Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method based on big data and Fourier transform, and robot system

A Fourier transform and robot system technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve the problems of limited information hiding data volume, easy to be cracked, etc., to increase the difficulty of detection and cracking, and improve capacity and safety, the effect of improving safety

Active Publication Date: 2019-08-30
SOUTH CHINA NORMAL UNIVERSITY +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, it is necessary to address the defects or deficiencies of information hiding in the prior art, and provide an information hiding method and robot system based on big data and Fourier transform, so as to solve the problem of limited data volume and easy cracking of information hiding in the prior art. shortcoming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on big data and Fourier transform, and robot system
  • Information hiding method based on big data and Fourier transform, and robot system
  • Information hiding method based on big data and Fourier transform, and robot system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Embodiment 1 provides an information hiding method, such as figure 1 As shown, the method includes step S110 to step S140.

[0049] Fourier transform step S110: Convert the secret information x that needs to be hidden into the data of the first function f(t), and use the first function f(t) as the original function to perform Fourier transform The obtained image function is used as the second function F(w), and the obtained data of the second function F(w) is used as the first information. Secret information refers to the information to be hidden, which can be text, password, image, graphics or sound, etc. Preferably, the secret information x is obtained, and the secret information is divided into multiple units (preferably, the division method includes spatial division or temporal division or sequential division), and the number of each unit is taken as t Value (preferably, the number includes space position or time or serial number, if it is divided according to space, ...

Embodiment 2

[0054] Embodiment 2 provides a preferred information hiding method. According to the information hiding method described in Embodiment 1, combined with big data, the Fourier transform step S110 specifically includes step S111; the information insertion step S120 specifically includes step S121; and the position acquisition step S130 specifically Including step S131.

[0055] Information segmentation step S111: segment the secret information x into multiple parts of the secret information x1, x2,..., xm (m is the number of splits), and then convert them into multiple first functions f(t1), f(t2),..., f(tm) data, and then use multiple of the first functions as the original functions to perform Fourier transforms respectively The image functions corresponding to the multiple first functions are respectively used as multiple second functions F(w1), F(w2),..., F(wm), and data of multiple second functions are obtained as multiple first functions. One information. Preferably, the secr...

Embodiment 3

[0060] Embodiment 3 provides an information extraction method, such as figure 2 As shown, the method includes step S210 to step S230.

[0061] Information acquisition step S210: accept the first position s input by the user.

[0062] Information extraction step S220: Extract the first information, that is, the data of the second function F(w) from the first position s in the big data. Preferably, the start number and the end number are obtained from the first position s in the big data. For example, the information at the first position s in the big data is "the data of the second function is "F(w) data, "the starting position is the starting position, and the ending position is" The ending position, then according to the keywords "the data of the second function is", "the starting position is", "the ending position is" for matching, the corresponding content after these keywords can be located as the first The data of the second function F(w), the start position, and the end po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information hiding method based on big data and Fourier transform, and a robot system. The information hiding method comprises the steps: converting secret information needing to be hidden into data of an original function for carrying out Fourier transform, and obtaining the data of an image function as first information; and inserting the first information into a firstposition in big data. According to the information hiding method based on big data and Fourier transform, the secret information is hidden in the big data and further converted in a Fourier transformmode, so that the data size hidden by the information is not limited and is difficult to crack, and the capacity and the safety of information hiding are improved.

Description

Technical field [0001] The present invention relates to the field of information technology, in particular to an information hiding method and a robot system. Background technique [0002] Information hiding technology (Information Hiding), that is, information hiding, will play an important role in protecting information from destruction in the future network. Information hiding is a method of hiding confidential information in a large amount of information from the opponent. The methods of information hiding mainly include steganography, digital watermarking technology, visual password, submarine channel, and concealment protocol. [0003] Fourier transform: This is the integral form of the frequency domain function F(ω) as the time domain function f(t). The inverse of the Fourier transform is: That is, the function f(t) in the time domain is expressed as the integral of the function F(ω) in the frequency domain. Generally, the function f(t) can be called the original functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/14
CPCG06F21/6245G06F17/14
Inventor 朱定局
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products