CN111199746B - Information hiding method and hidden information extracting method - Google Patents

Information hiding method and hidden information extracting method Download PDF

Info

Publication number
CN111199746B
CN111199746B CN202010017573.0A CN202010017573A CN111199746B CN 111199746 B CN111199746 B CN 111199746B CN 202010017573 A CN202010017573 A CN 202010017573A CN 111199746 B CN111199746 B CN 111199746B
Authority
CN
China
Prior art keywords
information
hidden
piece
segments
check code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010017573.0A
Other languages
Chinese (zh)
Other versions
CN111199746A (en
Inventor
郭俊龙
赖勇铨
李美玲
尚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN202010017573.0A priority Critical patent/CN111199746B/en
Publication of CN111199746A publication Critical patent/CN111199746A/en
Application granted granted Critical
Publication of CN111199746B publication Critical patent/CN111199746B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The application provides an information hiding method and a hidden information extracting method, which are applied to the technical field of information processing, wherein the method comprises the following steps: the method comprises the steps of segmenting coded information to be hidden, then determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided. Meanwhile, the hidden information extraction method is provided, and the hidden information can be extracted from the target audio carrier embedded with the information to be hidden.

Description

Information hiding method and hidden information extracting method
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an information hiding method and a hidden information extracting method.
Background
With the development of computer networks and multimedia technologies, information hiding is becoming one of the hot spots for information security concerns. Information hiding is to hide specific secret information in an open carrier or a transmission path, and a third party has difficulty in obtaining the secret information from the open carrier.
At present, embedding hidden information in audio signals is mainly classified into two algorithms of time domain and transform domain. The time domain algorithm comprises a bit replacement method, an echo hiding method and the like; the transform domain algorithm mainly comprises the steps of performing some kind of transform (Fourier transform, wavelet transform, etc.) on an original audio signal, and then embedding hidden information in a transform domain. However, both of these algorithms change the global structure of the audio signal.
Disclosure of Invention
The application provides an information hiding method and a hidden information extracting method, which are used for hiding information and extracting hidden information while not changing the global structure of an audio carrier, and adopt the following technical scheme:
in a first aspect, there is provided an information hiding method, the method comprising,
coding the information to be hidden to obtain coded information to be hidden;
carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
adding an extraction check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
and determining N embedding points in the target audio carrier, and respectively embedding N pieces of information segments to be hidden, which are added with the extracted check codes, into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Optionally, the performing fragment processing on the coded information to be hidden to obtain N pieces of information to be hidden includes:
judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and if the coded information to be hidden cannot be just segmented, filling the coded information to be hidden so as to obtain N equal-length information segments to be hidden.
Optionally, the determining N embedding points in the target audio carrier includes:
and respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the adding and extracting a check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extracted check code added thereto includes:
adding a data head to each information segment to be hidden to obtain N information segments to be hidden with the data heads added;
respectively determining check codes corresponding to the information segments to be hidden of the added data heads of each piece based on the information segments to be hidden of the added data heads of each piece;
and determining N pieces of information fragments to be hidden with the extracted check codes on the basis of the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
In a second aspect, a hidden information extraction method is provided, and includes:
reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
determining N pieces of information segments to be hidden added with the extracted check codes from the M segments of information based on the extracted check codes;
carrying out check code extraction removal processing on the N pieces of information segments to be hidden, which are added with the extracted check codes, so as to obtain N pieces of information segments to be hidden;
splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and decoding the coded information to be hidden to obtain the information to be hidden.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the determining, based on the extracted check code, N pieces of information segments to be hidden, to which the extracted check code is added, from the M pieces of information segments includes:
generating a check code to be verified based on a first preset segment of any one of the information segments;
and if the check code to be verified is the same as the second preset segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden with the extracted check code added.
Optionally, the splicing the N pieces of information to be hidden to obtain the encoded information to be hidden includes:
determining the sequence of each piece of information to be hidden based on the head data corresponding to each piece of information to be hidden;
and splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
Optionally, the method further comprises:
and judging whether the sequence of the information segments to be hidden is continuous or not based on the head data corresponding to the information to be hidden of each segment, and if not, prompting that the hidden information extraction fails.
In a third aspect, there is provided an information hiding apparatus, comprising,
