Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Steganographic method with misguiding function of controllable secret key sequence

A steganography and sequence technology, applied in the field of information security, can solve the problems of large redundancy, no active misleading, misleading and so on

Active Publication Date: 2012-02-22
桂林轻鸿科技有限公司
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to overcome the disadvantages of the existing steganographic methods, such as large redundancy, dependence on image and voice data, and lack of active misleading, to provide a method for steganographic text, which can have the function of misleading, and Uncontrollable key sequences can be modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Steganographic method with misguiding function of controllable secret key sequence
  • Steganographic method with misguiding function of controllable secret key sequence
  • Steganographic method with misguiding function of controllable secret key sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following are examples of the present invention, however, the present invention is not limited to the examples.

[0018] When implementing it, it is necessary to consider the format of the file for steganography. Taking the format of the txt file as an example, first open the secret text with Notepad, and read the content of the text "she is a smart teacher, and her hometown is in Xinjiang". In the database, clever belongs to the keywords that are permanently replaced, replaced by stupid. Teachers, doctors, workers, farmers, and students are a group of non-fixed replacement keyword groups, which are numbered 0-4 in turn. 23 provinces and 4 municipalities belong to the non-fixed replacement keyword group, Xinjiang is among them, and they are They are numbered with 0-26 respectively, assuming Xinjiang is 8.

[0019] Select the algorithm for generating the key stream as a 256-bit stream cipher algorithm, and randomly generate 256 bits as the key K of the stream ciphe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a text steganographic (secret writing) method with a misguiding function. The method comprises the steps of: opening a file, reading contents of the file, then replacing a keyword in the file with a keyword close, opposite or similar to the keyword in the file, and finally storing the file so that the misguiding function is achieved. The replacement of the keyword is achieved by adopting the combination of the fixed replacement and the floating replacement. The floating replacement is controlled by a secret key, a safe sequence generated by the secret key is used for carrying out tentative replacement, and if the replacement is not right, correction information can be added behind the secret key. Contents of the text subjected to steganography are possibly close, opposite or similar to contents of a hidden text, thus the misguiding effect can be obtained. The steganographic method is free of the defect that the traditional steganographic method needs large files of images, videos, audios and the like, and can directly misguide an opposite party.

Description

technical field [0001] The invention belongs to the field of information security and relates to a text steganography method, in particular to a text steganography (steganography) method which has a misleading function and can mislead at will. Background technique [0002] Steganography (steganography, steganography) is to embed secret messages in seemingly normal digital carriers, and transmit them through public channels such as the Internet in a way that cannot be noticed by others. Extract messages from the carrier to realize covert communication. Digital images are the most common carrier for steganography, followed by digital audio. Digital video can also be used for steganography. However, due to the large size of video files, the transmission on the network is far less extensive than images and audio, so generally speaking, it is not concealed. The preferred vehicle for communication. There is also a special information hiding technology, which is the subliminal ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/62
Inventor 王勇
Owner 桂林轻鸿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products