WO2017128788A1 - 一种wifi密码的分享方法及分享系统 - Google Patents

一种wifi密码的分享方法及分享系统 Download PDF

Info

Publication number
WO2017128788A1
WO2017128788A1 PCT/CN2016/103893 CN2016103893W WO2017128788A1 WO 2017128788 A1 WO2017128788 A1 WO 2017128788A1 CN 2016103893 W CN2016103893 W CN 2016103893W WO 2017128788 A1 WO2017128788 A1 WO 2017128788A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
password
carrier
picture
sharing
Prior art date
Application number
PCT/CN2016/103893
Other languages
English (en)
French (fr)
Inventor
喻海中
Original Assignee
上海斐讯数据通信技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海斐讯数据通信技术有限公司 filed Critical 上海斐讯数据通信技术有限公司
Publication of WO2017128788A1 publication Critical patent/WO2017128788A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10004Still image; Photographic image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20021Dividing image into blocks, subimages or windows
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20052Discrete cosine transform [DCT]

Definitions

  • the invention relates to the field of password sharing, in particular to a method and a sharing system for sharing WIFI passwords.
  • the traditional method of sharing WIFI passwords is dictation, written notification, etc.
  • This method of WIFI password sharing is prone to problems such as password leakage.
  • the WIFI password is written into the NFC password tag of the network device.
  • the password is read from the NFC password tag during the process in which the shared user terminal is close to the NFC password tag.
  • this WIFI password sharing method cannot control the defects such as sharing time and sharing objects, thereby reducing the protection of WIFI passwords.
  • the method for sharing a WIFI password includes: Step S10: generating a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; and step S20, according to the obtained carrier picture, the password After the watermark image is embedded on the carrier picture, the watermark carrier picture is formed; in step S30, the watermark carrier picture is shared and transmitted to the shared terminal; and step S40 extracts the password watermark information in the watermark carrier picture according to the received watermark carrier picture.
  • Step S60 identifies the shared password in the password watermark information based on the extracted password watermark information.
  • the method further includes: step S01, according to the acquired carrier picture, dividing the carrier picture into a plurality of carrier picture blocks that are not covered by each other.
  • the sharing method further includes: step S11, according to the number of blocks of the divided carrier picture block, dividing the password watermark picture into a plurality of block watermark picture blocks that are not covered by each other, and the number of blocks of the carrier picture block is the password. An even multiple of the number of blocks of the watermark picture block.
  • step S20 includes: step S21 performs domain transformation on a per-block basis picture block according to the divided carrier picture block; step S22 selects a watermark position embedded in a block watermark picture block according to the domain-transformed carrier picture block. Information; step S23 is based on the selected watermark For the location information, each block of the watermark picture block is embedded in the domain-transformed piece of the carrier picture block; in step S24, the carrier picture block in which the coded watermark picture block is embedded is inversely transformed in the domain to form a watermark carrier picture.
  • step S40 includes: step S41, according to the received watermark carrier picture, dividing the watermark carrier picture into a plurality of watermark carrier picture blocks that are not covered by each other; step S42, according to the divided watermark carrier picture blocks, one by one Each watermark carrier picture block performs domain transformation; step S43 extracts reference information of the cryptographic watermark picture block embedding position according to the domain transformed watermark carrier picture block; and step S44 calculates each watermark carrier picture block according to the extracted reference information. Password watermark information.
  • step S60 includes: step S61, combining all the calculated password watermark information according to the calculated password watermark information; and step S62, identifying the shared password in the password watermark information according to the combined password watermark information.
  • the sharing method further includes: step S70, determining, according to the shared password obtained by sharing, whether the shared password is the same as the preset password; if the shared password is the same as the preset password in step S71, the shared password is verified; In step S72, if the shared password is different from the preset password, the shared password cannot be verified.
  • the sharing method further includes: determining whether there is an attack sign in the password watermark information in step S50; and if there is an attack sign in the password watermark information in step S51, the watermark carrier image is attacked during the sharing transmission; step S52 If there is no attack sign in the password watermark information, the watermark carrier picture is not attacked during the share transmission.
  • a WIFI password sharing system includes: a watermark generating module, the watermark generating module generates a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; the watermark embedding module, the watermark embedding The module embeds the password watermark image into the carrier picture according to the obtained carrier picture, and forms a watermark carrier picture; the sharing transmission module, the sharing transmission module receives the watermark carrier picture output by the watermark embedding module, and shares the transmission a watermark carrier picture to the shared terminal; a watermark extraction module, the watermark extraction module receiving the watermark carrier picture sent by the sharing transmission module, extracting the password watermark information in the watermark carrier picture; the password identification module, the password recognition module receiving The density of the watermark extraction module output The code watermark information identifies the shared password in the password watermark information.
  • the sharing system further includes: a segmentation module, and dividing the carrier image into a plurality of carrier image blocks that are not covered by each other according to the acquired carrier image.
  • the WIFI password sharing method uses a watermark algorithm to embed a pre-shared password into a picture, which can actively control the sharing time and share the object, and can improve the WIFI password in the sharing process. Confidentiality.
  • the sharing method divides the image into blocks and then performs embedding or extraction, thereby improving the reliability of the sharing method. This sharing method also verifies the correctness of the password after identifying the shared password, and perfects the sharing method.
  • the sharing method can also timely discover whether the watermark carrier image receives an attack during the transmission process, thereby ensuring the security of the transmission and preventing the password from being tampered with; in addition, whether or not the attack is received, the correct sharing of the password is not affected, and the password is improved.
  • the safety and reliability of the method can also timely discover whether the watermark carrier image receives an attack during the transmission process, thereby ensuring the security of the transmission and preventing the password from being tampered with; in addition, whether or not the attack is received, the correct sharing of the password is not affected, and the password is improved.
  • FIG. 1 is a schematic flow chart of a method for sharing a WIFI password according to the present invention
  • FIG. 2 is a schematic flow chart of another method for sharing a WIFI password according to the present invention.
  • FIG. 3 is a partial flow chart showing a method for sharing a WIFI password in the present invention.
  • FIG. 4 is a partial flow chart showing a method for sharing a WIFI password in the present invention.
  • FIG. 5 is a schematic flowchart diagram of still another method for sharing a WIFI password according to the present invention.
  • FIG. 6 is a schematic flow chart of another method for sharing a WIFI password according to the present invention.
  • FIG. 7 is a schematic structural diagram of a WIFI password sharing system of the present invention.
  • FIG. 8 is a partial schematic structural diagram of another WIFI password sharing system according to the present invention.
  • FIG. 9 is a partial schematic structural diagram of another WIFI password sharing system according to the present invention.
  • FIG. 10 is a schematic flowchart diagram of still another method for sharing a WIFI password according to the present invention.
  • Figure 11 is a schematic illustration of a watermark image in the present invention.
  • a method for sharing a WIFI password includes: Step S10: generating a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password;
  • the password may be input by the user, or may be obtained by acquiring the password stored on the active sharing terminal;
  • step S20 embeds the password watermark image into the carrier image according to the obtained carrier picture to form a watermark carrier picture;
  • the carrier picture It may be a specific picture selected by the user, or may be a picture randomly acquired by the active sharing terminal from a certain library;
  • FIG. 2 is a schematic flow chart of another method for sharing a WIFI password according to the present invention.
  • FIG. 3 is a partial flow chart of a method for sharing a WIFI password in the present invention.
  • 4 is a partial flow chart of a method for sharing a WIFI password in the present invention.
  • a method for sharing a WIFI password includes:
  • Step S10 Generate a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; the pre-shared password may be input by the user, or may acquire a password stored on the active sharing terminal;
  • the method further includes the step S11, according to the number of blocks of the divided carrier picture block, dividing the password watermark picture into a plurality of block watermark picture blocks that are not covered by each other, and the number of blocks of the carrier picture block is the code watermark picture block.
  • the even number of blocks is equal;
  • the size of the cipher watermark picture is M m *N m in step S11;
  • the method further includes: step S21, performing domain transformation on a per-block basis picture block according to the divided carrier picture block; performing domain transformation on each piece of the carrier picture block one by one in step S21 means: one by one each of the carrier picture blocks
  • the method further includes the step S24, after performing a domain inverse transform on the carrier picture block in which the cipher watermark picture block is embedded, to form a watermark carrier picture; in step S24, the carrier picture block of the cipher watermark picture block is embedded one by one to perform inverse domain transformation.
  • Step S30 sharing and transmitting the watermark carrier image to the shared terminal
  • the method further includes the step S41, according to the received watermark carrier picture, dividing the watermark carrier picture into a plurality of watermark carrier picture blocks that are not covered by each other; the watermark carrier image block size 8*8, the watermark carrier in step S41
  • the method further includes the step S42: performing field transformation on each of the watermark carrier picture blocks one by one according to the divided watermark carrier picture blocks; and performing domain transformation on each of the watermark carrier picture blocks one by one in step S42: one by one
  • the watermark carrier picture block performs a two-dimensional DCT transform
  • the method further includes: Step S43: extracting reference information of the location where the cipher watermark picture block is embedded according to the watermark carrier picture block after the domain transformation; and extracting the reference information of the cipher watermark picture block embedding position in step S43: extracting the cipher watermark picture block The intermediate frequency coefficient of the embedded position;
  • the method further includes the step S61, according to the calculated password watermark information, combining all the extracted password watermark information; preferably, the method further includes the step S62, identifying the shared password in the password watermark information according to the combined password watermark information.
  • FIG. 5 is a schematic flow chart of still another method for sharing a WIFI password according to the present invention.
  • a method for sharing a WIFI password includes:
  • Step S10 Generate a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; the pre-shared password may be input by the user, or may acquire a password stored on the active sharing terminal;
  • the watermark image is divided into a password M c * N c block cipher watermark image block and do not cover, said carrier blocks for the number of image blocks An even multiple of the number of blocks of the cipher watermark picture block;
  • the size of the cipher watermark picture is M m *N m in step S11;
  • the size of the block is (M m *8/M c )*(N m *8/N c );
  • the method further includes: step S21, performing domain transformation on a per-block basis picture block according to the divided carrier picture block; performing domain transformation on each piece of the carrier picture block one by one in step S21 means: one by one each of the carrier picture blocks
  • Step S30 sharing and transmitting the watermark carrier image to the shared terminal
  • the image carrier watermark into M c * N c blocks watermark image carrier and do not cover the block; the size of the watermark image carrier block 8 in step S41 * 8.
  • the method further includes the step S42, according to the divided watermark carrier picture block, one by one each block
  • the watermark carrier picture block performs domain transformation; in step S42, performing domain transformation on each watermark carrier picture block one by one means: performing two-dimensional DCT transformation on each watermark carrier picture block one by one;
  • the method further includes: Step S43: extracting reference information of the location where the cipher watermark picture block is embedded according to the watermark carrier picture block after the domain transformation; and extracting the reference information of the cipher watermark picture block embedding position in step S43: extracting the cipher watermark picture block The intermediate frequency coefficient of the embedded position;
  • the method further includes: step S61, combining all the cryptographic watermark information extracted according to the calculated cryptographic watermark information; and preferably, further comprising: step S62, identifying the shared password in the cryptographic watermark information according to the combined cryptographic watermark information;
  • Step S70 determining, according to the shared password obtained by sharing, whether the shared password and the preset password are the same; step S71, if the shared password is the same as the preset password, the shared password is verified; and if the shared password is used in step S72 If the default password is different, the shared password cannot be verified.
  • FIG. 6 is a schematic flow chart of another method for sharing a WIFI password according to the present invention. As shown in FIG. 6, according to still another embodiment of the present invention, a method for sharing a WIFI password includes:
  • Step S10 Generate a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; the pre-shared password may be input by the user, or may acquire a password stored on the active sharing terminal;
  • the method further includes the step S11, according to the number of blocks of the divided carrier picture block, dividing the password watermark picture into a plurality of block watermark picture blocks that are not covered by each other, and the number of blocks of the carrier picture block is the code watermark picture block.
  • the even number of blocks is equal;
  • the size of the cipher watermark picture is M m *N m in step S11;
  • the method further includes: step S21, performing domain transformation on a per-block basis picture block according to the divided carrier picture block; performing domain transformation on each piece of the carrier picture block one by one in step S21 means: one by one each of the carrier picture blocks
  • Step S30 sharing and transmitting the watermark carrier image to the shared terminal
  • the method further includes the step S41, according to the received watermark carrier picture, dividing the watermark carrier picture into a plurality of watermark carrier picture blocks that are not covered by each other; the watermark carrier image block size 8*8, the watermark carrier in step S41
  • the method further includes the step S42: performing field transformation on each of the watermark carrier picture blocks one by one according to the divided watermark carrier picture blocks; and performing domain transformation on each of the watermark carrier picture blocks one by one in step S42: one by one
  • the watermark carrier picture block performs a two-dimensional DCT transform
  • the method further includes the step S43: extracting the password according to the watermark carrier picture block after the domain transformation.
  • the reference information of the watermark picture block embedding position; extracting the reference information of the embedding location of the cipher watermark picture block in step S43 means: extracting the intermediate frequency coefficient of the embedding position of the cipher watermark picture block;
  • Step S50 determining whether there is an attack sign in the password watermark information; the attack sign is a black and white small spot or a missing corner;
  • Step S51 if there is an attack sign (black and white small spot or missing corner) in the password watermark information, the watermark carrier picture is attacked during the sharing transmission (noise attack or cut attack); if there is an attack sign, the transmission is performed Report an error or give other reminders to the user.
  • an attack sign black and white small spot or missing corner
  • Step S52 if there is no attack sign (black and white small spot or missing corner) in the password watermark information, the watermark carrier picture is not attacked (noise attack or cut attack) during the sharing transmission; if there is no attack sign Proceed to step S60.
  • the method further includes: step S61, combining all the cryptographic watermark information extracted according to the calculated cryptographic watermark information; and preferably, further comprising: step S62, identifying the shared password in the cryptographic watermark information according to the combined cryptographic watermark information;
  • Step S70 determining, according to the shared password obtained by sharing, whether the shared password and the preset password are the same; step S71, if the shared password is the same as the preset password, the shared password is verified; and if the shared password is used in step S72 If the default password is different, the shared password cannot be verified.
  • FIG. 7 is a schematic structural diagram of a sharing system of the present invention.
  • a WIFI password sharing system includes: a watermark generating module 10, configured to generate a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password;
  • the pre-shared password may be input by the user, or may acquire the password stored on the active sharing terminal;
  • the watermark embedding module 20 embeds the password watermark image into the carrier image according to the obtained carrier picture to form a watermark.
  • the carrier picture may be a specific picture selected by the user, or may be a picture randomly acquired by the active sharing terminal from a certain library;
  • the sharing transmission module 30 shares and transmits the watermark carrier picture to the shared terminal;
  • Watermark extraction module 40 And extracting the password watermark information in the watermark carrier picture according to the received watermark carrier picture;
  • the password identification module 60 according to the extracted password watermark information, identifying the shared password in the password watermark information.
  • FIG. 8 is a partial schematic structural diagram of another sharing system of the present invention.
  • Figure 9 is a block diagram showing the structure of a part of another sharing system of the present invention.
  • a WIFI password sharing system includes:
  • the watermark generating module 10 generates a password watermark image corresponding to the pre-shared password according to the obtained pre-shared password; the pre-shared password may be input by the user, or may acquire the password stored on the active sharing terminal;
  • the method further includes a segmentation module 11 that divides the cryptographic watermark image into cipher watermark image blocks that are not covered by the M m *N m blocks according to the number of blocks of the divided carrier picture blocks, and the number of blocks of the carrier picture block M c *N c is an even multiple of the number of blocks M m *N m of the cipher watermark picture block;
  • the size of the cipher watermark picture is M m *N m in step S11;
  • the domain transformation module 21 further performs domain transformation on a per-block basis picture block according to the divided carrier picture block; and performing domain transformation on a per-carrier picture block one by one in step S21 means: one by one
  • the location selection module 22 further selects, according to the domain-transformed carrier picture block, watermark location information embedded in a block of watermark picture blocks; and in step S22, r is selected from the intermediate frequency of F m (u, v).
  • Loading position, 1 ⁇ r ⁇ (M m *8/M c )*(N m *8/N c ), W b (r) is the cryptographic watermark picture block W m w m (x',y') Position function
  • the watermark embedding module 20 further comprises: embedding each block of the watermark picture block into the domain-transformed piece of the carrier picture block according to the selected watermark position information; and in step S23, according to the addition criterion, according to the following formula, the password is
  • the domain inverse transform module 23 is further configured to perform a domain inverse transform on the carrier picture block in which the cipher watermark picture block is embedded, to form a watermark carrier picture; and in step S24, the carrier picture block of the cipher watermark picture block is embedded one by one.
  • the domain transformation sub-module 42 further performs domain transformation on each of the watermark carrier picture blocks according to the divided watermark carrier picture block; and performing domain transformation on each of the watermark carrier picture blocks one by one in step S42: Performing a two-dimensional DCT transform on each of the watermark carrier picture blocks one by one;
  • the information extraction module 43 further extracts reference information of the location where the cipher watermark picture block is embedded according to the watermark carrier picture block after the domain transformation; and extracts the reference information of the cipher watermark picture block embedding position in step S43: extracting the password The intermediate frequency coefficient of the watermark picture block embedding position;
  • the method further includes a watermark extraction module 40, and calculating password watermark information in each watermark carrier picture block according to the extracted reference information; and calculating a calculation formula of the password watermark information in each watermark carrier picture block in step S44.
  • W b (r) Y r /a;
  • the determining module 50 determines whether there is an attack sign in the password watermark information; the attack sign is a black and white small spot or a missing corner;
  • the watermark carrier picture is not attacked during the sharing transmission (pick salt noise attack or shear attack);
  • the password recognition module 60 further combines all the extracted password watermark information according to the calculated password watermark information.
  • the password recognition module 60 further identifies the password watermark information according to the combined password watermark information. Shared password;
  • the password verification module 70 determines whether the shared password is the same as the preset password according to the shared password obtained by sharing; if the shared password is the same as the preset password, the shared password is verified in the password verification module 70; The shared password is different from the preset password, and the shared password cannot be verified in the password verification module 70.
  • FIG. 10 is a schematic flowchart diagram of still another method for sharing a WIFI password according to the present invention.
  • Figure 11 is a schematic illustration of a watermark image in the present invention.
  • a method for sharing a WIFI password includes:
  • a texture rich image may be selected, and in order to improve the transmission efficiency, the selected image size should not be too large;
  • the digital watermark is generated, that is, the password is edited.
  • the digital watermark represents the password of the password sharing end, and the password is embedded in the carrier image in the form of a picture; since the maximum length of the WIFI password is usually 64 bits, the watermark image can be equally divided into 8x8.
  • the area to store the WIFI password each area selects the appropriate number of pixels to encode and place a password character image, such as 32x32 pixels, 64x64 pixels; if each character encodes too few pixels, it is not conducive to subsequent characters. The recognition, too much affects the efficiency of watermark generation; assuming the password is PHICOMM (as shown in Figure 11), setting the number of pixels per character encoding to 32x32, the generated watermark image size is 256x256;
  • Adding a watermark is actually a process of re-encoding and synthesizing a common standard image and a watermark image; for a digital image to which a watermark is added, it is difficult to detect a change of a picture in a human visual system; since the digital watermark is secretive and secure , robust features, so in the password sharing can be done without leaking to others; currently, in the digital image watermarking technology, already has a large
  • the quantity correlation algorithm can be used, which is mainly divided into: water domain based watermark algorithm and transform domain based watermarking algorithm (mainly based on discrete cosine transform DCT, discrete Fourier transform DFT, discrete wavelet transform DWT theory watermark algorithm) Watermarking algorithm based on image compression domain;
  • the sharer and the shareee can complete the transmission of the watermark image through communication technologies such as Bluetooth, NFC, and WIFI;
  • Extracting the watermark image that is, decoding and extracting the watermark information from the carrier picture, the process is included in the decoding process of the digital watermark algorithm;
  • the watermark image After identifying and verifying the WIFI password, after extracting the watermark image, the watermark image can be divided into 8x8 regions, and for each region image, the character recognition technology is used to identify the password characters represented by the image, thereby completing the verification of the WIFI password;
  • the method mainly comprises the steps of selecting an image, generating a digital watermark, adding a watermark, transmitting a watermark image, extracting and verifying the watermark image, and identifying and verifying the WIFI password.
  • a word watermark refers to a digital signal embedded in a digital carrier (including multimedia, documents, software, etc.), which can be all information that can be used as an identifier for images, words, symbols, numbers, and the like.
  • the digital watermark does not affect the normal use and existence value of the original carrier, and is not easy to be perceived by humans. Therefore, the technology can be used for password sharing, thereby solving the problem of password leakage.
  • Image digital watermarking technology uses image processing algorithm to embed watermark information into ordinary digital images and re-encode the image. After re-encoding, the human visual system can not detect the image changes, and the conventional image Processing algorithms such as denoising, enhancement, etc. have some robustness.
  • Digital watermark extraction of images that is, a process of decoding watermark information from a watermarked digital image using a decoding algorithm.
  • the invention has the advantages that the concealment, transmission reliability and tamper-proof robustness of the digital watermarking technology can effectively ensure the concealment and controllability of the password sharing, thereby preventing the password from being widely leaked, and the trouble of frequently changing the password is required. . Since the digital watermark is embedded in the digital image, there is no difference in visual effect between the digital image and the un-watermarked digital image, thus ensuring the concealment of the password. Since the digital image in the transmission is added with a digital watermark, even in the course of transmission, even if an attack is encountered, it can be detected quickly in the watermark extraction and verification, thereby ensuring the transmission is safe and reliable and preventing information tampering.
  • the invention can have effective selection in the process of password sharing The time, place and object of sharing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

一种WIFI密码的分享方法,包括:根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片(S10);根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片(S20);步骤S30分享传输所述水印载体图片至被分享终端上(S30);根据接收到的水印载体图片,提取所述水印载体图片中的密码水印信息(S40);根据提取的密码水印信息,识别出所述密码水印信息中的被分享密码(S60)。该方法利用水印算法将预分享密码嵌入到图片中,既可以主动控制其分享时间、分享对象;又能在分享过程中提高WIFI密码的保密性。

Description

一种WIFI密码的分享方法及分享系统 技术领域
本发明涉及密码分享领域,特别是涉及WIFI密码的分享方法及分享系统。
背景技术
分享WIFI密码的传统方法是口述、书面告知等,这种WIFI密码分享方法容易导致密码外泄等问题。近年来,为了防止WIFI密码在分享的过程中出现外泄,将WIFI密码写入网络设备的NFC密码标签中。在被分享用户终端靠近NFC密码标签的过程中,从NFC密码标签中读取密码。然而,这种WIFI密码分享方式存在无法控制其分享时间、分享对象等缺陷,从而降低了WIFI密码的保护力度。
发明内容
本发明提供的技术方案如下:
本发明提供的一种WIFI密码的分享方法,包括:步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;步骤S20根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;步骤S30分享传输所述水印载体图片至被分享终端上;步骤S40根据接收到的水印载体图片,提取所述水印载体图片中的密码水印信息;步骤S60根据提取的密码水印信息,识别出所述密码水印信息中的被分享密码。
进一步,在所述步骤S10之前还包括:步骤S01根据已获取的载体图片,将该载体图片分割成若干块互不覆盖的载体图片块。
进一步,本分享方法还包括:步骤S11根据分割后载体图片块的块数,将所述密码水印图片分割为若干块互不覆盖的密码水印图片块,所述载体图片块的块数为该密码水印图片块的块数的偶数倍。
进一步,所述步骤S20包括:步骤S21根据分割后的载体图片块,逐一对每块载体图片块进行域变换;步骤S22根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;步骤S23根据选取的水印 位置信息,将每块密码水印图片块嵌入到域变换后的一块载体图片块上;步骤S24逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片。
进一步,所述步骤S40包括:步骤S41根据接收到的水印载体图片,将所述水印载体图片分割成若干块互不覆盖的水印载体图片块;步骤S42根据分割后的水印载体图片块,逐一对每块水印载体图片块进行域变换;步骤S43根据域变换后的水印载体图片块,提取密码水印图片块嵌入位置的参考信息;步骤S44根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息。
进一步,所述步骤S60包括:步骤S61根据计算得到的密码水印信息,合并计算得到的所有密码水印信息;步骤S62根据合并后的密码水印信息,识别出所述密码水印信息中的被分享密码。
进一步,本分享方法还包括:步骤S70根据分享得到的被分享密码,判断该被分享密码与预设密码是否相同;步骤S71若该被分享密码与预设密码相同,则被分享密码完成验证;步骤S72若该被分享密码与预设密码不同,则被分享密码无法完成验证。
进一步,本分享方法还包括:步骤S50判断所述密码水印信息中是否存在攻击迹象;步骤S51若该密码水印信息中存在攻击迹象,则所述水印载体图片在分享传输过程中受到攻击;步骤S52若该密码水印信息中不存在攻击迹象,则所述水印载体图片在分享传输过程中没有受到攻击。
本法提供的一种WIFI密码的分享系统,包括:水印生成模块,该水印生成模块根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;水印嵌入模块,该水印嵌入模块根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;分享传输模块,该分享传输模块接收所述水印嵌入模块输出的水印载体图片,分享传输所述水印载体图片至被分享终端上;水印提取模块,该水印提取模块接收所述分享传输模块发送的水印载体图片,提取所述水印载体图片中的密码水印信息;密码识别模块,该密码识别模块接收所述水印提取模块输出的密 码水印信息,识别出所述密码水印信息中的被分享密码。
进一步,本分享系统还包括:分割模块,根据已获取的载体图片,将该载体图片分割成若干块互不覆盖的载体图片块。
与现有技术相比,本发明提供的WIFI密码的分享方法,利用水印算法将预分享密码嵌入到图片中,既可以主动控制其分享时间、分享对象;又能在分享过程中提高WIFI密码的保密性。本分享方法在水印嵌入或提取的过程中,将图片分割成块后,进行嵌入或提取,提高了本分享方法的可靠性。本分享方法还在识别出被分享密码后,验证该密码的正确性,完善了本分享方法。本分享方法还能够及时发现水印载体图片在传输的过程中是否收到攻击,从而保障了传输的安全性和防止密码被篡改;另外,无论是否收到攻击,均不影响密码的正确分享,提高了本方法的安全性、可靠性。
附图说明
下面将以明确易懂的方式,结合附图说明优选实施方式,对一种WIFI密码的分享方法及分享系统的上述特性、技术特征、优点及其实现方式予以进一步说明。
图1是本发明一种WIFI密码的分享方法的流程示意图;
图2是本发明另一种WIFI密码的分享方法的流程示意图;
图3是本发明中WIFI密码的分享方法的部分流程示意图;
图4是本发明中WIFI密码的分享方法的部分流程示意图;
图5是本发明再一种WIFI密码的分享方法的流程示意图;
图6是本发明又一种WIFI密码的分享方法的流程示意图;
图7是本发明一种WIFI密码的分享系统的组成结构示意图;
图8是本发明另一种WIFI密码的分享系统的部分组成结构示意图;
图9是本发明另一种WIFI密码的分享系统的部分组成结构示意图;
图10是本发明又又一种WIFI密码的分享方法的流程示意图;
图11是本发明中水印图片的示意图。
附图标号说明:
10、水印生成模块,11、分割模块,20、水印嵌入模块,21、域变换模块,22、位置选取模块,23、域反变换模块,30、分享传输模块,40、水印提取模块,41、分割子模块,42、域变换子模块,43、信息提取模块,50、判断模块,60、密码识别模块,70、密码验证模块。
具体实施方式
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对照附图说明本发明的具体实施方式。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图,并获得其他的实施方式。
为使图面简洁,各图中只示意性地表示出了与本发明相关的部分,它们并不代表其作为产品的实际结构。另外,以使图面简洁便于理解,在有些图中具有相同结构或功能的部件,仅示意性地绘示了其中的一个,或仅标出了其中的一个。在本文中,“一个”不仅表示“仅此一个”,也可以表示“多于一个”的情形。
图1是本发明一种WIFI密码的分享方法的流程示意图。如图1所示,根据本发明的一个实施例,一种WIFI密码的分享方法,包括:步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;步骤S20根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;该载体图片可以是用户选取的特定图片,也可以是主动分享终端从某个库中随机获取的一张图片;步骤S30分享传输所述水印载体图片至被分享终端上;步骤S40根据接收到的水印载体图片,提取所述水印载体图片中的密码水印信息;步骤S60根据提取的密码水印信息,识别出所述密码水印信息中的被分享密码。
图2是本发明另一种WIFI密码的分享方法的流程示意图。图3是本发明中WIFI密码的分享方法的部分流程示意图。图4是本发明中WIFI密码的分享方法的部分流程示意图。如图2、图3、图4所示,根据本发明的另一个实施例,一种WIFI密码的分享方法,包括:
步骤S01根据已获取的载体图片,将该载体图片分割成若干块互不覆 盖的载体图片块;在步骤S01中设载体图片函数为:X=f(x,y),载体图片的大小为Mc*Nc;载体图像块函数为:Xm=fm(x',y'),载体图像块的大小8*8;其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;
优选的,还包括步骤S11根据分割后载体图片块的块数,将所述密码水印图片分割为若干块互不覆盖的密码水印图片块,所述载体图片块的块数为该密码水印图片块的块数的偶数倍;在步骤S11中密码水印图片的大小为Mm*Nm;密码水印图片块函数为:Wm=wm(x',y'),密码水印图片块的大小为(Mm*8/Mc)*(Nm*8/Nc);
优选的,还包括步骤S21根据分割后的载体图片块,逐一对每块载体图片块进行域变换;在步骤S21中逐一对每块载体图片块进行域变换是指:逐一对每块载体图片块进行DCT变换;域变换后的载体图片块函数为:Ym=DCT(Xm)=Fm(u,v),其中Fm(u,v)为第m个图片离散余弦变换后空间频率(u,v)处的大小;
优选的,还包括步骤S22根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;在步骤S22中选取r为从Fm(u,v)中频选出的加载位置,1≤r≤(Mm*8/Mc)*(Nm*8/Nc),Wb(r)为密码水印图片块Wm=wm(x',y')的位置函数;
优选的,还包括步骤S23根据选取的水印位置信息,将每块密码水印图片块嵌入到域变换后的一块载体图片块上;在步骤S23中按照加法准则,根据以下公式,将密码水印图片块嵌入到载体图片块中,该公式为:Yr'=aWb(r);其中a为强度因子,然后用Yr'来代替嵌入水印后的DCT中频系数;
优选的,还包括步骤S24逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片;在步骤S24中逐一对嵌入有密码水印图片块的载体图片块进行域反变换是指:逐一对嵌入有密码水印图片块 的载体图片块进行DCT反变换;水印载体图片函数为:X'=f'(x',y');
步骤S30分享传输所述水印载体图片至被分享终端上;
优选的,还包括步骤S41根据接收到的水印载体图片,将所述水印载体图片分割成若干块互不覆盖的水印载体图片块;在步骤S41中水印载体图像块的大小8*8,水印载体图片块函数为:Xm'=fm'(x',y');其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
优选的,还包括步骤S42根据分割后的水印载体图片块,逐一对每块水印载体图片块进行域变换;在步骤S42中逐一对每块水印载体图片块进行域变换是指:逐一对每块水印载体图片块进行二维DCT变换;
优选的,还包括步骤S43根据域变换后的水印载体图片块,提取密码水印图片块嵌入位置的参考信息;在步骤S43中提取密码水印图片块嵌入位置的参考信息是指:提取密码水印图片块嵌入位置的中频系数;
优选的,还包括步骤S44根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息;在步骤S44中计算出每块水印载体图片块中的密码水印信息的计算公式为:Wb(r)=Yr/a;
优选的,还包括步骤S61根据计算得到的密码水印信息,合并提取到的所有密码水印信息;优选的,还包括步骤S62根据合并后的密码水印信息,识别出密码水印信息中的被分享密码。
图5是本发明再一种WIFI密码的分享方法的流程示意图。如图5所示,根据本发明的再一个实施例,一种WIFI密码的分享方法,包括:
步骤S01根据已获取的载体图片,将该载体图片分割成Mc*Nc块互不覆盖的载体图片块;在步骤S01中设载体图片函数为:X=f(x,y),载体图片的大小为Mc*Nc;载体图像块函数为:Xm=fm(x',y'),载体图像块的大小8*8;其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;
优选的,还包括步骤S11根据分割后载体图片块的块数,将所述密码 水印图片分割为Mc*Nc块互不覆盖的密码水印图片块,所述载体图片块的块数为该密码水印图片块的块数的偶数倍;在步骤S11中密码水印图片的大小为Mm*Nm;密码水印图片块函数为:Wm=wm(x',y'),密码水印图片块的大小为(Mm*8/Mc)*(Nm*8/Nc);
优选的,还包括步骤S21根据分割后的载体图片块,逐一对每块载体图片块进行域变换;在步骤S21中逐一对每块载体图片块进行域变换是指:逐一对每块载体图片块进行DCT变换;域变换后的载体图片块函数为:Ym=DCT(Xm)=Fm(u,v),其中Fm(u,v)为第m个图片离散余弦变换后空间频率(u,v)处的大小;
优选的,还包括步骤S22根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;在步骤S22中选取r为从Fm(u,v)中频选出的加载位置,1≤r≤(Mm*8/Mc)*(Nm*8/Nc),Wb(r)为密码水印图片块Wm=wm(x',y')的位置函数;
优选的,还包括步骤S23根据选取的水印位置信息,将每块密码水印图片块嵌入到域变换后的一块载体图片块上;在步骤S23中按照加法准则,根据以下公式,将密码水印图片块嵌入到载体图片块中,该公式为:Yr'=aWb(r);其中a为强度因子,然后用Yr'来代替嵌入水印后的DCT中频系数;
优选的,还包括步骤S24逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片;在步骤S24中逐一对嵌入有密码水印图片块的载体图片块进行域反变换是指:逐一对嵌入有密码水印图片块的载体图片块进行DCT反变换;水印载体图片函数为:X'=f'(x',y');
步骤S30分享传输所述水印载体图片至被分享终端上;
优选的,还包括步骤S41根据接收到的水印载体图片,将所述水印载体图片分割成Mc*Nc块互不覆盖的水印载体图片块;在步骤S41中水印载体图像块的大小8*8,水印载体图片块函数为:Xm'=fm'(x',y');其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
优选的,还包括步骤S42根据分割后的水印载体图片块,逐一对每块 水印载体图片块进行域变换;在步骤S42中逐一对每块水印载体图片块进行域变换是指:逐一对每块水印载体图片块进行二维DCT变换;
优选的,还包括步骤S43根据域变换后的水印载体图片块,提取密码水印图片块嵌入位置的参考信息;在步骤S43中提取密码水印图片块嵌入位置的参考信息是指:提取密码水印图片块嵌入位置的中频系数;
优选的,还包括步骤S44根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息;在步骤S44中计算出每块水印载体图片块中的密码水印信息的计算公式为:Wb(r)=Yr/a;
优选的,还包括步骤S61根据计算得到的密码水印信息,合并提取到的所有密码水印信息;优选的,还包括步骤S62根据合并后的密码水印信息,识别出密码水印信息中的被分享密码;
步骤S70根据分享得到的被分享密码,判断该被分享密码与预设密码是否相同;步骤S71若该被分享密码与预设密码相同,则被分享密码完成验证;步骤S72若该被分享密码与预设密码不同,则被分享密码无法完成验证。
图6是本发明又一种WIFI密码的分享方法的流程示意图。如图6所示,根据本发明的又一个实施例,一种WIFI密码的分享方法,包括:
步骤S01根据已获取的载体图片,将该载体图片分割成若干块互不覆盖的载体图片块;在步骤S01中设载体图片函数为:X=f(x,y),载体图片的大小为Mc*Nc;载体图像块函数为:Xm=fm(x',y'),载体图像块的大小8*8;其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;
优选的,还包括步骤S11根据分割后载体图片块的块数,将所述密码水印图片分割为若干块互不覆盖的密码水印图片块,所述载体图片块的块数为该密码水印图片块的块数的偶数倍;在步骤S11中密码水印图片的大小为Mm*Nm;密码水印图片块函数为:Wm=wm(x',y'),密码水印图片块 的大小为(Mm*8/Mc)*(Nm*8/Nc);
优选的,还包括步骤S21根据分割后的载体图片块,逐一对每块载体图片块进行域变换;在步骤S21中逐一对每块载体图片块进行域变换是指:逐一对每块载体图片块进行DCT变换;域变换后的载体图片块函数为:Ym=DCT(Xm)=Fm(u,v),其中Fm(u,v)为第m个图片离散余弦变换后空间频率(u,v)处的大小;
优选的,还包括步骤S22根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;在步骤S22中选取r为从Fm(u,v)中频选出的加载位置,1≤r≤(Mm*8/Mc)*(Nm*8/Nc),Wb(r)为密码水印图片块Wm=wm(x',y')的位置函数;
优选的,还包括步骤S23根据选取的水印位置信息,将每块密码水印图片块嵌入到域变换后的一块载体图片块上;在步骤S23中按照加法准则,根据以下公式,将密码水印图片块嵌入到载体图片块中,该公式为:Yr'=aWb(r);其中a为强度因子,然后用Yr'来代替嵌入水印后的DCT中频系数;
优选的,还包括步骤S24逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片;在步骤S24中逐一对嵌入有密码水印图片块的载体图片块进行域反变换是指:逐一对嵌入有密码水印图片块的载体图片块进行DCT反变换;水印载体图片函数为:X'=f'(x',y');
步骤S30分享传输所述水印载体图片至被分享终端上;
优选的,还包括步骤S41根据接收到的水印载体图片,将所述水印载体图片分割成若干块互不覆盖的水印载体图片块;在步骤S41中水印载体图像块的大小8*8,水印载体图片块函数为:Xm'=fm'(x',y');其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
优选的,还包括步骤S42根据分割后的水印载体图片块,逐一对每块水印载体图片块进行域变换;在步骤S42中逐一对每块水印载体图片块进行域变换是指:逐一对每块水印载体图片块进行二维DCT变换;
优选的,还包括步骤S43根据域变换后的水印载体图片块,提取密码 水印图片块嵌入位置的参考信息;在步骤S43中提取密码水印图片块嵌入位置的参考信息是指:提取密码水印图片块嵌入位置的中频系数;
优选的,还包括步骤S44根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息;在步骤S44中计算出每块水印载体图片块中的密码水印信息的计算公式为:Wb(r)=Yr/a;
步骤S50判断所述密码水印信息中是否存在攻击迹象;该攻击迹象为黑白小斑点或缺角等;
步骤S51若该密码水印信息中存在攻击迹象(黑白小斑点或缺角),则所述水印载体图片在分享传输过程中受到攻击(噪声攻击或剪切攻击);若出现攻击迹象,对传输进行报错或向接受用户进行其他方式的提醒。
步骤S52若该密码水印信息中不存在攻击迹象(黑白小斑点或缺角),则所述水印载体图片在分享传输过程中没有受到攻击(噪声攻击或剪切攻击);若不存在攻击迹象则继续执行步骤S60。
优选的,还包括步骤S61根据计算得到的密码水印信息,合并提取到的所有密码水印信息;优选的,还包括步骤S62根据合并后的密码水印信息,识别出密码水印信息中的被分享密码;
步骤S70根据分享得到的被分享密码,判断该被分享密码与预设密码是否相同;步骤S71若该被分享密码与预设密码相同,则被分享密码完成验证;步骤S72若该被分享密码与预设密码不同,则被分享密码无法完成验证。
图7是本发明一种分享系统的组成结构示意图。如图7所示,根据本发明的一个实施例,一种WIFI密码的分享系统,包括:水印生成模块10,根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;水印嵌入模块20,根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;该载体图片可以是用户选取的特定图片,也可以是主动分享终端从某个库中随机获取的一张图片;分享传输模块30,分享传输所述水印载体图片至被分享终端上;水印提取模块40, 根据接收到的水印载体图片,提取所述水印载体图片中的密码水印信息;密码识别模块60,根据提取的密码水印信息,识别出所述密码水印信息中的被分享密码。
图8是本发明另一种分享系统的部分组成结构示意图。图9是本发明另一种分享系统的部分组成结构示意图。如图8、图9所示,根据本发明的另一个实施例,一种WIFI密码的分享系统,包括:
分割模块11,根据已获取的载体图片,将该载体图片分割成Mc*Nc块互不覆盖的载体图片块;在步骤S01中设载体图片函数为:X=f(x,y),载体图片的大小为Mc*Nc;载体图像块函数为:Xm=fm(x',y'),载体图像块的大小8*8;其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
水印生成模块10,根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;该预分享密码可以是由用户输入,也可以是获取主动分享终端上已存储的密码;
优选的,还包括分割模块11,根据分割后载体图片块的块数,将所述密码水印图片分割为Mm*Nm块互不覆盖的密码水印图片块,所述载体图片块的块数Mc*Nc为该密码水印图片块的块数Mm*Nm的偶数倍;在步骤S11中密码水印图片的大小为Mm*Nm;密码水印图片块函数为:Wm=wm(x',y'),密码水印图片块的大小为(Mm*8/Mc)*(Nm*8/Nc);
优选的,还包括域变换模块21,根据分割后的载体图片块,逐一对每块载体图片块进行域变换;在步骤S21中逐一对每块载体图片块进行域变换是指:逐一对每块载体图片块进行DCT变换;域变换后的载体图片块函数为:Ym=DCT(Xm)=Fm(u,v),其中Fm(u,v)为第m个图片离散余弦变换后空间频率(u,v)处的大小;
优选的,还包括位置选取模块22,根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;在步骤S22中选取r为从Fm(u,v)中频选出的加载位置,1≤r≤(Mm*8/Mc)*(Nm*8/Nc),Wb(r)为密码水印图片块Wm=wm(x',y')的位置函数;
优选的,还包括水印嵌入模块20,根据选取的水印位置信息,将每 块密码水印图片块嵌入到域变换后的一块载体图片块上;在步骤S23中按照加法准则,根据以下公式,将密码水印图片块嵌入到载体图片块中,该公式为:Yr'=aWb(r);其中a为强度因子,然后用Yr'来代替嵌入水印后的DCT中频系数;
优选的,还包括域反变换模块23,逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片;在步骤S24中逐一对嵌入有密码水印图片块的载体图片块进行域反变换是指:逐一对嵌入有密码水印图片块的载体图片块进行DCT反变换;水印载体图片函数为:X'=f'(x',y');
分享传输模块30,分享传输所述水印载体图片至被分享终端上;
优选的,还包括分割子模块41,根据接收到的水印载体图片,将所述水印载体图片分割成Mc*Nc块互不覆盖的水印载体图片块;在步骤S41中水印载体图像块的大小8*8,水印载体图片块函数为:Xm'=fm'(x',y');其中m=1,2,......,(Mc/8)*(Nc/8),记为0≤x’,y’≤8;
优选的,还包括域变换子模块42,根据分割后的水印载体图片块,逐一对每块水印载体图片块进行域变换;在步骤S42中逐一对每块水印载体图片块进行域变换是指:逐一对每块水印载体图片块进行二维DCT变换;
优选的,还包括信息提取模块43,根据域变换后的水印载体图片块,提取密码水印图片块嵌入位置的参考信息;在步骤S43中提取密码水印图片块嵌入位置的参考信息是指:提取密码水印图片块嵌入位置的中频系数;
优选的,还包括水印提取模块40,根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息;在步骤S44中计算出每块水印载体图片块中的密码水印信息的计算公式为:Wb(r)=Yr/a;
判断模块50,判断所述密码水印信息中是否存在攻击迹象;该攻击迹象为黑白小斑点或缺角等;
若该密码水印信息中存在攻击迹象(黑白小斑点或缺角),则所述水 印载体图片在分享传输过程中受到攻击(椒盐噪声攻击或剪切攻击);
若该密码水印信息中不存在攻击迹象(黑白小斑点或缺角),则所述水印载体图片在分享传输过程中没有受到攻击(椒盐噪声攻击或剪切攻击);
优选的,还包括密码识别模块60,根据计算得到的密码水印信息,合并提取到的所有密码水印信息;优选的,还包括密码识别模块60根据合并后的密码水印信息,识别出密码水印信息中的被分享密码;
密码验证模块70,根据分享得到的被分享密码,判断该被分享密码与预设密码是否相同;若该被分享密码与预设密码相同,被分享密码在密码验证模块70中完成验证;若该被分享密码与预设密码不同,被分享密码在密码验证模块70中无法完成验证。
图10是本发明又又一种WIFI密码的分享方法的流程示意图。图11是本发明中水印图片的示意图。根据本发明的一个实施例,一种WIFI密码的分享方法,包括:
选取图像,为了在图像上进行数字水印的添加,可以选用纹理较为丰富的图像,同时为了提高传输的效率,选用的图像尺寸不宜过大;
生成数字水印,即编辑密码,数字水印代表了密码分享端的密码,密码以图片的形式内嵌到载体图片中;由于WIFI密码的最大长度通常为64位,因此可将水印图像平均分拆成8x8个的区域来存放WIFI密码,每个区域选取合适数量的像素点来编码放置一个密码字符图像,如32x32个像素,64x64个像素;若每个字符编码的像素点数太少,则不利于后续字符的识别,过多则影响水印生成的效率;假设密码为PHICOMM(如图11所示),设置每个字符编码的像素点数为32x32,则所生成水印图像大小为256x256;
添加水印,实际上是对普通标准图像和水印图片进行重编码合成的过程;对于添加了水印的数字图像来说,在人的视觉系统上不易察觉出图片的变化;由于数字水印具有隐秘,安全,鲁棒的特点,因此在进行密码分享中可以做到不泄露给他人;目前,在数字图像水印技术上,已经拥有大 量相关的算法可提供使用,主要分为:基于空间域的水印算法、基于变换域的水印算法(主要有基于离散余弦变换DCT、离散傅里叶变换DFT、离散小波变换DWT理论的水印算法)、基于图像压缩域的水印算法;
传输图像,在进行密码分享过程中,分享者与被分享者可以通过蓝牙、NFC、WIFI等通信技术来完成水印图像的传输;
提取水印图像,即将水印信息从载体图片中解码提取出来,该过程囊括在数字水印算法的解码过程中;
识别与验证WIFI密码,在提取出水印图片后,可以对水印图片进行分割8x8个区域,对每个区域图片,采用字符识别技术,识别出图片所代表的密码字符,从而完成WIFI密码的验证;本方法主要包括选取图像,生成数字水印,添加水印,传输水印图像,水印图像提取与校验;WIFI密码的识别与验证等步骤。
字水印是指嵌入数字载体(包括多媒体、文档、软件等)中的数字信号,它可以是图像、文字、符号、数字等所有可以作为标识的信息。数字水印既不影响原始载体的正常使用及存在价值,也不容易被人感知,因而可以将其该技术用于密码分享,从而解决密码的泄露问题。图像数字水印技术是采用图像处理算法,把水印标志信息内嵌到普通数字图像中,对图像进行重新编码,在重编码后,人的视觉系统并不能察觉出图像的变化,且对常规的图像处理算法,如去噪,增强等有一定的鲁棒性。图像的数字水印提取,即采用解码算法将水印信息从带水印的数字图像中解码出来的过程。
本发明的优点在于,数字水印技术的隐蔽性、传输可靠性、防篡改的鲁棒性能够有效的保证密码分享的隐蔽性和可控性,从而防止密码被广泛泄露,需要频繁修改密码的烦恼。数字水印由于内嵌在数字图像中,与未添加水印数字图像在视觉效果上并没有区别,因此保证了密码的隐蔽性。传输中的数字图像由于添加了数字水印,因此在传输过程中,即使遭遇了攻击,在进行水印提取和校验中能够迅速侦查出来,从而保障了传输得安全可靠和防止信息篡改。本发明在进行密码分享过程中,可有有效的选择 分享的时间、地点与分享的对象。
应当说明的是,上述实施例均可根据需要自由组合。以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (10)

  1. 一种WIFI密码的分享方法,其特征在于,包括:
    步骤S10根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;
    步骤S20根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;
    步骤S30分享传输所述水印载体图片至被分享终端上;
    步骤S40根据接收到的水印载体图片,提取所述水印载体图片中的密码水印信息;
    步骤S60根据提取的密码水印信息,识别出所述密码水印信息中的被分享密码。
  2. 如权利要求1所述的WIFI密码的分享方法,其特征在于,在所述步骤S10之前还包括:
    步骤S01根据已获取的载体图片,将该载体图片分割成若干块互不覆盖的载体图片块。
  3. 如权利要求2所述的WIFI密码的分享方法,其特征在于,还包括:
    步骤S11根据分割后载体图片块的块数,将所述密码水印图片分割为若干块互不覆盖的密码水印图片块,所述载体图片块的块数为该密码水印图片块的块数的偶数倍。
  4. 如权利要求3所述的WIFI密码的分享方法,其特征在于,所述步骤S20包括:
    步骤S21根据分割后的载体图片块,逐一对每块载体图片块进行域变换;
    步骤S22根据域变换后的载体图片块,选取嵌入一块密码水印图片块的水印位置信息;
    步骤S23根据选取的水印位置信息,将每块密码水印图片块嵌入到域变换后的一块载体图片块上;
    步骤S24逐一对嵌入有密码水印图片块的载体图片块进行域反变换后,形成水印载体图片。
  5. 如权利要求1所述的WIFI密码的分享方法,其特征在于,所述步骤S40包括:
    步骤S41根据接收到的水印载体图片,将所述水印载体图片分割成若干块互不覆盖的水印载体图片块;
    步骤S42根据分割后的水印载体图片块,逐一对每块水印载体图片块进行域变换;
    步骤S43根据域变换后的水印载体图片块,提取密码水印图片块嵌入位置的参考信息;
    步骤S44根据提取的参考信息,计算出每块水印载体图片块中的密码水印信息。
  6. 如权利要求5所述的WIFI密码的分享方法,其特征在于,所述步骤S60包括:
    步骤S61根据计算得到的密码水印信息,合并计算得到的所有密码水印信息;
    步骤S62根据合并后的密码水印信息,识别出所述密码水印信息中的被分享密码。
  7. 如权利要求1~6中任意一项所述的WIFI密码的分享方法,其特征在于,还包括:
    步骤S70根据分享得到的被分享密码,判断该被分享密码与预设密码是否相同;
    步骤S71若该被分享密码与预设密码相同,则被分享密码完成验证;
    步骤S72若该被分享密码与预设密码不同,则被分享密码无法完成验证。
  8. 如权利要求1所述的WIFI密码的分享方法,其特征在于,还包括:
    步骤S50判断所述密码水印信息中是否存在攻击迹象;
    步骤S51若该密码水印信息中存在攻击迹象,则所述水印载体图片在分享传输过程中受到攻击;
    步骤S52若该密码水印信息中不存在攻击迹象,则所述水印载体图片在分享传输过程中没有受到攻击。
  9. 一种应用如权利要求1~8中任意一项所述的WIFI密码的分享方法的分享系统,其特征在于,包括:
    水印生成模块,该水印生成模块根据获取到的预分享密码,生成与该预分享密码相对应的密码水印图片;
    水印嵌入模块,该水印嵌入模块根据获取到的载体图片,将所述密码水印图片嵌入到载体图片上后,形成水印载体图片;
    分享传输模块,该分享传输模块接收所述水印嵌入模块输出的水印载体图片,分享传输所述水印载体图片至被分享终端上;
    水印提取模块,该水印提取模块接收所述分享传输模块发送的水印载体图片,提取所述水印载体图片中的密码水印信息;
    密码识别模块,该密码识别模块接收所述水印提取模块输出的密码水印信息,识别出所述密码水印信息中的被分享密码。
  10. 根据如权利要求9所述的WIFI密码的分享系统,其特征在于,包括:
    分割模块,该分割模块根据已获取的载体图片,将该载体图片分割成若干块互不覆盖的载体图片块。
PCT/CN2016/103893 2016-01-25 2016-10-29 一种wifi密码的分享方法及分享系统 WO2017128788A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610049098.9 2016-01-25
CN201610049098.9A CN105427234A (zh) 2016-01-25 2016-01-25 一种wifi密码的分享方法及分享系统

Publications (1)

Publication Number Publication Date
WO2017128788A1 true WO2017128788A1 (zh) 2017-08-03

Family

ID=55505416

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/103893 WO2017128788A1 (zh) 2016-01-25 2016-10-29 一种wifi密码的分享方法及分享系统

Country Status (2)

Country Link
CN (1) CN105427234A (zh)
WO (1) WO2017128788A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427234A (zh) * 2016-01-25 2016-03-23 上海斐讯数据通信技术有限公司 一种wifi密码的分享方法及分享系统
CN105792197A (zh) * 2016-02-26 2016-07-20 上海斐讯数据通信技术有限公司 一种wifi密码分享方法及系统
CN106131828A (zh) * 2016-06-30 2016-11-16 维沃移动通信有限公司 一种WiFi密码共享方法、移动终端及云服务器

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040136528A1 (en) * 2002-12-27 2004-07-15 Kabushiki Kaisha Toshiba Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
CN1517855A (zh) * 2003-01-16 2004-08-04 成都市宇飞信息工程有限公司 图像数字水印方法
CN102129658A (zh) * 2011-03-10 2011-07-20 浪潮(北京)电子信息产业有限公司 数字水印实现方法和装置
CN102254298A (zh) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 数字水印的加解密方法和系统
CN102970307A (zh) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 密码安全系统和密码安全方法
CN103067367A (zh) * 2012-12-21 2013-04-24 网秦无限(北京)科技有限公司 密码隐蔽方法和装置、密码取回方法和装置
CN105427234A (zh) * 2016-01-25 2016-03-23 上海斐讯数据通信技术有限公司 一种wifi密码的分享方法及分享系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6956958B2 (en) * 2002-02-21 2005-10-18 Xerox Corporation Method of embedding color information in printed documents using watermarking
CN100518055C (zh) * 2003-12-10 2009-07-22 联想(北京)有限公司 一种安全的数据传输方法
CN104023332B (zh) * 2014-06-25 2018-01-16 上海斐讯数据通信技术有限公司 一种电子终端及其短信加密、解密方法
CN104933668B (zh) * 2015-06-11 2019-03-15 广东工业大学 一种基于局部定位和Alattar整数变换的可逆水印的处理方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040136528A1 (en) * 2002-12-27 2004-07-15 Kabushiki Kaisha Toshiba Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
CN1517855A (zh) * 2003-01-16 2004-08-04 成都市宇飞信息工程有限公司 图像数字水印方法
CN102129658A (zh) * 2011-03-10 2011-07-20 浪潮(北京)电子信息产业有限公司 数字水印实现方法和装置
CN102254298A (zh) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 数字水印的加解密方法和系统
CN102970307A (zh) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 密码安全系统和密码安全方法
CN103067367A (zh) * 2012-12-21 2013-04-24 网秦无限(北京)科技有限公司 密码隐蔽方法和装置、密码取回方法和装置
CN105427234A (zh) * 2016-01-25 2016-03-23 上海斐讯数据通信技术有限公司 一种wifi密码的分享方法及分享系统

Also Published As

Publication number Publication date
CN105427234A (zh) 2016-03-23

Similar Documents

Publication Publication Date Title
Mahto et al. A survey of color image watermarking: State-of-the-art and research directions
US8615103B2 (en) Method and system for embedding and extracting image digital watermark
Benrhouma et al. Chaotic watermark for blind forgery detection in images
Singh et al. Reversible data hiding based on Shamir’s secret sharing for color images over cloud
US7792377B2 (en) Method of image authentication and restoration
US8379911B2 (en) Method and system for efficient watermarking of video content
CN111932432B (zh) 盲水印的植入方法、检测方法、装置、设备及存储介质
Hsu et al. Enhancing the robustness of image watermarking against cropping attacks with dual watermarks
WO2017128788A1 (zh) 一种wifi密码的分享方法及分享系统
CN110889796B (zh) 水印嵌入和水印提取方法、装置及设备
Cheung et al. A sequential quantization strategy for data embedding and integrity verification
Ding et al. Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
Shehzad et al. LSB image steganography based on blocks matrix determinant method
Khalil et al. Two‐Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
Hsu et al. Digital watermarking scheme with visual cryptography
Gull et al. Color image authentication using dual watermarks
CN113810723B (zh) 视频数据保护方法、电子设备及计算机存储介质
Hiran et al. Robust & secure digital image watermarking technique using concatenation process
Stănescu et al. Cover processing-based steganographic model with improved security
Soppari et al. Study of digital watermarking algorithms for digital rights management and their attacks
CN106851436A (zh) Dct域内视频分形脆弱水印算法
Lee et al. An improved double image digital watermarking scheme using the position property
Jasmine Selvakumari Jeya et al. RONI based secured and authenticated indexing of lung CT images
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Bhattacharyya et al. A secured technique for image data hiding

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16887661

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16887661

Country of ref document: EP

Kind code of ref document: A1