








技术领域technical field
本申请涉及信息隐藏技术领域,尤其涉及秘密信息隐藏方法、秘密信息提取方法及秘密信息传输系统。The present application relates to the technical field of information hiding, and in particular, to a secret information hiding method, a secret information extraction method and a secret information transmission system.
背景技术Background technique
作为对抗网络信息攻击的制衡术之一,信息隐藏技术是常见的信息安全保护措施。信息隐藏是指将秘密信息隐藏于可公开的媒体信息中,使人们凭直观的感官难以察觉其存在的技术。在数字时代,信息隐藏的载体形式可为任何一种数字媒体,如图像、音频或文本文档等。当前以文本文档为载体的主流隐写方法为:利用人们视觉感官对字符格式特征的非敏感性,采用调整字符颜色、修改行间距字间距等方式对隐藏的信息进行嵌入操作;或通过在编辑文档安装字库等插件时嵌入信息。As one of the checks and balances against network information attacks, information hiding technology is a common information security protection measure. Information hiding refers to the technology of hiding secret information in public media information, making it difficult for people to detect its existence with intuitive senses. In the digital age, the carrier form of information hiding can be any kind of digital media, such as images, audio or text documents. The current mainstream steganography methods based on text documents are: using the insensitivity of people's visual senses to character format features, adjusting the color of characters, modifying the line spacing and word spacing, etc. to embed hidden information; or by editing Documents embed information when plugins such as fonts are installed.
虽然以上基于文档文件的隐藏技术已经能够达到让秘密信息在内容上避开人类感官直观检测的隐藏效果,但是仍然存在一经分析探测易被捕捉的隐写痕迹,如:在进行嵌入操作前后文件占用字节的大小波动难以掩盖、因隐藏信息加入文档的附加对象易受到第三方攻击者格外的关注和监测。以文档文件为载体的信息隐藏技术方案在信息安全性层面仍然有进一步提升的空间。Although the above hidden technologies based on document files have been able to achieve the hidden effect of avoiding the intuitive detection of human senses in the content of secret information, there are still steganographic traces that are easily captured after analysis and detection, such as: file occupation before and after the embedding operation The fluctuation of the size of bytes is difficult to cover up, and the additional objects added to the document due to hidden information are vulnerable to special attention and monitoring by third-party attackers. There is still room for further improvement in the information security level of the information hiding technical solution based on the document file.
发明内容SUMMARY OF THE INVENTION
鉴于此,本申请实施例提供了秘密信息隐藏方法、秘密信息提取方法及传输系统,以消除或改善现有技术中存在的一个或更多个缺陷。In view of this, the embodiments of the present application provide a method for hiding secret information, a method for extracting secret information, and a transmission system, so as to eliminate or improve one or more defects existing in the prior art.
本申请的一个方面提供了一种秘密信息隐藏方法,包括:One aspect of the present application provides a secret information hiding method, comprising:
基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域;Obtain a target data area corresponding to the target document file based on the version information of the target document file, and search for an embedded area for hiding secret information in the target data area;
将秘密信息对应的加密数据添加至所述嵌入区域,并对所述目标文档文件进行源文档类型一致性处理。The encrypted data corresponding to the secret information is added to the embedded area, and the source document type consistency processing is performed on the target document file.
在本申请的一些实施例中,在所述将秘密信息对应的加密数据添加至所述嵌入区域之前,还包括:In some embodiments of the present application, before adding the encrypted data corresponding to the secret information to the embedded area, the method further includes:
在获取秘密信息对应的字符串;When obtaining the string corresponding to the secret information;
在所述字符串中添加标注以形成对应的标注字符串;adding a label to the string to form a corresponding label string;
对所述标注字符串进行加密处理,以得到所述秘密信息对应的加密数据。Encrypting the marked character string to obtain encrypted data corresponding to the secret information.
在本申请的一些实施例中,所述在所述字符串中添加标注,以形成对应的标注字符串,包括:In some embodiments of the present application, adding a label to the character string to form a corresponding label string includes:
在所述字符串的开头和/或结尾添加对应的自定义字符标注以形成对应的标注字符串。A corresponding custom character label is added at the beginning and/or end of the character string to form a corresponding label string.
在本申请的一些实施例中,所述基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域,包括:In some embodiments of the present application, the target data area corresponding to the target document file is obtained based on the version information of the target document file, and an embedded area for hiding secret information is searched in the target data area, including:
若所述目标文档文件的版本信息显示该目标文档文件所属的版本为预设的第一版本,则定位至所述目标文档文件的ASCII码数据信息块;If the version information of the target document file shows that the version to which the target document file belongs is the preset first version, then locate the ASCII code data information block of the target document file;
在ASCII码数据信息块中查找自动预留的一块用于保存文档属性信息的区域以作为所述目标文档文件对应的目标数据区域;In the ASCII code data information block, find an automatically reserved area for saving document attribute information as the target data area corresponding to the target document file;
以及,在所述目标数据区域中查找无效干扰数据区域或全空白字节数据区域作为用于隐藏秘密信息的嵌入区域。And, in the target data area, search for an invalid interference data area or an all-blank byte data area as an embedded area for hiding secret information.
在本申请的一些实施例中,所述基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域,包括:In some embodiments of the present application, the target data area corresponding to the target document file is obtained based on the version information of the target document file, and an embedded area for hiding secret information is searched in the target data area, including:
若所述目标文档文件的版本信息显示该目标文档文件所属的版本为预设的第一版本之后的其他版本,则对所述目标文档文件进行压缩处理,以得到该目标文档文件对应的压缩包;If the version information of the target document file shows that the version to which the target document file belongs is another version after the preset first version, the target document file is compressed to obtain a compressed package corresponding to the target document file ;
在所述压缩包中的数据信息块中定位因压缩而生成的数据扩展域;Locate the data extension field generated by compression in the data information block in the compressed package;
在所述数据扩展域中查找无效干扰数据区域或全空白字节数据区域作为用于隐藏秘密信息的嵌入区域。In the data extension field, an invalid interference data area or an all-blank byte data area is searched as an embedded area for hiding secret information.
在本申请的一些实施例中,所述将秘密信息对应的加密数据添加至所述嵌入区域,并对所述目标文档文件进行源文档类型一致性处理,包括:In some embodiments of the present application, the adding encrypted data corresponding to the secret information to the embedding area, and performing source document type consistency processing on the target document file, includes:
将秘密信息对应的加密数据进行视觉透明处理;Visually transparently process the encrypted data corresponding to the secret information;
将经视觉透明处理后的加密数据添加至所述嵌入区域并进行保存;adding the visually transparent encrypted data to the embedded area and saving it;
若当前生成有所述目标文档文件的压缩包,则对该压缩包进行解压缩处理。If a compressed package of the target document file is currently generated, the compressed package is decompressed.
本申请的另一个方面提供了一种秘密信息提取方法,包括:Another aspect of the present application provides a secret information extraction method, comprising:
在目标文档文件对应的目标数据区域中查找到用于隐藏秘密信息的嵌入区域,其中,所述目标文档文件预先基于所述的秘密信息隐藏方法嵌入所述秘密信息对应的加密数据;Find an embedded area for hiding secret information in the target data area corresponding to the target document file, wherein the target document file embeds encrypted data corresponding to the secret information in advance based on the secret information hiding method;
在所述嵌入区域中提取加密数据,并根据该加密数据获取所述秘密信息。Encrypted data is extracted in the embedded area, and the secret information is acquired based on the encrypted data.
在本申请的一些实施例中,所述根据该加密数据获取所述秘密信息,包括:In some embodiments of the present application, the obtaining the secret information according to the encrypted data includes:
基于预获取的解密方式对所述加密数据进行解密,并根据预获取的标注形式数据在解密后的数据中删除标注字符串,以得到所述秘密信息对应的字符串。The encrypted data is decrypted based on the pre-acquired decryption method, and the labeled character string is deleted from the decrypted data according to the pre-acquired labeled form data, so as to obtain a character string corresponding to the secret information.
在本申请的一些实施例中,所述在目标文档文件对应的目标数据区域中查找到用于隐藏秘密信息的嵌入区域,包括:In some embodiments of the present application, finding the embedded area for hiding secret information in the target data area corresponding to the target document file includes:
预先获取针对所述目标文档文件的秘密数据提取方式;Acquire in advance the secret data extraction method for the target document file;
若所述秘密数据提取方式中不包含有压缩步骤,则定位至所述目标文档文件的ASCII码数据信息块,在ASCII码数据信息块中查找自动预留的一块用于保存文档属性信息的区域以作为所述目标文档文件对应的目标数据区域,并在所述目标数据区域中查找用于隐藏秘密信息的嵌入区域;If the secret data extraction method does not include a compression step, locate the ASCII code data information block of the target document file, and search for an automatically reserved area for storing document attribute information in the ASCII code data information block as the target data area corresponding to the target document file, and find an embedded area for hiding secret information in the target data area;
若所述秘密数据提取方式中包含有压缩步骤,则对所述目标文档文件进行压缩处理,在对应的压缩包中定位因压缩而生成的数据扩展域,并在所述数据扩展域中查找用于隐藏秘密信息的嵌入区域。If the secret data extraction method includes a compression step, compress the target document file, locate the data extension field generated by compression in the corresponding compressed package, and search for the data extension field in the data extension field. Embedding areas that hide secret information.
本申请的另一个方面提供了一种秘密信息隐藏装置,包括:Another aspect of the present application provides a secret information hiding device, comprising:
区域查找模块,用于基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域;an area search module for obtaining a target data area corresponding to the target document file based on the version information of the target document file, and searching for an embedded area for hiding secret information in the target data area;
数据嵌入模块,用于将秘密信息对应的加密数据添加至所述嵌入区域,并对所述目标文档文件进行源文档类型一致性处理。The data embedding module is used for adding encrypted data corresponding to the secret information to the embedding area, and performing source document type consistency processing on the target document file.
本申请的另一个方面提供了一种秘密信息提取装置,包括:Another aspect of the present application provides an apparatus for extracting secret information, comprising:
区域定位模块,用于在目标文档文件对应的目标数据区域中查找到用于隐藏秘密信息的嵌入区域,其中,所述目标文档文件预先基于所述的秘密信息隐藏方法嵌入所述秘密信息对应的加密数据;The area positioning module is used to find the embedded area for hiding secret information in the target data area corresponding to the target document file, wherein the target document file is pre-embedded with the secret information corresponding to the secret information based on the secret information hiding method. encrypted data;
数据提取模块,用于在所述嵌入区域中提取加密数据,并根据该加密数据获取所述秘密信息。A data extraction module, configured to extract encrypted data in the embedded area, and obtain the secret information according to the encrypted data.
本申请的另一个方面提供了一种秘密信息传输系统,包括:秘密信息隐藏装置和秘密信息提取装置;Another aspect of the present application provides a secret information transmission system, including: a secret information hiding device and a secret information extracting device;
所述秘密信息隐藏装置用于执行所述的秘密信息隐藏方法,并将嵌入所述秘密信息对应的加密数据的目标文档文件发送至所述秘密信息提取装置;The secret information hiding device is configured to execute the secret information hiding method, and send a target document file embedded with encrypted data corresponding to the secret information to the secret information extracting device;
所述秘密信息提取装置用于接收所述秘密信息隐藏装置发送的目标文档文件,并执行所述的秘密信息提取方法。The secret information extraction device is configured to receive the target document file sent by the secret information hiding device, and execute the secret information extraction method.
本申请的另一个方面提供了一种电子设备,包括存储器、包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现所述的秘密信息隐藏方法,或者,所述处理器执行所述计算机程序时实现所述的秘密信息提取方法。Another aspect of the present application provides an electronic device including a memory, a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the computer program when the processor executes the computer program The secret information hiding method, or, when the processor executes the computer program, the secret information extraction method is implemented.
本申请的另一个方面提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现所述的秘密信息隐藏方法,或者,该计算机程序被处理器执行时实现所述的秘密信息提取方法。Another aspect of the present application provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the secret information hiding method, or, when the computer program is executed by the processor The described secret information extraction method is realized.
本申请的秘密信息隐藏方法,基于目标文档文件的版本信息,针对不同版本文档进行不同处置,能够根据实际应用情况灵活选择适用某一版本办公软件,并能够根据是否改变文件大小的效果需求进一步选取具体可行的方法,实用性强,适用范围广;通过获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域,将秘密信息对应的加密数据添加至所述嵌入区域,能够达到信息隐藏前后文件大小不变的隐藏效果,目标信息隐蔽性高、安全性强,进一步弱化在人类视觉感官上感知隐蔽信息的程度,且无需安装额外插件、无附加多媒体内容(如文本、音频、图像等);通过对所述目标文档文件进行源文档类型一致性处理,能够在不改变文档格式特征的基础上实现信息隐藏,原文外观零隐写痕迹,大幅度降低因在文件引入附加对象的操作受到第三方攻击者关注及监测的网络攻击风险。可为具有携密信息传递流程的应用场景提供更高的数字内容通信安全保护等级,降低信息隐藏方和提取方在信息交流过程中遭遇来自第三方恶意的信息破解、损坏、篡改等攻击行为的信息安全风险,隐秘信息传递行为的隐蔽性和可靠性进一步增强。The secret information hiding method of the present application, based on the version information of the target document file, handles different versions of documents differently, and can flexibly select a certain version of office software according to the actual application situation, and can further select according to the effect requirements of whether to change the file size. The specific and feasible method has strong practicability and wide application range; by acquiring the target data area corresponding to the target document file, and searching for an embedded area for hiding secret information in the target data area, the encrypted data corresponding to the secret information is Adding to the embedded area can achieve the effect of keeping the file size unchanged before and after information hiding. The target information has high concealment and strong security, and further weakens the degree of human visual sense perception of concealed information. Additional multimedia content (such as text, audio, images, etc.); by performing source document type consistency processing on the target document file, information hiding can be realized without changing the document format characteristics, the original appearance has zero steganographic traces, and the large It greatly reduces the risk of network attacks that are noticed and monitored by third-party attackers due to the operation of introducing additional objects into files. It can provide a higher level of digital content communication security protection for application scenarios with confidential information transfer processes, and reduce the risk of information hiding parties and extractors encountering malicious information cracking, damage, tampering and other attacks from third parties during the information exchange process. Information security risks, the concealment and reliability of secret information transmission behaviors are further enhanced.
本申请的附加优点、目的,以及特征将在下面的描述中将部分地加以阐述,且将对于本领域普通技术人员在研究下文后部分地变得明显,或者可以根据本申请的实践而获知。本申请的目的和其它优点可以通过在说明书以及附图中具体指出的结构实现到并获得。Additional advantages, objects, and features of the present application will be set forth in part in the following description, and in part will become apparent to those of ordinary skill in the art upon study of the following, or may be learned from practice of the present application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the description and drawings.
本领域技术人员将会理解的是,能够用本申请实现的目的和优点不限于以上具体所述,并且根据以下详细说明将更清楚地理解本申请能够实现的上述和其他目的。Those skilled in the art will appreciate that the objects and advantages that can be achieved with the present application are not limited to those specifically described above, and the above and other objects that can be achieved by the present application will be more clearly understood from the following detailed description.
附图说明Description of drawings
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,并不构成对本申请的限定。附图中的部件不是成比例绘制的,而只是为了示出本申请的原理。为了便于示出和描述本申请的一些部分,附图中对应部分可能被放大,即,相对于依据本申请实际制造的示例性装置中的其它部件可能变得更大。在附图中:The accompanying drawings described herein are used to provide further understanding of the present application, and constitute a part of the present application, and do not constitute a limitation to the present application. The components in the drawings are not to scale, but merely illustrate the principles of the application. In order to facilitate the illustration and description of some portions of the present application, corresponding portions in the figures may be exaggerated, ie, may be made larger relative to other components in an exemplary device actually fabricated in accordance with the present application. In the attached image:
图1为基于办公文档文件的信息隐藏与信息提取技术方案中的现有主流技术方案与本发明的技术方案之间的区别对比示意图。FIG. 1 is a schematic diagram showing the difference between the existing mainstream technical solutions in the technical solutions for information hiding and information extraction based on office document files and the technical solutions of the present invention.
图2为本申请一实施例中的秘密信息隐藏方法的流程示意图。FIG. 2 is a schematic flowchart of a secret information hiding method in an embodiment of the present application.
图3为本申请一实施例中的秘密信息提取方法的流程示意图。FIG. 3 is a schematic flowchart of a method for extracting secret information in an embodiment of the present application.
图4为本申请另一实施例中的秘密信息隐藏装置的结构示意图。FIG. 4 is a schematic structural diagram of a secret information hiding apparatus in another embodiment of the present application.
图5为本申请另一实施例中的秘密信息提取装置的结构示意图。FIG. 5 is a schematic structural diagram of an apparatus for extracting secret information in another embodiment of the present application.
图6为本申请另一实施例中的秘密信息传输系统的结构示意图。FIG. 6 is a schematic structural diagram of a secret information transmission system in another embodiment of the present application.
图7为本申请应用实例提供的基于办公文档文件的信息隐藏方法思路框架的流程图。FIG. 7 is a flow chart of an idea framework of an information hiding method based on an office document file provided by an application example of this application.
图8为本申请应用实例提供的基于办公文档文件的信息提取方法思路框架的流程图。FIG. 8 is a flow chart of an idea framework of an information extraction method based on an office document file provided by an application example of this application.
图9为本申请应用实例提供的以微软Office 2003版本为例的秘密信息隐藏及提取的流程示意图。FIG. 9 is a schematic flowchart of secret information hiding and extraction provided by an application example of this application, taking Microsoft Office 2003 version as an example.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚明白,下面结合实施方式和附图,对本申请做进一步详细说明。在此,本申请的示意性实施方式及其说明用于解释本申请,但并不作为对本申请的限定。In order to make the objectives, technical solutions and advantages of the present application more clear, the present application will be further described in detail below with reference to the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the present application are used to explain the present application, but are not intended to limit the present application.
在此,还需要说明的是,为了避免因不必要的细节而模糊了本申请,在附图中仅仅示出了与根据本申请的方案密切相关的结构和/或处理步骤,而省略了与本申请关系不大的其他细节。Here, it should also be noted that, in order to avoid obscuring the present application due to unnecessary details, only the structures and/or processing steps closely related to the solution according to the present application are shown in the drawings, and the related structures and/or processing steps are omitted. Other details not relevant to this application.
应该强调,术语“包括/包含”在本文使用时指特征、要素、步骤或组件的存在,但并不排除一个或更多个其它特征、要素、步骤或组件的存在或附加。It should be emphasized that the term "comprising/comprising" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other features, elements, steps or components.
在此,还需要说明的是,如果没有特殊说明,术语“连接”在本文不仅可以指直接连接,也可以表示存在中间物的间接连接。Here, it should also be noted that, if there is no special description, the term "connection" herein may not only refer to direct connection, but also to indicate indirect connection with intermediates.
在下文中,将参考附图描述本申请的实施例。在附图中,相同的附图标记代表相同或类似的部件,或者相同或类似的步骤。Hereinafter, embodiments of the present application will be described with reference to the accompanying drawings. In the drawings, the same reference numbers represent the same or similar parts, or the same or similar steps.
信息作为一种资源,它的普遍性、共享性、增值性、可处理性和多效用性使其成为社会运转必不可少的元素。信息安全的实质是保护信息系统或信息网络中的信息资源免受各种类型的威胁、干扰和破坏,即保证信息的安全性。随着互联网的全球盛行,日益繁多的事情交付给计算机处理,数不胜数的敏感信息经过脆弱的网络通信线路每时每刻在计算机系统之间传送。信息在存储、处理和交换过程中,都存在泄露、被截收、窃听、篡改、伪造的可能性。计算机系统中存在着无数安全漏洞,一旦这些漏洞被不法分子利用来,对秘密信息的传输发起破解攻击,会对个人、企业等造成严重影响。As a resource, information has become an indispensable element of social operation due to its universality, sharing, value-added, processability and multi-utility. The essence of information security is to protect the information resources in the information system or information network from various types of threats, interference and damage, that is, to ensure the security of information. With the global prevalence of the Internet, more and more things are handed over to computers for processing, and countless sensitive information is transferred between computer systems every moment through fragile network communication lines. In the process of storage, processing and exchange of information, there is the possibility of leakage, interception, eavesdropping, tampering and forgery. There are numerous security loopholes in computer systems. Once these loopholes are exploited by criminals, cracking attacks on the transmission of secret information will have serious impacts on individuals and enterprises.
现有的基于文档文件的信息隐藏技术一般是通过对文档内容的格式特征进行调整,或者在编辑时添加插件或附加媒体对象等方式嵌入秘密信息。上述方案存在着由“文件隐写前后大小浮动明显、插件附加隐写痕迹重、载体文件的文档类型和对应的办公编辑软件版本局限性强”所带来的安全性不强、可隐蔽性不高、实用范围不广的问题。Existing document file-based information hiding technologies generally embed secret information by adjusting the format characteristics of document content, or adding plug-ins or additional media objects during editing. The above scheme has the disadvantages of weak security and poor concealability caused by "the size of the file before and after steganography fluctuates obviously, the plug-in attaches heavy steganographic traces, and the document type of the carrier file and the corresponding version of the office editing software have strong limitations". High and low practical range.
基于此,参见图1,本申请实施例提供了以Office软件不同版本下多种类型的文档文件为信息载体,隐写前后文件大小不变或者大小变化的一组信息隐藏和信息提取方法,实际应用范围广泛。相比现有技术,本申请提出的文件大小不变型方案使得文件在信息隐藏前后所占用的字节信息无差异,文档文字的格式特征不变,秘密信息的安全性和可隐蔽性进一步提升;本申请提出的文件大小变化型方案无需安装字库等插件引入,文档无附加对象,外观无嵌入痕迹。通过实施本申请,为信息传递流程提供更高的数字内容通信安全保护等级,隐秘信息的交流行为的隐蔽性和可靠性进一步增强。Based on this, referring to FIG. 1 , the embodiment of the present application provides a set of information hiding and information extraction methods in which various types of document files under different versions of Office software are used as information carriers, and the file size remains unchanged or changes in size before and after steganography. Wide range of applications. Compared with the prior art, the file size invariance scheme proposed in this application makes the byte information occupied by the file before and after information hiding unchanged, the format characteristics of the document text remain unchanged, and the security and concealability of secret information are further improved; The file size variation solution proposed in the present application does not require the installation of plug-ins such as fonts to be introduced, the document has no additional objects, and the appearance has no embedded traces. By implementing this application, a higher digital content communication security protection level is provided for the information transmission process, and the concealment and reliability of the exchange behavior of secret information are further enhanced.
为了现有的基于电子文档字符格式特征的信息隐藏方法存在的嵌入痕迹难以抹除,可隐蔽性较弱,信息安全性缺乏足够的保护,隐匿信息易遭受第三方检测和攻击等问题,本申请实施例提供一种秘密信息隐藏方法,参见图2,所述秘密信息隐藏方法具体包含有如下内容:In order to solve the problems of the existing information hiding methods based on the character format characteristics of electronic documents, the embedded traces are difficult to erase, the concealment is weak, the information security lacks sufficient protection, and the concealed information is vulnerable to third-party detection and attack. The embodiment provides a method for hiding secret information. Referring to FIG. 2 , the method for hiding secret information specifically includes the following contents:
步骤100:基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域。Step 100: Acquire a target data area corresponding to the target document file based on the version information of the target document file, and search for an embedded area for hiding secret information in the target data area.
在执行步骤100之前,可以先创建文档文件,作为目标信息隐藏和提取的数字化载体宿主,具体方式可以为:选取由Microsoft Office对应版本的编辑类型为.doc/.xls/.ppt(或.docx/.xlsx/.pptx)文档文件,文档的内容普通无异常,以该文档文件作为目标信息的载体文件。Before executing
在步骤100中,可以根据目标文档文件的版本信息,针对不同版本的目标文档文件选取不同的处理方式,能够根据实际应用情况灵活选择适用某一版本办公软件,并能够根据是否改变文件大小的效果需求进一步选取具体可行的方法,实用性强,适用范围广。In
具体来说,可以获取目标文档文件的数据块区域的数据信息特征,对文档文件进行压缩处理,选取适合隐蔽目标信息的嵌入区域,嵌入处理后的目标信息。例如:利用Office系列软件的应用特性,以文档数据信息块内的特有数据区域、文档压缩包的数据信息块内的数据扩展域、或压缩包目录内附属文件的可利用区域为待选的嵌入区域,找到可供信息隐藏的无效干扰数据区域或全0空白字节数据区域,将经过处理加工后的隐匿信息嵌入到最终选定的数据块区域中。Specifically, the data information feature of the data block region of the target document file can be acquired, the document file can be compressed, an embedding region suitable for concealing the target information can be selected, and the processed target information can be embedded. For example: using the application features of the Office series software, the unique data area in the document data information block, the data extension field in the data information block of the document compressed package, or the available area of the attached files in the compressed package directory is used as the embedding to be selected. Find the invalid interference data area or all 0 blank byte data area for information hiding, and embed the processed hidden information into the final selected data block area.
步骤200:将秘密信息对应的加密数据添加至所述嵌入区域,并对所述目标文档文件进行源文档类型一致性处理。Step 200: Add encrypted data corresponding to the secret information to the embedded area, and perform source document type consistency processing on the target document file.
在步骤200中,在将秘密信息对应的加密数据添加至所述嵌入区域之后,需要恢复文档文件类型,信息隐藏过程完成。例如:若在步骤100中出现了目标文档文件的压缩包,则需要在步骤200的源文档类型一致性处理中,需要将对文档压缩包内文档数据块的修改操作保存,将文档文件解压缩恢复到文档原类型,保持信息隐藏前后文件在视觉感官上的一致性,关闭文档,完成信息隐藏过程。若在步骤100中未出现压缩包,则步骤200中的源文档类型一致性处理中,仅需要保存修改的数据并关闭文档即可。可以理解的是,步骤100中是否出现压缩包,主要取决于所述目标文档文件的版本,具体在后续实施例中详细说明。In
从上述描述可知,本申请实施例提供的秘密信息隐藏方法,基于目标文档文件的版本信息,针对不同版本文档进行不同处置,能够根据实际应用情况灵活选择适用某一版本办公软件,并能够根据是否改变文件大小的效果需求进一步选取具体可行的方法,实用性强,适用范围广;通过获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域,将秘密信息对应的加密数据添加至所述嵌入区域,能够达到信息隐藏前后文件大小不变的隐藏效果,目标信息隐蔽性高、安全性强,进一步弱化在人类视觉感官上感知隐蔽信息的程度,且无需安装额外插件、无附加多媒体内容(如文本、音频、图像等);通过对所述目标文档文件进行源文档类型一致性处理,能够在不改变文档格式特征的基础上实现信息隐藏,原文外观零隐写痕迹,大幅度降低因在文件引入附加对象的操作受到第三方攻击者关注及监测的网络攻击风险。可为具有携密信息传递流程的应用场景提供更高的数字内容通信安全保护等级,降低信息隐藏方和提取方在信息交流过程中遭遇来自第三方恶意的信息破解、损坏、篡改等攻击行为的信息安全风险,隐秘信息传递行为的隐蔽性和可靠性进一步增强。It can be seen from the above description that the secret information hiding method provided by the embodiment of the present application, based on the version information of the target document file, performs different processing for different versions of the document, can flexibly select and apply a certain version of the office software according to the actual application The effect of changing the file size requires further selection of a specific and feasible method, which has strong practicability and a wide range of applications; by acquiring the target data area corresponding to the target document file, and searching for an embedded area for hiding secret information in the target data area , the encrypted data corresponding to the secret information is added to the embedded area, which can achieve the hiding effect that the file size remains unchanged before and after the information is hidden, the target information has high concealment and strong security, and further weakens the degree of human visual sense to perceive the concealed information. , and there is no need to install additional plug-ins, no additional multimedia content (such as text, audio, images, etc.); by performing source document type consistency processing on the target document file, information hiding can be realized without changing the document format characteristics, The original text has zero steganographic traces, which greatly reduces the risk of network attacks that are noticed and monitored by third-party attackers due to the operation of introducing additional objects into the file. It can provide a higher level of digital content communication security protection for application scenarios with confidential information transfer processes, and reduce the risk of information hiding parties and extractors encountering malicious information cracking, damage, tampering and other attacks from third parties during the information exchange process. Information security risks, the concealment and reliability of secret information transmission behaviors are further enhanced.
为了进一步提高秘密信息对应的加密数据的应用可靠性及安全性,在本申请的秘密信息隐藏方法的一个实施例中,在所述步骤200之前还具体包含有如下内容:In order to further improve the application reliability and security of the encrypted data corresponding to the secret information, in an embodiment of the secret information hiding method of the present application, before the
步骤010:在获取秘密信息对应的字符串。Step 010: Obtain the character string corresponding to the secret information.
步骤020:在所述字符串中添加标注以形成对应的标注字符串。Step 020: Add a label to the character string to form a corresponding label string.
在步骤020中,为了更进一步提高标注字符串的应用可靠性,所述步骤020的具体执行方式可以为:步骤021:在所述字符串的开头和/或结尾添加对应的自定义字符标注以形成对应的标注字符串。In step 020, in order to further improve the application reliability of the labelled character string, the specific implementation of step 020 may be: Step 021: Add corresponding custom character labels at the beginning and/or end of the character string to mark Form the corresponding label string.
步骤030:对所述标注字符串进行加密处理,以得到所述秘密信息对应的加密数据。Step 030: Encrypt the marked character string to obtain encrypted data corresponding to the secret information.
具体来说,在执行步骤200之前,还可以对待隐写的秘密信息进行标注处理,对标注后的信息进行二次处理。例如:将秘密信息字符化形式呈现记录在记事本文件中,将信息组成的字符串的开头或结尾添加自定义的开端识别字符标注和结束识别字符标注,再对拼接标注符后的信息字符串进行二次处理。Specifically, before
其中,所述对标注后的信息进行二次处理,包括:对拼接后组成的“秘密信息+标注符”信息字符串经过特殊的密码学算法程序进行加密处理,转化为视觉上不可读的密文。Wherein, the secondary processing of the marked information includes: encrypting the “secret information+marker” information string formed after splicing through a special cryptographic algorithm program, and converting it into a visually unreadable password. arts.
为了进一步提高秘密信息隐藏的适用广泛性及可靠性,在本申请的秘密信息隐藏方法的一个实施例中,所述步骤100具体包含有如下内容:In order to further improve the applicability and reliability of secret information hiding, in an embodiment of the secret information hiding method of the present application, the
步骤111:若所述目标文档文件的版本信息显示该目标文档文件所属的版本为预设的第一版本,则定位至所述目标文档文件的ASCII码数据信息块。Step 111: If the version information of the target document file shows that the version to which the target document file belongs is the preset first version, locate the ASCII code data information block of the target document file.
其中,所述第一版本可以指Microsoft Office 2003。Wherein, the first version may refer to Microsoft Office 2003.
步骤112:在ASCII码数据信息块中查找自动预留的一块用于保存文档属性信息的区域以作为所述目标文档文件对应的目标数据区域。Step 112: Find an automatically reserved area for storing document attribute information in the ASCII code data information block as the target data area corresponding to the target document file.
步骤113:在所述目标数据区域中查找无效干扰数据区域或全空白字节数据区域作为用于隐藏秘密信息的嵌入区域。Step 113: Search for invalid interference data area or all-blank byte data area in the target data area as an embedded area for hiding secret information.
具体来说,本实施例提供了以Microsoft Office 2003软件创建的文档文件(.doc/.xls/.ppt)为信息载体,进行信息隐藏与提取的技术方案,方案内容包括:创建微软office 2003年系列的文档作为秘密信息隐藏的载体,打开文档的ASCII码数据信息块,找到数据包中存在的特定无效数据区域,将秘密信息嵌入到选定的数据块区域中,信息隐藏前后文件大小维持不变。Specifically, this embodiment provides a technical solution for hiding and extracting information by using a document file (.doc/.xls/.ppt) created by Microsoft Office 2003 software as an information carrier. The content of the solution includes: creating Microsoft Office 2003 The series of documents are used as the carrier of secret information hiding. Open the ASCII data information block of the document, find the specific invalid data area in the data packet, and embed the secret information into the selected data block area. The file size before and after information hiding remains unchanged. Change.
其中,所述的将秘密信息嵌入在载体文档数据信息块内存在的无效数据区域中的方法,信息隐藏方式通过以下过程:Office 2003办公软件创建的文档文件具有“在文档数据信息块中会自动预留一块用于保存文档的属性信息数据块区域”的特征,在该区域的无效数据全0空白域中嵌入秘密信息和结束标注对应的ASCII编码字节串;信息提取方式通过以下过程确定:找到文档数据块中保存文档信息的区域,以结束标注为界,夹在有效数据信息和结束标注间的字符段即为待提取的目标消息。Wherein, in the method for embedding secret information in the invalid data area existing in the carrier document data information block, the information hiding method is through the following process: the document file created by the Office 2003 office software has the "automatic information in the document data information block". Reserve a block area for saving the attribute information of the document" feature, and embed the secret information and the ASCII-encoded byte string corresponding to the end tag in the blank space of all 0s of invalid data in this area; the information extraction method is determined by the following process: Find the area where the document information is stored in the document data block, and take the end mark as the boundary, and the character field sandwiched between the valid data information and the end mark is the target message to be extracted.
为了进一步提高秘密信息隐藏的适用广泛性及可靠性,在本申请的秘密信息隐藏方法的一个实施例中,所述步骤100还可以具体包含有如下内容:In order to further improve the applicability and reliability of secret information hiding, in an embodiment of the secret information hiding method of the present application, the
步骤121:若所述目标文档文件的版本信息显示该目标文档文件所属的版本为预设的第一版本之后的其他版本,则对所述目标文档文件进行压缩处理,以得到该目标文档文件对应的压缩包。Step 121: If the version information of the target document file shows that the version to which the target document file belongs is another version after the preset first version, compress the target document file to obtain the corresponding version of the target document file. zip package.
其中,第一版本之后的其他版本可以指Microsoft Office 2007及之后的Office版本软件。Wherein, other versions after the first version may refer to Microsoft Office 2007 and later Office version software.
步骤122:在所述压缩包中的数据信息块中定位因压缩而生成的数据扩展域。Step 122: Locate the data extension field generated by compression in the data information block in the compressed package.
步骤123:在所述数据扩展域中查找无效干扰数据区域或全空白字节数据区域作为用于隐藏秘密信息的嵌入区域。Step 123: Search for invalid interference data area or all-blank byte data area in the data extension field as an embedded area for hiding secret information.
具体来说,本实施例提供了以Microsoft Office 2007及之后的Office版本软件创建的文档文件(.doc/.xls/.ppt)为信息载体,进行信息隐藏与提取的技术方案,方案内容包括:通过将文档文件进行压缩处理,打开压缩包文件的数据信息块,定位到数据块中因压缩生成的数据扩展域,将秘密信息加标注组合的字符串嵌入到该数据域的全0空白部分,信息隐藏前后文件大小不变;通过将文档文件进行压缩处理后,用压缩软件解析出压缩包内的文件目录,在压缩包内的文件目录中找到与文档类型对应的专有信息记录文件,在打开的记录文件中写入一条属性名称无意义的属性信息记录,属性的内容设置为秘密信息。信息隐藏后文件大小改变;通过将文档文件进行压缩处理后得到公有的文档属性信息记录文件,定位至文件的末尾作为嵌入起始区域,粘贴秘密信息经特定算法加密生成的视觉“透明”密文字符串,保存对压缩包内记录文件的修改操作,解压回源文档文件类型。信息隐藏后文件大小改变。Specifically, this embodiment provides a technical solution for information hiding and extraction using document files (.doc/.xls/.ppt) created by Microsoft Office 2007 and later Office version software as an information carrier, and the content of the solution includes: By compressing the document file, open the data information block of the compressed package file, locate the data expansion field generated by compression in the data block, and embed the string of secret information plus annotation into the blank part of all 0s in the data field. The file size does not change before and after the information is hidden; after compressing the document file, use the compression software to parse the file directory in the compressed package, and find the proprietary information record file corresponding to the document type in the file directory in the compressed package. An attribute information record with a meaningless attribute name is written into the opened record file, and the content of the attribute is set as secret information. The file size changes after the information is hidden; the public document attribute information record file is obtained by compressing the document file, locates the end of the file as the embedding start area, and pastes the secret information encrypted by a specific algorithm to generate a visual "transparent" ciphertext String, save the modification operation of the record file in the compressed package, and decompress it back to the original document file type. File size changed after information hiding.
其中,所述的将文档文件压缩处理后,打开压缩包的数据信息块,定位到数据块中存在的数据扩展域,并在域中空白部分嵌入目标信息的方法,信息隐藏方法通过以下过程确定:通过将文档文件内容进行压缩处理,定位到压缩后压缩包的数据信息块中生成的数据扩展域,将目标信息加结束标志拼成的字符串以ASCII编码字节串的形式写入扩展域中除有效数据外的无效空白区,数据块修改完成后解压缩回文档类型文件,恢复文档文件原状;信息提取方法通过以下的过程确定:把文档文件进行压缩,打开压缩包的数据信息块,定位到块内的数据扩展域,将扩展域内除有效数据外的所有数据内容全部从写入载体的文件提取出来复制在某记事本文件中,再截断结束标注及其后所有的全0字节,得到秘密信息。Among them, after the document file is compressed, the data information block of the compressed package is opened, the data extension field existing in the data block is located, and the target information is embedded in the blank part of the field. The information hiding method is determined by the following process : By compressing the content of the document file, locating the data extension field generated in the data information block of the compressed package, and writing the string composed of the target information and the end mark into the extension field in the form of an ASCII-encoded byte string In the invalid blank area except valid data in the data block, after the modification of the data block is completed, decompress it back to the document type file, and restore the original state of the document file; the information extraction method is determined by the following process: compress the document file, open the data information block of the compressed package, Locate the data extension field in the block, extract all data content in the extension field except valid data from the file written to the carrier and copy it to a notepad file, and then truncate the end tag and all subsequent all 0 bytes , get secret information.
其中,所述的将文档文件压缩后,解析压缩包内的文件目录,得到与文档类型对应的专有信息记录文件,在文件中新增含秘密信息的属性信息记录的方法,信息隐藏方法通过以下过程确定:将文档文件进行压缩处理后,在对压缩包解析打开时生成的目录文件夹内找到各文件类型对应专有的信息记录文件,打开文件后在任意位置增加一条属性名称无意义的属性信息记录,属性信息的内容设置为秘密信息,修改完记录文件后保存,并对压缩包进行解压处理,恢复文件原类型。信息提取方法通过以下的过程确定:将载体文件进行压缩处理,打开压缩包内的文件目录后定位到携密的与文档类型对应的专有信息记录文件,找到文件内在信息隐藏时添加属性名称无意义的属性记载记录,复制该条属性记录对应的属性内容,即成功提取到秘密信息。Wherein, after compressing the document file, parsing the file directory in the compressed package to obtain a proprietary information record file corresponding to the document type, and adding a new attribute information record containing secret information to the file, the information hiding method adopts The following process is determined: after compressing the document file, find the exclusive information record file corresponding to each file type in the directory folder generated when the compressed package is parsed and opened, and add a meaningless attribute name at any position after opening the file. Attribute information record, the content of the attribute information is set as secret information, the record file is modified and saved, and the compressed package is decompressed to restore the original type of the file. The information extraction method is determined by the following process: compress the carrier file, open the file directory in the compressed package, locate the private information record file corresponding to the document type that carries the secret, and add the attribute name when the hidden information in the file is found. The meaningful attribute record record, copy the attribute content corresponding to the attribute record, that is, the secret information is successfully extracted.
为了能够在不改变文档格式特征的基础上实现信息隐藏,在本申请的秘密信息隐藏方法的一个实施例中,所述步骤200还可以具体包含有如下内容:In order to realize information hiding without changing the document format characteristics, in an embodiment of the secret information hiding method of the present application, the
步骤210:将秘密信息对应的加密数据进行视觉透明处理。Step 210: Perform visual transparent processing on the encrypted data corresponding to the secret information.
步骤220:将经视觉透明处理后的加密数据添加至所述嵌入区域并进行保存。Step 220: Add the encrypted data after the visual transparency processing to the embedded area and save it.
步骤230:若当前生成有所述目标文档文件的压缩包,则对该压缩包进行解压缩处理。Step 230: If a compressed package of the target document file is currently generated, decompress the compressed package.
其中,所述的将文档文件进行压缩处理后,在压缩包内的文件目录中打开所有类型文档公有的信息记录文件,在文件末尾处粘贴上秘密信息由特定算法加密生成的“透明”密文字符串的方法,信息隐藏方法通过以下过程确定:将文档文件进行压缩处理后,打开生成的压缩包,在压缩包目录下找到所有文档类型公有的信息记录文件,通过特殊加密算法将目标隐匿信息转化为由空格串和Tab键组合的“透明”字符串,将密文粘贴至记录文件的末尾。修改完成后对压缩包进行解压,恢复文档文件原类型;信息提取方法通过以下过程确定:将写入秘密信息的载体文件进行压缩,在压缩包的目录文件中找到携密的公有文档信息记录文件,提取文件尾部后一定长度的空白行区域并复制到某一记事本文件中,通过密码学算法对记事本文件中的无形密文解密输出,得到秘密信息。Wherein, after the document file is compressed, the information record file common to all types of documents is opened in the file directory in the compressed package, and the "transparent" ciphertext generated by the encryption of the secret information by a specific algorithm is pasted at the end of the file. The string method and the information hiding method are determined by the following process: after compressing the document file, open the generated compressed package, find the information record files common to all document types in the compressed package directory, and hide the information of the target through a special encryption algorithm. Convert to a "transparent" string consisting of a space string and the Tab key, and paste the ciphertext at the end of the log file. After the modification is completed, decompress the compressed package to restore the original type of the document file; the information extraction method is determined by the following process: compress the carrier file with the secret information written, and find the secret public document information record file in the directory file of the compressed package , extract the blank line area of a certain length after the end of the file and copy it to a notepad file, and decrypt the invisible ciphertext in the notepad file through a cryptographic algorithm to output the secret information.
基于上述实施例提供的秘密信息隐藏方法,本申请还提供一种对应的秘密信息提取方法的实施例,参见图3,所述秘密信息提取方法具体包含有如下内容:Based on the secret information hiding method provided by the above-mentioned embodiments, the present application also provides an embodiment of a corresponding secret information extraction method. Referring to FIG. 3 , the secret information extraction method specifically includes the following contents:
步骤300:在目标文档文件对应的目标数据区域中查找到用于隐藏秘密信息的嵌入区域,其中,所述目标文档文件预先基于所述秘密信息隐藏方法嵌入所述秘密信息对应的加密数据。Step 300: Find an embedded area for hiding secret information in a target data area corresponding to a target document file, wherein the target document file embeds encrypted data corresponding to the secret information in advance based on the secret information hiding method.
在步骤300中,需要先获取载体文档文件,打开文档文件,定位信息隐藏时嵌入的数据块区域。例如:信息提取方(接受方)根据和信息隐藏方(发送方)的协定获取到目标信息的载体文档文件,压缩载体文件,打开文档文件的压缩包下的文件夹,以文件尾部区域或数据块标志字符或全0字节区域为索引,确定信息隐藏的数据区域。In
步骤400:在所述嵌入区域中提取加密数据,并根据该加密数据获取所述秘密信息。Step 400: Extract encrypted data in the embedded area, and obtain the secret information according to the encrypted data.
在步骤400中,可以提取数据块区域中存储的信息,将提取出的信息还原成秘密信息。例如:打开文档或文档压缩包,定位到信息隐藏所在的区域,将区域内的数据信息块复制并粘贴在记事本文件中,通过特殊的密码学算法将记事本中存储的密文信息解密为源目标信息的明文形式,再将解密出来的明文通过删除首尾标注符号转为源秘密信息。In
在步骤400之后,还可以恢复文档文件类型,关闭文档,信息提取过程完成。例如:将文档压缩包内隐藏信息的文档数据区域中的数据删除,填充为无意义的字节码串。保存修改操作,将文档文件解压缩恢复为文档原类型,保持信息隐藏前后文件在视觉感官上的一致性,关闭文档,完成信息提取过程。After
为了进一步提高提取秘密信息的可靠性及安全性,在所述秘密信息提取方法的一个实施例中,所述秘密信息提取方法中的步骤400中的所述根据该加密数据获取所述秘密信息具体包含有如下内容:In order to further improve the reliability and security of extracting the secret information, in an embodiment of the secret information extracting method, in
步骤410:基于预获取的解密方式对所述加密数据进行解密,并根据预获取的标注形式数据在解密后的数据中删除标注字符串,以得到所述秘密信息对应的字符串。Step 410: Decrypt the encrypted data based on the pre-acquired decryption method, and delete the labeled character string in the decrypted data according to the pre-acquired data in the labeled form, so as to obtain a character string corresponding to the secret information.
为了进一步提高查找到用于隐藏秘密信息的嵌入区域的可靠性及安全性,在所述秘密信息提取方法的一个实施例中,所述秘密信息提取方法中的步骤300中的所述根据该加密数据获取所述秘密信息具体包含有如下内容:In order to further improve the reliability and security of finding the embedded area for hiding secret information, in an embodiment of the secret information extraction method, the encryption method in
步骤310:预先获取针对所述目标文档文件的秘密数据提取方式。Step 310: Acquire in advance the secret data extraction method for the target document file.
步骤320:若所述秘密数据提取方式中不包含有压缩步骤,则定位至所述目标文档文件的ASCII码数据信息块,在ASCII码数据信息块中查找自动预留的一块用于保存文档属性信息的区域以作为所述目标文档文件对应的目标数据区域,并在所述目标数据区域中查找用于隐藏秘密信息的嵌入区域。Step 320: If the secret data extraction method does not include a compression step, locate the ASCII code data information block of the target document file, and find an automatically reserved block in the ASCII code data information block for saving the document attributes. The information area is taken as the target data area corresponding to the target document file, and an embedded area for hiding secret information is searched in the target data area.
步骤330:若所述秘密数据提取方式中包含有压缩步骤,则对所述目标文档文件进行压缩处理,在对应的压缩包中定位因压缩而生成的数据扩展域,并在所述数据扩展域中查找用于隐藏秘密信息的嵌入区域。Step 330: If the secret data extraction method includes a compression step, compress the target document file, locate the data extension field generated by compression in the corresponding compressed package, and store the data extension field in the data extension field Find the embedded area used to hide secret information in .
从软件层面来说,本申请还提供一种用于执行所述秘密信息隐藏方法中全部或部分内的秘密信息隐藏装置,参见图4,所述秘密信息隐藏装置具体包含有如下内容:From the software level, the present application also provides a secret information hiding device for executing all or part of the secret information hiding method, referring to FIG. 4 , the secret information hiding device specifically includes the following content:
区域查找模块10,用于基于目标文档文件的版本信息获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域;an
数据嵌入模块20,用于将秘密信息对应的加密数据添加至所述嵌入区域,并对所述目标文档文件进行源文档类型一致性处理。The
本申请提供的秘密信息隐藏装置的实施例具体可以用于执行上述实施例中的秘密信息隐藏方法的实施例的处理流程,其功能在此不再赘述,可以参照上述秘密信息隐藏方法实施例的详细描述。The embodiments of the secret information hiding apparatus provided by the present application can be specifically used to execute the processing flow of the secret information hiding method embodiments in the foregoing embodiments, and its functions are not repeated here, and reference may be made to the secret information hiding method embodiments described above. Detailed Description.
所述秘密信息隐藏装置进行秘密信息隐藏的部分可以在服务器中执行,而在另一种实际应用情形中,也可以所有的操作都在客户端设备中完成。具体可以根据所述客户端设备的处理能力,以及用户使用场景的限制等进行选择。本申请对此不作限定。若所有的操作都在所述客户端设备中完成,所述客户端设备还可以包括处理器,用于秘密信息隐藏的具体处理。The secret information hiding part of the secret information hiding apparatus may be performed in the server, and in another practical application situation, all operations may be completed in the client device. Specifically, the selection can be made according to the processing capability of the client device and the limitations of the user's usage scenario. This application does not limit this. If all operations are completed in the client device, the client device may further include a processor for specific processing of secret information hiding.
上述的客户端设备可以具有通信模块(即通信单元),可以与远程的服务器进行通信连接,实现与所述服务器的数据传输。所述服务器可以包括任务调度中心一侧的服务器,其他的实施场景中也可以包括中间平台的服务器,例如与任务调度中心服务器有通信链接的第三方服务器平台的服务器。所述的服务器可以包括单台计算机设备,也可以包括多个服务器组成的服务器集群,或者分布式装置的服务器结构。The above-mentioned client device may have a communication module (ie, a communication unit), which may be communicatively connected with a remote server to realize data transmission with the server. The server may include a server on the task scheduling center side, and other implementation scenarios may also include a server on an intermediate platform, such as a server on a third-party server platform that has a communication link with the task scheduling center server. The server may include a single computer device, a server cluster composed of multiple servers, or a server structure of a distributed device.
上述服务器与所述客户端设备端之间可以使用任何合适的网络协议进行通信,包括在本申请提交日尚未开发出的网络协议。所述网络协议例如可以包括TCP/IP协议、UDP/IP协议、HTTP协议、HTTPS协议等。当然,所述网络协议例如还可以包括在上述协议之上使用的RPC协议(Remote Procedure Call Protocol,远程过程调用协议)、REST协议(Representational State Transfer,表述性状态转移协议)等。Any suitable network protocol may be used for communication between the above-mentioned server and the client device, including a network protocol that has not been developed as of the filing date of this application. The network protocol may include, for example, the TCP/IP protocol, the UDP/IP protocol, the HTTP protocol, the HTTPS protocol, and the like. Of course, the network protocol may also include, for example, an RPC protocol (Remote Procedure Call Protocol, a remote procedure call protocol), a REST protocol (Representational State Transfer, a representational state transfer protocol) and the like used on the above-mentioned protocols.
从上述描述可知,本申请实施例提供的秘密信息隐藏装置,基于目标文档文件的版本信息,针对不同版本文档进行不同处置,能够根据实际应用情况灵活选择适用某一版本办公软件,并能够根据是否改变文件大小的效果需求进一步选取具体可行的方法,实用性强,适用范围广;通过获取所述目标文档文件对应的目标数据区域,并在该目标数据区域中查找用于隐藏秘密信息的嵌入区域,将秘密信息对应的加密数据添加至所述嵌入区域,能够达到信息隐藏前后文件大小不变的隐藏效果,目标信息隐蔽性高、安全性强,进一步弱化在人类视觉感官上感知隐蔽信息的程度,且无需安装额外插件、无附加多媒体内容(如文本、音频、图像等);通过对所述目标文档文件进行源文档类型一致性处理,能够在不改变文档格式特征的基础上实现信息隐藏,原文外观零隐写痕迹,大幅度降低因在文件引入附加对象的操作受到第三方攻击者关注及监测的网络攻击风险。可为具有携密信息传递流程的应用场景提供更高的数字内容通信安全保护等级,降低信息隐藏方和提取方在信息交流过程中遭遇来自第三方恶意的信息破解、损坏、篡改等攻击行为的信息安全风险,隐秘信息传递行为的隐蔽性和可靠性进一步增强。It can be seen from the above description that the secret information hiding device provided by the embodiment of the present application, based on the version information of the target document file, handles different versions of documents differently, can flexibly select and apply a certain version of office software according to the actual application, and can The effect of changing the file size requires further selection of a specific and feasible method, which has strong practicability and a wide range of applications; by acquiring the target data area corresponding to the target document file, and searching for an embedded area for hiding secret information in the target data area , the encrypted data corresponding to the secret information is added to the embedded area, which can achieve the hiding effect that the file size remains unchanged before and after the information is hidden, the target information has high concealment and strong security, and further weakens the degree of human visual sense to perceive the concealed information. , and there is no need to install additional plug-ins, no additional multimedia content (such as text, audio, images, etc.); by performing source document type consistency processing on the target document file, information hiding can be realized without changing the document format characteristics, The original text has zero steganographic traces, which greatly reduces the risk of network attacks that are noticed and monitored by third-party attackers due to the operation of introducing additional objects into the file. It can provide a higher level of digital content communication security protection for application scenarios with confidential information transfer processes, and reduce the risk of information hiding parties and extractors encountering malicious information cracking, damage, tampering and other attacks from third parties during the information exchange process. Information security risks, the concealment and reliability of secret information transmission behaviors are further enhanced.
从软件层面来说,本申请还提供一种用于执行所述秘密信息提取方法中全部或部分内的秘密信息提取装置,参见图5,所述秘密信息提取装置具体包含有如下内容:From the software level, the present application also provides a secret information extraction apparatus for executing all or part of the secret information extraction method. Referring to FIG. 5 , the secret information extraction apparatus specifically includes the following contents:
区域定位模块30,用于在目标文档文件对应的目标数据区域中查找到用于隐藏秘密信息的嵌入区域,其中,所述目标文档文件预先基于所述的秘密信息隐藏方法嵌入所述秘密信息对应的加密数据。The
数据提取模块40,用于在所述嵌入区域中提取加密数据,并根据该加密数据获取所述秘密信息。The
本申请提供的秘密信息提取装置的实施例具体可以用于执行上述实施例中的秘密信息提取方法的实施例的处理流程,其功能在此不再赘述,可以参照上述秘密信息提取方法实施例的详细描述。The embodiments of the apparatus for extracting secret information provided by the present application can be specifically used to execute the processing flow of the embodiments of the methods for extracting secret information in the above-mentioned embodiments, and its functions are not repeated here. Detailed Description.
另外,基于上述的秘密信息隐藏装置及秘密信息提取装置,本申请还提供一种秘密信息传输系统的实施例,参见图6,所述秘密信息传输系统具体包含有如下内容:In addition, based on the above-mentioned secret information hiding device and secret information extracting device, the present application also provides an embodiment of a secret information transmission system, referring to FIG. 6 , the secret information transmission system specifically includes the following contents:
秘密信息隐藏装置和秘密信息提取装置;Secret information hiding device and secret information extracting device;
所述秘密信息隐藏装置用于执行所述的秘密信息隐藏方法,并将嵌入所述秘密信息对应的加密数据的目标文档文件发送至所述秘密信息提取装置;The secret information hiding device is configured to execute the secret information hiding method, and send a target document file embedded with encrypted data corresponding to the secret information to the secret information extracting device;
所述秘密信息提取装置用于接收所述秘密信息隐藏装置发送的目标文档文件,并执行所述的秘密信息提取方法。The secret information extraction device is configured to receive the target document file sent by the secret information hiding device, and execute the secret information extraction method.
为了进一步说明本方案,本申请还提供一种基于办公文档文件的信息隐藏和信息提取的具体应用实例,涉及信息隐藏技术领域,具体涉及指一种将特定的目标信息嵌入数字化宿主信息(如文本)的信息隐写术。以解决现有的基于电子文档字符格式特征的信息隐藏方法(或基于在文档中增添附加内容的信息嵌入方式)所面临的“嵌入痕迹难以抹除,可隐蔽性较弱,信息安全性缺乏足够的保护,隐匿信息易遭受第三方检测和攻击”的问题。具体说明如下:In order to further illustrate the solution, the present application also provides a specific application example of information hiding and information extraction based on office document files, which relates to the technical field of information hiding, and specifically refers to a method of embedding specific target information into digital host information (such as text ) information steganography. In order to solve the problem that the existing information hiding methods based on the character format characteristics of electronic documents (or information embedding methods based on adding additional content to the document) are faced with "the embedded trace is difficult to erase, the concealment is weak, and the information security is insufficient. protection, hidden information is vulnerable to third-party detection and attack”. The specific instructions are as follows:
参见图7至图9,本申请应用实例公开了一种以办公文档编辑软件MicrosoftOffice系列创建的办公文档文件为信息载体对象,进行秘密信息的隐藏及提取流程的技术方案。Referring to FIGS. 7 to 9 , an application example of the present application discloses a technical solution for concealing and extracting secret information by taking an office document file created by the office document editing software Microsoft Office series as an information carrier object.
结合信息隐藏应用场景中使用的Microsoft Office的版本的不同,本申请的技术方案内容将分为两个方面,第一方面代表针对Microsoft Office 2003系列办公文档的信息隐藏和提取方案,第二方面代表针对Microsoft Office 2007及之后的系列办公文档的信息隐藏和提取方案。根据采用的各种信息隐藏技术在信息嵌入前后给文件内容大小带来的变化差异,每一方面对应着一个或多个具体的实施例方式,每一个实施方式对应着隐藏前后文件大小不变类型或者文件大小变化类型的某一技术操作。所有的信息隐藏方法设计联合组成了本申请的技术方案内容。Combined with the different versions of Microsoft Office used in information hiding application scenarios, the content of the technical solution of this application will be divided into two aspects. The first aspect represents the information hiding and extraction solution for Microsoft Office 2003 series office documents, and the second aspect represents Information hiding and extraction scheme for Microsoft Office 2007 and later series of office documents. According to the difference in file content size before and after information embedding by various information hiding technologies adopted, each aspect corresponds to one or more specific embodiments, and each embodiment corresponds to the type of file size that remains unchanged before and after hiding. Or some technical manipulation of the type of file size change. All the information hiding method designs are combined to form the technical solution content of the present application.
本申请的每一份实施例组合在一起提供了一种基于办公文档文件的信息隐藏与信息提取方案,具体实施方式包括:以Microsoft Office 2003创建编辑的文档文件为秘密信息的载体,信息隐藏和提取前后文件大小不变的第一方面第一实施方式;以MicrosoftOffice 2007及之后的所有Office版本创建编辑的文档文件为秘密信息的载体,信息隐藏和提取前后文件大小不变的第二方面第一实施方式;以Microsoft Office 2007及之后的所有Office版本创建编辑的文档文件为秘密信息的载体,信息隐藏和提取前后文件大小变化的第二方面第二实施方式和第二方面第三实施方式。Each embodiment of the present application is combined to provide an information hiding and information extraction solution based on office document files. The first aspect of the first aspect that the file size does not change before and after the extraction is the first embodiment; the document file created and edited by Microsoft Office 2007 and all Office versions after that is the carrier of the secret information, and the second aspect of the information hiding and the unchanged file size before and after extraction is the first aspect. Embodiments: The second aspect of the second aspect and the third aspect of the second aspect are the document files created and edited by Microsoft Office 2007 and all subsequent Office versions as the carrier of secret information, and the file size changes before and after information hiding and extraction.
对于第一方面第一实施方式,对应的信息隐藏技术方案具体实施操作流程如下:For the first embodiment of the first aspect, the specific implementation operation process of the corresponding information hiding technical solution is as follows:
将待隐藏的秘密信息的末尾后添加内容自定义结束标注(标注可以是内容随意的字符组合),添加后将“秘密信息+结束标注”的信息作为即将嵌入的信息。用数据包分析工具010Editor打开载体文档文件,010Editor界面加载出文档对应的完整ASCII编码数据信息块。由于Microsoft Office 2003版本创建的文档文件(.doc/.ppt/.xls)具有“文档对应的数据信息块中占用了4096字节区域的文档数据块专门用于保存公司、管理员等属性信息,且该区域在保存文档属性信息的有效数据后仍然存在大量全0空白数据区域”的应有特性,因此可以将嵌入位置定位在存放文档属性信息的数据块内的全0空白数据域。将记录属性信息等有效数据结束后再间隔16个全0字节的位置作为嵌入的起始位置,010Editor工具会自动将以字符串形式嵌入的信息转为ASCII编码字节形式,替换到起始嵌入位置之后相同长度的零字节数据区域。在4096字节文档信息数据块中,记录信息的有效数据长度一般在300字节附近,嵌入起始位置前预留16个全0字节,大概可以隐藏3780(4096-300-16)字节容量的信息。保存对数据信息块的修改操作,关闭010Editor界面。前后文件大小不变,信息隐藏过程完成。Add a custom end label to the end of the secret information to be hidden (the label can be a combination of characters with arbitrary content), and after adding, the information of "secret information + end label" is used as the information to be embedded. Use the data packet analysis tool 010Editor to open the carrier document file, and the 010Editor interface loads the complete ASCII encoded data information block corresponding to the document. Since the document file (.doc/.ppt/.xls) created by the Microsoft Office 2003 version has "the document data block that occupies a 4096-byte area in the data information block corresponding to the document is specially used to save attribute information such as company and administrator, And this area still has a large number of all-zero blank data areas after saving the valid data of the document attribute information. Therefore, the embedded position can be located in the all-zero blank data field in the data block storing the document attribute information. After recording the attribute information and other valid data, the position of 16 all 0 bytes is used as the starting position of embedding. The 010Editor tool will automatically convert the information embedded in the form of a string into the form of ASCII encoded bytes and replace it with the starting position. A zero-byte data area of the same length after the embedded position. In the 4096-byte document information data block, the effective data length of the record information is generally around 300 bytes, and 16 all-zero bytes are reserved before the embedded start position, which can hide about 3780 (4096-300-16) bytes. capacity information. Save the modification operation to the data information block and close the 010Editor interface. The file size remains unchanged before and after, and the information hiding process is completed.
对于第一方面第一实施方式,对应的信息提取技术方案具体实施操作流程如下:For the first embodiment of the first aspect, the specific implementation operation process of the corresponding information extraction technical solution is as follows:
获取载体文件,通过打开数据包分析工具010Editor直接加载文档对应的完整ASCII数据信息块,找到记录文档各属性信息的数据块区域。定位到该区域后,找到有效非零数据后的16个连续全0字节,以此为嵌入开端的标注,选中其后的数据块(目标信息+结束标注+若干全0字节),选中数据区域后,010Editor界面右侧会自动显示对该选中部分进行ASCII解码后后所得到的字符串信息,复制信息并提取到某一记事本文件中。在记文件中截断并删除结束标注符及其后的全0字节,得到目标秘密信息。关闭010Editor界面,信息提取过程完成。Obtain the carrier file, directly load the complete ASCII data information block corresponding to the document by opening the data packet analysis tool 010Editor, and find the data block area that records the attribute information of the document. After locating this area, find 16 consecutive all 0 bytes after valid non-zero data, use this as the label of the beginning of the embedding, select the following data block (target information + end label + several all 0 bytes), select After the data area, the right side of the 010Editor interface will automatically display the string information obtained after ASCII decoding the selected part, copy the information and extract it into a notepad file. Truncate and delete the end tag and all 0 bytes after it in the record file to obtain the target secret information. Close the 010Editor interface, and the information extraction process is complete.
对于第二方面第一实施方式,对应的信息隐藏技术方案具体实施操作流程如下:For the first embodiment of the second aspect, the specific implementation operation process of the corresponding information hiding technical solution is as follows:
将待隐藏的目标信尾部添加一个自定义结束标注(标注可以是随意的字符组合)作为预备写入文档隐藏区域的内容。获取由Microsoft Office 2007以及之后Office系列所编辑的载体文件,右键重命名,将文档类型后缀名(.docx/.pptx/.xlsx)改写为压缩包类型后缀名(如.zip),用010Editor软件工具打开文档压缩包,010Editor界面将展示文档压缩包对应的完整ASCII数据信息块。由于Microsoft office 2007及之后的Office系列编辑的文档文件(.docx/.pptx/.xlsx)经压缩处理后,压缩包对应的数据块中会产生520字节的数据扩展域,且有两字节(20A2)为扩展域的开端标志,之后的两字节记录扩展域长度,因此数据扩展域中记录的有效数据较少(4字节),其后都为可用于秘密信息嵌入的全0字节数据块(516字节)。通过扩展域的开端标志字节(20A2)定位到数据扩展域,将预备写入的信息嵌入扩展域的全0区域,隐写容量预计在500字节左右。保存对数据块的嵌入修改操作后关闭010Editor界面。将文件的后缀名重新改为源文档类型后缀名,信息隐藏前后文件大小不变,信息隐藏过程完成。Add a custom end mark (the mark can be any combination of characters) at the end of the target letter to be hidden as the content to be written into the hidden area of the document. Get the carrier file edited by Microsoft Office 2007 and later Office series, right-click to rename, rewrite the document type suffix (.docx/.pptx/.xlsx) to the compressed package type suffix (such as .zip), use 010Editor software The tool opens the document archive, and the 010Editor interface will display the complete ASCII data information block corresponding to the document archive. Since the document files (.docx/.pptx/.xlsx) edited by Microsoft office 2007 and later Office series are compressed, a 520-byte data extension field will be generated in the data block corresponding to the compressed package, and there are two bytes (20A2) is the start flag of the extension field, and the following two bytes record the length of the extension field, so the valid data recorded in the data extension field is less (4 bytes), and then all 0 words can be used for secret information embedding Section data block (516 bytes). The start flag byte (20A2) of the extension field is located to the data extension field, and the information to be written is embedded in the all 0 area of the extension field, and the steganographic capacity is expected to be about 500 bytes. After saving the embedded modification to the data block, close the 010Editor interface. Change the suffix name of the file to the suffix name of the source document type again, the file size will not change before and after information hiding, and the information hiding process is complete.
对于第二方面第一实施方式,对应的信息提取技术方案具体实施操作流程如下:For the first embodiment of the second aspect, the specific implementation operation process of the corresponding information extraction technical solution is as follows:
获取秘密信息隐藏的载体文件,右键重命名,将文档类型文档后缀名(.docx/.pptx/.xlsx)修改为压缩包类型后缀名(如.zip),用010Editor工具打开文档,显示文档压缩包对应的完整ASCII数据信息块。通过开头两字节的标识符(20A2)找到压缩后的数据扩展域,选中扩展域内除开端四字节外的全部数据块,010Editor界面右侧会显示对该选中数据块进行ASCII解码后得到的字符串形式信息,将信息复制并提取到一记事本文件中,在文件中截断并删除结束标注及其后的全0字节,得到目标秘密信息。将嵌入的数据块字节全部还原为0字节,关闭010Editor界面。将文件的后缀名重新改为源文档类型,信息提取过程完成。Get the carrier file with the secret information hidden, right-click to rename, change the document type document suffix (.docx/.pptx/.xlsx) to the compressed package type suffix (such as .zip), open the document with the 010Editor tool, and display the document compression The complete ASCII data message block corresponding to the packet. Find the compressed data extension field through the identifier of the first two bytes (20A2), select all data blocks in the extension field except the first four bytes, the right side of the 010Editor interface will display the data obtained after ASCII decoding the selected data block Information in the form of a string, copy and extract the information into a notepad file, truncate and delete the end tag and all 0 bytes after it in the file, and obtain the target secret information. Restore all the embedded data block bytes to 0 bytes, and close the 010Editor interface. Change the suffix of the file to the source document type, and the information extraction process is complete.
对于第二方面第二实施方式,对应的信息隐藏技术方案具体实施操作流程如下:For the second embodiment of the second aspect, the specific implementation operation process of the corresponding information hiding technical solution is as follows:
创建由Microsoft Office 2007以及之后Office系列所编辑的载体文件,对文件重命名,将文档后缀名由对应的文档类型(.docx/.pptx/.xlsx)转换为压缩包类型的后缀名(如.zip),使用压缩包工具(如360压缩器)打开文档压缩包,在工具界面内显示压缩包内的文件目录中找到Microsoft office 2007文档为了记录文档属性信息而生成的专有xml文件(docx的document.xml、pptx的presentation.xml、xlsx的workbook.xml),打开相应xml文件并写入一行属性名无意义的无用属性信息,该属性信息的具体内容设置为秘密信息字符串,写入的格式为<任意无义属性名称="秘密信息内容">,可以隐藏的信息容量不受限制。再将修改后的xml文件保存并关闭,移动回文档的压缩包目录的原位置中。关闭压缩包工具界面(如360压缩器),将文件的后缀名由压缩包类型重新改为源文档类型,信息隐藏前后文件大小改变,信息隐藏过程完成。Create a carrier file edited by Microsoft Office 2007 and later Office series, rename the file, and convert the document suffix from the corresponding document type (.docx/.pptx/.xlsx) to the suffix of the compressed package type (eg . zip), use a compression package tool (such as 360 compressor) to open the document compressed package, and find the Microsoft office 2007 document in the file directory in the compressed package displayed in the tool interface. document.xml, presentation.xml of pptx, workbook.xml of xlsx), open the corresponding xml file and write a line of useless attribute information whose attribute name is meaningless. The specific content of the attribute information is set as a secret information string, which is written in The format is <any meaningless attribute name="secret information content">, and the amount of information that can be hidden is not limited. Then save and close the modified xml file, and move it back to the original location of the archive directory of the document. Close the compressed package tool interface (such as 360 compressor), change the suffix name of the file from the compressed package type to the source document type, the file size before and after information hiding, and the information hiding process is complete.
对于第二方面第二实施方式,对应的信息提取技术方案具体实施操作流程如下:For the second embodiment of the second aspect, the specific implementation operation process of the corresponding information extraction technical solution is as follows:
获取信息隐藏的载体文件,修改文档后缀名把文档类型(.docx/.pptx/.xlsx)转换为压缩包类型(如.zip)。用压缩包工具(如360压缩器)文档压缩包,在工具界面显示的压缩包的文件目录中找出携密的各文档类型的专有属性信息记录文件xml文件(docx的document.xml、pptx的presentation.xml、xlsx的workbook.xml),打开文件并浏览,在文件中提取出记载着秘密信息的属性记录行,得到目标信息。提取完成后,将xml文件中该条对应秘密信息的属性记录删除,保存修改后的xml文件。关闭压缩包工具界面(如360压缩器),将文件的后缀名重新改为源文档类型,信息提取过程完成。Obtain the information-hiding carrier file, modify the document suffix and convert the document type (.docx/.pptx/.xlsx) to a compressed package type (such as .zip). Use a compression package tool (such as 360 compressor) to compress the document, and find the private attribute information record file xml file (document.xml of docx, pptx of docx) in the file directory of the compressed package displayed on the tool interface. presentation.xml, workbook.xml of xlsx), open the file and browse, extract the attribute record line that records the secret information in the file, and get the target information. After the extraction is completed, the attribute record corresponding to the secret information in the xml file is deleted, and the modified xml file is saved. Close the compressed package tool interface (such as 360 compressor), change the suffix name of the file to the source document type, and the information extraction process is completed.
对于第二方面第三实施方式,对应的信息隐藏技术方案具体实施操作流程如下:For the third embodiment of the second aspect, the specific implementation operation process of the corresponding information hiding technical solution is as follows:
将待隐藏的目标信息首部和尾部分别拼接内容自定义的开始标注和结束标注(标注可以是内容随意的字符组合),拼接完成后将“开始标注+目标信息+结束标注”的信息作为明文,以字符串形式输入至某一记事本文件中进行存储。预备一份可将任意明文经由现代密码学中的snow加密算法转化为“无形”字符密文的可执行程序,以存储明文的记事本文件对应的文件路径和一个与信息提取方协定的共享密钥作为程序的输入,执行程序,程序将从输入的文件路径中读取的明文替换成输出形式为由数个空格键和Tab键组合成的“无形”字符串密文,并存储在输入文件路径对应的原记事本文件中。创建由Microsoft Office2007以及之后Office系列所编辑的载体文档文件,右键重命名,将文档后缀名由文档类型(.docx/.pptx/.xlsx)替换为压缩包类型(如.zip),用压缩包工具(如360压缩器)打开压缩包,在工具界面内显示压缩包内的文件目录中找出Microsoft office2007文档用于记录属性信息的名为[Content_Types].xml的公有xml文件,在xml文件的末尾粘贴在记事本中存储的由snow算法加密程序得到的“无形”密文字符串。将修改后的xml文件保存并关闭,重新移动回文件的压缩包目录中的原位置。关闭压缩包工具界面(如360压缩器),将文件的后缀名重新改为源文档类型,信息隐藏前后文件大小改变,信息隐藏过程完成。The header and tail of the target information to be hidden are spliced with the custom start label and end label of the content (the label can be a combination of characters with arbitrary content). After the splicing is completed, the information of "start label + target information + end label" is used as plaintext, Enter as a string into a notepad file for storage. Prepare an executable program that can convert any plaintext into "invisible" character ciphertext through the snow encryption algorithm in modern cryptography, to store the file path corresponding to the plaintext notepad file and a shared secret agreed with the information extractor. The key is used as the input of the program, and the program is executed. The program replaces the plaintext read from the input file path with the output form of "invisible" string ciphertext composed of several space bars and Tab keys, and stores it in the input file. in the original Notepad file corresponding to the path. Create a carrier document file edited by Microsoft Office2007 and later Office series, right-click to rename, replace the document suffix from the document type (.docx/.pptx/.xlsx) with the compressed package type (such as .zip), use the compressed package Tools (such as 360 Compressor) open the compressed package, and find the public xml file named [Content_Types].xml used by Microsoft office2007 documents to record attribute information in the file directory in the compressed package displayed in the tool interface. At the end, paste the "invisible" ciphertext string stored in Notepad by the snow algorithm encryption program. Save and close the modified xml file, and move it back to the original location in the archive directory of the file. Close the compressed package tool interface (such as 360 compressor), change the suffix name of the file to the source document type, the file size before and after information hiding, and the information hiding process is complete.
对于第二方面第三实施方式,对应的信息提取技术方案具体实施操作流程如下:For the third embodiment of the second aspect, the specific implementation operation process of the corresponding information extraction technical solution is as follows:
取信息隐藏的载体文件,修改文档后缀名把文档类型(.docx/.pptx/.xlsx)转换为压缩包类型(如.zip)。用压缩包工具(如360压缩器)打开文档压缩包,在工具界面显示的压缩包内的文件目录中找出携密的用于属性信息记录的[Content_Types].xml公有文件,定位xml文件可视区域的尾部,复制其后一定长度的空白行区域,将提取的无形密文粘贴到某一记事本文件中。以该记事本的文件路径和与信息隐藏方协定的共享密钥作为snow算法解密程序的输入,执行程序,程序将从输入的文件路径中读取“无形”密文替换成输出形式为加密前可读的明文内容,并存储在输入文件路径对应的原记事本文件中。截取并复制记事本中记录的明文信息夹在开始标注和结束标注间的信息内容,秘密信息提取成功。删除xml文件可视区域尾部后一定长度的用于嵌入“无形”密文的空白块,保存并关闭xml文件。关闭压缩包工具界面(如360压缩器),将文件的后缀名重新改为源文档类型,信息提取过程完成。Take the information-hiding carrier file, modify the document suffix and convert the document type (.docx/.pptx/.xlsx) to a compressed package type (such as .zip). Use a compression package tool (such as 360 compressor) to open the document compression package, find the secret [Content_Types].xml public file for attribute information record in the file directory in the compressed package displayed on the tool interface, and locate the xml file. At the end of the viewing area, copy the blank line area of a certain length after that, and paste the extracted invisible ciphertext into a notepad file. Use the file path of the notepad and the shared key agreed with the information hiding party as the input of the snow algorithm decryption program, execute the program, and the program will read the "invisible" ciphertext from the input file path and replace it with the output format as before encryption. The readable plaintext content is stored in the original Notepad file corresponding to the input file path. Intercept and copy the plaintext information recorded in the notepad between the start tag and the end tag, and the secret information is successfully extracted. Delete the blank block of a certain length at the end of the visible area of the xml file for embedding "invisible" ciphertext, save and close the xml file. Close the compressed package tool interface (such as 360 compressor), change the suffix name of the file to the source document type, and the information extraction process is completed.
综上所述,本申请应用实例提供了一种基于办公文件的信息隐藏和信息提取的技术方案,办公文件载体类型包括:文字文档组件Word创建的.doc类型文档、演示文稿组件PowerPoint创建的.ppt类型文档、电子表格组件Excel创建的.xls类型文档。适用的办公文档编辑软件包括:Microsoft Office 2003、Microsoft Office 2007以及之后的MicrosoftOffice所有版本。方案针对不同编辑软件下创建的文档文件提供了文件大小不变或可变的多种方法,技术方案框架完整清晰,适用面广泛。In summary, the application example of this application provides a technical solution for information hiding and information extraction based on office documents. The types of office document carriers include: .doc type documents created by the text document component Word, and .doc documents created by the presentation component PowerPoint. PPT type documents, .xls type documents created by the spreadsheet component Excel. Applicable office document editing software includes: Microsoft Office 2003, Microsoft Office 2007 and all subsequent versions of Microsoft Office. The solution provides a variety of methods with constant or variable file size for document files created under different editing software. The technical solution framework is complete and clear, and has a wide range of applications.
现有的同类型主流技术方案主要分为两大分支:利用人类视觉感官对字符格式特征的非敏感性,采用调整字符颜色或大小、修改行间距字间距等方式对隐藏的信息进行嵌入操作;或通过在编辑文档时通过安装字库等插件,引入附加对象嵌入目标信息。与现有技术相比,本申请的优势在于:可以根据实际应用情况灵活选择适用某一版本办公软件下适用的方案,并根据是否改变文件大小的效果需求进一步选取具体可行的方法,本申请方案实用性强,适用范围广。相比现有的修改文档的格式特征方案,本申请方案可以达到信息隐藏前后文件大小不变的隐藏效果,目标信息隐蔽性高、安全性强,进一步弱化在人类视觉感官上感知隐蔽信息的程度。相比现有的在文档引入附加插件嵌入目标信息的方案,本申请方案提供一种无需安装额外插件、无附加多媒体内容(文本、音频、图像等)的优化方法,原文外观零隐写痕迹,大幅度降低因在文件引入附加对象的操作受到第三方攻击者关注及监测的网络攻击风险。通过实施本申请,可为具有携密信息传递流程的应用场景提供更高的数字内容通信安全保护等级,降低信息隐藏方和提取方在信息交流过程中遭遇来自第三方恶意的信息破解、损坏、篡改等攻击行为的信息安全风险,隐秘信息传递行为的隐蔽性和可靠性进一步增强。The existing mainstream technical solutions of the same type are mainly divided into two branches: using the insensitivity of human visual senses to character format features, and embedding hidden information by adjusting the color or size of characters, modifying the line spacing and word spacing, etc.; Or by installing plug-ins such as font libraries when editing documents, introducing additional objects to embed target information. Compared with the prior art, the advantages of the present application are: according to the actual application situation, it is possible to flexibly select a solution applicable to a certain version of the office software, and further select a specific feasible method according to the effect requirements of whether to change the file size. Strong practicability and wide application. Compared with the existing format feature scheme for modifying the document, the scheme of the present application can achieve the hiding effect that the file size remains unchanged before and after information hiding, the target information has high concealment and strong security, and further weakens the degree to which the human visual senses perceive the concealed information. . Compared with the existing solution of introducing additional plug-ins to embed target information in the document, the solution of the present application provides an optimization method without installing additional plug-ins and without additional multimedia content (text, audio, images, etc.), the original appearance has zero steganographic traces, Significantly reduce the risk of network attacks that are noticed and monitored by third-party attackers due to the operation of introducing additional objects into files. By implementing this application, a higher level of digital content communication security protection can be provided for the application scenarios with the secret information transfer process, and the information hiding party and extractor encountering malicious information cracking, damage, damage, etc. The information security risks of tampering and other attack behaviors, and the concealment and reliability of secret information transmission behaviors are further enhanced.
本申请实施例还提供了一种计算机设备(也即电子设备),该计算机设备可以包括处理器、存储器、接收器及发送器,处理器用于执行上述实施例提及的秘密信息隐藏方法或者秘密信息提取方法,其中处理器和存储器可以通过总线或者其他方式连接,以通过总线连接为例。该接收器可通过有线或无线方式与处理器、存储器连接。所述计算机设备与秘密信息隐藏装置或者秘密信息提取装置之间通信连接,以自所述无线多媒体传感器网络中的传感器接收实时运动数据,并自所述视频采集装置接收原始视频序列。Embodiments of the present application further provide a computer device (ie, an electronic device), the computer device may include a processor, a memory, a receiver, and a transmitter, and the processor is configured to execute the secret information hiding method or secret information mentioned in the above embodiments An information extraction method, wherein the processor and the memory can be connected by a bus or in other ways, taking the connection by a bus as an example. The receiver can be connected with the processor and the memory by wire or wireless. The computer equipment is in communication connection with the secret information hiding device or the secret information extracting device, so as to receive real-time motion data from sensors in the wireless multimedia sensor network, and receive original video sequences from the video acquisition device.
处理器可以为中央处理器(Central Processing Unit,CPU)。处理器还可以为其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等芯片,或者上述各类芯片的组合。The processor may be a central processing unit (Central Processing Unit, CPU). The processor may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other Chips such as programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or a combination of the above types of chips.
存储器作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序、非暂态计算机可执行程序以及模块,如本申请实施例中的秘密信息隐藏方法或者秘密信息提取方法对应的程序指令/模块。处理器通过运行存储在存储器中的非暂态软件程序、指令以及模块,从而执行处理器的各种功能应用以及数据处理,即实现上述方法实施例中的秘密信息隐藏方法或者秘密信息提取方法。As a non-transitory computer-readable storage medium, the memory can be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as those corresponding to the secret information hiding method or secret information extraction method in the embodiments of the present application. Program instructions/modules. The processor executes various functional applications and data processing of the processor by running the non-transitory software programs, instructions and modules stored in the memory, that is, to implement the secret information hiding method or secret information extraction method in the above method embodiments.
存储器可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储处理器所创建的数据等。此外,存储器可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施例中,存储器可选包括相对于处理器远程设置的存储器,这些远程存储器可以通过网络连接至处理器。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application program required by at least one function; the storage data area may store data created by the processor, and the like. Additionally, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory may optionally include memory located remotely from the processor, such remote memory being connectable to the processor via a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
所述一个或者多个模块存储在所述存储器中,当被所述处理器执行时,执行实施例中的秘密信息隐藏方法或者秘密信息提取方法。The one or more modules are stored in the memory, and when executed by the processor, perform the secret information hiding method or the secret information extraction method in the embodiment.
在本申请的一些实施例中,用户设备可以包括处理器、存储器和收发单元,该收发单元可包括接收器和发送器,处理器、存储器、接收器和发送器可通过总线系统连接,存储器用于存储计算机指令,处理器用于执行存储器中存储的计算机指令,以控制收发单元收发信号。In some embodiments of the present application, the user equipment may include a processor, a memory, and a transceiver unit, the transceiver unit may include a receiver and a transmitter, the processor, the memory, the receiver, and the transmitter may be connected through a bus system, and the memory is used for For storing computer instructions, the processor is used for executing the computer instructions stored in the memory to control the transceiver unit to send and receive signals.
作为一种实现方式,本申请中接收器和发送器的功能可以考虑通过收发电路或者收发的专用芯片来实现,处理器可以考虑通过专用处理芯片、处理电路或通用芯片实现。As an implementation manner, the functions of the receiver and the transmitter in this application may be implemented by a transceiver circuit or a dedicated chip for transceiver, and the processor may be implemented by a dedicated processing chip, a processing circuit or a general-purpose chip.
作为另一种实现方式,可以考虑使用通用计算机的方式来实现本申请实施例提供的服务器。即将实现处理器,接收器和发送器功能的程序代码存储在存储器中,通用处理器通过执行存储器中的代码来实现处理器,接收器和发送器的功能。As another implementation manner, a general-purpose computer may be used to implement the server provided by the embodiments of the present application. The program code that is to implement the functions of the processor, the receiver and the transmitter is stored in the memory, and the general-purpose processor implements the functions of the processor, the receiver and the transmitter by executing the code in the memory.
本申请实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时以实现前述秘密信息隐藏方法或者秘密信息提取方法的步骤。该计算机可读存储介质可以是有形存储介质,诸如随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、软盘、硬盘、可移动存储盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质。Embodiments of the present application further provide a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the foregoing secret information hiding method or secret information extraction method. The computer-readable storage medium may be a tangible storage medium such as random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, floppy disk, hard disk, removable storage disk, CD-ROM, or any other form of storage medium known in the art.
本领域普通技术人员应该可以明白,结合本文中所公开的实施方式描述的各示例性的组成部分、系统和方法,能够以硬件、软件或者二者的结合来实现。具体究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。当以硬件方式实现时,其可以例如是电子电路、专用集成电路(ASIC)、适当的固件、插件、功能卡等等。当以软件方式实现时,本申请的元素是被用于执行所需任务的程序或者代码段。程序或者代码段可以存储在机器可读介质中,或者通过载波中携带的数据信号在传输介质或者通信链路上传送。It should be understood by those of ordinary skill in the art that the various exemplary components, systems and methods described in conjunction with the embodiments disclosed herein can be implemented in hardware, software or a combination of the two. Whether it is implemented in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application. When implemented in hardware, it may be, for example, an electronic circuit, an application specific integrated circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, elements of the present application are programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted over a transmission medium or communication link by a data signal carried in a carrier wave.
需要明确的是,本申请并不局限于上文所描述并在图中示出的特定配置和处理。为了简明起见,这里省略了对已知方法的详细描述。在上述实施例中,描述和示出了若干具体的步骤作为示例。但是,本申请的方法过程并不限于所描述和示出的具体步骤,本领域的技术人员可以在领会本申请的精神后,作出各种改变、修改和添加,或者改变步骤之间的顺序。To be clear, the present application is not limited to the specific configurations and processes described above and illustrated in the figures. For the sake of brevity, detailed descriptions of known methods are omitted here. In the above-described embodiments, several specific steps are described and shown as examples. However, the method process of the present application is not limited to the specific steps described and shown, and those skilled in the art can make various changes, modifications and additions, or change the sequence of steps after comprehending the spirit of the present application.
本申请中,针对一个实施方式描述和/或例示的特征,可以在一个或更多个其它实施方式中以相同方式或以类似方式使用,和/或与其他实施方式的特征相结合或代替其他实施方式的特征。In this application, features described and/or illustrated with respect to one embodiment may be used in the same or in a similar manner in one or more other embodiments, and/or in combination with or in place of features of other embodiments Features of the implementation.
以上所述仅为本申请的优选实施例,并不用于限制本申请,对于本领域的技术人员来说,本申请实施例可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above descriptions are only preferred embodiments of the present application, and are not intended to limit the present application. For those skilled in the art, various modifications and changes may be made to the embodiments of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included within the protection scope of this application.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210042418.3ACN114386103B (en) | 2022-01-14 | 2022-01-14 | Secret information hiding method, secret information extraction method and transmission system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210042418.3ACN114386103B (en) | 2022-01-14 | 2022-01-14 | Secret information hiding method, secret information extraction method and transmission system |
| Publication Number | Publication Date |
|---|---|
| CN114386103A CN114386103A (en) | 2022-04-22 |
| CN114386103Btrue CN114386103B (en) | 2022-10-04 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210042418.3AActiveCN114386103B (en) | 2022-01-14 | 2022-01-14 | Secret information hiding method, secret information extraction method and transmission system |
| Country | Link |
|---|---|
| CN (1) | CN114386103B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115563655B (en)* | 2022-11-25 | 2023-03-21 | 承德石油高等专科学校 | User dangerous behavior identification method and system for network security |
| CN116340277B (en)* | 2023-05-25 | 2023-08-01 | 合肥高维数据技术有限公司 | Steganography-based data compression method and decompression method thereof |
| CN118690725B (en)* | 2024-08-26 | 2024-11-12 | 中孚安全技术有限公司 | Hidden information processing method, system and medium based on CFB document |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102096787A (en)* | 2009-12-14 | 2011-06-15 | 湖南大学 | Method and device for hiding information based on word2007 text segmentation |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1897522B (en)* | 2005-07-15 | 2010-05-05 | 国际商业机器公司 | Water mark embedded and/or inspecting method, device and system |
| MY147993A (en)* | 2009-05-14 | 2013-02-28 | Univ Malaya | Text steganography |
| CN103544408A (en)* | 2013-09-23 | 2014-01-29 | 中山大学 | Method for embedment and extraction of PDF document hidden information according to composite font |
| US10108810B2 (en)* | 2015-02-13 | 2018-10-23 | Global Integrity, Inc. | System and method for secure document embedding |
| CN109800547B (en)* | 2019-01-09 | 2023-04-07 | 杭州基尔区块链科技有限公司 | Method for quickly embedding and extracting information for WORD document protection and distribution tracking |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102096787A (en)* | 2009-12-14 | 2011-06-15 | 湖南大学 | Method and device for hiding information based on word2007 text segmentation |
| Title |
|---|
| 基于ZIP文档格式的信息隐藏方法;李兵兵等;《计算机工程》;20110305;第37卷(第05期);第4节* |
| Publication number | Publication date |
|---|---|
| CN114386103A (en) | 2022-04-22 |
| Publication | Publication Date | Title |
|---|---|---|
| CN114386103B (en) | Secret information hiding method, secret information extraction method and transmission system | |
| Zhang et al. | Breaking into the vault: Privacy, security and forensic analysis of Android vault applications | |
| CN106874778B (en) | Intelligent terminal file acquisition and data recovery system and method based on android system | |
| CN105323064A (en) | System and method for adding real-time file dynamic tags and encryption online | |
| CN111861844A (en) | A Reversible Watermarking Method Based on Image Block Authentication | |
| CN109547215B (en) | Document information protection method based on mobile terminal fingerprint | |
| JP2019161643A (en) | Tamper protection and video source identification for video processing pipeline | |
| TW201602830A (en) | A method and system for adding dynamic labels to a file and encrypting the file | |
| DOrazio et al. | iOS anti-forensics: How can we securely conceal, delete and insert data? | |
| WO2011076037A1 (en) | Apparatus and method for processing extension information in image files | |
| Anwar et al. | Stegocrypt scheme using LSB-AES base64 | |
| WO2020044095A1 (en) | File encryption method and apparatus, device, terminal, server, and computer-readable storage medium | |
| CN102646179A (en) | A PDF file information embedding and extraction method based on PDF file body | |
| US8656157B2 (en) | Method for sending and receiving an encrypted message and a system thereof | |
| CN114745373A (en) | File transmission method, device, equipment and storage medium | |
| CN103530574B (en) | A kind of hide Info embedding and extracting method based on English PDF document | |
| CN114338035B (en) | Mobile terminal PDF electronic signature method and system based on key collaborative signature | |
| CN108563396B (en) | Safe cloud object storage method | |
| CN103559251A (en) | Data security protection method based on data hiding | |
| Castiglione et al. | Hiding Information into OOXML Documents: New Steganographic Perspectives. | |
| CN113177193A (en) | Watermark adding method, watermark verifying method and terminal equipment | |
| Sharma et al. | A study of steganography based data hiding techniques | |
| CN103838986A (en) | Multimedia file encryption method and device | |
| Preksha et al. | Image Steganography using RSA Algorithm for Secure Communication | |
| Kaushik et al. | An offensive approach for hiding malicious payloads in an image |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |