Unlock instant, AI-driven research and patent intelligence for your innovation.

Information Steganography Method and System, Information Extraction Method and System Based on Big Data

An information extraction and big data technology, applied in digital transmission systems, redundancy in operations for data error detection, transmission systems, etc., can solve the problems of low value density of big data, destruction of secret information, loss of reliability, etc.

Active Publication Date: 2020-05-15
SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The value density of big data (carrier) is low, and the data may be deleted as junk data or updated as outdated data at any time, while the existing information steganography technology is designed and implemented for relatively stable carriers
If the existing information steganography technology is used for such a variable carrier (big data), the secret information hidden in the carrier may be destroyed at any time, so that the existing information steganography technology loses its reliability in big data. sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information Steganography Method and System, Information Extraction Method and System Based on Big Data
  • Information Steganography Method and System, Information Extraction Method and System Based on Big Data
  • Information Steganography Method and System, Information Extraction Method and System Based on Big Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] Such as figure 1 As shown, this embodiment provides a method for information steganography, which includes the following steps:

[0127] S101. Receive secret information to be steganographically.

[0128] S102. Process the secret information and insert it into a position in the big data, and send information related to the secret information in the big data to the authorized person.

[0129] The information steganography method in this embodiment is compared with the prior art. In the prior art, secret information is steganographically written in small data, but in this embodiment, secret information is steganographically written in large data.

[0130] Stealing secret information in small data in the prior art is like hiding gold and silver treasures at home. Only a small amount of gold and silver treasures are hidden and can always be found by shrewd thieves.

[0131] In this embodiment, the steganography of secret information in big data is like "a stone sinks into...

Embodiment 2

[0154] The difference between this embodiment and Embodiment 1 is that in step S102, the location of processing the secret information and inserting it into the big data refers to copying the secret information into multiple pieces of secret information and inserting the multiple pieces of secret information into the big data. Multiple locations; the secret information-related information in the big data includes the locations and verification information of multiple pieces of secret information in the big data.

[0155] Such as Figure 5 As shown, step S102 specifically includes the following steps:

[0156] S1021. Copy the secret information into multiple pieces of secret information.

[0157] S1022. Insert multiple pieces of secret information into multiple locations in the big data, and use the locations of the multiple pieces of secret information in the big data as multiple first locations.

[0158] Although the value density of big data is low, which makes it volatile...

Embodiment 3

[0173] The difference between this embodiment and Embodiments 1 and 2 lies in step S102, such as Figure 7 As shown, step S102 specifically includes the following steps:

[0174] S1021. Copy the secret information into multiple pieces of secret information, and the copying method is the same as that in Embodiment 2.

[0175] S1022. Divide each piece of secret information into a plurality of secret information pieces, and the division method is the same as that in Embodiment 1.

[0176] Although the size of the big data carrier is huge and variable, after applying the segmentation in Embodiment 1, the data block at the insertion position of each secret information sheet is a small data carrier, and the small data carrier belongs to The scope of competency of the existing information steganography technology, so that the existing information steganography technology can be used for "secret information sheet".

[0177]S1023. Calculate the distribution density of the secret info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information steganography method and system based on big data, and an information extraction method and system. The information steganography method includes: receiving secret information that needs to be steganographic; processing the secret information and inserting it into the big data location, sending the secret information related information in the big data to the authorized person; the information extraction method includes: receiving the secret information related information in the big data provided by the authorized person; extracting the secret information according to the secret information related information in the big data information and send confidential information to authorized persons. The present invention can not only enable all users to openly access big data, but also enable each user to only access the information authorized by the user in the big data, so that the big data is both open and safe. , so that the steganography capacity of information steganography has been greatly expanded in the large data carrier, no longer limited by the traditional carrier size, and the capacity of information steganography has been greatly improved.

Description

technical field [0001] The invention relates to an information steganography method and system based on big data, an information extraction method and system, and belongs to the technical field of information privacy protection. Background technique [0002] Information steganography is different from the well-known "password". Information steganography is a kind of "invisibility". Learn where secret information exists. [0003] "Huge data volume and low value density" are the key characteristics of big data different from "small data". These new characteristics make it impossible for existing information steganography technology to be copied to the big data environment. [0004] Big data (carrier) has a huge volume of data, and the existing information steganography technology is designed and implemented for small-sized carriers. If the existing information steganography technology is used to process such a huge carrier (big data), it will take a very long time to complet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08G06F11/14
CPCH04L9/0894H04L63/04H04L63/10G06F11/1448
Inventor 朱定局
Owner SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD