Information Steganography Method and System, Information Extraction Method and System Based on Big Data
An information extraction and big data technology, applied in digital transmission systems, redundancy in operations for data error detection, transmission systems, etc., can solve the problems of low value density of big data, destruction of secret information, loss of reliability, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0126] Such as figure 1 As shown, this embodiment provides a method for information steganography, which includes the following steps:
[0127] S101. Receive secret information to be steganographically.
[0128] S102. Process the secret information and insert it into a position in the big data, and send information related to the secret information in the big data to the authorized person.
[0129] The information steganography method in this embodiment is compared with the prior art. In the prior art, secret information is steganographically written in small data, but in this embodiment, secret information is steganographically written in large data.
[0130] Stealing secret information in small data in the prior art is like hiding gold and silver treasures at home. Only a small amount of gold and silver treasures are hidden and can always be found by shrewd thieves.
[0131] In this embodiment, the steganography of secret information in big data is like "a stone sinks into...
Embodiment 2
[0154] The difference between this embodiment and Embodiment 1 is that in step S102, the location of processing the secret information and inserting it into the big data refers to copying the secret information into multiple pieces of secret information and inserting the multiple pieces of secret information into the big data. Multiple locations; the secret information-related information in the big data includes the locations and verification information of multiple pieces of secret information in the big data.
[0155] Such as Figure 5 As shown, step S102 specifically includes the following steps:
[0156] S1021. Copy the secret information into multiple pieces of secret information.
[0157] S1022. Insert multiple pieces of secret information into multiple locations in the big data, and use the locations of the multiple pieces of secret information in the big data as multiple first locations.
[0158] Although the value density of big data is low, which makes it volatile...
Embodiment 3
[0173] The difference between this embodiment and Embodiments 1 and 2 lies in step S102, such as Figure 7 As shown, step S102 specifically includes the following steps:
[0174] S1021. Copy the secret information into multiple pieces of secret information, and the copying method is the same as that in Embodiment 2.
[0175] S1022. Divide each piece of secret information into a plurality of secret information pieces, and the division method is the same as that in Embodiment 1.
[0176] Although the size of the big data carrier is huge and variable, after applying the segmentation in Embodiment 1, the data block at the insertion position of each secret information sheet is a small data carrier, and the small data carrier belongs to The scope of competency of the existing information steganography technology, so that the existing information steganography technology can be used for "secret information sheet".
[0177]S1023. Calculate the distribution density of the secret info...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


