CN111199746B - Information hiding method and hidden information extracting method - Google Patents
Information hiding method and hidden information extracting method Download PDFInfo
- Publication number
- CN111199746B CN111199746B CN202010017573.0A CN202010017573A CN111199746B CN 111199746 B CN111199746 B CN 111199746B CN 202010017573 A CN202010017573 A CN 202010017573A CN 111199746 B CN111199746 B CN 111199746B
- Authority
- CN
- China
- Prior art keywords
- information
- hidden
- piece
- segments
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 69
- 238000000605 extraction Methods 0.000 claims abstract description 51
- 239000012634 fragment Substances 0.000 claims description 36
- 238000012545 processing Methods 0.000 claims description 27
- 238000013467 fragmentation Methods 0.000 claims description 14
- 238000006062 fragmentation reaction Methods 0.000 claims description 14
- 230000008447 perception Effects 0.000 claims description 7
- 230000010365 information processing Effects 0.000 abstract description 2
- 238000012795 verification Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000013135 deep learning Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000011218 segmentation Effects 0.000 description 3
- 230000005236 sound signal Effects 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000005034 decoration Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003062 neural network model Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 206010021403 Illusion Diseases 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
Landscapes
- Engineering & Computer Science (AREA)
- Computational Linguistics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Document Processing Apparatus (AREA)
Abstract
The application provides an information hiding method and a hidden information extracting method, which are applied to the technical field of information processing, wherein the method comprises the following steps: the method comprises the steps of segmenting coded information to be hidden, then determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided. Meanwhile, the hidden information extraction method is provided, and the hidden information can be extracted from the target audio carrier embedded with the information to be hidden.
Description
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an information hiding method and a hidden information extracting method.
Background
With the development of computer networks and multimedia technologies, information hiding is becoming one of the hot spots for information security concerns. Information hiding is to hide specific secret information in an open carrier or a transmission path, and a third party has difficulty in obtaining the secret information from the open carrier.
At present, embedding hidden information in audio signals is mainly classified into two algorithms of time domain and transform domain. The time domain algorithm comprises a bit replacement method, an echo hiding method and the like; the transform domain algorithm mainly comprises the steps of performing some kind of transform (Fourier transform, wavelet transform, etc.) on an original audio signal, and then embedding hidden information in a transform domain. However, both of these algorithms change the global structure of the audio signal.
Disclosure of Invention
The application provides an information hiding method and a hidden information extracting method, which are used for hiding information and extracting hidden information while not changing the global structure of an audio carrier, and adopt the following technical scheme:
in a first aspect, there is provided an information hiding method, the method comprising,
coding the information to be hidden to obtain coded information to be hidden;
carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
adding an extraction check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
and determining N embedding points in the target audio carrier, and respectively embedding N pieces of information segments to be hidden, which are added with the extracted check codes, into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Optionally, the performing fragment processing on the coded information to be hidden to obtain N pieces of information to be hidden includes:
judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and if the coded information to be hidden cannot be just segmented, filling the coded information to be hidden so as to obtain N equal-length information segments to be hidden.
Optionally, the determining N embedding points in the target audio carrier includes:
and respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the adding and extracting a check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extracted check code added thereto includes:
adding a data head to each information segment to be hidden to obtain N information segments to be hidden with the data heads added;
respectively determining check codes corresponding to the information segments to be hidden of the added data heads of each piece based on the information segments to be hidden of the added data heads of each piece;
and determining N pieces of information fragments to be hidden with the extracted check codes on the basis of the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
In a second aspect, a hidden information extraction method is provided, and includes:
reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
determining N pieces of information segments to be hidden added with the extracted check codes from the M segments of information based on the extracted check codes;
carrying out check code extraction removal processing on the N pieces of information segments to be hidden, which are added with the extracted check codes, so as to obtain N pieces of information segments to be hidden;
splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and decoding the coded information to be hidden to obtain the information to be hidden.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the determining, based on the extracted check code, N pieces of information segments to be hidden, to which the extracted check code is added, from the M pieces of information segments includes:
generating a check code to be verified based on a first preset segment of any one of the information segments;
and if the check code to be verified is the same as the second preset segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden with the extracted check code added.
Optionally, the splicing the N pieces of information to be hidden to obtain the encoded information to be hidden includes:
determining the sequence of each piece of information to be hidden based on the head data corresponding to each piece of information to be hidden;
and splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
Optionally, the method further comprises:
and judging whether the sequence of the information segments to be hidden is continuous or not based on the head data corresponding to the information to be hidden of each segment, and if not, prompting that the hidden information extraction fails.
In a third aspect, there is provided an information hiding apparatus, comprising,
the encoding module is used for encoding the information to be hidden to obtain the encoded information to be hidden;
the fragmentation module is used for carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
the adding module is used for adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the first determining module is used for determining N embedding points in a target audio carrier, and embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier respectively based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Optionally, the slicing module includes:
the judging unit is used for judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and the filling unit is used for filling the coded information to be hidden if the coded information to be hidden cannot be just segmented, so that N equal-length information segments to be hidden can be obtained.
Optionally, the first determining module includes:
and the first determining unit is used for respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the adding module includes:
the adding unit is used for adding data heads to the information segments to be hidden to obtain N pieces of information segments to be hidden with the data heads added;
the second determining unit is used for determining the check codes corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and the third determining unit is used for determining N pieces of information fragments to be hidden, which are added with and extract the check codes, based on the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
In a fourth aspect, there is provided a hidden information extraction apparatus, including:
the reading module is used for reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M sections of information fragments, wherein M is a positive integer;
the second determining module is used for determining N pieces of information fragments to be hidden, added with the extracted check codes, from the M pieces of information fragments based on the extracted check codes;
the processing module is used for carrying out check code extraction removal processing on the N pieces of information segments to be hidden, which are added with the extracted check codes, so as to obtain N pieces of information segments to be hidden;
the splicing module is used for splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and the decoding module is used for decoding the coded information to be hidden to obtain the information to be hidden.
Optionally, the extracting the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Optionally, the second determining module includes:
the generating unit is used for generating a check code to be verified based on a first preset segment of any one of the information segments;
and the fourth determining unit is used for determining any one of the information segments as the information segment to be hidden with the extracted check code if the check code to be verified is the same as the second preset segment of the any one of the information segments.
Optionally, the splicing module comprises:
a fifth determining unit, configured to determine, based on header data corresponding to each piece of information to be hidden, an order of each piece of information to be hidden;
and the splicing unit is used for splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
Optionally, the apparatus further comprises:
and the judging module is used for judging whether the sequence of the information segments to be hidden is continuous or not based on the head data corresponding to the information to be hidden of each segment, and if the sequence is discontinuous, prompting that the hidden information extraction fails.
In a fifth aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the information hiding method shown in the first aspect or the hidden information extracting method shown in the second aspect is performed.
In a fourth aspect, a computer-readable storage medium is provided, which is used for storing computer instructions, which when run on a computer, make the computer perform the information hiding method shown in the first aspect or the hidden information extracting method shown in the second aspect.
The application provides an information hiding method and a hidden information extracting method, compared with the hiding of information realized by a time domain or transform domain algorithm in the prior art, the information hiding method and the hidden information extracting method are characterized in that the information hiding method and the hidden information extracting method are realized by encoding the information to be hidden through the information to be hidden to obtain the encoded information to be hidden, the encoded information to be hidden is subjected to fragmentation processing to obtain N information fragments to be hidden, N is a positive integer, each information fragment to be hidden is added with an extraction check code to obtain N information fragments to be hidden added with the extraction check code, N embedding points are determined in a target audio carrier, and the N information fragments to be hidden added with the extraction check code are respectively embedded into the target audio carrier to obtain the target audio carrier embedded with the information to be hidden. The method comprises the steps of dividing coded information to be hidden into pieces, determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided. Meanwhile, the hidden information extraction method is provided, and the hidden information can be extracted from the target audio carrier embedded with the information to be hidden.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an information hiding method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a hidden information extraction method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information hiding apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a hidden information extraction apparatus according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
An embodiment of the present application provides an information hiding method, as shown in fig. 1, the method may include the following steps:
step S101, coding information to be hidden to obtain coded information to be hidden;
specifically, the information to be hidden is encoded to obtain binary data, where encoding the hidden information may use a common encoding method (such as ASCII) or a custom encoding method, which is not limited herein.
Illustratively, the encoded information to be hidden is C, and the length is M bytes, wherein the following examples are described based on this example.
The information to be hidden may be label information of the target audio carrier, where the label information may be determined manually (i.e. manually labeling) or may be obtained by a method based on machine learning, such as unsupervised or semi-supervised machine learning.
Step S102, carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
specifically, the coded information to be hidden may be subjected to a fragmentation processing to obtain N pieces of information to be hidden, where N is a positive integer. Determining how to perform segmentation based on the size or length of the coded information to be hidden; determining how to segment the information to be hidden according to the size or length of the target audio carrier; how to perform segmentation can also be determined comprehensively based on the size or the length of the encoded information to be hidden and the target audio carrier, for example, the number of slices to be segmented of the encoded information to be hidden can be determined comprehensively according to the duration of the target audio and the length of the encoded information to be hidden.
The coded information to be hidden may also be segmented according to a predetermined length of each piece of segmented information, and for example, the coded data C is segmented and divided into piecesShare data (round up, L is the length of data after segmentation).
Step S103, adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
specifically, an extraction check code may be added to each to-be-hidden information segment to obtain N to-be-hidden information segments to which the extraction check code is added. Wherein the extraction check code is used for extracting the hidden information from the target audio carrier embedded with the information to be hidden.
The extracted check code may include a check code and/or a data header, the check code is used to identify each piece of information to be hidden as hidden information, and the data header is used to identify the sequence of each piece of information to be hidden.
Illustratively, one implementation of the header is that if the encoded data C is sliced into 5 shares, the header for each slice of sliced encoded data may be 1/5, 2/5, 3/5, 4/5, 5/5, respectively. The header may identify an order of the encoded data for each slice, so that when the hidden information query is performed, the order of the encoded data for each slice is determined based on the header, thereby restoring the data.
And step S104, determining N embedding points in the target audio carrier, and respectively embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
Specifically, N embedding points may be determined in the target audio carrier, and the N pieces of information to be hidden with the check code added and extracted are respectively embedded into the target audio carrier based on the determined N embedding points, so as to obtain the target audio carrier with the information to be hidden embedded.
The embedding point may be determined equally, and if the target audio length is L2, the positions of the N embedding points are determined according to the number N of the embedding points.
And respectively determining the embedding point of each piece of information segment to be hidden, added with and extracted from the check code, in the target audio carrier based on a perception distortion minimum strategy.
The embedding point can be determined according to a perception distortion minimum strategy, and the perception distortion strategy is used for minimizing the influence on the original target audio frequency after the information segment to be hidden added with the extracted check code is embedded into the target audio frequency carrier, so that the influence on the target audio frequency structure is reduced while the information hiding is realized.
Illustratively, an application scenario of the information hiding method of the present application is as follows:
with the development of deep learning neural networks, intelligent voice technologies such as voice recognition and voiceprint recognition are rapidly developed. To train a deep learning neural network model, a large number of audio files with labeled information are required. At present, label information used by deep learning training is mainly stored separately in a text format or indicated by a file directory. However, when the tag information contains sensitive information such as an identity card, a login password, and the like, for example, a voice recognition and voiceprint recognition model is applied to a bank APP login scene, an information hiding technology is required, and information to be hidden (tag information) can be directly embedded into a target audio carrier by the information hiding method of the present application. The corresponding neural network model to be trained can directly extract the label information from the target audio carrier embedded with the hidden information without acquiring the label information corresponding to the target audio carrier through other data query ways, so that the complexity of training operation can be reduced, and the training efficiency can be improved.
The embodiment of the application provides an information hiding method, compared with the hiding of information realized by a time domain or transform domain algorithm in the prior art, the information to be hidden is coded, the coded information to be hidden is obtained, the coded information to be hidden is subjected to fragmentation processing, N information fragments to be hidden are obtained, N is a positive integer, check codes are added and extracted to each information fragment to be hidden, N information fragments to be hidden are obtained, N embedding points are determined at a target audio carrier, and the N information fragments to be hidden, to be added and extracted with the check codes, are respectively embedded into the target audio carrier to obtain the target audio carrier embedded with the information to be hidden. The method comprises the steps of dividing coded information to be hidden, determining embedding points of each piece of information to be hidden in a target audio carrier, and embedding each piece of information to be hidden into the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided.
The embodiment of the present application provides a possible implementation manner, and specifically, step S102 includes:
step S1021 (not shown in the figure), determining whether the encoded information to be hidden is just segmented, so as to obtain N equal-length information segments to be hidden;
step S1022 (not shown in the figure), if the encoded information to be hidden cannot be just segmented, the encoded information to be hidden is filled, so that N equal-length information segments to be hidden can be obtained.
Specifically, if the last copy of data is less than L bytes long (i.e., cannot be sliced exactly), padding (padding) completion is performed, and the added padding information can be used for information verification (when padding does not need to be added, this partial verification does not work).
For the embodiment of the application, if the coded information to be hidden cannot be exactly segmented, completion processing is performed, wherein the completion information can also be used for verification of subsequent extraction of the hidden information, and the problem of extraction of the hidden information can be solved.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: the device comprises a check code and/or a data head, wherein the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Specifically, the adding and extracting check codes to each to-be-hidden information segment in step S103 to obtain N to-be-hidden information segments to which the extracting check codes are added includes:
step S1031 (not shown in the figure), adding a data header to each piece of information segment to be hidden, to obtain N pieces of information segments to be hidden with data headers added;
step S1032 (not shown in the figure), determining, based on the to-be-hidden information segment of each additional data header, a check code corresponding to the to-be-hidden information segment of each additional data header;
step S1033 (not shown in the figure), based on the check code corresponding to each piece of information to be hidden added with the data header and the information to be hidden added with the data header, determining N pieces of information to be hidden added with the extracted check code.
Illustratively, each piece of information to be hidden uses c i A header H representing (i ═ 1,2,. N), to which kbytes are added i Get e of (L + k) byte i ;e i The check code generating module generates n bytes of check code p i The method is used for accurate positioning during information extraction. Finally with e i Splicing to obtain (L + k + n) byte q i (i.e. N pieces of information to be hidden with check code extracted added).
The check code may use a common parity check, hamming check, CRC check, etc., and is not limited herein.
Wherein, an example of determining the embedding point based on the minimum perceptual distortion strategy is as follows:
q i taking an integer from every 1 byte to obtain (L + k + n) integer series, i.e. converting the original byte stream into integer series in such a way that 1 byte corresponds to an integer, and calculating the average value m i And variance v i (ii) a Searching the whole audio data to obtain N disjoint (L + k + N) or 2 x (L + k + N) sampling points, wherein the search criterion is to make the average value of the areaSum varianceAnd m of the inserted data i And v i Normalized difference weighted sum minimumWhere alpha is a weighting coefficient, N q i And respectively inserting the central points of the found N areas to obtain the audio data embedded with the label information.
For the embodiment of the application, the problem of adding the extracted verification information is solved.
Example two
An embodiment of the present application provides a hidden information extraction method, as shown in fig. 2, the method may include the following steps:
step S201, reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
step S202, determining N pieces of information fragments to be hidden, which are added with the extracted check codes, from M pieces of information fragments based on the extracted check codes; wherein, the extracting the check code comprises: a check code and/or a data header; the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
Step S203, carrying out check code extraction removal processing on the N pieces of information to be hidden with the check codes added to obtain N pieces of information to be hidden;
step S204, splicing the N pieces of information to be hidden to obtain coded information to be hidden;
step S205, decoding the encoded information to be hidden to obtain the information to be hidden.
Specifically, a target audio carrier embedded with information to be hidden is read through a sliding window method to obtain M information segments, then N segments containing hidden information are determined from the M information segments based on the extracted check codes, and operations such as check code removal, splicing processing and decoding processing are carried out to obtain the hidden information.
The process of obtaining the M-side information segment by the sliding window method and determining the N segments containing the hidden information may be reading one information segment, that is, determining whether the information segment contains the hidden information, or may be reading the information segment to obtain the M information segment, and then determining whether the information segment contains the hidden information.
For the embodiment of the application, the hidden information is extracted based on the extracted check code, so that the problem of extracting the hidden information is solved.
The embodiment of the present application provides a possible implementation manner, specifically, step S202 includes:
step 2021 (not shown in the figure), generating a check code to be verified based on a first predetermined segment of any one of the information segments;
step 2022 (not shown in the figure), if the check code to be verified is the same as the second predetermined segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden to which the extracted check code is added.
Specifically, a check code to be verified is generated based on a first predetermined segment of any one of the information segments, and if the check code to be verified is the same as a second predetermined segment of any one of the information segments, the any one of the information segments is determined as an information segment to be hidden, to which an extracted check code is added.
Illustratively, the window size of the sliding window method is (L + k + n) bytes, one information segment is q, the data of the first (L + k) byte is taken as e, the last c byte is taken as p, and e passes through the check code module to generate a group of check codesIf it is notThe information segment q is the information segment to be hidden with the extracted check code added.
The method and the device solve the problem of how to determine whether the information segment is the to-be-hidden information segment added with the extracted check code.
The embodiment of the present application provides a possible implementation manner, and specifically, step S204 includes:
step S2041 (not shown in the figure), determining the order of each piece of information to be hidden based on the header data corresponding to each piece of information to be hidden;
step S2042 (not shown in the figure), the pieces of information to be hidden are spliced based on the sequence of the pieces of information to be hidden, so as to obtain the encoded information to be hidden.
Illustratively, take the first k bytes of data (data header) of e, parse to get the sequence number or order indicating the data, take the last L bytes of data to get c, pair e i Carrying out the above operation to obtain c i (i.e. the piece of information to be hidden)) Then based on each c i The serial number or order of (c), to i And carrying out splicing operation to obtain the coded information to be hidden.
For the embodiment of the application, the sequence of each data is determined based on the data header, so that the problem of recovery of the coded information to be hidden is solved.
The embodiment of the present application provides a possible implementation manner, and further, the method further includes:
step S206 (not shown in the figure), based on the header data corresponding to each piece of information to be hidden, determines whether the sequence of each piece of information to be hidden is continuous, and if not, indicates that the extraction of hidden information fails.
Specifically, based on the header data corresponding to each piece of information to be hidden, corresponding sequence number information is obtained, and if the sequence number is discontinuous or discontinuous, the information extraction is prompted to fail. And if the information to be hidden contains the padding information, judging whether the padding information is correct, and if the information to be hidden does not contain the padding information, prompting failure in extraction.
Illustratively, the complete hidden information is divided into five pieces and embedded, the head data of the five pieces of data correspond to the sequence numbers 1/5, 2/5, 3/5, 4/5 and 5/5, and if the sequence numbers obtained by analyzing the head data are 1/5, 2/5, 4/5 and 5/5 during hidden information extraction, a prompt of information extraction failure is given.
For the embodiment of the application, the extracted information is verified, and accurate hidden information can be extracted and obtained.
EXAMPLE III
Fig. 3 is an information hiding apparatus provided in an embodiment of the present application, where the apparatus 30 includes: an encoding module 201, a slicing module 202, an adding module 203, and a first determining module 204, wherein,
the encoding module 301 is configured to perform encoding processing on information to be hidden to obtain encoded information to be hidden;
a fragmentation module 302, configured to perform fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, where N is a positive integer;
an adding module 303, configured to add an extraction check code to each to-be-hidden information segment to obtain N to-be-hidden information segments to which the extraction check codes are added;
a first determining module 304, configured to determine N embedding points in a target audio carrier, and embed the N to-be-hidden information segments with check codes added and extracted respectively into the target audio carrier based on the determined N embedding points, so as to obtain a target audio carrier with to-be-hidden information embedded therein.
The embodiment of the application provides an information hiding device, compares with hiding of prior art through time domain or transform domain algorithm realization information, and this application embodiment is through treating hidden information and coding the processing, obtains the information of waiting to hide after the coding, right treat hidden information after the coding and carry out the fragmentation processing, obtain N and treat the hidden information fragment, and N is positive integer, treats to each and waits that hidden information fragment adds and draws the check code, obtains N and adds the information fragment of waiting to hide that draws the check code, confirms N embedded points at the target audio carrier to based on a definite N embedded point will N add the information fragment of waiting to hide that draws the check code imbed respectively to the target audio carrier obtains the target audio carrier that the embedding treats the hidden information. The method comprises the steps of dividing coded information to be hidden into pieces, determining embedding points of the information to be hidden in a target audio carrier, and embedding the information to be hidden in the target audio carrier, so that the information to be hidden is hidden while the global structure of the target audio carrier is not changed, and information leakage is avoided.
The embodiment of the present application provides a possible implementation manner, and specifically, the fragmentation module 302 includes:
the judging unit is used for judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and the filling unit is used for filling the coded information to be hidden if the coded information to be hidden cannot be just segmented, so that N equal-length information segments to be hidden can be obtained.
For the embodiment of the application, if the coded information to be hidden cannot be just segmented, completion processing is performed, wherein the completion information can also be used for verification of subsequent extraction of the hidden information, and the problem of extraction of the hidden information can be solved.
The application embodiment provides a possible implementation manner, and specifically, the first determining module 304 includes:
and the first determining unit is used for respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, of the pieces of information to be hidden in the target audio carrier based on a minimum perception distortion strategy.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
The embodiment of the present application provides a possible implementation manner, where the adding module 303 includes:
the adding unit is used for adding data heads to the information segments to be hidden to obtain N pieces of information segments to be hidden with the data heads added;
the second determining unit is used for determining the check codes corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and the third determining unit is used for determining N pieces of information fragments to be hidden, which are added with and extract the check codes, based on the check codes respectively corresponding to the information fragments to be hidden of each added data head and the information fragments to be hidden of each added data head.
The information hiding device of this embodiment can execute an information hiding method provided in the above embodiments of this application, and the implementation principles thereof are similar, and are not described herein again. The specific implementation manner and technical effects of the third embodiment of the present application are similar to those of the first embodiment, and are not described herein again.
Example four
Fig. 5 is an information hiding apparatus provided in an embodiment of the present application, where the apparatus 50 includes: a reading module 501, a second determining module 502, a processing module 503, a splicing module 504, and a decoding module 505, wherein,
a reading module 501, configured to read, by using a sliding window method, a target audio carrier embedded with information to be hidden, to obtain M segments of information segments, where M is a positive integer;
a second determining module 502, configured to determine, based on the extracted check code, N pieces of to-be-hidden information segments to which the extracted check code is added from the M pieces of information segments;
the processing module 503 is configured to perform check code extraction removal processing on the N to-be-hidden information segments to which the check codes are added, so as to obtain N to-be-hidden information segments;
a splicing module 504, configured to splice the N pieces of information to be hidden to obtain encoded information to be hidden;
and a decoding module 505, configured to decode the encoded information to be hidden to obtain the information to be hidden.
The embodiment of the application provides a hidden information extraction device, which extracts hidden information based on submission of a check code and solves the problem of extraction of the hidden information.
The embodiment of the present application provides a possible implementation manner, wherein the extracting of the check code includes: a check code and/or a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden.
The embodiment of the present application provides a possible implementation manner, and specifically, the second determining module 502 includes:
the generating unit is used for generating a check code to be verified based on a first preset segment of any one of the information segments;
and the fourth determining unit is used for determining any one of the information segments as the information segment to be hidden with the extracted check code if the check code to be verified is the same as the second preset segment of the any one of the information segments.
The embodiment of the present application provides a possible implementation manner, and specifically, the splicing module 504 includes:
a fifth determining unit, configured to determine an order of the pieces of information to be hidden based on header data corresponding to the pieces of information to be hidden;
and the splicing unit is used for splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
The embodiment of the present application provides a possible implementation manner, and further, the apparatus 50 further includes:
a determining module 506, configured to determine whether the sequence of the pieces of information to be hidden is continuous based on the header data corresponding to each piece of information to be hidden, and if not, prompt that the hidden information extraction fails.
The hidden information extraction device of this embodiment can execute the hidden information extraction method provided in the above embodiments of this application, and the implementation principles thereof are similar, and are not described herein again. The specific implementation manner and technical effects of the fourth embodiment of the present application are similar to those of the second embodiment, and are not described herein again.
EXAMPLE five
An embodiment of the present application provides an electronic device, as shown in fig. 4, an electronic device 40 shown in fig. 4 includes: a processor 401 and a memory 403. Wherein the processor 401 is coupled to the memory 403, such as via a bus 402. Further, the electronic device 40 may also include a transceiver 404. It should be noted that the transceiver 404 is not limited to one in practical application, and the structure of the electronic device 40 does not constitute a limitation to the embodiment of the present application. The processor 401 is applied in the embodiment of the present application to implement the functions of the modules shown in fig. 3 or fig. 5. The transceiver 404 includes a receiver and a transmitter.
The processor 401 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or execute the various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein. The processor 401 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The memory 403 is used for storing application program codes for executing the scheme of the application, and the execution is controlled by the processor 401. The processor 401 is configured to execute application program code stored in the memory 403 to implement the functions of the apparatus provided by the embodiments shown in fig. 3 or fig. 5.
The embodiment of the present application provides an electronic device suitable for the above method embodiment, and specific implementation manners and technical effects are not described herein again.
An embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the information hiding method or the hidden information extracting method shown in the above embodiments.
The embodiment of the present application provides a computer-readable storage medium suitable for the above method embodiment, and specific implementation manners and technical effects are not described herein again.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.
Claims (12)
1. An information hiding method, comprising:
coding the information to be hidden to obtain coded information to be hidden;
carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
adding an extraction check code to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
and determining N embedding points in the target audio carrier, and respectively embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
2. The method according to claim 1, wherein the slicing the encoded information to be hidden to obtain N information slices to be hidden comprises:
judging whether the coded information to be hidden is just segmented or not to obtain N equal-length information segments to be hidden;
and if the coded information to be hidden cannot be just segmented, filling the coded information to be hidden so as to obtain N equal-length information segments to be hidden.
3. The method of claim 1, wherein the determining N embedding points in the target audio carrier comprises:
and respectively determining the embedding points of the information segments to be hidden, which are added with and extracted from the check codes, in the target audio carrier based on a perception distortion minimum strategy.
4. The method according to claim 3, wherein the adding and extracting check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with extracted check codes added thereto comprises:
adding a data head to each information segment to be hidden to obtain N information segments to be hidden with the data heads added;
determining check codes respectively corresponding to the information segments to be hidden of the added data heads of each piece respectively based on the information segments to be hidden of the added data heads of each piece;
and determining N pieces of information segments to be hidden, which are added with and extracted from the check code, based on the check code corresponding to the information segment to be hidden of each added data head and the information segment to be hidden of each added data head.
5. A hidden information extraction method is characterized by comprising the following steps:
reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M segments of information, wherein M is a positive integer;
determining N pieces of information segments to be hidden added with the extracted check codes from the M segments of information based on the extracted check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information to be hidden;
carrying out check code extraction removal processing on the N pieces of information segments to be hidden added with the extracted check codes to obtain N pieces of information segments to be hidden;
splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and decoding the coded information to be hidden to obtain the information to be hidden.
6. The method according to claim 5, wherein the determining N pieces of information to be hidden with extracted check codes added thereto from M pieces of information based on the extracted check codes comprises:
generating a check code to be verified based on a first preset segment of any one of the information segments;
and if the check code to be verified is the same as the second preset segment of any one of the information segments, determining any one of the information segments as the information segment to be hidden with the extracted check code added.
7. The method according to claim 6, wherein the splicing the N pieces of information to be hidden to obtain the encoded information to be hidden comprises:
determining the sequence of each piece of information to be hidden based on the head data corresponding to each piece of information to be hidden;
and splicing the information to be hidden of each piece based on the sequence of the information to be hidden of each piece to obtain the coded information to be hidden.
8. The method of claim 7, further comprising:
and judging whether the sequence of the information segments to be hidden of each piece is continuous or not based on the head data corresponding to the information to be hidden of each piece, and prompting that the hidden information extraction fails if the sequence of the information segments to be hidden of each piece is discontinuous.
9. An information hiding apparatus, comprising:
the encoding module is used for encoding the information to be hidden to obtain the encoded information to be hidden;
the fragmentation module is used for carrying out fragmentation processing on the coded information to be hidden to obtain N information fragments to be hidden, wherein N is a positive integer;
the adding module is used for adding extraction check codes to each piece of information segment to be hidden to obtain N pieces of information segments to be hidden with the extraction check codes;
the extracting of the check code includes: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
the first determining module is used for determining N embedding points in a target audio carrier, and embedding the N pieces of information to be hidden added with the extracted check codes into the target audio carrier respectively based on the determined N embedding points to obtain the target audio carrier embedded with the information to be hidden.
10. A hidden information extracting apparatus, characterized in that the apparatus comprises:
the reading module is used for reading a target audio carrier embedded with information to be hidden by a sliding window method to obtain M sections of information fragments, wherein M is a positive integer;
the second determining module is used for determining N pieces of information fragments to be hidden, added with the extracted check codes, from the M pieces of information fragments based on the extracted check codes;
the extracting the check code comprises: a check code and a data header;
the check code is used for identifying each piece of information segment to be hidden as hidden information, and the data head is used for identifying the sequence of each piece of information segment to be hidden;
the processing module is used for carrying out check code extraction removal processing on the N pieces of information to be hidden added with the extracted check codes to obtain N pieces of information to be hidden;
the splicing module is used for splicing the N pieces of information to be hidden to obtain coded information to be hidden;
and the decoding module is used for decoding the coded information to be hidden to obtain the information to be hidden.
11. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: -performing an information hiding method or a hidden information extraction method according to any of claims 1 to 8.
12. A computer-readable storage medium for storing computer instructions which, when executed on a computer, enable the computer to perform the information hiding method or the hidden information extracting method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010017573.0A CN111199746B (en) | 2020-01-08 | 2020-01-08 | Information hiding method and hidden information extracting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010017573.0A CN111199746B (en) | 2020-01-08 | 2020-01-08 | Information hiding method and hidden information extracting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111199746A CN111199746A (en) | 2020-05-26 |
CN111199746B true CN111199746B (en) | 2022-09-06 |
Family
ID=70747132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010017573.0A Active CN111199746B (en) | 2020-01-08 | 2020-01-08 | Information hiding method and hidden information extracting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111199746B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112235608B (en) * | 2020-12-11 | 2021-03-12 | 视联动力信息技术股份有限公司 | Data encryption transmission method, device and medium based on video network |
CN115630402A (en) * | 2022-12-22 | 2023-01-20 | 安徽华云安科技有限公司 | Information hiding method, device and equipment based on floating point number and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101115124A (en) * | 2006-07-26 | 2008-01-30 | 日电(中国)有限公司 | Method and apparatus for identifying media program based on audio watermark |
CN101226578A (en) * | 2008-01-09 | 2008-07-23 | 北大方正集团有限公司 | Method and device for hiding file information and recognizing pursuit |
CN101860744A (en) * | 2010-06-24 | 2010-10-13 | 北京理工大学 | Real-time digital video watermarking method based on H.264 standard |
CN102194081A (en) * | 2011-05-12 | 2011-09-21 | 西北大学 | Method for hiding natural language information |
CN102682248A (en) * | 2012-05-15 | 2012-09-19 | 西北大学 | Watermark embedding and extracting method for ultrashort Chinese text |
CN104850765A (en) * | 2014-02-19 | 2015-08-19 | 中国移动通信集团福建有限公司 | Watermark processing method, device and system |
WO2016165466A1 (en) * | 2015-07-07 | 2016-10-20 | 中兴通讯股份有限公司 | Information hiding method and corresponding terminal device |
CN108024114A (en) * | 2017-11-23 | 2018-05-11 | 华南理工大学 | A kind of lossless HEVC information concealing methods of large capacity based on the modification of flag bit parameter |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933391A (en) * | 2005-09-16 | 2007-03-21 | 北京书生国际信息技术有限公司 | Hidden code inserting and detecting method |
-
2020
- 2020-01-08 CN CN202010017573.0A patent/CN111199746B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101115124A (en) * | 2006-07-26 | 2008-01-30 | 日电(中国)有限公司 | Method and apparatus for identifying media program based on audio watermark |
CN101226578A (en) * | 2008-01-09 | 2008-07-23 | 北大方正集团有限公司 | Method and device for hiding file information and recognizing pursuit |
CN101860744A (en) * | 2010-06-24 | 2010-10-13 | 北京理工大学 | Real-time digital video watermarking method based on H.264 standard |
CN102194081A (en) * | 2011-05-12 | 2011-09-21 | 西北大学 | Method for hiding natural language information |
CN102682248A (en) * | 2012-05-15 | 2012-09-19 | 西北大学 | Watermark embedding and extracting method for ultrashort Chinese text |
CN104850765A (en) * | 2014-02-19 | 2015-08-19 | 中国移动通信集团福建有限公司 | Watermark processing method, device and system |
WO2016165466A1 (en) * | 2015-07-07 | 2016-10-20 | 中兴通讯股份有限公司 | Information hiding method and corresponding terminal device |
CN108024114A (en) * | 2017-11-23 | 2018-05-11 | 华南理工大学 | A kind of lossless HEVC information concealing methods of large capacity based on the modification of flag bit parameter |
Non-Patent Citations (2)
Title |
---|
Junling Ren.Information Hiding Algorithm Based on Predictive Coding.《2009 International Conference on Information Technology and Computer Science》.2009,全文. * |
张黎.基于安全通信的信息隐藏技术研究.《信息通信》.2019,第19-20页. * |
Also Published As
Publication number | Publication date |
---|---|
CN111199746A (en) | 2020-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20020126872A1 (en) | Method, apparatus and programs for generating and utilizing content signatures | |
CN110457873B (en) | Watermark embedding and detecting method and device | |
EP2657884A2 (en) | Identifying multimedia objects based on multimedia fingerprint | |
CN111199746B (en) | Information hiding method and hidden information extracting method | |
CN113627207B (en) | Bar code identification method, device, computer equipment and storage medium | |
CN112966713B (en) | DGA domain name detection method and device based on deep learning and computer equipment | |
CN114528394B (en) | Text triple extraction method and device based on mask language model | |
KR20200058329A (en) | 2-D code error correction decoding | |
CN116663549A (en) | Digitized management method, system and storage medium based on enterprise files | |
CN115952528A (en) | Multi-scale combined text steganography method and system | |
CN115712909A (en) | Text watermark embedding method, tracing method and system based on block chain | |
CN118349970A (en) | Text watermark embedding and detecting method based on model context learning | |
CN114036561A (en) | Information hiding method, information acquiring method, information hiding device, information acquiring device, storage medium and electronic equipment | |
CN109413595B (en) | Spam short message identification method, device and storage medium | |
CN107766771B (en) | Two-dimensional code detection method and terminal | |
US10236004B2 (en) | Data encoding and decoding method and system | |
US9600771B2 (en) | Information coding based on semantic data reasoning | |
CN112866257B (en) | Domain name detection method, system and device | |
CN117291787B (en) | Traceability method and system based on data watermark | |
CN113537484B (en) | Network training, encoding and decoding method, device and medium for digital watermarking | |
CN113705806B (en) | Network training, encoding and decoding method, device and medium for digital watermarking | |
CN111753521B (en) | Reading understanding method based on artificial intelligence and related equipment | |
CN117708779B (en) | Data watermarking processing method, tracing method and storage medium | |
CN111626911B (en) | Image processing method, device, server and storage medium | |
CN118135615A (en) | Unsupervised fingerprint anti-counterfeiting method based on fingertip tissue structure priori |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |