[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110516775B - User secret information hiding method based on QR code - Google Patents

User secret information hiding method based on QR code Download PDF

Info

Publication number
CN110516775B
CN110516775B CN201910623205.8A CN201910623205A CN110516775B CN 110516775 B CN110516775 B CN 110516775B CN 201910623205 A CN201910623205 A CN 201910623205A CN 110516775 B CN110516775 B CN 110516775B
Authority
CN
China
Prior art keywords
code
information
user
secret
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910623205.8A
Other languages
Chinese (zh)
Other versions
CN110516775A (en
Inventor
赵庆兰
杨舜同
郑东
张应辉
赖成喆
郭瑞
秦宝东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910623205.8A priority Critical patent/CN110516775B/en
Publication of CN110516775A publication Critical patent/CN110516775A/en
Application granted granted Critical
Publication of CN110516775B publication Critical patent/CN110516775B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06018Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
    • G06K19/06028Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of information security, and discloses a secret information hiding method based on a QR code user, which comprises the steps of firstly generating a position sequence, and generating the position sequence for information hiding by a user by using a secret key and a pseudo-random number generator; and then the user uses the position sequence to hide the secret information into the encoding process of the QR code after encoding the secret information to be hidden. The hidden QR code can be scanned normally to read the cover information, so that the hidden QR code is not easy to draw attention of an attacker. Finally, the secret information can be recovered from the hidden QR code by the user by using the secret key. The invention utilizes the properties of QR codes, pseudo random number generators and information hiding to hide the privacy information of users, and only users with secret keys can read the hidden information. And the hiding and recovering algorithm has low computational complexity, can be used on low-power equipment, and has wide application scenes.

Description

User secret information hiding method based on QR code
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a secret information hiding method based on a QR code user.
Background
Currently, the closest prior art: the QR code is a two-dimensional code or matrix barcode that can store data information and is designed to be read by a smart phone. QR stands for Quick Response (Quick Response), indicating that the code content should be decoded quickly at a very fast speed. The QR code consists of black modules arranged in a square pattern on a white background. The encoded information may be text, URLs or other data. QR codes are intended to allow high-speed decoding of their content. Therefore, the high capacity and the fast decoding speed of the QR code lead to the rapid increase of the popularity of the QR code worldwide. Nowadays, built-in cameras of mobile phones generally have a function of identifying QR codes.
In general, to protect the privacy of barcode data, the data is typically stored in a back-end database, with the barcodes displaying Web links of the database. These data can only be obtained after the browser has properly accessed the database. However, since the QR code is completely transparent in content and is used as only one encoding scheme, many studies have been made in the industry to consider it as a data carrier, and no security protection is provided on the encoding mechanism of the QR code. In QR code applications, the backend database links are stored for people to access, but direct exposure of the network links of the backend database easily causes unnecessary privacy information disclosure of users and other potential risks, which may attract the attention of intruders. The QR code is used as a data carrier, and does not distinguish the private information of the user from the general information, so that the information security problems such as the privacy security of the QR code information are important problems facing us today when the QR code is applied in a large quantity.
In summary, the problems of the prior art are: the QR code is completely transparent in content, and is not protected by any security mechanism, so that the direct exposure of the network link of the back-end database creates a potential risk, and may attract the attention of an intruder.
The difficulty of solving the technical problems is as follows: because the coding mode of the QR code is transparent, the data display is visual, and the read authority classification is not performed, so that the cryptography methods such as encryption and the like cannot ensure that the QR code is read normally by a general user while protecting specific data. Therefore, a new method is needed to realize the protection of the privacy information under the condition that the normal reading of the cover information of the QR code is not affected. And since QR code scanners are based on low power mobile devices, the scheme computation complexity should not be high.
Meaning of solving the technical problems: under the background that the QR codes are widely applied nowadays, a secret information hiding method can be used for distinguishing user groups or distinguishing user privacy information and general information. The method can provide user privacy security in environments requiring high capacity and quick reading of the QR codes.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention provides a method for hiding secret information of a user based on a QR code
The invention is realized in such a way, a user based on the QR code user secret information hiding method uses a pseudo-random generator to generate a pseudo-random sequence controlled by a user key, and codes the pseudo-random sequence to obtain a position sequence of hidden information; embedding secret information into the QR code according to the position sequence according to the encoding process of the QR code; and in the secret recovery process, the secret recovery process is directly read through the position sequence in the decoding process of the QR code, so that hidden information is obtained.
Further, the method for hiding the secret information of the user based on the QR code comprises the following steps:
generating a position sequence, wherein a user generates the position sequence for information hiding by using a secret key and a pseudo-random number generator;
secondly, after the secret information to be hidden is encoded by the user, the secret information is hidden into the encoding process of the QR code by using a position sequence;
and thirdly, the secret information can be recovered in the hidden QR code by the user by using the secret key.
Further, the pseudo random number generator in the first step and the selection of the QR code: the user should select the pseudo-random number generator with the largest period to ensure randomness; determining the version and error correction level of the QR code according to the length of the secret information to be hidden;
generating a position sequence: firstly, a user generates a series of sequences with the length longer than the total number of blocks of the QR code of the current version through a key-controlled pseudo-random number generator, and after repeated items are removed, the first c items are taken, so that the fact that the first c items have no repeated blocks is ensured. Traversing each item c and 0-7, and confusing by using a key-controlled pseudo-random number generator to obtain an 8 Xc sequence, wherein c is the maximum error correction number of the QR code version error correction level; the structure of the sequence is a series of two-dimensional arrays.
Further, the QR code cover information of the second step is encoded: before encoding the cover information of the QR code is stopped at the steps of computing the QR code and adding the mask, computing the mask type after hiding the information;
secret information encoding: the secret information needed to be hidden by the user is encoded, the secret information is encoded into a binary bit stream suitable for being hidden, the QR code data encoding standard can be used, and encoding modes such as an Ascii code and the like can be directly used for conversion. Hiding the length according to the user information and setting length bits at the last two bits of the secret information sequence to facilitate decoding;
secret information hiding: the user uses the key generated location sequence and the encoded secret information sequence to conceal. And according to the position information sequence, embedding the constructed secret sequence codes in sequence through the position information of each item in the position. For example, the first item of the position information sequence is (8, 1), namely, the first bit data of the secret sequence is embedded in the 2 nd bit of the 8 th block of the QR code in a covering way, and the position information sequence is sequentially read afterwards, so that secret information embedding is completed. After finishing hiding modification of the QR code data code blocks, continuing the encoding process of the cover QR code to obtain the hidden QR code.
Further, the hidden information of the third step is recovered: and the user uses the position sequence generated by the secret key and the hidden QR code to recover the secret information. Mask removing the hidden QR code and correcting errors; and then directly reading out the coded secret sequence according to the position sequence, and obtaining the user secret information through decoding.
Another object of the present invention is to provide an information data processing terminal to which the QR code-based user secret information hiding method is applied.
In summary, the invention has the advantages and positive effects that: the invention utilizes the property of the QR code to hide and protect the privacy of the user, the user without the secret key can not obtain hidden information, and all users can normally scan the two-dimensional code information of the cover, thus being not easy to cause the doubt of an attacker. Currently, the existing security technologies such as QR code hiding mainly use image hiding, watermarking and other modes to hide secret information. However, the image hiding and watermarking method is limited in capacity by the picture size or the picture size of the QR code, and the secret or secret QR code is embedded into the frequency domain of the QR code image or the hidden cover image by using a Discrete Wavelet Transform (DWT), discrete Cosine Transform (DCT), discrete Fourier Transform (DFT) and other methods in the hiding process, so that the computational complexity is extremely high. The hidden algorithm is simple and efficient, the security is directly controlled by the key, the calculation cost is low, the user privacy is effectively protected, and a security scheme is provided for the QR code.
According to the characteristics of hard identification and strong error correction of human eyes of the QR code, the safety and the confidentiality of information such as user identity are ensured in an information hiding mode; according to the characteristics of the QR codes, the hidden QR codes can be scanned and read normally, are not easy to be suspected by an attacker, and ensure the confidentiality; other scanners can not obtain the secret information of the user except the user with the secret key, so that the safety is ensured; meanwhile, the scheme adopts a plaintext direct reading and writing method, reduces the computational complexity in hiding/recovering, has low system overhead, expands the application scene range, and can be applied to the cryptography fields such as secret sharing or the like, or can be combined with the research fields such as the Internet of things and cloud computing to protect the privacy of user data taking the QR code as a data carrier.
The method is based on the hiding scheme of the QR code on the sensitive privacy information of the user, and can be used for confidentiality, authentication and integrity of the information of the QR code. The invention mainly utilizes the property of the QR code to hide information so as to protect the user safety of the QR code. The information hiding scheme capable of effectively protecting the user data in the QR code is provided, so that the user privacy data can be simply and efficiently protected, and the identity authentication and authentication of a scanner can be realized.
Drawings
Fig. 1 is a flowchart of a method for hiding secret information of a user based on a QR code according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for hiding secret information of a user based on a QR code according to an embodiment of the present invention.
Fig. 3 is a flowchart for hiding QR code information according to an embodiment of the present invention.
Fig. 4 is a QR code hidden information recovery chart provided by an embodiment of the present invention.
Fig. 5 is a schematic diagram of an experimental result of an information hiding algorithm according to an embodiment of the present invention;
in the figure: (a) a secret original QR code image is not hidden; (b) - (e) are QR code images after hiding the secret.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Aiming at the problems existing in the prior art, the invention provides a secret information hiding method based on a QR code user and an information data processing terminal, and the invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the method for hiding user secret information based on QR codes provided by the embodiment of the invention includes the following steps:
s101: generating a position sequence, wherein a user generates a position sequence for information hiding by using a secret key and a pseudo-random number generator;
s102: after the user encodes the secret information to be hidden, the user uses the position sequence to hide the secret information into the encoding process of the QR code; the hidden QR code can be scanned normally to read the cover information, so that the hidden QR code is not easy to draw attention of an attacker;
s103: the user can recover the secret information in the hidden QR code using the key.
As shown in fig. 2, the method for hiding the secret information of the user based on the QR code provided by the embodiment of the present invention specifically includes the following steps:
(1) Pseudo-random number generator and QR code selection: the user should choose a pseudo-random number generator with as large a period as possible to ensure randomness. And the version and the error correction level of the QR code are determined according to the length of the secret information which needs to be hidden.
(2) Generating a position sequence: the user generates a series of sequences with the length of 8 Xc through a key-controlled pseudo-random number generator, and c is the maximum error correction number of the error correction level of the QR code version. The structure of the sequence is a series of two-dimensional arrays, such as: [12,1],[22,5],[15,1]. The first item is the position of the changed error correction block, and the position of the error correction block needs to be selected from the data code blocks of the QR code, so that hidden information loss caused by QR code offset is avoided. The second term is the position in the data block, and the value should be between 0 and 7. Thus the 8 xc sequence should not have duplicate entries and should be traversed completely through the 8 xc entries.
(3) Encoding QR code cover information: before encoding the QR code cover information is stopped at the steps of computing the QR code and adding the mask, and computing the mask type after hiding the information can make the generated hidden QR code less prone to doubt.
(4) Secret information encoding: and coding the secret information which needs to be hidden by the user, and setting length bits at the last two bits of the secret information sequence according to the hiding length of the user information so as to facilitate decoding.
(5) Secret information hiding: the user uses the position sequence generated by the secret key and the coded secret information sequence to hide, such as the sequences [12,1], [22,5], [15,1], and then writes the three bits of the secret sequence into the 12 th bit, the 22 th bit and the 15 th bit of the block 2 of the QR code respectively. And then continuing the encoding process of the cover QR code to obtain the hidden QR code.
(6) Hidden information recovery: and the user uses the position sequence generated by the secret key and the hidden QR code to recover the secret information. And removing a mask from the hidden QR code, correcting errors, directly reading out the coded secret sequence according to the position sequence, and obtaining the user secret information through decoding.
The technical scheme of the invention is further described below with reference to the accompanying drawings.
1. QR code
QR codes consist of two square modules, white and black, representing the numbers 0 and 1, represented by a 2D matrix. The QR code standard provides 40 QR versions that can encode a variety of data, with version 1 having the smallest capacity and version 40 having the largest capacity. The version used by the user depends on the amount of data encoded by the alphanumeric, binary, kanji, or a combination thereof, and the level of error correction. In addition, the QR code is very reliable, and even if a portion of the barcode is stained or damaged, the data can be correctly read. The QR code adopts a Reed-Solomon error control code to carry out error detection and correction. The user may select 4 error correction levels, L, M, Q, and H, each providing a different error correction capability, with higher error correction levels having better error correction capabilities, but also increasing the amount of data to be encoded. The encoding process of the QR code is mainly divided into three steps. The first step generates a data block. The data code words are encoded in an interleaved manner, and error correction code words are appended to the end of the sequence of data code words, so that the likelihood that the QR code will become undecodable due to local corruption can be minimized. And secondly, filling the QR code image, calculating a mask type according to the QR code standard, and adding a mask. After encoding the data codeword, a mask balancing the white and black modules is applied to the encoded region. There are 8 mask types (0-7) in total, and selecting an appropriate mask type can reduce bad patterns that may confuse the QR code reader. And thirdly, adding format information and version information.
2. Pseudo-random number generator
Pseudo-random number generators are computers that generate random numbers with a long periodicity by means of a pseudo-random algorithm and seed. They are not truly random, as they are in fact computable, but they have statistical features similar to random numbers, with cryptographically secure pseudo-randomness. I.e. given a part of the random sample and the random algorithm, the remaining part of the random sample cannot be efficiently calculated.
3 information hiding
Information hiding is a method of hiding confidential information in a large amount of information from adversaries. Information hiding methods mainly include steganography, digital watermarking technology, visual passwords, latent channels, hiding protocols and the like.
As shown in fig. 3 and 4, the specific process of the present invention is as follows:
step one,Generating a position sequence L N
The user should select a proper pseudo-random number generator, set a user key K, and use the K and the pseudo-random number generator to generate a sequence of the number d of the QR code data blocks, wherein the number of each block only appears once, the first c items of d are taken, and c is the error correction capability of the error correction level of the version of the QR code. Dividing the sequence of the first c items into 8 items each and rearranging by using a K and pseudo-random number generator to obtain a position sequence L with the length of 8 Xc N
And step two, secret information encoding.
In order to facilitate decoding, the hidden secret S needs to be encoded. Selecting the length of the length bit according to the version and the error correction level of the QR code, and adding the secret information length code to the secret information after the secret information is coded to obtain a coded secret information sequence S N
And thirdly, hiding the secret information.
According to the sequence of positions L N And a secret information sequence S N After the QR code has completed data encoding and filling, the data block area D is calculated before mask addition QR In which a secret information sequence S is written N . Such as sequence L N Is [12,1],[22,5],[15,1]Then the secret sequence S N Respectively write D into three bits of QR The 12 th bit, the 22 th bit, the 6 th bit and the 15 th bit. And then continuing the encoding process of the cover QR code to obtain the hidden QR code.
And step four, recovering the hidden information.
Based on the user key K and hidden QR code data block D after mask removal and error correction QR The user generates a sequence of positions L by means of a key K N Directly reading out the encoded secret sequence S N And decoding to obtain the user secret S.
The technical effects of the present invention will be described in detail with reference to experiments.
Front experimental data: according to the above scheme, experimental data using the python3 language in the environment of linux are as follows: the figure is a simulation result of the scheme, wherein all QR codes are QR codes with versions of 1-H and can be scanned and read normally.
FIG. 5 (a) is an original QR code image of an unhidden secret, wherein the cover data is "Hallo", the cover data is encoded into a data code block D QR Is [64,84,134,22,198,198,240,236,17,246,192,246,119,46,148,193,221,87,192,157,115,154,73,193,130,113 ]]. The mask type calculated from the QR code encoding is 7.
FIG. 5 (b-e) shows a QR code image with hidden secret, cover data are all "Hallo", so QR code block D is embedded before hidden QR The data of (a) are the same as those of (a). L in the following data N Location sequence generated for key, D QR (coding) is a hidden QR code data code block.
In fig. 5 (b), the hidden secret information is "pwd", and the user key is "1q2w3e4r".
L N =[(6,1),(20,7),(20,3),(11,1),(22,4),(11,7),(12,6),(9,0),(9,1),(18,0),(20,1),(22,0),(12,3),(11,3),(12,5),(9,5),(16,7),(20,0),(16,5),(18,5),(6,4),(18,4),(16,1),(22,6),(16,2),(20,2),(18,3),(22,3),(16,0),(22,7),(9,7),(6,6),(6,0),(11,6),(16,6),(18,6),(6,5),(9,4),(11,0),(22,1),(12,0),(20,6),(9,6),(18,1),(20,5),(11,2),(6,3),(9,3),(11,4),(12,7),(20,4),(12,1),(22,5),(22,2),(12,2),(9,2),(12,4),(16,4),(16,3),(6,2),(6,7),(18,7),(18,2),(11,5)]
D QR (hiding)=[64,84,134,22,198,198,21,236,17,15,192,218,164,46,148,193,20,87,234,157,255,154,228,193,130,113]
Therein [6,9,11,12,16,18,20,22 ]]The block is changed, the change part is at D QR The (hide) is marked by using an underline, and the mask type is still 7 after the QR code data block added with the secret information is masked, so that the hidden QR code does not change much from the figure (a).
In fig. 5 (c), the hidden secret information is "key", and the user key is "1q2w3e4r".
D QR (hiding)=[64,84,134,22,198,198,173,236,17,191,192,184,98,46,148,193,14,87,214,157,243,154,122,193,130,113]
Since the user key is the same as in figure (b), L N Same, wherein [6,9,11,12,16,18,20,22 ]]The block is changed, the change part is at D QR The (hide) is marked by using an underline, and the hidden QR code has a larger change than the figure (a) because the mask type is 0 after the QR code data block added with the secret information is masked by the calculation mask.
In FIG. 5 (d), the hidden secret information is "pwd" and the user key is "google"
L N =[(18,6),(18,0),(6,5),(18,2),(23,3),(15,4),(18,1),(6,6),(4,3),(15,6),(7,1),(7,0),(25,2),(23,5),(6,1),(25,3),(23,1),(18,4),(4,4),(12,3),(18,7),(4,5),(7,2),(25,1),(6,3),(23,0),(15,5),(12,6),(4,2),(15,3),(23,2),(25,7),(25,6),(23,6),(6,7),(7,4),(12,4),(4,1),(12,7),(7,6),(18,3),(18,5),(4,7),(25,0),(4,6),(7,7),(7,5),(25,4),(12,0),(15,1),(15,2),(6,2),(7,3),(23,4),(15,0),(23,7),(12,2),(12,1),(6,0),(12,5),(4,0),(6,4),(25,5),(15,7)]
D QR (hiding)=[64,84,134,22,207,198,196,222,17,246,192,246,137,46,148,162,221,87,188,157,115,154,73,174,130,148]
Therein [4,6,7,12,15,18,23,25 ]]The block is changed, the change part is at D QR The (hide) is marked by using an underline, and since the mask type is 5 after the QR code data block added with the secret information is masked, the hidden QR code is greatly changed from the drawings (a) and (c).
In fig. 5 (e), the hidden secret information is "key", and the user key is "google"
D QR (hiding)=[64,84,134,22,201,198,39,75,17,246,192,246,223,46,148,134,221,87,205,157,115,154,73,189,130,218]
Since the user key is the same as in figure (d), L N Same, wherein [4,6,7,12,15,18,23,25 ]]The block is changed, the change part is at D QR Underline is used in (coding) because the QR code data block after adding the secret informationAfter calculating the mask, the mask type is 5, so the hidden QR code has a large change compared to fig. 5 (a) and 5 (c), and a small change compared to fig. 5 (d).
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (2)

1. A method for hiding secret information of a user based on a QR code is characterized in that the user based on the method for hiding secret information of the user based on the QR code uses a pseudo-random generator to generate a pseudo-random sequence controlled by a user key, and the pseudo-random sequence is subjected to coding processing to obtain a position sequence of hidden information; embedding secret information into the QR code according to the position sequence according to the encoding process of the QR code; in the secret recovery process, the secret recovery process is directly read through a position sequence in the decoding process of the QR code to obtain hidden information;
the user secret information hiding method based on the QR code comprises the following steps:
generating a position sequence, wherein a user generates the position sequence for information hiding by using a secret key and a pseudo-random number generator;
secondly, after the secret information to be hidden is encoded by the user, the secret information is hidden into the encoding process of the QR code by using a position sequence;
thirdly, the secret information can be recovered in the hidden QR code by the user by using the secret key;
the pseudo random number generator in the first step and the QR code selection: the user should select the pseudo-random number generator with the largest period to ensure randomness; determining the version and error correction level of the QR code according to the length of the secret information to be hidden;
generating a position sequence: a user generates a series of sequences with the length of 8 multiplied by c through a key-controlled pseudo-random number generator, and c is the maximum error correction number of the error correction level of the QR code version; the structure of the sequence is a series of two-dimensional arrays;
and (3) encoding the QR code cover information in the second step: before encoding the cover information of the QR code is stopped at the steps of computing the QR code and adding the mask, computing the mask type after hiding the information;
secret information encoding: encoding the secret information which needs to be hidden by the user, and setting length bits at the last two bits of the secret information sequence according to the hiding length of the user information so as to facilitate decoding;
secret information hiding: the user uses the position sequence generated by the secret key and the coded secret information sequence to hide; continuing the encoding process of the cover QR code to obtain a hidden QR code;
and the hidden information in the third step is recovered: the user uses the position sequence generated by the secret key and the hidden QR code to recover the secret information; mask removing the hidden QR code and correcting errors; and then directly reading out the coded secret sequence according to the position sequence, and obtaining the user secret information through decoding.
2. An information data processing terminal applying the QR code user secret information hiding method of claim 1.
CN201910623205.8A 2019-07-11 2019-07-11 User secret information hiding method based on QR code Active CN110516775B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910623205.8A CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910623205.8A CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Publications (2)

Publication Number Publication Date
CN110516775A CN110516775A (en) 2019-11-29
CN110516775B true CN110516775B (en) 2023-07-25

Family

ID=68622595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910623205.8A Active CN110516775B (en) 2019-07-11 2019-07-11 User secret information hiding method based on QR code

Country Status (1)

Country Link
CN (1) CN110516775B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112926087B (en) * 2021-03-09 2023-05-05 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code
CN113011543B (en) * 2021-03-10 2021-10-29 南京信息职业技术学院 Travel code generation method, travel code reading method, travel code verification method, mobile terminal and school attendance management system
CN116506232B (en) * 2023-06-28 2023-10-10 南京畅洋科技有限公司 High-capacity Internet of things hidden channel construction method based on channel coding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276936A (en) * 1997-08-18 2000-12-13 索拉纳技术开发公司 Post-compression hidden data transport for video
EP3319070A1 (en) * 2016-11-02 2018-05-09 Skeyecode Method for authenticating a user by means of a non-secure terminal
CN109120377A (en) * 2018-07-19 2019-01-01 华北水利水电大学 Information concealing method, storage medium in a kind of new data transmission
CN109190741A (en) * 2018-08-21 2019-01-11 福建工程学院 A kind of private information management method and terminal based on QR code

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69739969D1 (en) * 1996-06-20 2010-10-07 Ibm METHOD FOR HIDING DATA
US7243193B2 (en) * 2004-05-27 2007-07-10 Silverbrook Research Pty Ltd Storage of program code in arbitrary locations in memory
US10152663B2 (en) * 2015-09-11 2018-12-11 Graphiclead LLC Method to store a secret QR code into a colored secure QR code
CN105847629B (en) * 2016-03-18 2018-09-07 大连大学 A kind of reversible information hidden method of encrypted image
CN109325367B (en) * 2018-08-24 2020-07-14 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276936A (en) * 1997-08-18 2000-12-13 索拉纳技术开发公司 Post-compression hidden data transport for video
EP3319070A1 (en) * 2016-11-02 2018-05-09 Skeyecode Method for authenticating a user by means of a non-secure terminal
CN109120377A (en) * 2018-07-19 2019-01-01 华北水利水电大学 Information concealing method, storage medium in a kind of new data transmission
CN109190741A (en) * 2018-08-21 2019-01-11 福建工程学院 A kind of private information management method and terminal based on QR code

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
:"一种基于 QR 条形码的数字水印新算法";贾志强;《中国优秀硕士学位论文全文数据库》;全文 *
CH Chung等."Image hidden technique using QR-barcode".《ieee》.2009,全文. *
Qinglan Zhao等."A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things".《Security and Communication》.2019,全文. *
YW Chow."Exploiting the error correction mechanism in QR codes for secret sharing".《Springer》.2016,全文. *

Also Published As

Publication number Publication date
CN110516775A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
Dhawan et al. Analysis of various data security techniques of steganography: A survey
US11361397B2 (en) Method and apparatus for watermark embedding and extracting
Raj et al. A survey on fragile watermarking based image authentication schemes
CN110516775B (en) User secret information hiding method based on QR code
Vellaisamy et al. Inversion attack resilient zero‐watermarking scheme for medical image authentication
Chiang et al. Blind QR code steganographic approach based upon error correction capability
Chang et al. A block-based watermarking scheme for image tamper detection and self-recovery
Lin et al. QR code steganography with secret payload enhancement
Huang et al. Sudoku-based secret sharing approach with cheater prevention using QR code
Wu Quantization-based image authentication scheme using QR error correction
Yu et al. A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code
Cao et al. Using image sensor PUF as root of trust for birthmarking of perceptual image hash
Ansari et al. PSO optimized multipurpose image watermarking using SVD and chaotic sequence
Bhoskar et al. A Survey on secrete communication through QR code steganography for military application
CN114078071A (en) Image tracing method, device and medium
Zhao et al. A QR code secret hiding scheme against contrast analysis attack for the internet of things
Li et al. A recoverable chaos‐based fragile watermarking with high PSNR preservation
Zhu et al. A visual security multi-key selection image encryption algorithm based on a new four-dimensional chaos and compressed sensing
Zhou et al. A QR data hiding method based on redundant region and BCH
Yeh et al. Content-based watermarking in image authentication allowing remedying of tampered images
Ramyashree et al. Optimal Information Hiding: Advanced Bitstream‐Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos
Erlangga et al. Increasing Secret Data Hiding Capacity in QR Code Using Subcells
Iliyasu Cellular-automated protocol to safeguard confidentiality of QR codes
Arabzadeh et al. Detection, Reconstruction, and Repairing the Distortion in the Quran Pages Based on Watermarking
Dong et al. Cloak: visible touching and invisible protecting: cloud privacy protection based on lsb and chaotic approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant