Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding method based on forwarding mechanism of social software users' dynamic messages

A dynamic message and social software technology, applied in the field of information hiding, can solve the problem of no social network secret information transmission, etc., and achieve the effect of avoiding statistical anomalies and effective secret information transmission

Active Publication Date: 2020-11-20
FUDAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, according to the literature review, there is currently no specific scheme for using social networks to transmit secret information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on forwarding mechanism of social software users' dynamic messages
  • Information hiding method based on forwarding mechanism of social software users' dynamic messages
  • Information hiding method based on forwarding mechanism of social software users' dynamic messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below in conjunction with specific embodiment, further illustrate the present invention.

[0046] Message sender S:

[0047] Step 1: S calculates the dynamic number l required to transmit the L-bit binary ciphertext sequence m=[0, 0, 1, 1, 1, 0], the calculation formula is shown in (1-1), when L=6 , l=4.

[0048] Step 2: S calculates the forwarding order T of transmitting ciphertext m according to the arrangement rules agreed with R raw .

[0049] Specifically include the following sub-steps:

[0050] Step 2.1: S converts the ciphertext m into decimal d=14.

[0051] Step 2.2: S calculates that the transfer ciphertext m should be in T list ={t 1 , t 2 , t 3 , t 4} The number k selected in the order v in a permutation. According to the formulas (2-1) (2-2), when d=14, k=2 and v=10 are obtained, which means selecting the 10th type of permutations that can be formed by selecting 2 of the 4 dynamics.

[0052] Step 2.3: According to the arrangement rules agreed w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information hiding, and specifically relates to an information hiding method based on a social software user dynamic message forwarding mechanism. The sender encrypts the message to obtain a binary ciphertext, and selects several dynamic messages according to the length of the ciphertext and sorts them according to the agreed arrangement rules to obtain an initial dynamic sequence; then replaces the initial dynamic sequence according to the random flow generated by the shared seed to obtain the actual The new dynamic sequence forwarded; finally, the sender forwards the dynamic one by one; after receiving the forwarded message, the receiver restores the message to the initial dynamic sequence according to the shared random flow, and restores the initial dynamic sequence to Binary ciphertext sequence, and then decrypt to get the message. The invention breaks through the inherent mode of information hiding, avoids visual and statistical abnormalities caused by information embedded in the carrier, and can safely and effectively transmit secret information.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to an information hiding method based on a social software user dynamic message forwarding mechanism. Background technique [0002] At present, most of the existing information hiding technologies use the information describing the objective world as the carrier. Carry out covert communication by slightly modifying the carrier data, while ensuring the perceptual fidelity and statistical fidelity of the classified information. However, in the case of new communication methods, information hiding technology should continue to develop. All kinds of information media can be used as the carrier of secret information. Only by constantly breaking through the inherent mode of information confrontation and opening up new forms of information warfare can we take the initiative in the confrontation of information security. [0003] Behavioral information hiding is the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L12/58
CPCH04L9/0869H04L51/046H04L63/0428H04L51/52
Inventor 陆嘉旻张新鹏韦平钱振兴李晟
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products