Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret document steganography and extraction method suitable for wireless communication environment

A technology for secret files and wireless communication, applied in wireless communication, electrical components, security devices, etc., can solve problems such as poor algorithm security, information security degradation, non-independent intellectual property leakage, and potential security risks, and achieve the effect of avoiding detection.

Inactive Publication Date: 2013-02-20
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it also has security risks to a certain extent:
[0004] (1) Traditional security risks: lawbreakers can intercept, tamper or forge communication signals, and can also locate communication locations;
[0005] (2) New security risks: 3G standardization leads to information security downgrade and hidden dangers of leakage of non-independent intellectual property rights in the encryption system
However, the security of this algorithm is too poor, and it is easy to be Detection and RS detection based on statistical methods, so the invention uses an improved LSB algorithm to avoid this detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret document steganography and extraction method suitable for wireless communication environment
  • Secret document steganography and extraction method suitable for wireless communication environment
  • Secret document steganography and extraction method suitable for wireless communication environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings, but the implementation and protection scope of the present invention are not limited thereto.

[0046] like figure 1It is the flow chart of steganography and extraction of secret files in the wireless communication environment of the embodiment. In this example, the byte size R of the voice data packet is set as 256, and the number of bytes S for steganography in each voice data packet is set as 240. . Since the improved LSB algorithm cannot directly steganographically secret files, before the sender and the receiver establish a voice call, the sender must first preprocess the secret files to be steganographically, and process the secret files into suitable ones for the improved LSB algorithm. secret data. The preprocessing steps are as follows:

[0047] (1) Obtain relevant data from the secret file to be steganographic, including file n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret document steganography and extraction method suitable for a wireless communication environment. A steganography method comprises the steps of secretly writing a secret document into a real-time speech data which are streams with a plurality of bytes, and rewriting the last bit of pseudo-random S bytes in every R-byte speech data into a binary coding of the secret document, wherein every R-byte speech data can be embedded into S-bit data, the speech data totally have S / 8 bytes, and S / 8 bytes of secrete information is transmitted to the other person involved when every R-byte speech data are transmitted through a communication system. An extraction method comprises the step of extracting the binary coding embedded into the secret document by receiving the sent speech data and using an improved least significant bite (LSB) algorithm to obtain the secrete information sent by a sender. Due to the fact that the confidential information is hidden by means of a steganographic algorithm, even through lawless persons intercept communication information during communication, the lawless persons cannot obtain the secrete document secretly written in the communication information.

Description

technical field [0001] The invention relates to a technology field applicable to wireless communication security, in particular to a secret file steganography method and a method for extracting a secret file applicable to a wireless communication environment. Background technique [0002] With the continuous development of mobile communication technology and Internet technology and the continuous acceleration of people's life rhythm, people are more and more keen on using various electronic communication products to communicate and communicate with others. Wireless mobile communication has penetrated into people's work and life, bringing great convenience to people. But at the same time, there are various security issues. In the process of communication, the data transmission between the base station and the base station uses clear text, so criminals can intercept and eavesdrop on the communication data by some means. Since both the military market and the civilian market...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02
Inventor 何军辉李敬医曾潇
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products