CN110175472A - Information concealing method and robot system based on big data insertion and address of cache - Google Patents
Information concealing method and robot system based on big data insertion and address of cache Download PDFInfo
- Publication number
- CN110175472A CN110175472A CN201910458126.6A CN201910458126A CN110175472A CN 110175472 A CN110175472 A CN 110175472A CN 201910458126 A CN201910458126 A CN 201910458126A CN 110175472 A CN110175472 A CN 110175472A
- Authority
- CN
- China
- Prior art keywords
- information
- presupposed
- secret
- secret information
- preset function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Information concealing method and robot system based on big data insertion and address of cache, it include: that secret information is inputted into the second preset function, presupposed information is calculated, using presupposed information as the input of the first preset function, first position is calculated, secret information inserting step: secret information is inserted into the first position in big data.The above method and system can hide the secret information of big data quantity, and the secret information after hiding is difficult to be cracked, is highly-safe.
Description
Technical field
The present invention relates to information technology fields, more particularly to a kind of information concealing method and robot system.
Background technique
Information Hiding Techniques (Information Hiding), that is, Information hiding will protect letter in future network
Breath plays an important role in terms of not being damaged, and Information hiding is confidential information to be hidden in bulk information not allow opponent to realize
A kind of method.The method of Information hiding mainly has Steganography, digital watermark technology, visual password, latent channel, concealment agreement etc..
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: existing Information hiding
Technology, since the data volume of cover object and camouflaging object is limited, analysis mining goes out from cover object and camouflaging object
The complexity and difficulty of secret information are limited, so that secret information is possible to be cracked, lead to the safety of Information hiding
It is not high.Simultaneously because the data volume of cover object and camouflaging object is limited, large batch of secret information can not be hidden.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
Based on this, it is necessary to for the defect or deficiency of Information hiding in the prior art, provide based on big data insertion and
The information concealing method and robot system of address of cache, data volume to solve Information hiding in the prior art is limited, easy quilt
The shortcomings that cracking.
In a first aspect, the embodiment of the present invention provides a kind of information concealing method, which comprises
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information inserting step: secret information is inserted into the first position in big data.
Preferably,
Before the positional information calculation step further include:
Presupposed information generation step: secret information is inputted into the second preset function, presupposed information is calculated.
Preferably,
Include: after the secret information inserting step
Presupposed information sending step: the presupposed information is sent to user.
Second aspect, the embodiment of the present invention provide a kind of information extracting method, which comprises
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtaining step: secret information is extracted from the first position in big data.
Preferably,
After the secret information obtaining step further include:
Secret information verification step: the secret information is inputted into the second preset function, is calculated output, described in judgement
Whether output is equal to the presupposed information: being that then verification passes through;It is no, then verify failure.
Preferably,
Include: before the data extraction step
Presupposed information receives step: acceptance presupposition information.
The third aspect, the embodiment of the present invention provide a kind of Information hiding and extracting method, and the method includes the letters
Cease hidden method and the information extracting method.
Fourth aspect, the embodiment of the present invention provide a kind of information hiding system, the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information is inserted into module: secret information is inserted into the first position in big data.
Preferably,
Before the positional information calculation module further include:
Presupposed information generation module: secret information is inputted into the second preset function, presupposed information is calculated.
Preferably,
Include: after the secret information insertion module
Presupposed information sending module: the presupposed information is sent to user.
5th aspect, the embodiment of the present invention provide a kind of information extracting system, the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtains module: extracting secret information from the first position in big data.
Preferably,
The secret information obtains after module further include:
Secret information correction verification module: the secret information is inputted into the second preset function, is calculated output, described in judgement
Whether output is equal to the presupposed information: being that then verification passes through;It is no, then verify failure.
Preferably,
Include: before the data extraction module
Presupposed information receiving module: acceptance presupposition information.
6th aspect, the embodiment of the present invention provide a kind of Information hiding and extracting system, and the system comprises the letters
Cease the system of hiding and the information extracting system.
7th aspect, the embodiment of the present invention provides a kind of robot system, is each configured in the robot described
Information hiding system and the information extracting system.
The embodiment of many aspects of the present invention the utility model has the advantages that
1, the Information Hiding Techniques based on big data search, since the data volume of cover object and camouflaging object is very big, because
This analysis mining from the great cover object of data volume and camouflaging object go out secret information complexity and difficulty it is very high, such as
Cause the safety of Information hiding high so that secret information can not extremely be cracked with " looking for a needle in a haystack ".Simultaneously because
The data volume of cover object and camouflaging object is big, can hide large batch of secret information.
