A method of data hiding and completion in data transmission
A data transmission and data hiding technology, which is applied in the field of data hiding and completion in data transmission, can solve problems such as changes and leaks, and achieve the effects of data transmission security, connection establishment security, and complex generation methods.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0170] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the connection establishment process provided by the present invention will be described in detail.
[0171] The invention provides an identity verification method in the connection establishment process, comprising the following steps:
[0172] The client initiates a connection request;
[0173] After receiving the connection request, the server randomly generates a set of NxN state transition matrix A, NxM observation state probability matrix B, initial state transition probability vector Π, and observation sequence of the first HMM model λ1=(A,B,∏) O={o 1 ,o 2 ,...o T}; Randomly generate an observation sequence O={o 1 ,o 2 ,...o T}, where N is the number of states in the HMM model, and T is the length of the observation sequence.
[0174] According to the randomly generated first HMM model λ1=(A,B,∏) and the observation sequence O={o 1 ,o 2 ,...o T} get the passwor...
Embodiment 2
[0189] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.
[0190] The invention provides a method for encrypted data transmission, comprising the following steps:
[0191] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted D={d i} N , get the preliminary encryption vector D'={d' i} N ;
[0192] in, N is the number of states in the HMM model;
[0193] Replace the vector P with the vector of preliminary encrypted data α , let α T (i)=d' i ;
[0194] Among them, P α for α T (i) The vector formed, P α ={α T (i)} N , a password randomly generated and saved for the connection establishment process;
[0195] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequenc...
Embodiment 3
[0202] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.
[0203] The invention provides a method for hiding and completing data in encrypted data transmission, comprising the following steps:
[0204] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted H={h i} N , get the preliminary encryption vector H'={h' i} N ;
[0205] in, N is the number of states in the HMM model;
[0206] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O={o 1 ,o 2 ,...o T} and (N-2)xN data in the observation probability matrix B, N is the number of states in the HMM model, and T is the length of the observation sequence;
[0207] The initial encryption vector H'={h' i} N The v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


