Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret information transmission method based on BitTorrent protocol Have message

A technology of secret information and transmission method, which is applied in the field of secret information transmission based on the BitTorrent protocol Have message, to achieve the effect of improving concealment and robustness and avoiding communication load

Active Publication Date: 2016-07-13
JIANGSU UNIV OF SCI & TECH
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

No information hiding method based on this message has been found from public information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information transmission method based on BitTorrent protocol Have message
  • Secret information transmission method based on BitTorrent protocol Have message
  • Secret information transmission method based on BitTorrent protocol Have message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further explained below in conjunction with the accompanying drawings.

[0034] Taking the client software Vuze4.4 as an example, an information hiding method based on BitTorrent protocol Have message sorting of the present invention is further clarified.

[0035] figure 1 It is an overall flowchart of the information hiding method of the present invention. The hidden channel is constructed based on the transmission channel of the BT protocol Have message. The sender undergoes two processes of encryption and encoding, and adjusts the order of the Have messages in the N groups of Have message sequences according to the N groups of secret information ciphertext S, thereby completing the N groups of The embedding of the secret information ciphertext S, the secret information is transmitted together with the Have message. The receiver obtains N groups of secret information plaintext P through reverse decoding and decryption, and submits it to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the computer network and information safety technology field and mainly discloses a secret information transmission method based on a BitTorrent protocol Have message. A transmission channel of the BT protocol Have message is taken as a basic-construction hidden channel. According to secret information coding, a sequence of the Have message in an Have message sequence is adjusted so as to complete embedding of secret information so that the secret information is transmitted along with the Have message. In the invention, during BT protocol Have message sorting, an information coding technology is introduced to construct the hidden channel; transmission of the secret information is simple and high-efficient; an extra communication load brought for an existing Have message channel is avoided; and an information coding position circulation shift mechanism and an information verification mechanism are introduced so as to further increase concealment and robustness of secret information transmission.

Description

technical field [0001] The invention belongs to the technical field of computer network and information security, in particular to a secret information transmission method based on the BitTorrent protocol Have message. Background technique [0002] With the rapid development of computer network communication technology, the security problem of information transmission is becoming more and more serious. Traditional encryption technology scrambles secret information and turns it into chaotic ciphertext, but it directly exposes the existence of confidential communication and easily attracts the attention of attackers. Information hiding technology is to hide secret information in approximately normal data streams, thereby hiding the existence of secret information transmission channels. Compared with traditional encryption technology, it has an extra layer of means to confuse attackers and is more secure. . [0003] P2P network is a distributed peer-to-peer network environmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/28H04L29/06G06F21/60H04N19/46
CPCG06F21/60G06F21/602G06F21/606H04L9/06H04L63/0428H04N19/46
Inventor 戴跃伟高斌唐雨翟江涛
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products