CN110517699B - Information steganography method, device, equipment and storage medium - Google Patents

Information steganography method, device, equipment and storage medium Download PDF

Info

Publication number
CN110517699B
CN110517699B CN201910788340.8A CN201910788340A CN110517699B CN 110517699 B CN110517699 B CN 110517699B CN 201910788340 A CN201910788340 A CN 201910788340A CN 110517699 B CN110517699 B CN 110517699B
Authority
CN
China
Prior art keywords
information
notes
music
preset
note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910788340.8A
Other languages
Chinese (zh)
Other versions
CN110517699A (en
Inventor
朱照华
王健宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910788340.8A priority Critical patent/CN110517699B/en
Priority to PCT/CN2019/118147 priority patent/WO2021035978A1/en
Publication of CN110517699A publication Critical patent/CN110517699A/en
Application granted granted Critical
Publication of CN110517699B publication Critical patent/CN110517699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention relates to the field of information security, and discloses an information steganography method, an information steganography device, information steganography equipment and a storage medium, wherein the information steganography method comprises the following steps: acquiring information to be embedded and the information length corresponding to the information to be embedded; carrying out binary conversion on the information length to obtain information to be added; adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments; reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information to obtain new preset notes; the invention is based on new preset notes to carry on note adjustment to the carrier music, obtain the target music, because the invention is to embed the secret information into the pitch information of the preset notes of the carrier music after grouping, and then has increased the secrecy while secret information is transmitted, compared with the existing information steganography technology, the invention makes decryptor unable to perceive what kind of note's pitch information carries the secret information, therefore also unable to carry on the information decryption, has guaranteed the security of information transmission.

Description

Information steganography method, device, equipment and storage medium
Technical Field
The present invention relates to the field of information security technologies, and in particular, to an information steganography method, an information steganography device, an information steganography apparatus, and a storage medium.
Background
Information security has been one of the major concerns in the internet field, and steganography is an important component of information security technology, and aims to embed secret information in an imperceptible manner into a carrier, where the steganography carrier can be theoretically any carrier, and at present, common steganography carriers include images, texts, audio, video and the like. The development of steganography is of great importance in many fields.
Most of the prior audio-related steganography techniques embed secret information into the lowest level of audio dynamics components, so that human ears cannot be effectively distinguished based on auditory masking effects. However, this method is not enough for computer equipment, the audio carrying the secret information is easy to detect and is anti-decrypted, and the security is to be improved.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide an information steganography method, an information steganography device, information steganography equipment and a storage medium, and aims to solve the technical problems that steganography cannot be performed on data safely and effectively and the data security is low in the prior art.
To achieve the above object, the present invention provides an information steganography method, including the steps of:
acquiring information to be embedded and the information length corresponding to the information to be embedded;
carrying out binary conversion on the information length to obtain information to be added;
adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments;
reading pitch information of preset notes in carrier music, and writing the information fragments into the pitch information to obtain new preset notes;
and performing note adjustment on the carrier music based on the new preset notes to obtain target music.
Preferably, before the step of performing the binary conversion on the information length to obtain the information to be added, the method further includes:
invoking a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
encrypting the information to be embedded through the encryption key to obtain encrypted information;
the step of adding the information to be added to the information to be embedded to obtain target information comprises the following steps:
and adding the information to be added to the encrypted information to obtain target information.
Preferably, before the step of calling a preset key generator based on the information length to generate an encryption key having a key length identical to the information length, the method further includes:
acquiring carrier music and counting the number of string beating skills corresponding to the carrier music;
reading a predefined embedding parameter, and detecting whether the information length meets a preset condition according to the predefined embedding parameter and the string beating skill number;
if yes, executing the step of calling a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
wherein, the preset conditions are as follows:
L M ≤min[x*(y-4)*c,2 x*y ]
wherein L is M The information length, x, y are predefined embedding parameters, c is the number of string techniques, and min is the minimum value.
Preferably, the step of performing a binary conversion on the information length to obtain information to be added includes:
and reading a predefined embedding parameter, and converting the information length into information to be added with a preset length according to the predefined embedding parameter.
Preferably, the step of reading pitch information of preset notes in the carrier music and writing the pieces of information into the pitch information to obtain new preset notes includes:
reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information through a preset formula to obtain new preset notes;
wherein, the preset formula is:
p=a f
wherein f is pitch information, and
Figure BDA0002177254300000031
p is a new preset note, a is a preset note, m' is an information piece, and c is the number of string skills.
Preferably, after the step of performing note adjustment on the carrier music based on the new preset notes to obtain target music, the method further includes:
acquiring the target music, and performing note screening on the target music to acquire a candidate note set corresponding to the target music;
extracting notes contained in the target music, and sequencing the extracted notes according to the performance sequence of the notes in the target music to obtain a note sequence set;
traversing the note sequence set, and acquiring pitch information of corresponding notes from the candidate note set according to the notes traversed currently;
converting the acquired pitch information into a binary sequence, and splicing the binary sequence to obtain an information fragment;
and combining the obtained information fragments according to a preset information recovery strategy, and recovering the combined information into the information to be embedded.
Preferably, the step of obtaining the target music and performing note screening on the target music to obtain a candidate note set corresponding to the target music includes:
acquiring note types of all notes in the target music, and screening target notes which do not belong to preset note types from the notes according to the note types;
obtaining pitch information corresponding to the target notes, and generating a note pitch set according to the obtained pitch information and the target notes;
selecting a candidate note from the note pitch set according to the number of string techniques, and generating a candidate note set according to the candidate note.
In addition, to achieve the above object, the present invention also proposes an information steganography apparatus, the apparatus including:
the information acquisition module is used for acquiring information to be embedded and the information length corresponding to the information to be embedded;
the information acquisition module is also used for carrying out the binary conversion on the information length to obtain information to be added;
the information grouping module is used for adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments;
the information writing module is used for reading the pitch information of the preset notes in the carrier music and writing the information fragments into the pitch information to obtain new preset notes;
and the audio generation module is used for carrying out note adjustment on the carrier music based on the new preset notes to obtain target music.
In addition, to achieve the above object, the present invention also proposes an information steganography apparatus, the apparatus including: a memory, a processor, and an information steganogram stored on the memory and executable on the processor, the information steganogram configured to implement the steps of the information steganogram method as described above.
In addition, to achieve the above object, the present invention also proposes a storage medium having stored thereon an information steganography program that, when executed by a processor, implements the steps of the information steganography method as described above.
The information length corresponding to the information to be embedded is obtained; carrying out binary conversion on the information length to obtain information to be added; adding information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments; reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information to obtain new preset notes; the invention is based on new preset notes to carry on note adjustment to the carrier music, obtain the target music, because the invention is to embed the secret information into the pitch information of the preset notes of the carrier music after grouping, and then has increased the secrecy while secret information is transmitted, compared with the existing information steganography technology, the invention makes decryptor unable to perceive what kind of note's pitch information carries the secret information, therefore also unable to carry on the information decryption, has guaranteed the security of information transmission.
Drawings
FIG. 1 is a schematic diagram of the structure of an information steganography device of a hardware running environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of the information steganography method of the present invention;
FIG. 3 is a flowchart of a second embodiment of the information steganography method of the present invention;
FIG. 4 is a flowchart of a third embodiment of the information steganography method of the present invention;
fig. 5 is a block diagram of a first embodiment of an information steganography device according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic diagram of an information steganography device structure of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the information steganography device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) Memory or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the structure shown in fig. 1 is not limiting and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a data storage module, a network communication module, a user interface module, and an information steganography program may be included in the memory 1005 as one type of storage medium.
In the information steganography device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the information steganography device of the present invention may be disposed in the information steganography device, and the information steganography device calls the information steganography program stored in the memory 1005 through the processor 1001 and executes the information steganography method provided by the embodiment of the present invention.
An embodiment of the present invention provides an information steganography method, referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the information steganography method of the present invention.
In this embodiment, the information steganography method includes the following steps:
step S10: acquiring information to be embedded and the information length corresponding to the information to be embedded;
it should be noted that, the execution body of the method may be a computing service device (such as a mobile phone, a tablet computer, a personal computer, etc.) with functions of data processing, network communication and program running, and hereinafter referred to as an encryption terminal. The information to be embedded is the initial secret information which needs to be hidden in the carrier music, and in order to ensure the security of the information, the encryption terminal of the embodiment encrypts the information to be embedded before writing the information to be embedded into the carrier music. The secret information to be embedded in the step can be recorded as an information set M= { M in binary format i =0or 1|i=1,2,…,L M }, wherein L M Representing the length of the secret information to be embedded, i.e. the information length.
In a specific implementation, when the encryption terminal obtains the information to be embedded, the encryption terminal can obtain the information length corresponding to the information to be embedded.
Step S20: carrying out binary conversion on the information length to obtain information to be added;
it should be understood that the binary conversion is to convert the length of the information according to the data format corresponding to the information to be embedded, for example, if the information to be embedded is in a binary format, the length of the information is correspondingly converted into the information in the binary format; if the information to be embedded is in hexadecimal format, the specific binary conversion method is not limited in this embodiment, and the information length is converted into hexadecimal format.
Considering that binary is a number system widely adopted in computing technology, the current computer system is basically a binary system, so in this embodiment, binary conversion is preferably performed on the information length to obtain binary information, then the converted binary information is added to the information to be embedded to obtain target information, and then the target information is grouped to obtain a plurality of groups of information pieces.
Specifically, the encryption terminal may first read the predefined embedding parameters x and y, and then convert the information length into binary information (i.e. information to be added) r= { R with a preset length (i.e. x×y length) according to the predefined embedding parameters x and y i =0or 1|i=1,2,…x*y}。
Step S30: adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments;
in a specific implementation, after acquiring the information R to be added, the encryption terminal can add the information R to the head position of the information to be embedded, thereby obtaining secret information (i.e. the target information) M '= { M' 1 ,m’ 2 ,…,m’ LM+x*y }={r 1 ,r 2 ,…,r x*y ,m* 1 ,…,m* LM Then the target information is grouped to obtain a plurality of groups of information fragments M '= { M' 1 ,M’ 2 ,…,M’ e },M’ i ={m’ k |x*(i-1)+1≤k≤x*i},e=(L M +x x y)/c. Wherein e is the number of grouped information fragments, c is the number of string skills corresponding to the carrier music, that is, how many string notes are in the carrier music, and the string notes are used for grouping the target information. Of course, the object described in this embodimentThe grouping method of the header information may be other grouping methods, and is not particularly limited.
Step S40: reading pitch information of preset notes in carrier music, and writing the information fragments into the pitch information to obtain new preset notes;
it should be understood that the musical instrument digital interface (Musical Instrument Digital Interface, MIDI) format is a file format for storing Note instruction information, all playing instructions of music are stored, among all MIDI instructions, the instruction most closely presented to the music is the two types of instructions of Note on (Note on) and Note off (Note off), which respectively determine the start and stop time of different notes in the music, and when the sequencer knows the relevant instructions, the music can be played completely.
It should be noted that, the information steganography method provided in this embodiment and the embodiments described below may be an information steganography method based on guitar strings. By strings are meant a kind of performance skills in guitar which gives a "crash" sound by the slapping of fingers with strings for creating a specific emotional atmosphere, in MIDI this sound effect is usually achieved by sounds of very short duration, i.e. in MIDI strings the slapping skills are also usually represented by sounds of a specific pitch, but the duration of the sound is so short that the sound is stopped before the specific pitch has not yet been perceived. The scheme combines the representation mode of guitar string beating skills in MIDI to realize the embedding of secret information in MIDI files. The carrier music in this embodiment is the MIDI file.
In addition, in this embodiment, the preset notes are notes other than guitar string notes among all the notes of the carrier music. Pitch refers to the sound of various heights, namely the height of the sound, which is determined by the vibration frequency, and the sound is "high" when the frequency is high, and "low" when the frequency is low. The pitch information in this embodiment may be information characterizing the pitch of notes.
In order to ensure the safety and the confidentiality of data transmission, the information fragment corresponding to the information to be embedded is embedded into the pitch information corresponding to different preset notes by the information steganography method of the embodiment. Specifically, the encryption terminal may rewrite original pitch information of the preset notes according to the acquired information fragment, so as to obtain new preset notes with new pitch information.
Specifically, the encryption terminal can read the pitch information of preset notes in the carrier music, and write the information fragments into the pitch information through a preset formula to obtain new preset notes;
wherein, the preset formula is:
p=a f
wherein f is pitch information, and
Figure BDA0002177254300000071
p is a new preset note, a is a preset note, m' is an information piece, and c is the number of string skills.
