Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method based on big data and dynamic time recursion and robot system

A technology of information hiding and big data, which is applied in the information field, can solve the problems of limited data volume and easy cracking of information hiding, and achieve the effect of improving capacity, security and high security

Active Publication Date: 2019-08-23
SOUTH CHINA NORMAL UNIVERSITY +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the defects or deficiencies of information hiding in the prior art, and provide an information hiding method and robot system based on big data and dynamic time recursion, so as to solve the problem of limited data volume and easy cracking of information hiding in the prior art. Shortcomings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on big data and dynamic time recursion and robot system
  • Information hiding method based on big data and dynamic time recursion and robot system
  • Information hiding method based on big data and dynamic time recursion and robot system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Embodiment 1 provides an information hiding method, such as figure 1 As shown, the method includes step S110 to step S160.

[0063] Secret information acquiring step S110: acquiring secret information x. Preferably, the secret information can be obtained by accepting user input information or files. Secret information refers to the information to be hidden, which can be text, password, image, graphics or sound, etc.

[0064] The current time obtaining step S120: obtaining the current time t. The current time can be obtained through system time conversion or online. Preferably, if the preset number of recursions is k, the current times obtained successively are t1, t2, ..., tk, respectively.

[0065] Reversible function acquisition step S130: Obtain a preset reversible function g with secret information x and current time t as variables; preferably, the reversible function is g(x, f(t)), where f is the second preset function, corresponding to The inverse function of is x=g-...

Embodiment 2

[0070] Embodiment 2 provides a preferred information hiding method. According to the information hiding method described in Embodiment 1, combined with big data, such as figure 2 As shown, the method further includes step S170.

[0071] First position generation step S170: insert y into the big data, and obtain the position of y in the big data as the first position. Preferably, y is randomly inserted into the big data. Preferably, the position of y in the big data includes the start position and the end position of y. Preferably, the first position is output to the user.

[0072] The beneficial effect of this embodiment is that after inserting the first information into the big data, the cracker is further unable to find the first information, and the secret information needs to be converted from the first information, which naturally makes the secret information more difficult to crack

Embodiment 3

[0073] Embodiment 3 provides a preferred information hiding method. According to the information hiding method described in Embodiment 2, the first position generating step S170 specifically includes: generating the first position according to the time in the first time set and the preset function h. Position, insert y into the first position in the big data. Preferably, the first position p is generated using the time closest to the present in the first time set and the preset function h, that is, p=h(t).

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information hiding method based on big data and dynamic time recursion and a robot system. The method comprises the following steps: obtaining a preset reversible function taking the secret information and the current time as variables, taking the secret information and the current time as the input of the preset reversible function, calculating and obtaining first information, taking the first information as new secret information, and returning to the current time obtaining step to continue to execute. According to the method and the system, secret information is recursively transformed for multiple times in a dynamic time mode and then hidden in big data, so that the data size of information hiding is not limited and is difficult to crack, and the capacity andthe safety of information hiding are improved.

Description

Technical field [0001] The present invention relates to the field of information technology, in particular to an information hiding method and a robot system. Background technique [0002] Information hiding technology (Information Hiding), also known as information hiding, will play an important role in protecting information from damage in the future network. Information hiding is a method of hiding confidential information in a large amount of information from opponents. The methods of information hiding mainly include steganography, digital watermarking technology, visual ciphers, latent channels, and concealment protocols. [0003] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: the existing information hiding technology, due to the limited amount of data of the carrier object and the disguised object, it is difficult to analyze and mine the secret information from the carrier object and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 朱定局
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products