Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method based on social software user dynamic message forwarding mechanism

A technology of dynamic messaging and social software, applied in the field of information hiding, can solve the problem of no secret information transmission in social networks, and achieve the effect of avoiding statistical anomalies and effectively transmitting secret information

Active Publication Date: 2019-01-18
FUDAN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, according to the literature review, there is currently no specific scheme for using social networks to transmit secret information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on social software user dynamic message forwarding mechanism
  • Information hiding method based on social software user dynamic message forwarding mechanism
  • Information hiding method based on social software user dynamic message forwarding mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below in conjunction with specific embodiment, further illustrate the present invention.

[0046] Message sender S:

[0047] Step 1: S calculates the dynamic number l required to transmit the L-bit binary ciphertext sequence m=[0, 0, 1, 1, 1, 0], the calculation formula is shown in (1-1), when L=6 , l=4.

[0048] Step 2: S calculates the forwarding order T of transmitting ciphertext m according to the arrangement rules agreed with R raw .

[0049] Specifically include the following sub-steps:

[0050] Step 2.1: S converts the ciphertext m into decimal d=14.

[0051] Step 2.2: S calculates that the transfer ciphertext m should be in T list ={t 1 , t 2 , t 3 , t 4} The number k selected in the order v in a permutation. According to the formulas (2-1) (2-2), when d=14, k=2 and v=10 are obtained, which means selecting the 10th type of permutations that can be formed by selecting 2 of the 4 dynamics.

[0052] Step 2.3: According to the arrangement rules agreed w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information hiding, and specifically relates to an information hiding method based on a social software user dynamic message forwarding mechanism. The method comprises the steps that a transmitter encrypts a message to obtain a binary ciphertext, selects a plurality of dynamic messages according to the length of the ciphertext, sorts the plurality ofdynamic messages according to an appointed sorting rule to obtain an initial dynamic sequence (shown in the description), and performs the replacing of the initial dynamic sequence according to a random stream generated by a shared seed to obtain an actually forwarded new dynamic sequence (shown in the description); the transmitter performs the forwarding of messages in the new dynamic sequence (shown in the description) dynamically one by one; a receiver restores the forwarded message (shown in the description) into the initial dynamic sequence (shown in the description) according to the shared random stream, restores the initial dynamic sequence (shown in the description) into a binary ciphertext according to the appointed sorting rule, and performs the decryption to obtain a message. The invention breaks through an inherent mode of information hiding, avoids the visual and statistical abnormalities caused by the embedding of information into a carrier, and can safely and effectively achieve the secret information transmission.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to an information hiding method based on a social software user dynamic message forwarding mechanism. Background technique [0002] At present, most of the existing information hiding technologies use the information describing the objective world as the carrier. Carry out covert communication by slightly modifying the carrier data, while ensuring the perceptual fidelity and statistical fidelity of the classified information. However, in the case of new communication methods, information hiding technology should continue to develop. All kinds of information media can be used as the carrier of secret information. Only by constantly breaking through the inherent mode of information confrontation and opening up new forms of information warfare can we take the initiative in the confrontation of information security. [0003] Behavioral information hiding is the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L12/58
CPCH04L9/0869H04L51/046H04L63/0428H04L51/52
Inventor 陆嘉旻张新鹏韦平钱振兴李晟
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products