the encoding module is used for encoding the information to be hidden to obtain the encoded information to be hidden;
the fragmentation module is used for carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
the adding module is used for adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the first determining module is used for determining N embedding points in a target audio carrier, and embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier respectively based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Optionally, the slicing module includes:
the judging unit is used for judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and the filling unit is used for filling the coded information to be hidden if the coded information to be hidden cannot be just segmented, so that N equal-length information segments to be hidden can be obtained.
Optionally, the first determining module includes:
and the first determining unit is used for respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the adding module includes:
the adding unit is used for adding data heads to the information segments to be hidden to obtain N pieces of information segments to be hidden with the data heads added;
the second determining unit is used for determining the check codes corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and the third determining unit is used for determining N pieces of information fragments to be hidden, which are added with and extract the check codes, based on the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
In a fourth aspect, there is provided a hidden information extraction apparatus, including:
the reading module is used for reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M sections of information fragments, wherein M is a positive integer;
the second determining module is used for determining N pieces of information fragments to be hidden, added with the extracted check codes, from the M pieces of information fragments based on the extracted check codes;
the processing module is used for carrying out check code extraction removal processing on the N pieces of information segments to be hidden, which are added with the extracted check codes, so as to obtain N pieces of information segments to be hidden;
the splicing module is used for splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and the decoding module is used for decoding the coded information to be hidden to obtain the information to be hidden.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the second determining module includes:
the generating unit is used for generating a check code to be verified based on a first preset segment of any one of the information segments;
and the fourth determining unit is used for determining any one of the information segments as the information segment to be hidden with the extracted check code if the check code to be verified is the same as the second preset segment of the any one of the information segments.
Optionally, the splicing module comprises:
a fifth determining unit, configured to determine, based on header data corresponding to each piece of information to be hidden, an order of each piece of information to be hidden;
and the splicing unit is used for splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
Optionally, the apparatus further comprises:
and the judging module is used for judging whether the sequence of the information segments to be hidden is continuous or not based on the head data corresponding to the information to be hidden of each segment, and if the sequence is discontinuous, prompting that the hidden information extraction fails.
In a fifth aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the information hiding method shown in the first aspect or the hidden information extracting method shown in the second aspect is performed.
In a fourth aspect, a computer-readable storage medium is provided, which is used for storing computer instructions, which when run on a computer, make the computer perform the information hiding method shown in the first aspect or the hidden information extracting method shown in the second aspect.
The application provides an information hiding method and a hidden information extracting method, compared with the hiding of information realized by a time domain or transform domain algorithm in the prior art, the information hiding method and the hidden information extracting method are characterized in that the information hiding method and the hidden information extracting method are realized by encoding the information to be hidden through the information to be hidden to obtain the encoded information to be hidden, the encoded information to be hidden is subjected to fragmentation processing to obtain N information fragments to be hidden, N is a positive integer, each information fragment to be hidden is added with an extraction check code to obtain N information fragments to be hidden added with the extraction check code, N embedding points are determined in a target audio carrier, and the N information fragments to be hidden added with the extraction check code are respectively embedded into the target audio carrier to obtain the target audio carrier embedded with the information to be hidden. The method comprises the steps of dividing coded information to be hidden into pieces, determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided. Meanwhile, the hidden information extraction method is provided, and the hidden information can be extracted from the target audio carrier embedded with the information to be hidden.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an information hiding method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a hidden information extraction method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information hiding apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a hidden information extraction apparatus according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
An embodiment of the present application provides an information hiding method, as shown in fig. 1, the method may include the following steps:
step S101, coding information to be hidden to obtain coded information to be hidden;
specifically, the information to be hidden is encoded to obtain binary data, where encoding the hidden information may use a common encoding method (such as ASCII) or a custom encoding method, which is not limited herein.
Illustratively, the encoded information to be hidden is C, and the length is M bytes, wherein the following examples are described based on this example.
The information to be hidden may be label information of the target audio carrier, where the label information may be determined manually (i.e. manually labeling) or may be obtained by a method based on machine learning, such as unsupervised or semi-supervised machine learning.
Step S102, carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
specifically, the coded information to be hidden may be subjected to a fragmentation processing to obtain N pieces of information to be hidden, where N is a positive integer. Determining how to perform segmentation based on the size or length of the coded information to be hidden; determining how to segment the information to be hidden according to the size or length of the target audio carrier; how to perform segmentation can also be determined comprehensively based on the size or the length of the encoded information to be hidden and the target audio carrier, for example, the number of slices to be segmented of the encoded information to be hidden can be determined comprehensively according to the duration of the target audio and the length of the encoded information to be hidden.
The coded information to be hidden may also be segmented according to a predetermined length of each piece of segmented information, and for example, the coded data C is segmented and divided into pieces
Figure BDA0002359483420000091
Share data (round up, L is the length of data after segmentation).
Step S103, adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
specifically, an extraction check code may be added to each to-be-hidden information segment to obtain N to-be-hidden information segments to which the extraction check code is added. Wherein the extraction check code is used for extracting the hidden information from the target audio carrier embedded with the information to be hidden.
The extracted check code may include a check code and/or a data header, the check code is used to identify each piece of information to be hidden as hidden information, and the data header is used to identify the sequence of each piece of information to be hidden.
Illustratively, one implementation of the header is that if the encoded data C is sliced into 5 shares, the header for each slice of sliced encoded data may be 1/5, 2/5, 3/5, 4/5, 5/5, respectively. The header may identify an order of the encoded data for each slice, so that when the hidden information query is performed, the order of the encoded data for each slice is determined based on the header, thereby restoring the data.
And step S104, determining N embedding points in the target audio carrier, and respectively embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Specifically, N embedding points may be determined in the target audio carrier, and the N pieces of information to be hidden with the check code added and extracted are respectively embedded into the target audio carrier based on the determined N embedding points, so as to obtain the target audio carrier with the information to be hidden embedded.
The embedding point may be determined equally, and if the target audio length is L2, the positions of the N embedding points are determined according to the number N of the embedding points.
And respectively determining the embedding point of each piece of information segment to be hidden, added with and extracted from the check code, in the target audio carrier based on a perception distortion minimum strategy.
The embedding point can be determined according to a perception distortion minimum strategy, and the perception distortion strategy is used for minimizing the influence on the original target audio frequency after the information segment to be hidden added with the extracted check code is embedded into the target audio frequency carrier, so that the influence on the target audio frequency structure is reduced while the information hiding is realized.
Illustratively, an application scenario of the information hiding method of the present application is as follows:
with the development of deep learning neural networks, intelligent voice technologies such as voice recognition and voiceprint recognition are rapidly developed. To train a deep learning neural network model, a large number of audio files with labeled information are required. At present, label information used by deep learning training is mainly stored separately in a text format or indicated by a file directory. However, when the tag information contains sensitive information such as an identity card, a login password, and the like, for example, a voice recognition and voiceprint recognition model is applied to a bank APP login scene, an information hiding technology is required, and information to be hidden (tag information) can be directly embedded into a target audio carrier by the information hiding method of the present application. The corresponding neural network model to be trained can directly extract the label information from the target audio carrier embedded with the hidden information without acquiring the label information corresponding to the target audio carrier through other data query ways, so that the complexity of training operation can be reduced, and the training efficiency can be improved.
The embodiment of the application provides an information hiding method, compared with the hiding of information realized by a time domain or transform domain algorithm in the prior art, the information to be hidden is coded, the coded information to be hidden is obtained, the coded information to be hidden is subjected to fragmentation processing, N information fragments to be hidden are obtained, N is a positive integer, check codes are added and extracted to each information fragment to be hidden, N information fragments to be hidden are obtained, N embedding points are determined at a target audio carrier, and the N information fragments to be hidden, to be added and extracted with the check codes, are respectively embedded into the target audio carrier to obtain the target audio carrier embedded with the information to be hidden. The method comprises the steps of dividing coded information to be hidden, determining embedding points of each piece of information to be hidden in a target audio carrier, and embedding each piece of information to be hidden into the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided.
The embodiment of the present application provides a possible implementation manner, and specifically, step S102 includes:
step S1021 (not shown in the figure), determining whether the encoded information to be hidden is just segmented, so as to obtain N equal-length information segments to be hidden;
step S1022 (not shown in the figure), if the encoded information to be hidden cannot be just segmented, the encoded information to be hidden is filled, so that N equal-length information segments to be hidden can be obtained.
Specifically, if the last copy of data is less than L bytes long (i.e., cannot be sliced exactly), padding (padding) completion is performed, and the added padding information can be used for information verification (when padding does not need to be added, this partial verification does not work).
For the embodiment of the application, if the coded information to be hidden cannot be exactly segmented, completion processing is performed, wherein the completion information can also be used for verification of subsequent extraction of the hidden information, and the problem of extraction of the hidden information can be solved.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: the device comprises a check code and/or a data head, wherein the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Specifically, the adding and extracting check codes to each to-be-hidden information segment in step S103 to obtain N to-be-hidden information segments to which the extracting check codes are added includes:
step S1031 (not shown in the figure), adding a data header to each piece of information segment to be hidden, to obtain N pieces of information segments to be hidden with data headers added;
step S1032 (not shown in the figure), determining, based on the to-be-hidden information segment of each additional data header, a check code corresponding to the to-be-hidden information segment of each additional data header;
step S1033 (not shown in the figure), based on the check code corresponding to each piece of information to be hidden added with the data header and the information to be hidden added with the data header, determining N pieces of information to be hidden added with the extracted check code.
Illustratively, each piece of information to be hidden uses c i A header H representing (i ═ 1,2,. N), to which kbytes are added i Get e of (L + k) byte i ;e i The check code generating module generates n bytes of check code p i The method is used for accurate positioning during information extraction. Finally with e i Splicing to obtain (L + k + n) byte q i (i.e. N pieces of information to be hidden with check code extracted added).
The check code may use a common parity check, hamming check, CRC check, etc., and is not limited herein.
Wherein, an example of determining the embedding point based on the minimum perceptual distortion strategy is as follows:
q i taking an integer from every 1 byte to obtain (L + k + n) integer series, i.e. converting the original byte stream into integer series in such a way that 1 byte corresponds to an integer, and calculating the average value m i And variance v i (ii) a Searching the whole audio data to obtain N disjoint (L + k + N) or 2 x (L + k + N) sampling points, wherein the search criterion is to make the average value of the area
Figure BDA0002359483420000121
Sum variance
Figure BDA0002359483420000122
And m of the inserted data i And v i Normalized difference weighted sum minimum
Figure BDA0002359483420000123
Where alpha is a weighting coefficient, N q i And respectively inserting the central points of the found N areas to obtain the audio data embedded with the label information.
For the embodiment of the application, the problem of adding the extracted verification information is solved.
Example two
An embodiment of the present application provides a hidden information extraction method, as shown in fig. 2, the method may include the following steps:
step S201, reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
step S202, determining N pieces of information fragments to be hidden, which are added with the extracted check codes, from M pieces of information fragments based on the extracted check codes; wherein, the extracting the check code comprises: a check code and/or a data header; the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Step S203, carrying out check code extraction removal processing on the N pieces of information to be hidden with the check codes added to obtain N pieces of information to be hidden;
step S204, splicing the N pieces of information to be hidden to obtain coded information to be hidden;
step S205, decoding the encoded information to be hidden to obtain the information to be hidden.
Specifically, a target audio carrier embedded with information to be hidden is read through a sliding window method to obtain M information segments, then N segments containing hidden information are determined from the M information segments based on the extracted check codes, and operations such as check code removal, splicing processing and decoding processing are carried out to obtain the hidden information.
The process of obtaining the M-side information segment by the sliding window method and determining the N segments containing the hidden information may be reading one information segment, that is, determining whether the information segment contains the hidden information, or may be reading the information segment to obtain the M information segment, and then determining whether the information segment contains the hidden information.
For the embodiment of the application, the hidden information is extracted based on the extracted check code, so that the problem of extracting the hidden information is solved.
The embodiment of the present application provides a possible implementation manner, specifically, step S202 includes:
step 2021 (not shown in the figure), generating a check code to be verified based on a first predetermined segment of any one of the information segments;
step 2022 (not shown in the figure), if the check code to be verified is the same as the second predetermined segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden to which the extracted check code is added.
Specifically, a check code to be verified is generated based on a first predetermined segment of any one of the information segments, and if the check code to be verified is the same as a second predetermined segment of any one of the information segments, the any one of the information segments is determined as an information segment to be hidden, to which an extracted check code is added.
Illustratively, the window size of the sliding window method is (L + k + n) bytes, one information segment is q, the data of the first (L + k) byte is taken as e, the last c byte is taken as p, and e passes through the check code module to generate a group of check codes
Figure BDA0002359483420000141
If it is not
Figure BDA0002359483420000142
The information segment q is the information segment to be hidden with the extracted check code added.
The method and the device solve the problem of how to determine whether the information segment is the to-be-hidden information segment added with the extracted check code.
The embodiment of the present application provides a possible implementation manner, and specifically, step S204 includes:
step S2041 (not shown in the figure), determining the order of each piece of information to be hidden based on the header data corresponding to each piece of information to be hidden;
step S2042 (not shown in the figure), the pieces of information to be hidden are spliced based on the sequence of the pieces of information to be hidden, so as to obtain the encoded information to be hidden.
Illustratively, take the first k bytes of data (data header) of e, parse to get the sequence number or order indicating the data, take the last L bytes of data to get c, pair e i Carrying out the above operation to obtain c i (i.e. the piece of information to be hidden)) Then based on each c i The serial number or order of (c), to i And carrying out splicing operation to obtain the coded information to be hidden.
For the embodiment of the application, the sequence of each data is determined based on the data header, so that the problem of recovery of the coded information to be hidden is solved.
The embodiment of the present application provides a possible implementation manner, and further, the method further includes:
step S206 (not shown in the figure), based on the header data corresponding to each piece of information to be hidden, determines whether the sequence of each piece of information to be hidden is continuous, and if not, indicates that the extraction of hidden information fails.
Specifically, based on the header data corresponding to each piece of information to be hidden, corresponding sequence number information is obtained, and if the sequence number is discontinuous or discontinuous, the information extraction is prompted to fail. And if the information to be hidden contains the padding information, judging whether the padding information is correct, and if the information to be hidden does not contain the padding information, prompting failure in extraction.
Illustratively, the complete hidden information is divided into five pieces and embedded, the head data of the five pieces of data correspond to the sequence numbers 1/5, 2/5, 3/5, 4/5 and 5/5, and if the sequence numbers obtained by analyzing the head data are 1/5, 2/5, 4/5 and 5/5 during hidden information extraction, a prompt of information extraction failure is given.
For the embodiment of the application, the extracted information is verified, and accurate hidden information can be extracted and obtained.
EXAMPLE III
Fig. 3 is an information hiding apparatus provided in an embodiment of the present application, where the apparatus 30 includes: an encoding module 201, a slicing module 202, an adding module 203, and a first determining module 204, wherein,
the encoding module 301 is configured to perform encoding processing on information to be hidden to obtain encoded information to be hidden;
a fragmentation module 302, configured to perform fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, where N is a positive integer;
an adding module 303, configured to add an extraction check code to each to-be-hidden information segment to obtain N to-be-hidden information segments to which the extraction check codes are added;
a first determining module 304, configured to determine N embedding points in a target audio carrier, and embed the N to-be-hidden information segments with check codes added and extracted respectively into the target audio carrier based on the determined N embedding points, so as to obtain a target audio carrier with to-be-hidden information embedded therein.
The embodiment of the application provides an information hiding device, compares with hiding of prior art through time domain or transform domain algorithm realization information, and this application embodiment is through treating hidden information and coding the processing, obtains the information of waiting to hide after the coding, right treat hidden information after the coding and carry out the fragmentation processing, obtain N and treat the hidden information fragment, and N is positive integer, treats to each and waits that hidden information fragment adds and draws the check code, obtains N and adds the information fragment of waiting to hide that draws the check code, confirms N embedded points at the target audio carrier to based on a definite N embedded point will N add the information fragment of waiting to hide that draws the check code imbed respectively to the target audio carrier obtains the target audio carrier that the embedding treats the hidden information. The method comprises the steps of dividing coded information to be hidden into pieces, determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided.
The embodiment of the present application provides a possible implementation manner, and specifically, the fragmentation module 302 includes:
the judging unit is used for judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and the filling unit is used for filling the coded information to be hidden if the coded information to be hidden cannot be just segmented, so that N equal-length information segments to be hidden can be obtained.
For the embodiment of the application, if the coded information to be hidden cannot be just segmented, completion processing is performed, wherein the completion information can also be used for verification of subsequent extraction of the hidden information, and the problem of extraction of the hidden information can be solved.
The application embodiment provides a possible implementation manner, and specifically, the first determining module 304 includes:
and the first determining unit is used for respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, of the pieces of information to be hidden in the target audio carrier based on a minimum perception distortion strategy.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
The embodiment of the present application provides a possible implementation manner, where the adding module 303 includes:
the adding unit is used for adding data heads to the information segments to be hidden to obtain N pieces of information segments to be hidden with the data heads added;
the second determining unit is used for determining the check codes corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and the third determining unit is used for determining N pieces of information fragments to be hidden, which are added with and extract the check codes, based on the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
The information hiding device of this embodiment can execute an information hiding method provided in the above embodiments of this application, and the implementation principles thereof are similar, and are not described herein again. The specific implementation manner and technical effects of the third embodiment of the present application are similar to those of the first embodiment, and are not described herein again.
Example four
Fig. 5 is an information hiding apparatus provided in an embodiment of the present application, where the apparatus 50 includes: a reading module 501, a second determining module 502, a processing module 503, a splicing module 504, and a decoding module 505, wherein,
a reading module 501, configured to read, by using a sliding window method, a target audio carrier embedded with information to be hidden, to obtain M segments of information segments, where M is a positive integer;
a second determining module 502, configured to determine, based on the extracted check code, N pieces of to-be-hidden information segments to which the extracted check code is added from the M pieces of information segments;
the processing module 503 is configured to perform check code extraction removal processing on the N to-be-hidden information segments to which the check codes are added, so as to obtain N to-be-hidden information segments;
a splicing module 504, configured to splice the N pieces of information to be hidden to obtain encoded information to be hidden;
and a decoding module 505, configured to decode the encoded information to be hidden to obtain the information to be hidden.
The embodiment of the application provides a hidden information extraction device, which extracts hidden information based on submission of a check code and solves the problem of extraction of the hidden information.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
The embodiment of the present application provides a possible implementation manner, and specifically, the second determining module 502 includes:
the generating unit is used for generating a check code to be verified based on a first preset segment of any one of the information segments;
and the fourth determining unit is used for determining any one of the information segments as the information segment to be hidden with the extracted check code if the check code to be verified is the same as the second preset segment of the any one of the information segments.
The embodiment of the present application provides a possible implementation manner, and specifically, the splicing module 504 includes:
a fifth determining unit, configured to determine an order of the pieces of information to be hidden based on header data corresponding to the pieces of information to be hidden;
and the splicing unit is used for splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
The embodiment of the present application provides a possible implementation manner, and further, the apparatus 50 further includes:
a determining module 506, configured to determine whether the sequence of the pieces of information to be hidden is continuous based on the header data corresponding to each piece of information to be hidden, and if not, prompt that the hidden information extraction fails.
The hidden information extraction device of this embodiment can execute the hidden information extraction method provided in the above embodiments of this application, and the implementation principles thereof are similar, and are not described herein again. The specific implementation manner and technical effects of the fourth embodiment of the present application are similar to those of the second embodiment, and are not described herein again.
EXAMPLE five
An embodiment of the present application provides an electronic device, as shown in fig. 4, an electronic device 40 shown in fig. 4 includes: a processor 401 and a memory 403. Wherein the processor 401 is coupled to the memory 403, such as via a bus 402. Further, the electronic device 40 may also include a transceiver 404. It should be noted that the transceiver 404 is not limited to one in practical application, and the structure of the electronic device 40 does not constitute a limitation to the embodiment of the present application. The processor 401 is applied in the embodiment of the present application to implement the functions of the modules shown in fig. 3 or fig. 5. The transceiver 404 includes a receiver and a transmitter.
The processor 401 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or execute the various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein. The processor 401 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 402 may include a path that transfers information between the above components. The bus 402 may be a PCI bus or an EISA bus, etc. Bus 402 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
Memory 403 may be, but is not limited to, ROM or other type of static storage device that can store static information and instructions, RAM or other type of dynamic storage device that can store information and instructions, EEPROM, CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 403 is used for storing application program codes for executing the scheme of the application, and the execution is controlled by the processor 401. The processor 401 is configured to execute application program code stored in the memory 403 to implement the functions of the apparatus provided by the embodiments shown in fig. 3 or fig. 5.
The embodiment of the present application provides an electronic device suitable for the above method embodiment, and specific implementation manners and technical effects are not described herein again.
An embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the information hiding method or the hidden information extracting method shown in the above embodiments.
The embodiment of the present application provides a computer-readable storage medium suitable for the above method embodiment, and specific implementation manners and technical effects are not described herein again.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (12)

1. An information hiding method, comprising:
coding the information to be hidden to obtain coded information to be hidden;
carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
adding an extraction check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
and determining N embedding points in the target audio carrier, and respectively embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
2. The method according to claim 1, wherein the slicing the encoded information to be hidden to obtain N information slices to be hidden comprises:
judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and if the coded information to be hidden cannot be just segmented, filling the coded information to be hidden so as to obtain N equal-length information segments to be hidden.
3. The method of claim 1, wherein the determining N embedding points in the target audio carrier comprises:
and respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
4. The method according to claim 3, wherein the adding and extracting check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with extracted check codes added thereto comprises:
adding a data head to each information segment to be hidden to obtain N information segments to be hidden with the data heads added;
determining check codes respectively corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and determining N pieces of information segments to be hidden, which are added with and extracted from the check code, based on the check code corresponding to the information segment to be hidden of each added data head and the information segment to be hidden of each added data head.
5. A hidden information extraction method is characterized by comprising the following steps:
reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
determining N pieces of information segments to be hidden added with the extracted check codes from the M segments of information based on the extracted check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information to be hidden;
carrying out check code extraction removal processing on the N pieces of information segments to be hidden added with the extracted check codes to obtain N pieces of information segments to be hidden;
splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and decoding the coded information to be hidden to obtain the information to be hidden.
6. The method according to claim 5, wherein the determining N pieces of information to be hidden with extracted check codes added thereto from M pieces of information based on the extracted check codes comprises:
generating a check code to be verified based on a first preset segment of any one of the information segments;
and if the check code to be verified is the same as the second preset segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden with the extracted check code added.
7. The method according to claim 6, wherein the splicing the N pieces of information to be hidden to obtain the encoded information to be hidden comprises:
determining the sequence of each piece of information to be hidden based on the head data corresponding to each piece of information to be hidden;
and splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
8. The method of claim 7, further comprising:
and judging whether the sequence of the information segments to be hidden of each piece is continuous or not based on the head data corresponding to the information to be hidden of each piece, and prompting that the hidden information extraction fails if the sequence of the information segments to be hidden of each piece is discontinuous.
9. An information hiding apparatus, comprising:
the encoding module is used for encoding the information to be hidden to obtain the encoded information to be hidden;
the fragmentation module is used for carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
the adding module is used for adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
the first determining module is used for determining N embedding points in a target audio carrier, and embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier respectively based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
10. A hidden information extracting apparatus, characterized in that the apparatus comprises:
the reading module is used for reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M sections of information fragments, wherein M is a positive integer;
the second determining module is used for determining N pieces of information fragments to be hidden, added with the extracted check codes, from the M pieces of information fragments based on the extracted check codes;
the extracting the check code comprises: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
the processing module is used for carrying out check code extraction removal processing on the N pieces of information to be hidden added with the extracted check codes to obtain N pieces of information to be hidden;
the splicing module is used for splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and the decoding module is used for decoding the coded information to be hidden to obtain the information to be hidden.
11. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: -performing an information hiding method or a hidden information extraction method according to any of claims 1 to 8.
12. A computer-readable storage medium for storing computer instructions which, when executed on a computer, enable the computer to perform the information hiding method or the hidden information extracting method of any one of claims 1 to 8.
CN202010017573.0A 2020-01-08 2020-01-08 Information hiding method and hidden information extracting method Active CN111199746B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010017573.0A CN111199746B (en) 2020-01-08 2020-01-08 Information hiding method and hidden information extracting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010017573.0A CN111199746B (en) 2020-01-08 2020-01-08 Information hiding method and hidden information extracting method

Publications (2)

Publication Number Publication Date
CN111199746A CN111199746A (en) 2020-05-26
CN111199746B true CN111199746B (en) 2022-09-06

Family

ID=70747132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010017573.0A Active CN111199746B (en) 2020-01-08 2020-01-08 Information hiding method and hidden information extracting method

Country Status (1)

Country Link
CN (1) CN111199746B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235608B (en) * 2020-12-11 2021-03-12 视联动力信息技术股份有限公司 Data encryption transmission method, device and medium based on video network
CN115630402A (en) * 2022-12-22 2023-01-20 安徽华云安科技有限公司 Information hiding method, device and equipment based on floating point number and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115124A (en) * 2006-07-26 2008-01-30 日电(中国)有限公司 Method and apparatus for identifying media program based on audio watermark
CN101226578A (en) * 2008-01-09 2008-07-23 北大方正集团有限公司 Method and device for hiding file information and recognizing pursuit
CN101860744A (en) * 2010-06-24 2010-10-13 北京理工大学 Real-time digital video watermarking method based on H.264 standard
CN102194081A (en) * 2011-05-12 2011-09-21 西北大学 Method for hiding natural language information
CN102682248A (en) * 2012-05-15 2012-09-19 西北大学 Watermark embedding and extracting method for ultrashort Chinese text
CN104850765A (en) * 2014-02-19 2015-08-19 中国移动通信集团福建有限公司 Watermark processing method, device and system
WO2016165466A1 (en) * 2015-07-07 2016-10-20 中兴通讯股份有限公司 Information hiding method and corresponding terminal device
CN108024114A (en) * 2017-11-23 2018-05-11 华南理工大学 A kind of lossless HEVC information concealing methods of large capacity based on the modification of flag bit parameter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933391A (en) * 2005-09-16 2007-03-21 北京书生国际信息技术有限公司 Hidden code inserting and detecting method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115124A (en) * 2006-07-26 2008-01-30 日电(中国)有限公司 Method and apparatus for identifying media program based on audio watermark
CN101226578A (en) * 2008-01-09 2008-07-23 北大方正集团有限公司 Method and device for hiding file information and recognizing pursuit
CN101860744A (en) * 2010-06-24 2010-10-13 北京理工大学 Real-time digital video watermarking method based on H.264 standard
CN102194081A (en) * 2011-05-12 2011-09-21 西北大学 Method for hiding natural language information
CN102682248A (en) * 2012-05-15 2012-09-19 西北大学 Watermark embedding and extracting method for ultrashort Chinese text
CN104850765A (en) * 2014-02-19 2015-08-19 中国移动通信集团福建有限公司 Watermark processing method, device and system
WO2016165466A1 (en) * 2015-07-07 2016-10-20 中兴通讯股份有限公司 Information hiding method and corresponding terminal device
CN108024114A (en) * 2017-11-23 2018-05-11 华南理工大学 A kind of lossless HEVC information concealing methods of large capacity based on the modification of flag bit parameter

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Junling Ren.Information Hiding Algorithm Based on Predictive Coding.《2009 International Conference on Information Technology and Computer Science》.2009,全文. *
张黎.基于安全通信的信息隐藏技术研究.《信息通信》.2019,第19-20页. *

Also Published As

Publication number Publication date
CN111199746A (en) 2020-05-26

Similar Documents

Publication Publication Date Title
US20020126872A1 (en) Method, apparatus and programs for generating and utilizing content signatures
CN110457873B (en) Watermark embedding and detecting method and device
EP2657884A2 (en) Identifying multimedia objects based on multimedia fingerprint
CN111199746B (en) Information hiding method and hidden information extracting method
CN113627207B (en) Bar code identification method, device, computer equipment and storage medium
CN112966713B (en) DGA domain name detection method and device based on deep learning and computer equipment
CN114528394B (en) Text triple extraction method and device based on mask language model
KR20200058329A (en) 2-D code error correction decoding
CN116663549A (en) Digitized management method, system and storage medium based on enterprise files
CN115952528A (en) Multi-scale combined text steganography method and system
CN115712909A (en) Text watermark embedding method, tracing method and system based on block chain
CN118349970A (en) Text watermark embedding and detecting method based on model context learning
CN114036561A (en) Information hiding method, information acquiring method, information hiding device, information acquiring device, storage medium and electronic equipment
CN109413595B (en) Spam short message identification method, device and storage medium
CN107766771B (en) Two-dimensional code detection method and terminal
US10236004B2 (en) Data encoding and decoding method and system
US9600771B2 (en) Information coding based on semantic data reasoning
CN112866257B (en) Domain name detection method, system and device
CN117291787B (en) Traceability method and system based on data watermark
CN113537484B (en) Network training, encoding and decoding method, device and medium for digital watermarking
CN113705806B (en) Network training, encoding and decoding method, device and medium for digital watermarking
CN111753521B (en) Reading understanding method based on artificial intelligence and related equipment
CN117708779B (en) Data watermarking processing method, tracing method and storage medium
CN111626911B (en) Image processing method, device, server and storage medium
CN118135615A (en) Unsupervised fingerprint anti-counterfeiting method based on fingertip tissue structure priori

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant