A Reliable Network Steganography Method Based on IP Source Address

A technology of IP address and source address, applied in the field of information hiding, can solve the problems of small hidden capacity, low hidden capacity, increased computing cost and network delay, and achieve the effect of improving concealment and reliable communication

Active Publication Date: 2022-05-06
QINGDAO UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These network steganography methods have their own advantages and disadvantages. For example, the network steganography method based on the modification of the data packet field is easy to implement, but most of these methods cannot be applied to the network environment where IPv4, IPv6 or both coexist, such as : Embed the secret message into the source address of the data packet, etc.; the network steganography method based on the data packet delay is to transmit the secret message by introducing different delays between data packets, which has strong concealment; its disadvantage is the hidden capacity It is small and affected by network conditions, such as packet loss or retransmission, which will cause decoding errors in the receiver's secret message; the network steganography method based on the length of the data packet may be limited by the MTU in the network, and it will also change the payload while changing the payload. It is necessary to change the checksum of the data packets, and it has better robustness when implemented based on TCP, but its steganography capacity is small, and it increases the calculation cost and network delay
To sum up, the current network steganography methods have problems such as being unable to apply to complex network environments, low hidden capacity, and unable to guarantee reliable transmission of secret messages. In many cases, it is impossible to guarantee the normal operation of steganography.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Reliable Network Steganography Method Based on IP Source Address
  • A Reliable Network Steganography Method Based on IP Source Address
  • A Reliable Network Steganography Method Based on IP Source Address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Such as figure 1 As shown, in order to ensure that the secret message will not be decoded incorrectly due to packet loss, this method establishes a service node. The service node contains at least the following content information: the real IP address of the sender of the secret message, the IP address of the receiver of the secret message, the number of IP data packets used to transmit the secret message, and the communication status of the receiver.

[0050] Such as figure 2 , 3 , 4, this method is divided into three parts: preparation process, embedding process and extraction process. Assuming that the secret message is successfully sent under normal circumstances, the following specific process is given by taking "Time" as an example.

[0051] 1. Preparation process:

[0052]1) Create a service node, which is used to record auxiliary information for sending hidden secret messages. Including: the real IP addresses and communication ports of the sender and recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A reliable network steganography method based on IP source address, which mainly consists of three parts: preparation process, embedding process and extraction process. A service node is set to record the basic information and communication status of both parties in communication, and both parties use different IP source addresses. The type represents the binary digits "0" and "1", and the service node completes the auxiliary confirmation of the integrity of the secret message and realizes the reliable transmission of the secret information. The advantages are: the entire steganography process only hides the secret message by classifying the source address field of the data packet, and chooses to use the IP address that exists in the public network. It actually exists in the network, so it is not easy to attract the attention of the attacker; the service node is A network node independent of the receiver and sender of a secret message to record the state used for covert communication to ensure reliable communication. The sender and receiver of the secret message do not communicate directly, so that the attacker cannot detect the communication process between the two, which helps to improve the concealment.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a reliable network steganography method based on an IP source address. Background technique [0002] Information hiding aims to hide the existence of secret information, and can be applied to covert communication, digital watermarking and other fields. At present, there are many network steganography methods, such as: network steganography method based on data packet field modification, network steganography method based on data packet delay, network steganography method based on data packet length, etc. These network steganography methods have their own advantages and disadvantages. For example, the network steganography method based on the modification of the data packet field is easy to implement, but most of these methods cannot be applied to the network environment where IPv4, IPv6 or both coexist, such as : Embed the secret message into the source address of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0806H04L41/0823H04L41/12
CPCH04L41/0806H04L41/0836H04L41/12H04L63/123H04L63/0428H04L61/35
Inventor 王开西王婧雨孟凡超颜培政
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products