Hidden information communication method based on IP fragmentation camouflage technology

A technology for covert information and communication methods, applied in encryption devices with shift registers/memory, electrical components, transmission systems, etc., can solve the problems of unreliable and low security of covert communication, improve the embedding rate and ensure transmission. Quality, the effect of improving concealment

Inactive Publication Date: 2014-02-12
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method for concealed information communication based on IP fragmentation and camouflage technology, and provide a safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden information communication method based on IP fragmentation camouflage technology
  • Hidden information communication method based on IP fragmentation camouflage technology
  • Hidden information communication method based on IP fragmentation camouflage technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] 1. Communication of hidden information

[0043] In this embodiment, it is assumed that the original hidden information has been encrypted into a bitstream file, and the value of u is 10.

[0044] (1) The transmission process of the hidden information embedded in the sender

[0045] Such as image 3 As shown, the basic process of embedded transmission of hidden information at the sender is:

[0046] Step 1: At the beginning of sending, the sender selects the number of bit packets K to be sent this time, that is, the number of fragmented packets identified in the same IPID domain K (the maximum requirement is 8).

[0047] Step 2: After the above stage ends, the sender first sends a synchronization packet to the receiver to indicate the beginning of the transmission of concealed information. The specific method is: embed the number of fragments K in step 1 into the upper 3 bits of the Offset field, and do the remaining 10 bits specify the format or content of the flag information? ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hidden information communication method based on an IP fragmentation camouflage technology. The method includes the following steps that (1) hidden information is encrypted; (2) a transmitting end sends a grouped data synchronizing request to a receiving end to indicate that the hidden information starts to be transmitted; (3) the transmitting end selects a bit stream to be sent at the time, modifies message information of K IP data packages to be transmitted, and sends the IP data packages to the receiving end according to a normal TCP/IP protocol; (4) after the bit stream to be sent is sent, the transmitting end judges whether the bit stream which is not transmitted exists, if the answer is yes, the bit stream which is not transmitted continues to be transmitted according to the step (3), otherwise, the transmitting end sends a grouping completion request to the receiving end, network connection is shut down, and hidden information transmission is finished. On the premise that invisibility similar to the prior art is guaranteed, the embedding rate is improved by means of the camouflage fragmentation principle and the combination action of multiple fields, and orderly rearrangement and loss detection of grouping at the receiving end are guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a concealed information communication method based on IP fragmentation and camouflage technology. Background technique [0002] Information concealment is a new information security technology, which has developed rapidly in recent years and can be widely used in the fields of digital information copyright protection, authentication, and concealed transmission of confidential information. It hides the information in the public carrier medium without affecting the effect of the carrier medium. Covert communication refers to a communication method that uses information concealment technology to hide confidential information in ordinary multimedia information for transmission. It has better concealment and security, and can be used for military and commercial confidential communications. [0003] With the rapid development of information technology, the Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06
Inventor 黄刘生陆潇榕缪海波沈瑶陈志立杨威
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products