Steganographic method of encrypted information based on zero-width characters

A technology for encrypting information and characters. It is used in digital transmission systems, secure communication devices, and unstructured text data retrieval. It can solve the problem of no semantics in indexes, achieve information steganography, ensure uniqueness, and improve security. Effect

Active Publication Date: 2022-05-17
河南芯盾网安科技发展有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the encryption scheme based on cloud indexing, the index has no semantics and has clearly identifiable start characters and end characters. Once someone obtains the index content, it can be directly recognized that the information has been encrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Steganographic method of encrypted information based on zero-width characters
  • Steganographic method of encrypted information based on zero-width characters
  • Steganographic method of encrypted information based on zero-width characters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0027] It should be noted that the experimental methods described in the following embodiments are conventional methods unless otherwise specified; in the description of the present invention, the terms "transverse", "longitudinal", "upper", "lower", " The orientation or positional relationship indicated by "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the drawings The orientation or positional relationship shown is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and therefore cannot be construed as an important ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a steganography method for encrypted information based on zero-width characters, which includes: a first client encrypts the plaintext of a message to generate a ciphertext and uploads it to a server, and the server saves the ciphertext and generates a unique corresponding index for the ciphertext , and then send the index to the second client, the second client presents the index content in plain text, and downloads the corresponding ciphertext data from the server through the index, and then decrypts the ciphertext; wherein, the index includes a natural language part and a unique The zero-width character encoding part of , the natural language part has semantics, and the semantics of two adjacent natural language parts of the index generated by the same session within a preset time are related. The zero-width character encoding of the present invention realizes the information steganography of the index, and the natural language part adds a layer of concealment to the content of the index itself, reducing the abnormal characteristics of the index. At the same time, the natural language part is used as the verification of the zero-width character encoding part Bits prevent malicious brute force from data collision, significantly improving security.

Description

technical field [0001] The present invention relates to the field of data encryption. More specifically, the present invention relates to a steganography method for encrypted information based on zero-width characters. Background technique [0002] In the era of global information networking, people participate in more and more frequent network activities, and computer network information transmission has increasingly become a common means of data exchange in the fields of education, national defense, e-commerce and banking, and has gradually penetrated into various fields of society. With the continuous expansion of computer network application scope, the confidentiality requirements of data information are also getting higher and higher. [0003] Many encryption schemes that have come out can realize data security encryption well, but the encrypted data transmission is divided into many schemes. Some schemes first encrypt the whole, and then transmit the encrypted data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F16/31
CPCH04L63/0428G06F16/31
Inventor 王晨晓庞潼川杨成功
Owner 河南芯盾网安科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products