Password embedding method and device, password matching method and device and control system

文档序号:972887 发布日期:2020-11-03 浏览:2次 中文

阅读说明:本技术 密码嵌入方法及装置、密码匹配方法及装置及控制系统 (Password embedding method and device, password matching method and device and control system ) 是由 刘泉洲 李玉发 吴卫钟 叶铁英 张亚国 李陈杰 于 2020-07-06 设计创作,主要内容包括:本发明公开一种密码嵌入方法及装置、密码匹配方法及装置及控制系统。其中,该密码嵌入方法包括:对载体音频信号进行处理,获得多个具有系数的音频段;其中,所述载体音频信号中包含控制指令;将预设的二进制序列进行扩展,获得嵌入密码序列;根据所述嵌入密码序列对所述音频段进行处理,得到嵌入密码后的载体音频信息;将嵌入密码后的载体音频信号发送至指令接收端,进行密码匹配。通过本发明,能够解决载体信息受到干扰导致密码信息失真,影响匹配结果的问题,提高密码匹配的准确度,避免误判。(The invention discloses a password embedding method and device, a password matching method and device and a control system. The password embedding method comprises the following steps: processing the carrier audio signal to obtain a plurality of audio segments with coefficients; wherein the carrier audio signal comprises a control instruction; expanding a preset binary sequence to obtain an embedded password sequence; processing the audio segment according to the embedded password sequence to obtain carrier audio information with the embedded password; and sending the carrier audio signal embedded with the password to an instruction receiving end for password matching. The invention can solve the problem that the carrier information is interfered to cause the distortion of the password information and influence the matching result, improve the accuracy of the password matching and avoid misjudgment.)

1. A password embedding method is applied to an instruction sending end, and is characterized in that the method comprises the following steps:

processing the carrier audio signal to obtain a plurality of audio segments with coefficients; wherein the carrier audio signal comprises a control instruction;

expanding a preset binary sequence to obtain an embedded password sequence;

processing the audio segment according to the embedded password sequence to obtain carrier audio information with the embedded password;

and sending the carrier audio signal embedded with the password to an instruction receiving end for password matching.

2. The method of claim 1, wherein processing the carrier audio signal to obtain a plurality of audio segments having coefficients comprises:

segmenting the carrier audio information;

and carrying out discrete cosine transform on each section of carrier audio information to obtain a plurality of audio sections with coefficients.

3. The method of claim 1, wherein expanding the predetermined binary sequence to obtain the embedded crypto sequence comprises:

expanding each digit in the binary sequence one by one to generate a corresponding binary subsequence; the number of the binary subsequences is the same as the number of bits of the binary sequences;

and sequentially arranging the generated binary subsequences according to the numerical sequence in the preset binary sequence to obtain an embedded password sequence.

4. The method of claim 1, wherein processing the audio segment according to the embedded cipher sequence to obtain the carrier audio information after embedding the cipher comprises:

selecting a preset number of audio segments, and replacing the coefficients of each selected audio segment one by the numbers embedded in the password sequence according to the sequence to obtain carrier audio signals embedded with passwords; wherein the number of the audio segments is the same as the number of bits of the embedded code sequence.

5. The method of claim 4, wherein selecting a predetermined number of audio segments comprises:

a preset number of audio segments is selected in a low frequency part of the carrier audio signal.

6. The method of claim 5, wherein selecting a preset number of audio segments in a low frequency portion of the carrier audio signal comprises:

continuously selecting a preset number of audio segments from the low-frequency part of the carrier audio signal; or;

and selecting a preset number of audio segments in the low-frequency part of the carrier audio signal at intervals according to a preset interval.

7. A password matching method is applied to an instruction receiving end, and is characterized by comprising the following steps:

processing the received carrier audio signal sent by the instruction sending end to obtain the coefficient of each audio segment;

extracting a reduction code sequence from the coefficient of the selected audio segment;

judging whether the password is successfully matched according to the total matching degree of the restoration password sequence and a prestored password sequence; wherein the pre-stored crypto sequence is identical to the embedded crypto sequence.

8. The method of claim 7, wherein processing the received carrier audio signal sent by the sender of the instruction to obtain coefficients for each audio segment comprises:

and carrying out inverse discrete cosine transform on the received carrier audio signal to obtain the coefficient of each audio segment.

9. The method of claim 7, wherein determining whether the matching of the password is successful according to the total matching degree of the recovery password sequence and the pre-stored password sequence comprises:

judging whether the overall matching degree is greater than or equal to a first preset value;

if so, judging that the password matching is successful, and controlling the command receiving end to execute the operation corresponding to the control command contained in the carrier audio signal;

if not, whether the password is successfully matched is continuously judged according to the matching degree of each binary subsequence in the restored password sequence.

10. The method of claim 9, wherein determining whether the matching of the cipher is successful according to the matching degree of each binary subsequence in the recovery cipher sequence comprises:

judging whether the matching degrees of all the binary subsequences are greater than or equal to a second preset value or not; wherein the second preset value is smaller than the first preset value;

if so, judging that the password matching is successful, and controlling the command receiving end to execute the operation corresponding to the control command contained in the carrier audio signal;

if not, the password matching is judged to be failed, and the control command receiving end refuses to execute any operation.

11. A cryptographic embedding apparatus for implementing the cryptographic embedding method of any one of claims 1 to 6, characterized in that the apparatus comprises:

the first processing module is used for processing the carrier audio signal to obtain a plurality of audio segments with coefficients; wherein the carrier audio signal comprises a control instruction;

the extension module is used for extending a preset binary sequence to obtain an embedded password sequence;

the embedding module is used for processing the audio segment according to the embedded password sequence to obtain carrier audio information with the embedded password;

and the sending module is used for sending the carrier audio signal embedded with the password to the instruction receiving end for password matching.

12. A password matching apparatus for implementing the password matching method according to any one of claims 7 to 10, wherein the apparatus comprises:

the second processing module is used for processing the received carrier audio signal sent by the instruction sending end to obtain the coefficient of each audio segment;

the extraction module is used for extracting a reduction code sequence from the coefficient of the selected audio segment;

the judging module is used for judging whether the passwords are successfully matched according to the overall matching degree of the restoration password sequence and the prestored password sequence; wherein the pre-stored crypto sequence is identical to the embedded crypto sequence.

13. A control system comprising an instruction transmitting end and an instruction receiving end, wherein said instruction transmitting end comprises the password embedding apparatus of claim 11; the instruction receiving end comprises the password matching device of claim 12.

14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a cryptographic embedding method according to any one of claims 1 to 6.

15. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the password matching method according to any one of claims 7 to 10.

Technical Field

The invention relates to the technical field of information processing, in particular to a password embedding method and device, a password matching method and device and a control system.

Background

At present, imitation products on the market are abused, the imitation products are similar to genuine products in function, consumers are not easy to distinguish, and the benefits of the consumers and regular manufacturers are infringed.

Aiming at the problem that the password matching result is wrong due to the fact that carrier information is interfered in the prior art, an effective solution is not provided at present.

Disclosure of Invention

The embodiment of the invention provides a password embedding method and device, a password matching method and device and a control system, and aims to solve the problem that in the prior art, the password matching result is wrong due to the fact that carrier information is interfered.

In order to solve the technical problem, the invention provides a password embedding method, which is applied to an instruction sending end and comprises the following steps:

processing the carrier audio signal to obtain a plurality of audio segments with coefficients; wherein the carrier audio signal comprises a control instruction;

expanding a preset binary sequence to obtain an embedded password sequence;

processing the audio segment according to the embedded password sequence to obtain carrier audio information with the embedded password;

and sending the carrier audio signal embedded with the password to an instruction receiving end for password matching.

Further, processing the carrier audio signal to obtain a plurality of audio segments having coefficients, comprises:

segmenting the carrier audio information;

and carrying out discrete cosine transform on each section of carrier audio information to obtain a plurality of audio sections with coefficients.

Further, expanding the preset binary sequence to obtain an embedded cipher sequence, including:

expanding each digit in the binary sequence one by one to generate a corresponding binary subsequence; the number of the binary subsequences is the same as the number of bits of the binary sequences;

and sequentially arranging the generated binary subsequences according to the numerical sequence in the preset binary sequence to obtain an embedded password sequence.

Further, processing the audio segment according to the embedded password sequence to obtain carrier audio information with embedded password, including:

selecting a preset number of audio segments, and replacing the coefficients of each selected audio segment one by the numbers embedded in the password sequence according to the sequence to obtain carrier audio signals embedded with passwords; wherein the number of the audio segments is the same as the number of bits of the embedded code sequence.

Further, selecting a preset number of audio segments includes:

a preset number of audio segments is selected in a low frequency part of the carrier audio signal.

Further, selecting a preset number of audio segments in a low frequency part of the carrier audio signal comprises:

continuously selecting a preset number of audio segments from the low-frequency part of the carrier audio signal; or;

and selecting a preset number of audio segments in the low-frequency part of the carrier audio signal at intervals according to a preset interval.

The invention also provides a password matching method, which is applied to the instruction receiving end and comprises the following steps:

processing the received carrier audio signal sent by the instruction sending end to obtain the coefficient of each audio segment;

extracting a reduction code sequence from the coefficient of the selected audio segment;

judging whether the password is successfully matched according to the total matching degree of the restoration password sequence and a prestored password sequence; wherein the pre-stored crypto sequence is identical to the embedded crypto sequence.

Further, processing the received carrier audio signal sent by the instruction sending end to obtain the coefficient of each audio segment, including:

and carrying out inverse discrete cosine transform on the received carrier audio signal to obtain the coefficient of each audio segment.

Further, judging whether the password is successfully matched according to the total matching degree of the restoration password sequence and the pre-stored password sequence, comprising:

judging whether the overall matching degree is greater than or equal to a first preset value;

if so, judging that the password matching is successful, and controlling the command receiving end to execute the operation corresponding to the control command contained in the carrier audio signal;

if not, whether the password is successfully matched is continuously judged according to the matching degree of each binary subsequence in the restored password sequence.

Further, judging whether the password is successfully matched according to the matching degree of each binary subsequence in the restored password sequence, including:

judging whether the matching degrees of all the binary subsequences are greater than or equal to a second preset value or not; wherein the second preset value is smaller than the first preset value;

if so, judging that the password matching is successful, and controlling the command receiving end to execute the operation corresponding to the control command contained in the carrier audio signal;

if not, the password matching is judged to be failed, and the control command receiving end refuses to execute any operation.

The present invention also provides a password embedding device for implementing the above password embedding method, the device comprising:

the first processing module is used for processing the carrier audio signal to obtain a plurality of audio segments with coefficients; wherein the carrier audio signal comprises a control instruction;

the extension module is used for extending a preset binary sequence to obtain an embedded password sequence;

the embedding module is used for processing the audio segment according to the embedded password sequence to obtain carrier audio information with the embedded password;

and the sending module is used for sending the carrier audio signal embedded with the password to the instruction receiving end for password matching.

The invention also provides a password matching device for realizing the password matching method, and the device comprises:

the second processing module is used for processing the received carrier audio signal sent by the instruction sending end to obtain the coefficient of each audio segment;

the extraction module is used for extracting a reduction code sequence from the coefficient of the selected audio segment;

the judging module is used for judging whether the passwords are successfully matched according to the overall matching degree of the restoration password sequence and the prestored password sequence; wherein the pre-stored crypto sequence is identical to the embedded crypto sequence.

The invention also provides a control system, which comprises an instruction sending end and an instruction receiving end, wherein the instruction sending end comprises the password embedding device; the instruction receiving end comprises the password matching device.

The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described password embedding method.

The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described password matching method.

By applying the technical scheme of the invention, the embedded password sequence is obtained by expanding the preset binary sequence; each bit in the embedded password sequence is used for replacing the coefficient of the selected audio segment to realize the embedding of the password; comparing the extracted reduction password sequence with a prestored password sequence to calculate the overall matching degree; whether the password is successfully matched is judged according to the total matching degree, the problems that the password information is distorted due to interference of the carrier information and the matching result is influenced can be solved, the accuracy of password matching is improved, and misjudgment is avoided.

Drawings

FIG. 1 is a block diagram of a control system to which the present invention is applied;

FIG. 2 is a flow diagram of a method of password embedding implemented in accordance with the present invention;

FIG. 3 is a flow chart of a password matching method according to another embodiment of the present invention;

fig. 4 is a structural view of an air conditioning control system to which the present invention is applied;

FIG. 5 is a flow diagram of an encryption method according to an embodiment of the present invention;

FIG. 6 is a block diagram of a password embedding device according to an embodiment of the present invention;

FIG. 7 is a block diagram of a password embedding device according to another embodiment of the present invention;

fig. 8 is a block diagram of a password matching apparatus according to an embodiment of the present invention;

fig. 9 is a block diagram of a password matching apparatus according to another embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, and "a plurality" typically includes at least two.

It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.

It should be understood that although the terms first, second, etc. may be used to describe preset values in embodiments of the present invention, these preset values should not be limited to these terms. These terms are only used to distinguish between different preset values. For example, the first preset value may also be referred to as a second preset value, and similarly, the second preset value may also be referred to as a first preset value without departing from the scope of the embodiments of the present invention.

The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.

It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that an article or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such article or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in the article or device in which the element is included.

Alternative embodiments of the present invention are described in detail below with reference to the accompanying drawings.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:语音信息处理及验证模型训练方法、装置、设备及介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!