Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method and robot system based on big data and Fourier transform

A technology of Fourier transform and Fourier inverse transform, applied in the field of information, can solve the problems of information hiding, such as limited data volume and easy cracking, and achieve the effect of increasing the difficulty of detection and cracking, improving capacity and security, and improving security

Active Publication Date: 2022-07-26
SOUTH CHINA NORMAL UNIVERSITY +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Based on this, it is necessary to address the defects or deficiencies of information hiding in the prior art, and provide an information hiding method and robot system based on big data and Fourier transform, so as to solve the problem of limited data volume and easy cracking of information hiding in the prior art. shortcoming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method and robot system based on big data and Fourier transform
  • Information hiding method and robot system based on big data and Fourier transform
  • Information hiding method and robot system based on big data and Fourier transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment 1 provides an information hiding method, such as figure 1 As shown, the method includes steps S110 to S140.

[0050] Fourier transform step S110: Convert the secret information x that needs to be hidden into data of the first function f(t), and perform Fourier transform with the first function f(t) as the original function The obtained image function is used as the second function F(w), and the data of the obtained second function F(w) is used as the first information. Secret information refers to the information to be hidden, which can be text, password, image, graphic or sound, etc. Preferably, the secret information x is obtained, the secret information is divided into a plurality of units (preferably, the division method includes dividing according to space, dividing according to time or dividing according to order), and taking the number of each unit as the number of t value (preferably, the numbering includes a spatial position or a time or a serial n...

Embodiment 2

[0055] Embodiment 2 provides a preferred information hiding method. According to the information hiding method described in Embodiment 1, combined with big data, the Fourier transform step S110 specifically includes step S111; the information insertion step S120 specifically includes step S121; the location acquisition step S130 specifically includes step S121. Step S131 is included.

[0056] Information segmentation step S111: segment the secret information x into multiple partial secret information x1, x2, . f(t2), . Take the image functions corresponding to the multiple first functions as multiple second functions F(w1), F(w2), ..., F(wm) respectively, and obtain the data of multiple second functions as multiple first functions. a message. Preferably, the secret information x is divided into m parts of equal length as a string to become x1, x2, . . . , xm. Preferably, the serial number of each part of the secret information after division is recorded, and the serial num...

Embodiment 3

[0061] Embodiment 3 provides a kind of information extraction method, as figure 2 As shown, the method includes steps S210 to S230.

[0062] Information acquisition step S210 : accept the first position s input by the user.

[0063] Information extraction step S220 : extract the first information, that is, the data of the second function F(w), from the first position s in the big data. Preferably, the start number and the end number are obtained from the first position s in the big data. For example, the information at the first position s in the big data is "the data of the second function is the data of" F(w), "the starting position is" the starting position, and "the ending position is" The ending position, then according to the keywords "the data of the second function is", "the starting position is", and "the ending position is" to match, the corresponding content after these keywords can be located as the first The data of the two-function F(w), the start position, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information hiding method and robot system based on big data and Fourier transform, comprising: converting secret information that needs to be hidden into data of an original function, performing Fourier transform, and obtaining data like a function as first information; Insert the first position in the big data. The above method and system hide the secret information in the big data and further transform the secret information by means of Fourier transform, so that the amount of information hidden data is not limited and difficult to be cracked, thereby improving the capacity and security of information hiding.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an information hiding method and a robot system. Background technique [0002] Information hiding technology (Information Hiding), that is, information hiding, will play an important role in protecting information from damage in the future network. Information hiding is a method to hide confidential information in a large amount of information from opponents. The methods of information hiding mainly include steganography, digital watermarking technology, visual password, latent channel, concealment protocol and so on. [0003] Fourier transform: This is the integral form representing the function F(ω) in the frequency domain as the function f(t) in the time domain. The inverse of the Fourier transform is: [0004] That is, the function f(t) in the time domain is expressed as the integral of the function F(ω) in the frequency domain. Generally, the function f(t) can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F17/14
CPCG06F21/6245G06F17/14
Inventor 朱定局
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products