Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method based on big data search and robot system

A robot system and information hiding technology, applied in the fields of digital data protection, electrical digital data processing, instruments, etc., can solve the problems of limited data volume and easy to be cracked, and achieve high security, low computing overhead, and ensure security. Effect

Active Publication Date: 2019-08-30
SOUTH CHINA NORMAL UNIVERSITY +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the defects or insufficiencies of information hiding in the prior art, and provide an information hiding method and robot system based on big data search, so as to solve the shortcomings of the limited data volume and easy cracking of information hiding in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on big data search and robot system
  • Information hiding method based on big data search and robot system
  • Information hiding method based on big data search and robot system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Embodiment 1 provides an information hiding method, such as figure 1 As shown, the method includes step S110 to step S170.

[0076] Secret information accepting step S110: Accept the secret information that needs to be hidden; for example, the information that needs to be hidden is 100 first photos.

[0077] Data search step S120: Search out the first information y' with a high degree of matching with the secret information y from the big data. Secret information refers to information to be hidden, which can be text, passwords, images, graphics or sounds, and so on. For example, search for second photos with a matching degree greater than 80% of 100 first photos from big data (such as Google Search or Baidu Search) as the first information. Wherein, the first information may consist of one or more data in the big data, and these data may be distributed in any position in the big data. The high degree of matching means that the degree of matching between the secret in...

Embodiment 2

[0086] Embodiment 2 provides a preferred information hiding method, according to the information hiding method described in Embodiment 1, combined with big data.

[0087] Step S110 includes an information splitting step S111: splitting the secret information y into a plurality of partial secret information y1, y2, . . . , ym (m is the number of splits).

[0088] Step S120 includes a multi-data search step S121: search for a plurality of first information y1', y2', ..., ym with a high degree of matching with a plurality of secret information y1, y2, ..., ym from the big data ';

[0089] Step S130 includes multi-position acquisition step S131: acquire multiple positions of multiple first information y1', y2', ..., ym' in the big data as multiple first positions s1, s2, ..., sm .

[0090] Step S140 includes a multi-difference calculation step S141: taking the corresponding differences between a plurality of first information y1', y2', ..., ym' and a plurality of secret informat...

Embodiment 3

[0095] Embodiment 3 provides an information extraction method, the method includes step S210 to step S270, such as figure 2 shown.

[0096] Authorization information acquisition step S210: Accept at least one set of first position s and second information z. Generally, the first position s and the second information z are received from the user terminal through the network.

[0097] First information extraction step S220: Extract first information y' from the first position s in the big data. For example, 100 second photos are downloaded from 100 network addresses in the first location as the first information.

[0098] Secret information generation step S230: Generate secret information y according to the first information y' and the second information z. Because in the hidden stage, the second information = f(secret information, first information), where f is the function of finding the difference between the secret information and the first information, so when restorin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information hiding method based on big data search and a robot system. The information hiding method comprises the steps: first information with the high matching degree withsecret information is searched out from big data; the position of the first information in the big data is acquired to serve as a first position; and the difference between the secret information andthe first information serves as second information. According to the information hiding method based on big data search, the secret information is hidden in the first information in the big data, sothat the data size of information hiding is not limited, and meanwhile, the first information exists in the big data originally, is extremely high in concealment and is difficult to crack, so that thecapacity and the security of information hiding are improved.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an information hiding method and a robot system. Background technique [0002] Information hiding technology (Information Hiding), that is, information hiding, will play an important role in protecting information from damage in the future network. Information hiding is a method of hiding confidential information in a large amount of information to prevent opponents from discovering it. The methods of information hiding mainly include steganography, digital watermarking technology, visible cryptography, covert channel, concealment protocol and so on. [0003] In the process of realizing the present invention, the inventors have found that there are at least the following problems in the prior art: in the existing information hiding technology, due to the limited amount of data of the carrier object and the disguised object, it is difficult to analyze and excavate the secret ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218Y02D10/00
Inventor 朱定局
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products