Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

244 results about "Covert communication" patented technology

Overt communication is the evident meaning of words exchanged. Covert communication is the murky world of implications, inferences, and attributions of motive. Covert communication includes the subtleties of meaning that are attached to the more obvious.

Covert communication method under cloud computing environment

InactiveCN102244682AAchieving covert transmissionBreak integrityTransmissionMemory addressCovert communication
The invention discloses a covert communication method under a cloud computing environment. The method comprises the following steps: 1) a sender and a receiver agree on a coding and decoding method of confidential information, wherein the coding and decoding method means that the confidential information is coded into interval time in a normal data transmission; 2) the sender establishes a annular shared memory data structure and sends an authorization reference to the receiver, and the sender and the receiver load an annular shared memory control driver as a form of a kernel module to a client virtual machine core; 3) the receiver maps the shared memory to memory address space of the sender; 4) the sender and the receiver write and read normal data containing the confidential information in and from the shared memory as a mode of a producer /a consumer; 5) the receiver acquires an interval time sequence which represents the confidential information, decodes the interval time sequence and turns the interval time sequence into the confidential information; 6) the receiver removes the shared memory mapping, and the receiver recovers the authorization reference. By using the method of the invention, current integrity and safety mechanism of the virtual machine system can be broken through and covert information transmissions between the virtual machines can be realized.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Underwater sound covert communication method and system based on ship radiation noise

The invention discloses an underwater sound covert communication method based on ship radiation noise. The underwater sound covert communication method comprises the following steps of: on a sending end, carrying out spectral analysis on a carrier signal, realizing information embedding in a frequency domain, carrying out amplitude-frequency modifying on an embedded frequency domain signal, obtaining a time domain signal by carrying out inverse transformation on the frequency domain, constructing a final emitting signal by adding a synchronizing signal in front of a time domain communication signal embedded with the information, and carrying out power amplifying on the signal and outputting the signal to a low-frequency energy converter to realize emitting; on a receiving end, converting an induced acoustic signal into an electric signal, detecting whether a communication signal exits by the synchronizing signal known in advance, if the communication signal exits, obtaining an encrypted message by an inverse operation mapped with the sending end, and finally, restoring the original message or information required to sent through a decipherment algorithm by a secret key. According to communication method, not only the information can be safely and reliably transmitted, but also the communication process has hidden property. The invention further discloses an underwater sound covert communication system based on the ship radiation noise.
Owner:JIANGSU UNIV OF SCI & TECH

High-capacity digital watermarking method combining multi-scale characteristics and Chinese remainder theorem

InactiveCN102044055AImmutableEffective Watermark ExtractionImage data processing detailsPattern recognitionImaging processing
The invention discloses a high-capacity digital watermarking method combining multi-scale characteristics and a Chinese remainder theorem, which is a high-capacity digital watermarking method used for covert communication and digital images. The method is used for determining positions for embedding and extracting watermarks by using multi-scale characteristic points with multiple-invariance, and embedding binary watermark images in a non-subsampled profile wave domain by using the Chinese remainder theorem. Before embedding, the watermark images are adjusted correspondingly according to an embedding region to ensure that watermark signals are adaptive to the embedding region. During extracting, a region containing watermarks is positioned by using a same method first, and the watermarks are extracted in the non-subsampled profile wave domain according to the Chinese remainder theorem. In the method, while high-capacity watermark signals are embedded, images containing the watermarks can obtain very high quality; and the extracted watermarks can resist conventional image processing operations and geometric transformations such as rotation, zooming, translation and the like, and the geometric transformations of the extracted watermarks and images are kept consistent for protecting the copyrights of the convert communication and the digital images.
Owner:CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products