Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Information Hiding Method Based on Encryption and Natural Language Generation

A technology of natural language and information hiding, which is applied in the field of cryptography and information hiding, can solve the problems that encrypted text does not conform to natural language grammar and has no semantics, and achieve the effect of ensuring safe sharing, improving similarity, and improving embedding rate

Active Publication Date: 2021-02-05
SUN YAT SEN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this method is that the embedding rate of secret information is greatly improved compared with the previous two methods, and it can better avoid the detection of the encrypted text in the statistical dimension by a third party outside the communication, but its disadvantage is that the generated The encrypted text often does not conform to the grammar of natural language, and has almost no semantics, which is easy to attract the attention of third parties outside the communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Information Hiding Method Based on Encryption and Natural Language Generation
  • An Information Hiding Method Based on Encryption and Natural Language Generation
  • An Information Hiding Method Based on Encryption and Natural Language Generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1 of the present invention introduces the specific process of using several cryptographic techniques to encrypt secret information and adding verification information, and finally obtain the information to be hidden in binary form. Specific steps include:

[0038] S1: Encode the secret information S into a binary stream S' according to a specific encoding method; for example, S in English text form can be encoded into binary form through ASCII encoding method, and S in Chinese text form can be encoded into binary form through Chinese character encoding method etc;

[0039] S2: Select an AES initial key K with a length of 128 bits, and then use the AES key expansion algorithm to expand K to generate the expanded key K' used for encryption; use the expanded key K' to process the binary stream S in step S1 'Carry out multiple rounds of AES encryption to obtain the encrypted binary stream E(S');

[0040] S3: Use the RSA key generation algorithm to generate a pa...

Embodiment 2

[0045] Embodiment 2 of the present invention introduces the specific process of generating encrypted text according to a piece of binary secret information and context-free grammar (CFG) of normal text. Assuming that the binary secret information to be hidden is 0101101, the CFG of a normal text is as follows figure 2 , where the number in parentheses after each production is the probability of the production appearing in normal text. Specific steps include:

[0046] S1: According to the probability of each production of each non-terminal symbol of CFG, use the Huffman compression coding algorithm to generate a Huffman binary tree for each non-terminal symbol of CFG, and each production of each non-terminal symbol is this non-terminal A leaf node of the Huffman tree of terminal symbols; if all the left branch paths of this binary tree are marked with 0, and all the right branch paths of this binary tree are marked with 1, then each production corresponds to a binary code, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information hiding method generated based on encryption and natural language, and belongs to the direction of data safety and information hiding in the field of computers. Firstly, secret information is encrypted by using an AES algorithm, an AES secret key is encrypted by using an RSA algorithm, an MD5 value is generated for the encrypted information by using an MD5 algorithm, and then a ciphertext is generated by using context free grammar of a normal natural language text and a Huffman coding and decoding algorithm according to the to-be-hidden information combinedby the encrypted information and the MD5 value of the encrypted information. The information hiding method provides more powerful protection for the secret information by using encryption algorithms,provides integrity verification information of the secret information, improves the similarity between the ciphertext and the normal text in terms of statistical features and grammatical semantics, and improves the concealment of the ciphertext and the embedding rate of the secret information.

Description

technical field [0001] The present invention relates to the fields of cryptography technology and information hiding technology, and more specifically, relates to an information hiding method based on encryption and natural language generation. Background technique [0002] In today's highly developed information society, information security has always been a problem that cannot be ignored, and people pay more and more attention to it. In many fields, there is a need for secret communication (that is, a third party cannot know the content or even existence of the communication during the communication process). Now there are two main technical means that people use to ensure the security of secret communication: cryptography technology and information hiding technology. Cryptography technology mainly uses keys to encrypt communication content, so that a third party without a key cannot know the content of communication. However, the communication content encrypted by the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0631H04L9/0643H04L9/0822H04L9/0825H04L63/0428H04L63/045H04L63/123
Inventor 高钰孙伟卢伟
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products