Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of data hiding and completion in data transmission

A data transmission and data hiding technology, which is applied in the field of data hiding and completion in data transmission, can solve problems such as changes and leaks, and achieve the effects of data transmission security, connection establishment security, and complex generation methods.

Active Publication Date: 2022-05-20
广州锦行网络科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. In the existing technology, the key is generated in advance and cannot be changed during the transmission process, and there is a risk of internal leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of data hiding and completion in data transmission
  • A method of data hiding and completion in data transmission
  • A method of data hiding and completion in data transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0170] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the connection establishment process provided by the present invention will be described in detail.

[0171] The invention provides an identity verification method in the connection establishment process, comprising the following steps:

[0172] The client initiates a connection request;

[0173] After receiving the connection request, the server randomly generates a set of NxN state transition matrix A, NxM observation state probability matrix B, initial state transition probability vector Π, and observation sequence of the first HMM model λ1=(A,B,∏) O={o 1 ,o 2 ,...o T}; Randomly generate an observation sequence O={o 1 ,o 2 ,...o T}, where N is the number of states in the HMM model, and T is the length of the observation sequence.

[0174] According to the randomly generated first HMM model λ1=(A,B,∏) and the observation sequence O={o 1 ,o 2 ,...o T} get the passwor...

Embodiment 2

[0189] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.

[0190] The invention provides a method for encrypted data transmission, comprising the following steps:

[0191] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted D={d i} N , get the preliminary encryption vector D'={d' i} N ;

[0192] in, N is the number of states in the HMM model;

[0193] Replace the vector P with the vector of preliminary encrypted data α , let α T (i)=d' i ;

[0194] Among them, P α for α T (i) The vector formed, P α ={α T (i)} N , a password randomly generated and saved for the connection establishment process;

[0195] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequenc...

Embodiment 3

[0202] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.

[0203] The invention provides a method for hiding and completing data in encrypted data transmission, comprising the following steps:

[0204] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted H={h i} N , get the preliminary encryption vector H'={h' i} N ;

[0205] in, N is the number of states in the HMM model;

[0206] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O={o 1 ,o 2 ,...o T} and (N-2)xN data in the observation probability matrix B, N is the number of states in the HMM model, and T is the length of the observation sequence;

[0207] The initial encryption vector H'={h' i} N The v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data hiding and complementing method in data transmission, belonging to the technical field of data security transmission. After the client and the server establish a connection in the present invention, the sender uses the password in the connection establishment process to perform preliminary encryption on the original data to obtain initial processing data; the HMM model conditions are randomly given, and the observation probability matrix B contains 2N unknowns; The initial processing data is given to N unknowns of the observation probability matrix B, and the observation probability matrix B containing N unknowns is obtained; according to the password in the connection establishment process and the determined HMM model conditions, the observation probability matrix B without unknowns is obtained; The initial processing data is removed from the observation probability matrix B as training data; the training data is sent to the receiving end; the receiving end decrypts the original data according to the training data and the password during the connection establishment process. The data in the present invention is randomly hidden and completed when receiving, so that the data transmission is more secure.

Description

technical field [0001] The invention relates to the technical field of data security transmission, in particular to a data hiding and complementing method in data transmission. Background technique [0002] Data encryption has always been an important part of confidential data, and there are already many relatively mature encryption methods. Common encryption algorithms include reversible encryption algorithms and irreversible encryption algorithms, and reversible encryption algorithms are further divided into symmetric encryption algorithms and asymmetric encryption algorithms. In most cases, both communicating parties need to establish an effective and secure encryption and decryption method, and need to make a trade-off between security and performance consumption. Moreover, whether it is symmetric encryption or asymmetric encryption, the key is generated in advance and cannot be changed during transmission. The key is an absolutely critical link in the communication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/32
CPCH04L63/0428H04L63/0838H04L9/0869H04L9/3228Y02D30/50
Inventor 吴建亮胡鹏王永君
Owner 广州锦行网络科技有限公司