A method and system for hiding and extracting key information based on compressed archives

An information hiding and compression algorithm technology, applied in the field of key information hiding, can solve the problems of attackers stealing user keys and information leakage, and achieves the effect of protecting security, improving embedding capacity, and extracting safely and efficiently.

Active Publication Date: 2021-11-05
南方电网互联网服务有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to overcome the deficiencies in the above-mentioned prior art, the object of the present invention is to provide a method and system for hiding and extracting key information based on compressed archives, so as to solve the problem of using images, audio and text as carriers in traditional information steganography. It is easy for the attacker to steal the user key through malicious attack means, so there is a problem of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for hiding and extracting key information based on compressed archives
  • A method and system for hiding and extracting key information based on compressed archives
  • A method and system for hiding and extracting key information based on compressed archives

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0043] figure 1 It is a flow chart of steps of a method for hiding key information based on compressed archives in the present invention. Such as figure 1 As shown, a method for hiding key information based on compressed archives of the present invention comprises the following steps:

[0044] Step S1, define a set of lossless compression algorithms R n , a reversible target mapping func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for hiding and extracting key information based on compressed archives. The hiding method includes: step S1, defining a set of lossless compression algorithms R n , a reversible target mapping function L and the inverse mapping function of the target mapping function L, and define a bijective reversible mapping function MR for each compression algorithm i ; Step S2, obtain the key information X that needs to be hidden, a set of lossless compression algorithm Rn and compressed archive A information as the input carrier; Step S3, obtain the node U of the compressed file i , to determine whether it is a compressed file or a directory; step S4, if U i To compress the file, then utilize the reversible target mapping function to decompress it, and store it in the U file, determine which compression algorithm to use to recompress the U file according to the key information and the target mapping function; step S5, if U i is a directory, then search for U again i child nodes, and return to step S3, and recursively process each child node.

Description

technical field [0001] The invention relates to the technical field of key information hiding, in particular to a method and system for hiding and extracting key information based on compressed archives. Background technique [0002] With the explosive growth of data and the popularization of Internet technology, the Internet has become an important way for us to transmit and communicate information. However, while we enjoy the convenience brought by the Internet, the Internet also brings us huge How to ensure information security has aroused great concern in the industry. [0003] The traditional information security protection mechanism is mainly based on cryptography, using complex encryption algorithms to encrypt the transmitted information first. This method can guarantee data security to a certain extent, but due to the rapid development of computer hardware, cracking The time for encrypting files is becoming shorter and shorter. According to reports, DES with a 56-bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 王国军文玺张少波彭滔
Owner 南方电网互联网服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products