Unlock instant, AI-driven research and patent intelligence for your innovation.

A Concealed Information Communication Method Based on IP Fragmentation and Masquerade Technology

A technology for concealing information and communication methods, applied in encryption devices with shift registers/memory, electrical components, transmission systems, etc., can solve the problems of unreliable concealed communication and low security, so as to improve the embedding rate and ensure transmission Quality, effect of improving concealment

Inactive Publication Date: 2016-06-22
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method for concealed information communication based on IP fragmentation and camouflage technology, and provide a safe and efficient method for concealed information communication. High problems, and at the same time facilitate the orderly reorganization of hidden information at the receiving end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Concealed Information Communication Method Based on IP Fragmentation and Masquerade Technology
  • A Concealed Information Communication Method Based on IP Fragmentation and Masquerade Technology
  • A Concealed Information Communication Method Based on IP Fragmentation and Masquerade Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] 1. Communication of covert information

[0042] In this embodiment, it is assumed that the original hidden information has been encrypted into a bitstream file, and the value of u is 10.

[0043] (1) The hidden information of the sender is embedded in the transmission process

[0044] Such as image 3 As shown, the basic process of embedding transmission of concealed information at the sending end is:

[0045] Step 1: At the beginning of sending, the sender selects the number K of bit packets to be sent this time, that is, the number K of fragmented packets identified in the same IPID field (requires a maximum of 8).

[0046] Step 2: After the above phase ends, the sender first sends a synchronization packet to the receiver, indicating the start of the covert information transmission. The specific method is: embed the number of fragments K in step 1 into the upper 3 bits of the Offset field, and should the format or content of the flag information be specified in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concealed information communication method based on IP fragmentation camouflage technology, which comprises the following steps: (1) encrypting concealed information; (2) sending a packet data synchronization request to a receiving end, indicating that the concealed information starts Transmission; (3) The sender selects the bit stream to be sent this time, modifies the message information of the K IP packets to be transmitted, and sends each IP packet to the receiver according to the normal TCP / IP protocol; (4) When the transmission of the bit stream to be sent is completed, the sender judges whether there is still an untransmitted bit stream; if it exists, continue to transmit the untransmitted bit stream according to step (3); otherwise, the sender sends an end packet request to the receiver and closes Network connection, covert information transmission ends. On the premise of ensuring the concealment of the existing technology, the method utilizes the principle of camouflage fragmentation and the combined effect of multiple fields to improve the embedding rate, and ensures the orderly reorganization and loss detection of packets at the receiving end.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a concealed information communication method based on IP fragmentation and camouflage technology. Background technique [0002] Information concealment is a new information security technology, which has developed rapidly in recent years and can be widely used in the fields of digital information copyright protection, authentication, and concealed transmission of confidential information. It hides the information in the public carrier medium without affecting the effect of the carrier medium. Covert communication refers to a communication method that uses information concealment technology to hide confidential information in ordinary multimedia information for transmission. It has better concealment and security, and can be used for military and commercial confidential communications. [0003] With the rapid development of information technology, the Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
Inventor 黄刘生陆潇榕缪海波沈瑶陈志立杨威
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More