2, user only needs to store presupposed information (such as a character string), and presupposed information and secret information
Between can be without any similarity, so that illegal user can not obtain secret information by presupposed information, and the first default letter
Number can convert presupposed information to the position that secret information is stored in big data, and the first preset function can be by executing the reality
The server of a method is applied to execute, so user only needs presupposed information to be sent to the server and can be achieved with secret letter
The extraction of breath is also unable to get secret information even if illegal user has been truncated to presupposed information by network, because first is default
Function stores in the server, is sent to user without by network, illegal user can not be intercepted by network, to can not lead to
It crosses presupposed information and recovers secret information.The benefit of the present embodiment is when secret information is inserted into big data, to be inserted into without sending
Position is to user, and user can not also send location information to the server of storage big data when extracting secret information, because such as
Fruit location information is stored in user terminal, once illegal user has got position letter by network or the terminal of invasion user
Breath can get secret information from big data server.And in the present embodiment, user terminal only needs to store presupposed information, institute
To be unable to get secret information illegal user obtains presupposed information.So that secret information is safer, is difficult to
It cracks.
3, it may further ensure that the extraction correctness of secret information by the second preset function, and need not additional letter
Breath, so that the accuracy and more efficient that secret information extracts.
Information concealing method and robot system provided in an embodiment of the present invention based on big data insertion and address of cache,
Include: that secret information is inputted into the second preset function, presupposed information is calculated, using presupposed information as the first preset function
Input, is calculated first position, secret information inserting step: secret information is inserted into the first position in big data.
The above method and system can hide the secret information of big data quantity, and the secret information after hiding is difficult to be cracked, safety
It is high.
Detailed description of the invention
Fig. 1 is the flow chart for the information concealing method that the embodiment of the present invention 1 provides;
Fig. 2 is the flow chart for the information extracting method that the embodiment of the present invention 1 provides;
Fig. 3 is the flow chart for the information concealing method that the embodiment of the present invention 2 provides;
Fig. 4 is the flow chart for the information extracting method that the embodiment of the present invention 2 provides;
Fig. 5 is the functional block diagram for the information hiding system that the embodiment of the present invention 3 provides;
Fig. 6 is the functional block diagram for the information extracting system that the embodiment of the present invention 3 provides;
Fig. 7 is the functional block diagram for the information hiding system that the embodiment of the present invention 4 provides;
Fig. 8 is the functional block diagram for the information extracting system that the embodiment of the present invention 4 provides;
Fig. 9 is the functional block diagram of Information hiding and extraction machine people's system that the embodiment of the present invention 5 provides.
Specific embodiment
Below with reference to embodiment of the present invention, technical solution in the embodiment of the present invention is described in detail.It should
Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Embodiment 1, a kind of information concealing method and corresponding information extracting method.
A kind of information concealing method includes positional information calculation step S110, secret information inserting step S120, default letter
Sending step S130 is ceased, as shown in Figure 1.
Positional information calculation step S110: using presupposed information as the input of the first preset function, it is calculated first
It sets.
Secret information inserting step S120: the first position in hiding secret information insertion big data will be needed.
Presupposed information sending step S130: presupposed information is sent to user.
A kind of information extracting method includes that presupposed information receives step S210, positional information calculation step S220, secret letter
Obtaining step S230 is ceased, as shown in Figure 2.
Presupposed information receives step S210: obtaining presupposed information.Presupposed information is stored in user there, and user wants
When extracting secret information, input presupposed information is first had to.
Positional information calculation step S220: using presupposed information as the input of the first preset function, it is calculated first
It sets.The input of first preset function is presupposed information, and output is location information.First preset function can convert presupposed information to
Location information.First preset function can be realized based on hash function.Such as presupposed information is the form of numerical value, and it is different
Numerical value can be mapped to different address codes by the first preset function based on hash, and different address codes from it is different
Address correspond.
Secret information obtaining step S230: it is extracted from the first position in big data and needs hiding secret information.
Through this embodiment, user only needs to store presupposed information (such as a character string), and default letter
Can there is no any similarity between breath and secret information, so that illegal user can not obtain secret information by presupposed information,
And the first preset function can convert presupposed information to the position that secret information is stored in big data, the first preset function can
To be executed by the server for executing the embodiment method, so user only needs presupposed information to be sent to the server just
It is able to achieve the extraction of secret information, even if illegal user has been truncated to presupposed information by network, is also unable to get secret information,
Because the first preset function stores in the server, it is sent to user without by network, illegal user can not be cut by network
It takes, so that secret information can not be recovered by presupposed information.When the benefit of the present embodiment is by secret information insertion big data,
Insertion position need not be sent to user, user can not also send location information to the clothes of storage big data when extracting secret information
Business device, because if location information is stored in user terminal, once illegal user is obtained by network or the terminal of invasion user
Secret information can be got from big data server by having arrived location information.And in the present embodiment, user terminal only needs to store
Presupposed information, so being unable to get secret information illegal user obtains presupposed information.So that secret information is more
For safely, be difficult to crack.
Embodiment 2, preferred information concealing method and corresponding information extracting method.
Positional information calculation step S110 further includes before presupposed information generation step in preferred information concealing method
S100, as shown in Figure 3.
Further include presupposed information generation step S100 before positional information calculation step S110: secret information is inputted second
Presupposed information is calculated in preset function.Presupposed information=the second preset function (secret information).The data volume of secret information can
With very big, but after being converted by the second preset function, the data volume of presupposed information can become very little.Second preset function is one
Big data quantity can be become small data quantity by kind, such as the second preset function is to seek the size of the data volume of secret information, then presets
Information is the size of the data volume of secret information.
It further include secret information verification step S240 after secret information obtaining step S230 in information extracting method, such as
Shown in Fig. 4.
Further include secret information verification step S240 after step S230: secret information is inputted into the second preset function, meter
Calculation is exported, and judges whether output is equal to presupposed information, if being equal to presupposed information, verification passes through, otherwise verification failure.
May further ensure that the extraction correctness of secret information by the second preset function, and need not additional information,
So that the accuracy and more efficient that secret information extracts.
Since the principle that system described below solves the problems, such as is similar to preceding method, the implementation of system described below can
With referring to the implementation of preceding method, overlaps will not be repeated.
Embodiment 3, a kind of information hiding system and corresponding information extracting system.
A kind of information hiding system includes positional information calculation module 110, secret information insertion module 120, presupposed information
Sending module 130, as shown in Figure 5.
A kind of information extracting system includes that presupposed information obtains module 210, positional information calculation module 220, secret information
Module 230 is obtained, as shown in Figure 6.
Embodiment 4, a kind of preferred information hiding system and corresponding information extracting system.
Positional information calculation module 110 further includes before presupposed information generation module 100 in preferred information hiding system,
As shown in Figure 7.
Secret information in information extracting system further includes secret information correction verification module 240 after obtaining module 230, is such as schemed
Shown in 8.
The step in the method in the module and embodiment 1,2 in system in embodiment 3,4 corresponds, beneficial effect
Also it corresponds, the particular content of each module in system repeats no more, and the beneficial effect of system also repeats no more.
Embodiment 5, a kind of Information hiding and extracting robot system, as shown in figure 9, system, Information hiding and extracting robot
System is made of information hiding system and information extracting system.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory ROM) or random access memory (Random Access
Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (10)
1. a kind of information concealing method, which is characterized in that the described method includes:
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information inserting step: secret information is inserted into the first position in big data.
2. information concealing method according to claim 1, which is characterized in that
Before the positional information calculation step further include:
Presupposed information generation step: secret information is inputted into the second preset function, presupposed information is calculated.
3. information concealing method according to claim 2, which is characterized in that
Include: after the secret information inserting step
Presupposed information sending step: the presupposed information is sent to user.
4. a kind of information extracting method, which is characterized in that the described method includes:
Positional information calculation step: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtaining step: secret information is extracted from the first position in big data.
5. information extracting method according to claim 4, which is characterized in that
After the secret information obtaining step further include:
Secret information verification step: the secret information is inputted into the second preset function, output is calculated, judges the output
Whether it is equal to the presupposed information: is, then verification passes through;It is no, then verify failure.
6. information extracting method according to claim 5, which is characterized in that
Include: before the data extraction step
Presupposed information receives step: acceptance presupposition information.
7. a kind of Information hiding and extracting method, which is characterized in that the method includes the described in any item letters of claim 1-3
Cease hidden method and the described in any item information extracting methods of claim 4-6.
8. a kind of information hiding system, which is characterized in that the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information is inserted into module: secret information is inserted into the first position in big data.
9. a kind of information extracting system, which is characterized in that the system comprises:
Positional information calculation module: using presupposed information as the input of the first preset function, first position is calculated;
Secret information obtains module: extracting secret information from the first position in big data.
10. a kind of robot system, which is characterized in that be each configured with information as claimed in claim 8 in the robot
The system of hiding and information extracting system as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458126.6A CN110175472A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and address of cache |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458126.6A CN110175472A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and address of cache |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110175472A true CN110175472A (en) | 2019-08-27 |
Family
ID=67696432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910458126.6A Pending CN110175472A (en) | 2019-05-29 | 2019-05-29 | Information concealing method and robot system based on big data insertion and address of cache |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110175472A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1197244A (en) * | 1996-12-26 | 1998-10-28 | 国际商业机器公司 | Data hiding method and data extraction method using statistical test |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
KR20150043092A (en) * | 2013-10-14 | 2015-04-22 | 주식회사 파수닷컴 | Index generating and searching method for encrypted field of database |
CN106250781A (en) * | 2016-07-31 | 2016-12-21 | 山东大学 | A kind of user profile guard method based on virtual machine increment mirror image |
CN107483194A (en) * | 2017-08-29 | 2017-12-15 | 中国民航大学 | G.729 speech hiding algorithm based on non-zero pulses position and amplitude information |
CN107786555A (en) * | 2017-10-24 | 2018-03-09 | 大国创新智能科技(东莞)有限公司 | Information steganography method and system, information extracting method and system based on big data |
-
2019
- 2019-05-29 CN CN201910458126.6A patent/CN110175472A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1197244A (en) * | 1996-12-26 | 1998-10-28 | 国际商业机器公司 | Data hiding method and data extraction method using statistical test |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
KR20150043092A (en) * | 2013-10-14 | 2015-04-22 | 주식회사 파수닷컴 | Index generating and searching method for encrypted field of database |
CN104408381A (en) * | 2014-11-27 | 2015-03-11 | 大连理工大学 | Protection method of data integrity in cloud storage |
CN106250781A (en) * | 2016-07-31 | 2016-12-21 | 山东大学 | A kind of user profile guard method based on virtual machine increment mirror image |
CN107483194A (en) * | 2017-08-29 | 2017-12-15 | 中国民航大学 | G.729 speech hiding algorithm based on non-zero pulses position and amplitude information |
CN107786555A (en) * | 2017-10-24 | 2018-03-09 | 大国创新智能科技(东莞)有限公司 | Information steganography method and system, information extracting method and system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2743273C (en) | Method and device for intercepting junk mail | |
CN109450649A (en) | Gateway verification method and device based on application program interface and electronic equipment | |
CN109858248B (en) | Malicious Word document detection method and device | |
CN103685308A (en) | Detection method and system of phishing web pages, client and server | |
CN103268449B (en) | A kind of high speed detection method and system of mobile phone malicious code | |
CN103067364A (en) | Virus detection method and equipment | |
CN109376133A (en) | File access method and file access system | |
WO2014145336A2 (en) | Systems and methods for tokenizing and parsing user-generated content to enable the prevention of attacks | |
CN104899499A (en) | Internet image search based Web verification code generation method | |
CN104426879A (en) | Verification code generation and verification processing method and corresponding method, device and system | |
CN104158828A (en) | Method and system for identifying doubtful phishing webpage on basis of cloud content rule base | |
CN110648118A (en) | Fish fork mail detection method and device, electronic equipment and readable storage medium | |
CN107844696B (en) | Verification code interference method and server | |
US20120030556A1 (en) | Method for enabling interactive content within messaging application | |
CN110175472A (en) | Information concealing method and robot system based on big data insertion and address of cache | |
CN109067716B (en) | Method and system for identifying dark chain | |
CN101989324A (en) | Information security system based on computer and mobile storage device | |
CN111898126A (en) | Android repackaging application detection method based on dynamically acquired user interface | |
CN106055693A (en) | Information processing method and terminal | |
US7712142B1 (en) | Document integrity | |
CN107645382A (en) | A kind of identity marking equipment and its method of work | |
CN110740112B (en) | Authentication method, apparatus and computer readable storage medium | |
CN110188552A (en) | Information concealing method and robot system based on big data and difference | |
CN110162991A (en) | Information concealing method and robot system based on big data insertion and heterogeneous types | |
CN110191111A (en) | The information concealing method and robot system verified based on big data and function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |