IP voice hidden communication method based on stream encryption

A technology of covert communication and stream encryption, applied in the field of secure communication, can solve problems such as voice quality damage, and achieve the effect of good security

Inactive Publication Date: 2009-07-08
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method effectively improves security, it is not difficult to see that this traditional encryption method will bring a large communication delay to the VoIP system, and the damage caused by this delay to voice quality will make covert communication difficult. Falling into another extreme that is prone to "exposure"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP voice hidden communication method based on stream encryption
  • IP voice hidden communication method based on stream encryption
  • IP voice hidden communication method based on stream encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings.

[0045] The processing flow of the present invention is as figure 1 Shown: including pre-agreement steps, online negotiation steps, stream encryption steps, embedding secret information steps and extracting secret information steps.

[0046] In the pre-agreement step, the two parties in the communication pre-agreed: (1) Embedding a synchronization bit sequence in the header of the first Internet protocol data packet in communication. The reasons are as follows: VoIP is built on IP technology, and all voice frames are encapsulated in Internet Protocol data packets for transmission. However, there are many unused bits in the header of the Internet protocol data packet, such as figure 2 As shown in the shaded field, there are a total of 64 bits in total. Therefore, the synchronous bit sequence (Beginning of Message, BoM) can be "hidden" in the header of the Internet pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a voice over IP (VoIP) hiding communication method based on stream encryption, which belongs to the field of secure communication, is applied to the communication employing the voice over IP as carrier, and aims to improve the security performance of hiding communication while ensuring the real-time communication of VoIP. The method comprises the following steps: (1) the step of on-line negotiation; (2) the step of stream encryption; (3) the step of information hiding; and (4) the step of hidden information extraction. Before hiding the information in the VoIP stream, the hidden information is segmented and subjected to the bitwise XOR operation with a super-random number, thereby effectively preventing decryption and ensuring the security. The VoIP hiding communication method ensures the security while maintaining the real-time property of the VoIP system, and is applied to the transmission of large blocks of hidden data.

Description

technical field [0001] The invention belongs to the field of secure communication, and in particular relates to a stream encryption-based IP voice concealed communication method, which is suitable for communication using IP voice (Voice over IP) technology as a carrier. Background technique [0002] The rapid development of Internet technology has greatly changed human production and life style. It has brought great benefits to human beings, but it has also brought various security risks and hidden dangers to human beings. People begin to care about where the news on the Internet comes from, where it is sent, the confidentiality, authenticity and integrity of the news, the trustworthiness of the communication object, and the protection of personal privacy. In short, it is the question of how to communicate securely in an open Internet environment. As a traditional measure to maintain secure communication, information encryption technology converts plaintext into meaningles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04M7/00
Inventor 周可田晖刘进
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products