458126.6A
Other languages
Chinese (zh)
Inventor
朱定局
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Original Assignee
Great Power Innovative Intelligent Technology (dongguan) Co Ltd
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Power Innovative Intelligent Technology (dongguan) Co Ltd, South China Normal University filed Critical Great Power Innovative Intelligent Technology (dongguan) Co Ltd
Priority to CN201910458126.6A priority Critical patent/CN110175472A/en
Publication of CN110175472A publication Critical patent/CN110175472A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Information concealing method and robot system based on big data insertion and address of cache, it include: that secret information is inputted into the second preset function, presupposed information is calculated, using presupposed information as the input of the first preset function, first position is calculated, secret information inserting step: secret information is inserted into the first position in big data.The above method and system can hide the secret information of big data quantity, and the secret information after hiding is difficult to be cracked, is highly-safe.

Description

Information concealing method and robot system based on big data insertion and address of cache
Technical field
The present invention relates to information technology fields, more particularly to a kind of information concealing method and robot system.
Background technique
Information Hiding Techniques (Information Hiding), that is, Information hiding will protect letter in future network Breath plays an important role in terms of not being damaged, and Information hiding is confidential information to be hidden in bulk information not allow opponent to realize A kind of method.The method of Information hiding mainly has Steganography, digital watermark technology, visual password, latent channel, concealment agreement etc..
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: existing Information hiding Technology, since the data volume of cover object and camouflaging object is limited, analysis mining goes out from cover object and camouflaging object The complexity and difficulty of secret information are limited, so that secret information is possible to be cracked, lead to the safety of Information hiding It is not high.Simultaneously because the data volume of cover object and camouflaging object is limited, large batch of secret information can not be hidden.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
Based on this, it is necessary to for the defect or deficiency of Information hiding in the prior art, provide based on big data insertion and The information concealing method and robot system of address of cache, data volume to solve Information hiding in the prior art is limited, easy quilt The shortcomings that cracking.
In a first aspect, the embodiment of the present invention provides a kind of information concealing method, which comprises
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information inserting step: secret information is inserted into the first position in big data.
Preferably,
Before the positional information calculation step further include:
Presupposed information generation step: secret information is inputted into the second preset function, presupposed information is calculated.
Preferably,
Include: after the secret information inserting step
Presupposed information sending step: the presupposed information is sent to user.
Second aspect, the embodiment of the present invention provide a kind of information extracting method, which comprises
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtaining step: secret information is extracted from the first position in big data.
Preferably,
After the secret information obtaining step further include:
Secret information verification step: the secret information is inputted into the second preset function, is calculated output, described in judgement Whether output is equal to the presupposed information: being that then verification passes through;It is no, then verify failure.
Preferably,
Include: before the data extraction step
Presupposed information receives step: acceptance presupposition information.
The third aspect, the embodiment of the present invention provide a kind of Information hiding and extracting method, and the method includes the letters Cease hidden method and the information extracting method.
Fourth aspect, the embodiment of the present invention provide a kind of information hiding system, the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information is inserted into module: secret information is inserted into the first position in big data.
Preferably,
Before the positional information calculation module further include:
Presupposed information generation module: secret information is inputted into the second preset function, presupposed information is calculated.
Preferably,
Include: after the secret information insertion module
Presupposed information sending module: the presupposed information is sent to user.
5th aspect, the embodiment of the present invention provide a kind of information extracting system, the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtains module: extracting secret information from the first position in big data.
Preferably,
The secret information obtains after module further include:
Secret information correction verification module: the secret information is inputted into the second preset function, is calculated output, described in judgement Whether output is equal to the presupposed information: being that then verification passes through;It is no, then verify failure.
Preferably,
Include: before the data extraction module
Presupposed information receiving module: acceptance presupposition information.
6th aspect, the embodiment of the present invention provide a kind of Information hiding and extracting system, and the system comprises the letters Cease the system of hiding and the information extracting system.
7th aspect, the embodiment of the present invention provides a kind of robot system, is each configured in the robot described Information hiding system and the information extracting system.
The embodiment of many aspects of the present invention the utility model has the advantages that
1, the Information Hiding Techniques based on big data search, since the data volume of cover object and camouflaging object is very big, because This analysis mining from the great cover object of data volume and camouflaging object go out secret information complexity and difficulty it is very high, such as Cause the safety of Information hiding high so that secret information can not extremely be cracked with " looking for a needle in a haystack ".Simultaneously because The data volume of cover object and camouflaging object is big, can hide large batch of secret information.
2, user only needs to store presupposed information (such as a character string), and presupposed information and secret information Between can be without any similarity, so that illegal user can not obtain secret information by presupposed information, and the first default letter Number can convert presupposed information to the position that secret information is stored in big data, and the first preset function can be by executing the reality The server of a method is applied to execute, so user only needs presupposed information to be sent to the server and can be achieved with secret letter The extraction of breath is also unable to get secret information even if illegal user has been truncated to presupposed information by network, because first is default Function stores in the server, is sent to user without by network, illegal user can not be intercepted by network, to can not lead to It crosses presupposed information and recovers secret information.The benefit of the present embodiment is when secret information is inserted into big data, to be inserted into without sending Position is to user, and user can not also send location information to the server of storage big data when extracting secret information, because such as Fruit location information is stored in user terminal, once illegal user has got position letter by network or the terminal of invasion user Breath can get secret information from big data server.And in the present embodiment, user terminal only needs to store presupposed information, institute To be unable to get secret information illegal user obtains presupposed information.So that secret information is safer, is difficult to It cracks.
3, it may further ensure that the extraction correctness of secret information by the second preset function, and need not additional letter Breath, so that the accuracy and more efficient that secret information extracts.
Information concealing method and robot system provided in an embodiment of the present invention based on big data insertion and address of cache, Include: that secret information is inputted into the second preset function, presupposed information is calculated, using presupposed information as the first preset function Input, is calculated first position, secret information inserting step: secret information is inserted into the first position in big data. The above method and system can hide the secret information of big data quantity, and the secret information after hiding is difficult to be cracked, safety It is high.
Detailed description of the invention
Fig. 1 is the flow chart for the information concealing method that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the information extracting method that the embodiment of the present invention 1 provides;
Fig. 3 is the flow chart for the information concealing method that the embodiment of the present invention 2 provides;
Fig. 4 is the flow chart for the information extracting method that the embodiment of the present invention 2 provides;
Fig. 5 is the functional block diagram for the information hiding system that the embodiment of the present invention 3 provides;
Fig. 6 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 7 is the functional block diagram for the information hiding system that the embodiment of the present invention 4 provides;
Fig. 8 is the functional block diagram for the information extracting system that the embodiment of the present invention 4 provides;
Fig. 9 is the functional block diagram of Information hiding and extraction machine people's system that the embodiment of the present invention 5 provides.
Specific embodiment
Below with reference to embodiment of the present invention, technical solution in the embodiment of the present invention is described in detail.It should Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Embodiment 1, a kind of information concealing method and corresponding information extracting method.
A kind of information concealing method includes positional information calculation step S110, secret information inserting step S120, default letter Sending step S130 is ceased, as shown in Figure 1.
Positional information calculation step S110: using presupposed information as the input of the first preset function, it is calculated first It sets.
Secret information inserting step S120: the first position in hiding secret information insertion big data will be needed.
Presupposed information sending step S130: presupposed information is sent to user.
A kind of information extracting method includes that presupposed information receives step S210, positional information calculation step S220, secret letter Obtaining step S230 is ceased, as shown in Figure 2.
Presupposed information receives step S210: obtaining presupposed information.Presupposed information is stored in user there, and user wants When extracting secret information, input presupposed information is first had to.
Positional information calculation step S220: using presupposed information as the input of the first preset function, it is calculated first It sets.The input of first preset function is presupposed information, and output is location information.First preset function can convert presupposed information to Location information.First preset function can be realized based on hash function.Such as presupposed information is the form of numerical value, and it is different Numerical value can be mapped to different address codes by the first preset function based on hash, and different address codes from it is different Address correspond.
Secret information obtaining step S230: it is extracted from the first position in big data and needs hiding secret information.
Through this embodiment, user only needs to store presupposed information (such as a character string), and default letter Can there is no any similarity between breath and secret information, so that illegal user can not obtain secret information by presupposed information, And the first preset function can convert presupposed information to the position that secret information is stored in big data, the first preset function can To be executed by the server for executing the embodiment method, so user only needs presupposed information to be sent to the server just It is able to achieve the extraction of secret information, even if illegal user has been truncated to presupposed information by network, is also unable to get secret information, Because the first preset function stores in the server, it is sent to user without by network, illegal user can not be cut by network It takes, so that secret information can not be recovered by presupposed information.When the benefit of the present embodiment is by secret information insertion big data, Insertion position need not be sent to user, user can not also send location information to the clothes of storage big data when extracting secret information Business device, because if location information is stored in user terminal, once illegal user is obtained by network or the terminal of invasion user Secret information can be got from big data server by having arrived location information.And in the present embodiment, user terminal only needs to store Presupposed information, so being unable to get secret information illegal user obtains presupposed information.So that secret information is more For safely, be difficult to crack.
Embodiment 2, preferred information concealing method and corresponding information extracting method.
Positional information calculation step S110 further includes before presupposed information generation step in preferred information concealing method S100, as shown in Figure 3.
Further include presupposed information generation step S100 before positional information calculation step S110: secret information is inputted second Presupposed information is calculated in preset function.Presupposed information=the second preset function (secret information).The data volume of secret information can With very big, but after being converted by the second preset function, the data volume of presupposed information can become very little.Second preset function is one Big data quantity can be become small data quantity by kind, such as the second preset function is to seek the size of the data volume of secret information, then presets Information is the size of the data volume of secret information.
It further include secret information verification step S240 after secret information obtaining step S230 in information extracting method, such as Shown in Fig. 4.
Further include secret information verification step S240 after step S230: secret information is inputted into the second preset function, meter Calculation is exported, and judges whether output is equal to presupposed information, if being equal to presupposed information, verification passes through, otherwise verification failure.
May further ensure that the extraction correctness of secret information by the second preset function, and need not additional information, So that the accuracy and more efficient that secret information extracts.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can With referring to the implementation of preceding method, overlaps will not be repeated.
Embodiment 3, a kind of information hiding system and corresponding information extracting system.
A kind of information hiding system includes positional information calculation module 110, secret information insertion module 120, presupposed information Sending module 130, as shown in Figure 5.
A kind of information extracting system includes that presupposed information obtains module 210, positional information calculation module 220, secret information Module 230 is obtained, as shown in Figure 6.
Embodiment 4, a kind of preferred information hiding system and corresponding information extracting system.
Positional information calculation module 110 further includes before presupposed information generation module 100 in preferred information hiding system, As shown in Figure 7.
Secret information in information extracting system further includes secret information correction verification module 240 after obtaining module 230, is such as schemed Shown in 8.
The step in the method in the module and embodiment 1,2 in system in embodiment 3,4 corresponds, beneficial effect Also it corresponds, the particular content of each module in system repeats no more, and the beneficial effect of system also repeats no more.
Embodiment 5, a kind of Information hiding and extracting robot system, as shown in figure 9, system, Information hiding and extracting robot System is made of information hiding system and information extracting system.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory ROM) or random access memory (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of information concealing method, which is characterized in that the described method includes:
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information inserting step: secret information is inserted into the first position in big data.
2. information concealing method according to claim 1, which is characterized in that
Before the positional information calculation step further include:
Presupposed information generation step: secret information is inputted into the second preset function, presupposed information is calculated.
3. information concealing method according to claim 2, which is characterized in that
Include: after the secret information inserting step
Presupposed information sending step: the presupposed information is sent to user.
4. a kind of information extracting method, which is characterized in that the described method includes:
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtaining step: secret information is extracted from the first position in big data.
5. information extracting method according to claim 4, which is characterized in that
After the secret information obtaining step further include:
Secret information verification step: the secret information is inputted into the second preset function, output is calculated, judges the output Whether it is equal to the presupposed information: is, then verification passes through;It is no, then verify failure.
6. information extracting method according to claim 5, which is characterized in that
Include: before the data extraction step
Presupposed information receives step: acceptance presupposition information.
7. a kind of Information hiding and extracting method, which is characterized in that the method includes the described in any item letters of claim 1-3 Cease hidden method and the described in any item information extracting methods of claim 4-6.
8. a kind of information hiding system, which is characterized in that the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information is inserted into module: secret information is inserted into the first position in big data.
9. a kind of information extracting system, which is characterized in that the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtains module: extracting secret information from the first position in big data.
10. a kind of robot system, which is characterized in that be each configured with information as claimed in claim 8 in the robot The system of hiding and information extracting system as claimed in claim 9.
CN201910458126.6A 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and address of cache Pending CN110175472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910458126.6A CN110175472A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and address of cache

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910458126.6A CN110175472A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and address of cache

Publications (1)

Publication Number Publication Date
CN110175472A true CN110175472A (en) 2019-08-27

Family

ID=67696432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910458126.6A Pending CN110175472A (en) 2019-05-29 2019-05-29 Information concealing method and robot system based on big data insertion and address of cache

Country Status (1)

Country Link
CN (1) CN110175472A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197244A (en) * 1996-12-26 1998-10-28 国际商业机器公司 Data hiding method and data extraction method using statistical test
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage
KR20150043092A (en) * 2013-10-14 2015-04-22 주식회사 파수닷컴 Index generating and searching method for encrypted field of database
CN106250781A (en) * 2016-07-31 2016-12-21 山东大学 A kind of user profile guard method based on virtual machine increment mirror image
CN107483194A (en) * 2017-08-29 2017-12-15 中国民航大学 G.729 speech hiding algorithm based on non-zero pulses position and amplitude information
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197244A (en) * 1996-12-26 1998-10-28 国际商业机器公司 Data hiding method and data extraction method using statistical test
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
KR20150043092A (en) * 2013-10-14 2015-04-22 주식회사 파수닷컴 Index generating and searching method for encrypted field of database
CN104408381A (en) * 2014-11-27 2015-03-11 大连理工大学 Protection method of data integrity in cloud storage
CN106250781A (en) * 2016-07-31 2016-12-21 山东大学 A kind of user profile guard method based on virtual machine increment mirror image
CN107483194A (en) * 2017-08-29 2017-12-15 中国民航大学 G.729 speech hiding algorithm based on non-zero pulses position and amplitude information
CN107786555A (en) * 2017-10-24 2018-03-09 大国创新智能科技(东莞)有限公司 Information steganography method and system, information extracting method and system based on big data

Similar Documents

Publication Publication Date Title
CA2743273C (en) Method and device for intercepting junk mail
CN109450649A (en) Gateway verification method and device based on application program interface and electronic equipment
CN109858248B (en) Malicious Word document detection method and device
CN103685308A (en) Detection method and system of phishing web pages, client and server
CN103268449B (en) A kind of high speed detection method and system of mobile phone malicious code
CN103067364A (en) Virus detection method and equipment
CN109376133A (en) File access method and file access system
WO2014145336A2 (en) Systems and methods for tokenizing and parsing user-generated content to enable the prevention of attacks
CN104899499A (en) Internet image search based Web verification code generation method
CN104426879A (en) Verification code generation and verification processing method and corresponding method, device and system
CN104158828A (en) Method and system for identifying doubtful phishing webpage on basis of cloud content rule base
CN110648118A (en) Fish fork mail detection method and device, electronic equipment and readable storage medium
CN107844696B (en) Verification code interference method and server
US20120030556A1 (en) Method for enabling interactive content within messaging application
CN110175472A (en) Information concealing method and robot system based on big data insertion and address of cache
CN109067716B (en) Method and system for identifying dark chain
CN101989324A (en) Information security system based on computer and mobile storage device
CN111898126A (en) Android repackaging application detection method based on dynamically acquired user interface
CN106055693A (en) Information processing method and terminal
US7712142B1 (en) Document integrity
CN107645382A (en) A kind of identity marking equipment and its method of work
CN110740112B (en) Authentication method, apparatus and computer readable storage medium
CN110188552A (en) Information concealing method and robot system based on big data and difference
CN110162991A (en) Information concealing method and robot system based on big data insertion and heterogeneous types
CN110191111A (en) The information concealing method and robot system verified based on big data and function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination