Information hiding methods and systems and extraction methods and systems based on big data and neural network

A neural network and information hiding technology, applied in neural learning methods, biological neural network models, digital data protection, etc., can solve the problem of limited complexity and difficulty of secret information, limited data volume, limited data volume of carrier objects and camouflaged objects, etc. problems, to achieve the effect of ensuring high concealment and ensuring safety

Active Publication Date: 2018-06-22
SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current information hiding technology, due to the limited amount of data of the carrier object and the disguised object, the complexity and difficulty of analyzing and digging out the secret information from the carrier object and the disguised object are limited, so that the secret information may be cracked, resulting in the failure of information hiding. low security
At the same time, due to the limited amount of data of the carrier object and the disguised object, it is impossible to hide a large amount of secret information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding methods and systems and extraction methods and systems based on big data and neural network
  • Information hiding methods and systems and extraction methods and systems based on big data and neural network
  • Information hiding methods and systems and extraction methods and systems based on big data and neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Such as figure 1 As shown, this embodiment provides an information hiding method, which includes the following steps:

[0097] S101. Obtain the location of the first data in the big data as the first location.

[0098] This embodiment is an information hiding technology based on big data search. Due to the huge amount of data of the carrier object and the disguised object, the complexity and difficulty of analyzing and digging out the secret information from the carrier object and the disguised object with a huge amount of data are very high. , like "finding a needle in a haystack", which makes it extremely impossible for secret information to be cracked, resulting in extremely high security for information hiding. At the same time, due to the large amount of data of the carrier object and the disguised object, a large amount of secret information can be hidden.

[0099] For example, the first data in the big data is an image file P, and the location of the image file...

Embodiment 2

[0110] Such as figure 2 As shown, this embodiment provides an information extraction method, which corresponds to the information hiding method in Embodiment 1, and includes the following steps:

[0111] S201. Acquire a first location, second information, and a trained neural network.

[0112] Since users who have access to big data but do not have access to secret information do not know the first location, second information, and trained neural network, they cannot extract secret information through big data, ensuring the security of secret information .

[0113] Since the first information is the actual output of the neural network whose expected output is the secret information, the difference between the first information and the secret information is very small, that is, the data volume of the second information is very small; and the neural network is based on the network weight Expressed in the form of , the amount of data is also very small; so as long as the first...

Embodiment 3

[0121] Such as image 3 As shown, this embodiment provides an information hiding method, which includes the following steps:

[0122] S301. Obtain secret information that needs to be hidden.

[0123] In this embodiment, some secret information is hidden. Therefore, the secret information to be hidden is obtained first, which is denoted as S. For example, the secret information to be hidden is 100 paragraphs.

[0124] S302. Divide the secret information into multiple secret sub-information, and use the relative positions of the multiple secret sub-information in the secret information as multiple first numbers.

[0125] In this embodiment, the secret information S is divided into p pieces of S1, S2, ..., Sp, and the relative positions of the p secret subinformation in the secret information S are used as the numbers W1, W2, ..., Wp, as p first numbers; where p≧2;

[0126] Taking the secret information that needs to be hidden as 100 paragraphs as an example, divide each parag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses information hiding methods and systems and extraction methods and systems based on big data and a neural network. One of the information hiding methods includes: acquiring a location of first data in the big data; acquiring secret information which is in the first data and needs to be hidden; respectively using the first data and the secret information as input and output of the preset neural network to train the preset neural network; inputting the first data into the trained neural network, and using obtained output as first information; using differences between thesecret information and the first information as second information; and sending the location of the first data in the big data, the second information and the trained neural network to the user with secret-information access authority. According to the method, the information can be hidden in the big data, security of the secret information is ensured through training of the neural network, the user with the secret-information access authority can extract the secret information from the big data through synthesis, and network overheads, storage overheads and computational overheads are all extremely low.

Description

technical field [0001] The invention relates to an information hiding and extracting method and system based on big data and a neural network, and belongs to the technical field of information privacy protection. Background technique [0002] The basic principle of information hiding is: assuming that A intends to secretly transmit some information to B, A needs to randomly select an irrelevant message C from a random source. The message is a cover object (Cover Message) C; secret information (Secret Message) M is hidden in the cover object C, and at this time, the cover object becomes a disguised object C1. The carrier object C is normal and will not arouse people's doubts. The camouflage object C1 and the carrier object C are both different from the senses (such as feeling the image, the vision of the video and the feeling of the sound, and the hearing of the audio) or from the analysis of the computer. It is impossible to tell them apart, and normal handling of the disgu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06N3/08
CPCG06F21/6245G06N3/08
Inventor 朱定局
Owner SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products