The embodiment respectively embeds the grouped information fragments into the pitch information of the preset notes until all the information fragments are embedded. In the embodiment, the embedding of the information segment may be performed according to the pitch sequence of the preset notes or the playing sequence of the preset notes, which is not limited by the scheme.
Step S50: and performing note adjustment on the carrier music based on the new preset notes to obtain target music.
In a specific implementation, after acquiring a new preset note carrying an information fragment, the encryption terminal can perform note adjustment on the carrier music based on the new preset note to obtain target music. The note adjustment is to replace the original preset notes in the carrier music with the new preset notes.
The embodiment obtains information to be embedded and information length corresponding to the information to be embedded; carrying out binary conversion on the information length to obtain information to be added; adding information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments; reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information to obtain new preset notes; the invention makes decryptor unable to perceive what kind of note pitch information carries secret information, so information decryption is unable to be carried out, and safety of information transmission is ensured.
Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the information steganography method of the present invention.
Based on the first embodiment, before the step S20, the method further includes:
step S101: invoking a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
it should be noted that, in this embodiment, the preset key generator may be a plug-in capable of generating information for encryption, decryption, integrity verification, and the like.
In a specific implementation, the encryption terminal may call a preset key generator to generate an encryption key S having a key length identical to the information length based on the information length corresponding to the information to be embedded.
Step S102: encrypting the information to be embedded through the encryption key to obtain encrypted information;
specifically, the information to be embedded may be encrypted by the following encryption operation, so as to obtain secret information M after encryption (i.e., the encrypted information);
Figure BDA0002177254300000081
in actual encryption, the encryption terminal may pass through the encryption key s= { S i |i=1,2,…,L M Information to be embedded m= { M i =0or 1|i=1,2,…,L M Each information m in } i Encrypting to obtain corresponding encrypted information m i * Then based on all the encrypted information m i * Generating encrypted messagesRest M.
Accordingly, step S30 in the above embodiment may specifically include:
step S301: and adding the information to be added to the encryption information to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments.
In a specific implementation, the encryption terminal may add the information R to be added to the encryption information M to obtain the target information M '= { M' 1 ,m’ 2 ,…,m’ LM+x*y }={r 1 ,r 2 ,…,r x*y ,m* 1 ,…,m* LM -then grouping said target information to obtain sets of pieces of information.
Further, before step S101 in the information steganography method of this embodiment, the method further includes:
step S01: acquiring carrier music and counting the number of string beating skills corresponding to the carrier music;
the number of string skills is the number of string skills notes that occur in the carrier music.
In a specific implementation, the encryption terminal may count the number of string skill notes that occur in the carrier music after the carrier music is acquired.
Step S02: reading a predefined embedding parameter, and detecting whether the information length meets a preset condition according to the predefined embedding parameter and the string beating skill number; wherein, the preset conditions are as follows:
L M ≤min[x*(y-4)*c,2 x*y ]
wherein L is M The information length, x, y are predefined embedding parameters, c is the number of string techniques, and min is the minimum value.
It should be understood that, in order to be able to completely embed the secret information, in this embodiment, the information length corresponding to the information to be embedded needs to satisfy the above-mentioned preset condition, if the preset condition is not satisfied, it indicates that the hiding capacity of the currently selected carrier music information is insufficient, and the carrier music needs to be replaced.
Step S03: if yes, executing the step of calling a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
in a specific implementation, when the encryption terminal detects that the information length meets the preset condition, it indicates that the currently selected carrier music can be used to hide the information to be embedded, and at this time, the encryption terminal can execute the operation corresponding to the step S101.
According to the embodiment, the carrier music is obtained, and the number of string beating skills corresponding to the carrier music is counted; reading a predefined embedding parameter, and detecting whether the information length meets a preset condition according to the predefined embedding parameter and the number of string beating skills; if so, the step of calling a preset key generator based on the information length to generate an encryption key with the same key length as the information length is executed, and the verification of the information length is carried out through the string beating skill number corresponding to the carrier music and the predefined embedding parameters, so that the secret information to be embedded can be ensured to be successfully embedded into the carrier music, and the success rate and the efficiency of information steganography are improved.
Referring to fig. 4, fig. 4 is a flowchart illustrating a third embodiment of the information steganography method of the present invention.
Based on the above embodiments, in this embodiment, after the step S50, the method further includes:
step S60: acquiring target music, and performing note screening on the target music to obtain a candidate note set corresponding to the target music;
it should be noted that, the application scenario of the information steganography method of this embodiment is mainly that the receiver (i.e. the decryption terminal) of the target music decrypts the target music to extract the secret information embedded in the target music. The encryption terminal in the above embodiment is of course also provided with the function of a decryption terminal.
Specifically, the obtaining manner of the candidate note set in this embodiment may be: firstly, acquiring note types of all notes in the target music, and screening target notes which do not belong to preset note types from the notes according to the note types; then obtaining pitch information corresponding to the target notes, and generating a note pitch set according to the obtained pitch information and the target notes; and selecting candidate notes from the note pitch set according to the string skill number, and generating a candidate note set according to the candidate notes.
The note types are note types of all notes in the carrier music, and the preset note types are guitar string notes. The manner of note filtering in this embodiment may be: counting note types of all notes in the carrier music, screening target notes which do not belong to preset note types from all notes according to the note types (namely screening target notes which do not belong to guitar string notes), and generating a note pitch set A= { a according to pitch information of the target notes 1 ,a 2 ,…,a n N represents the number of note types appearing in the carrier music, a 1 ,a n Representing the highest note and the lowest note appearing in the carrier music, respectively, and selecting a candidate note a' = { a from the note pitch set according to the number of string skills 1 ,a 2 ,…,a c As a candidate note set for hidden information.
Step S70: extracting notes contained in the target music, and sequencing the extracted notes according to the performance sequence of the notes in the target music to obtain a note sequence set;
in a specific implementation, after extracting all notes included in the target music, the decryption terminal may sort the extracted notes according to the performance sequence of each note in the target music to obtain a note sequence set o= { O 1 ,o 2 ,…,o u U is the number of notes contained in the target music.
Step S80: traversing the note sequence set, and acquiring pitch information of corresponding notes from the candidate note set according to the notes traversed currently;
in a specific implementation, the decryption terminal may set o= { O in order of notes 1 ,o 2 ,…,o u The order of notes in the sequence of notes traverses each note in the sequence of notes, each traversing to a noteSelect note set a' = { a 1 ,a 2 ,…,a c And matching the corresponding candidate notes in the sequence, acquiring pitch information of the matched candidate notes if the matching is successful, and converting the pitch information into a binary sequence (information).
Step S90: converting the acquired pitch information into a binary sequence, and splicing the binary sequence to obtain an information fragment;
in a specific implementation, after obtaining pitch information corresponding to each candidate note in the candidate note set, the decryption terminal may convert the obtained pitch information into binary sequences, and then splice all the obtained binary sequences according to the matching sequence of the candidate notes to obtain the information segment M '= { M' 1 ,M’ 2 ,…,M’ e }。
Step S100: and combining the obtained information fragments according to a preset information recovery strategy, and recovering the combined information into the information to be embedded.
In a specific implementation, after obtaining an information fragment, the decryption terminal extracts the first x y bits to calculate the information length, combines the information fragment M' into M according to the information length, and finally decrypts the information fragment by using the generated key sequence S to finally obtain the information to be embedded.
According to the embodiment, the decryption terminal performs note screening on target music by acquiring the target music to obtain a candidate note set corresponding to the target music; extracting notes contained in the target music, and sorting the extracted notes according to the playing sequence of the notes in the target music to obtain a note sequence set; traversing the note sequence set, and acquiring pitch information of corresponding notes from the candidate note set according to the notes traversed currently; converting the acquired pitch information into a binary sequence, and splicing the binary sequence to obtain an information fragment; the obtained information fragments are combined according to a preset information recovery strategy, and the combined information is recovered to be the information to be embedded, so that smooth acquisition of secret information hidden in target music can be realized, and the safety of information transmission is improved.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium is stored with an information steganography program, and the information steganography program realizes the steps of the information steganography method when being executed by a processor.
Referring to fig. 5, fig. 5 is a block diagram showing the structure of a first embodiment of the information steganography device of the present invention.
As shown in fig. 5, an information steganography apparatus provided in an embodiment of the present invention includes:
the information acquisition module 501 is configured to acquire information to be embedded, and an information length corresponding to the information to be embedded;
the information obtaining module 501 is further configured to perform a binary conversion on the information length to obtain information to be added;
the information grouping module 502 is configured to add the information to be added to the information to be embedded to obtain target information, and group the target information to obtain a plurality of groups of information fragments;
an information writing module 503, configured to read pitch information of preset notes in the carrier music, and write the information piece into the pitch information to obtain new preset notes;
the audio generation module 504 is configured to perform note adjustment on the carrier music based on the new preset notes, so as to obtain target music.
The embodiment obtains information to be embedded and information length corresponding to the information to be embedded; carrying out binary conversion on the information length to obtain information to be added; adding information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments; reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information to obtain new preset notes; the invention makes decryptor unable to perceive what kind of note pitch information carries secrets, so information decryption is unable to be carried out, and safety of information transmission is ensured.
Based on the above-described first embodiment of the information steganography device of the present invention, a second embodiment of the information steganography device of the present invention is presented.
In this embodiment, the information obtaining module 501 is further configured to invoke a preset key generator based on the information length to generate an encryption key with a key length identical to the information length; encrypting the information to be embedded through the encryption key to obtain encrypted information; and adding the information to be added to the encrypted information to obtain target information.
Further, the information obtaining module 501 is further configured to obtain carrier music, and count the number of string techniques corresponding to the carrier music; reading a predefined embedding parameter, and detecting whether the information length meets a preset condition according to the predefined embedding parameter and the string beating skill number; if yes, executing the step of calling a preset key generator based on the information length to generate an encryption key with the same key length as the information length; wherein, the preset conditions are as follows:
L M ≤min[x*(y-4)*c,2 x*y ]
wherein L is M The information length, x, y are predefined embedding parameters, c is the number of string techniques, and min is the minimum value.
Further, the information obtaining module 501 is further configured to read a predefined embedding parameter, and convert the information length into information to be added with a preset length according to the predefined embedding parameter.
Further, the information writing module 503 is further configured to read pitch information of preset notes in the carrier music, and write the information piece into the pitch information through a preset formula to obtain new preset notes; wherein, the preset formula is:
p=a f
wherein f is pitch information, and
Figure BDA0002177254300000131
p is a new preset note and a is a preset noteLet note, m' be the information segment, c be the number of string techniques.
Further, the information steganography device in this embodiment further includes: an information decryption module; the information decryption module is used for obtaining the target music, and performing note screening on the target music to obtain a candidate note set corresponding to the target music; extracting notes contained in the target music, and sequencing the extracted notes according to the performance sequence of the notes in the target music to obtain a note sequence set; traversing the note sequence set, and acquiring pitch information of corresponding notes from the candidate note set according to the notes traversed currently; converting the acquired pitch information into a binary sequence, and splicing the binary sequence to obtain an information fragment; and combining the obtained information fragments according to a preset information recovery strategy, and recovering the combined information into the information to be embedded.
Further, the information decryption module is further configured to obtain note types of all notes in the target music, and screen, according to the note types, target notes that do not belong to a preset note type from the notes; obtaining pitch information corresponding to the target notes, and generating a note pitch set according to the obtained pitch information and the target notes; selecting a candidate note from the note pitch set according to the number of string techniques, and generating a candidate note set according to the candidate note.
Other embodiments or specific implementation manners of the information steganography device of the present invention may refer to the above method embodiments, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. read-only memory/random-access memory, magnetic disk, optical disk), comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (9)

1. A method of information steganography, the method comprising:
acquiring information to be embedded and the information length corresponding to the information to be embedded;
carrying out binary conversion on the information length to obtain information to be added;
adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments;
reading pitch information of preset notes in carrier music, and writing the information fragments into the pitch information to obtain new preset notes;
performing note adjustment on the carrier music based on the new preset notes to obtain target music;
before the step of performing the binary conversion on the information length to obtain the information to be added, the method further includes:
invoking a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
encrypting the information to be embedded through the encryption key to obtain encrypted information;
the step of adding the information to be added to the information to be embedded to obtain target information comprises the following steps:
and adding the information to be added to the encrypted information to obtain target information.
2. The method of claim 1, wherein before the step of calling a preset key generator based on the information length to generate an encryption key having a key length identical to the information length, the method further comprises:
acquiring carrier music and counting the number of string beating skills corresponding to the carrier music;
reading a predefined embedding parameter, and detecting whether the information length meets a preset condition according to the predefined embedding parameter and the string beating skill number;
if yes, executing the step of calling a preset key generator based on the information length to generate an encryption key with the same key length as the information length;
wherein, the preset conditions are as follows:
Figure QLYQS_1
wherein L is M The information length, x, y are predefined embedding parameters, c is the number of string techniques, and min is the minimum value.
3. The method of claim 1, wherein the step of performing a binary conversion on the information length to obtain information to be added comprises:
and reading a predefined embedding parameter, and converting the information length into information to be added with a preset length according to the predefined embedding parameter.
4. A method as claimed in claim 2 or 3, wherein the step of reading pitch information of preset notes in the carrier music, writing the pieces of information to the pitch information to obtain new preset notes, comprises:
reading pitch information of preset notes in the carrier music, and writing the information fragments into the pitch information through a preset formula to obtain new preset notes;
wherein, the preset formula is:
p=a f
wherein f is pitch information, and
Figure QLYQS_2
p is a new preset note, a is a preset note, m' is an information piece, and c is the number of string skills.
5. The method of claim 4, wherein after the step of obtaining the target music by note-adjusting the carrier music based on the new preset notes, the method further comprises:
acquiring the target music, and performing note screening on the target music to acquire a candidate note set corresponding to the target music;
extracting notes contained in the target music, and sequencing the extracted notes according to the performance sequence of the notes in the target music to obtain a note sequence set;
traversing the note sequence set, and acquiring pitch information of corresponding notes from the candidate note set according to the notes traversed currently;
converting the acquired pitch information into a binary sequence, and splicing the binary sequence to obtain an information fragment;
and combining the obtained information fragments according to a preset information recovery strategy, and recovering the combined information into the information to be embedded.
6. The method of claim 5, wherein the step of obtaining the target music, and performing note screening on the target music to obtain a candidate note set corresponding to the target music, comprises:
acquiring note types of all notes in the target music, and screening target notes which do not belong to preset note types from the notes according to the note types;
obtaining pitch information corresponding to the target notes, and generating a note pitch set according to the obtained pitch information and the target notes;
selecting a candidate note from the note pitch set according to the number of string techniques, and generating a candidate note set according to the candidate note.
7. An information steganography device, the device comprising:
the information acquisition module is used for acquiring information to be embedded and the information length corresponding to the information to be embedded;
the information acquisition module is also used for carrying out the binary conversion on the information length to obtain information to be added;
the information grouping module is used for adding the information to be added into the information to be embedded to obtain target information, and grouping the target information to obtain a plurality of groups of information fragments;
the information writing module is used for reading the pitch information of the preset notes in the carrier music and writing the information fragments into the pitch information to obtain new preset notes;
the audio generation module is used for carrying out note adjustment on the carrier music based on the new preset notes to obtain target music;
the information acquisition module is further used for calling a preset key generator based on the information length to generate an encryption key with the key length identical to the information length, and encrypting the information to be embedded through the encryption key to obtain encrypted information;
the information grouping module is further used for adding the information to be added to the encrypted information to obtain target information.
8. An information steganography device, the device comprising: a memory, a processor and an information steganography program stored on the memory and executable on the processor, the information steganography program configured to implement the steps of the information steganography method of any one of claims 1 to 6.
9. A storage medium having stored thereon an information steganography program which, when executed by a processor, implements the steps of the information steganography method of any one of claims 1 to 6.
CN201910788340.8A 2019-08-23 2019-08-23 Information steganography method, device, equipment and storage medium Active CN110517699B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910788340.8A CN110517699B (en) 2019-08-23 2019-08-23 Information steganography method, device, equipment and storage medium
PCT/CN2019/118147 WO2021035978A1 (en) 2019-08-23 2019-11-13 Information steganography method, apparatus and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910788340.8A CN110517699B (en) 2019-08-23 2019-08-23 Information steganography method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110517699A CN110517699A (en) 2019-11-29
CN110517699B true CN110517699B (en) 2023-05-26

Family

ID=68627777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910788340.8A Active CN110517699B (en) 2019-08-23 2019-08-23 Information steganography method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110517699B (en)
WO (1) WO2021035978A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782868A (en) * 2020-07-06 2020-10-16 腾讯音乐娱乐科技(深圳)有限公司 Audio processing method, device, equipment and medium
CN117792665A (en) * 2022-09-29 2024-03-29 广州开得联软件技术有限公司 Data transmission method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0605047A1 (en) * 1992-12-29 1994-07-06 Koninklijke KPN N.V. Method for blockwise encryption/decryption using linear algebraic codes
EP1249002A1 (en) * 2000-01-13 2002-10-16 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
CN107562562A (en) * 2017-09-08 2018-01-09 郑州云海信息技术有限公司 A kind of method to set up and system of the extraneous information for describing event of failure
CN108989287A (en) * 2018-06-13 2018-12-11 平安科技(深圳)有限公司 encryption method, device, terminal device and storage medium
CN109346045A (en) * 2018-10-26 2019-02-15 平安科技(深圳)有限公司 Counterpoint generation method and device based on long neural network in short-term
CN109635524A (en) * 2018-11-26 2019-04-16 平安科技(深圳)有限公司 Audio watermarking embedding grammar and terminal device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1229228A (en) * 1998-03-16 1999-09-22 日本胜利株式会社 Processing device and method for embedded digital watermark information and processing device and method for reading
CN103548079B (en) * 2011-08-03 2015-09-30 Nds有限公司 Audio frequency watermark
CN109784006A (en) * 2019-01-04 2019-05-21 平安科技(深圳)有限公司 Watermark insertion and extracting method and terminal device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0605047A1 (en) * 1992-12-29 1994-07-06 Koninklijke KPN N.V. Method for blockwise encryption/decryption using linear algebraic codes
EP1249002A1 (en) * 2000-01-13 2002-10-16 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
CN107562562A (en) * 2017-09-08 2018-01-09 郑州云海信息技术有限公司 A kind of method to set up and system of the extraneous information for describing event of failure
CN108989287A (en) * 2018-06-13 2018-12-11 平安科技(深圳)有限公司 encryption method, device, terminal device and storage medium
CN109346045A (en) * 2018-10-26 2019-02-15 平安科技(深圳)有限公司 Counterpoint generation method and device based on long neural network in short-term
CN109635524A (en) * 2018-11-26 2019-04-16 平安科技(深圳)有限公司 Audio watermarking embedding grammar and terminal device

Also Published As

Publication number Publication date
WO2021035978A1 (en) 2021-03-04
CN110517699A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
US7935878B2 (en) System, method and computer program for ensuring secure use of music playing data files
US8020004B2 (en) Forensic marking using a common customization function
JP5346024B2 (en) Content encryption
CN110517699B (en) Information steganography method, device, equipment and storage medium
CN115051798B (en) Random number generation method and device, electronic equipment and storage medium
CN100416445C (en) System for binding secrets to a computer system having tolerance for hardware changes
CN105825143A (en) Application program data writing and reading method and device
JPWO2003013054A1 (en) Apparatus and method for generating data for detecting tampering of encrypted data with processing
US9607133B1 (en) Method and apparatus for watermarking binary computer code
CN115985329A (en) Method and system for adding and extracting audio hidden watermark
CN110619883B (en) Information embedding method, information extracting method, information embedding device, information extracting device, terminal and storage medium
JP4326494B2 (en) Content distribution apparatus and content distribution method
CN107391970A (en) Function access control method and device in Flash application programs
Chen et al. Tackling android stego apps in the wild
Badgaiyan et al. A New Steganographic Technique: Image Hiding in Mobile Application
JP2001184057A (en) Electronic watermark burying method, music data reproducing method, music data distributing method and recording medium
CN101354883B (en) Method for protecting Midi audio data
Bhowal et al. Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions.
Vaske et al. Velody—A novel method for music steganography
Ghani et al. Watermarking Techniques for Mobile Application: A Review
US20240203431A1 (en) Robust authentication of digital audio
WO2023053480A1 (en) Information processing device, information processing method, and program
Prayogi et al. Audio-based Data Hiding using All-in Modulo of Difference
CN106600520A (en) Hiding method and reappearing method for encrypted image and corresponding device
Yu et al. Smart Media: empower media with active data hiding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant