[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101277194B - Transmitting/receiving method for secret communication - Google Patents

Transmitting/receiving method for secret communication Download PDF

Info

Publication number
CN101277194B
CN101277194B CN2008101007958A CN200810100795A CN101277194B CN 101277194 B CN101277194 B CN 101277194B CN 2008101007958 A CN2008101007958 A CN 2008101007958A CN 200810100795 A CN200810100795 A CN 200810100795A CN 101277194 B CN101277194 B CN 101277194B
Authority
CN
China
Prior art keywords
verification
information
protocol data
transport layer
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008101007958A
Other languages
Chinese (zh)
Other versions
CN101277194A (en
Inventor
刘镇
钱萍
周亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University of Science and Technology
Original Assignee
Jiangsu University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University of Science and Technology filed Critical Jiangsu University of Science and Technology
Priority to CN2008101007958A priority Critical patent/CN101277194B/en
Publication of CN101277194A publication Critical patent/CN101277194A/en
Application granted granted Critical
Publication of CN101277194B publication Critical patent/CN101277194B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses a transmitting/receiving method of covert communication. The method conceals important information waiting convey into a carrier in computer network environment, and important information is unware. When a transmitter transmits network date, a secret information is random embedded into a check field of network protocol date unit (TCP section or UDP) header, and date field is corrected for ensuring check sum right after the secret information is embedded; a receiver extracts the secret information after receiving network protocol date unit from network. The method has better confidentiality and anti-attack by using check and covert information of protocol date unit, and is safely and reliable. The method is especially suitable for convert communication of important information with less date quantity.

Description

A kind of transmission/method of reseptance of secret communication
Technical field
The invention belongs to command, control, communications, and information safe practice field, relate to a kind of method for communicating, more specifically relate to a kind of transmission/method of reseptance of secret communication.
Background technology
Secret communication is an importance of command, control, communications, and information safe practice, and Information Hiding Techniques is to realize a kind of important method of secret communication, promptly the important information that will transmit is hidden in the carrier, makes it be difficult for being discovered.The carrier of Information Hiding Techniques can have a lot, as header of text, image, audio frequency, video and TCP/IP etc.Discovery by retrieval, existing information concealing method based on ICP/IP protocol mainly rely on following territory to realize hiding: the common seldom territory of usefulness when the option field of (1) TCP or IP head and transmission data; The territory that must force to fill when (2) transmitting data hides Info, as the source port territory in the source address field in the IP data packet head, destination address domain, mark domain and the tcp data packet header, destination interface territory, sequence number territory etc.Rely on the Information Hiding Techniques in these territories, owing to Hidden field is known by everybody, so crypticity is not high; At these technology, attack methods such as packet filtering, chi square analysis have appearred, and utilize these attack methods can detect or extract TCP or the hiding information of IP head, therefore be easy to be attacked, fail safe is not high.
Summary of the invention
Technical problem to be solved by this invention is: introduce at above that existing Information Hiding Techniques based on ICP/IP protocol is existing is easily attacked and the not high defective of fail safe, propose a kind of transmission/method of reseptance of in computer network environment, realizing secret communication, make secret information have better crypticity and anti-aggressive.
To achieve these goals, the technical scheme that the present invention addresses the above problem is a kind of transmission/method of reseptance of secret communication, first the Information hiding that will transmit is in carrier in network environment, when transmit leg sends network data, verification territory at the network protocol data unit header embeds information at random, and embedding information is passed through to revise the data field verification; After the recipient receives network protocol data unit from network, from the information extraction of verification territory.
Wherein, described sending method comprises the steps:
Step 1: with sharing the secret information that secret key encryption will send, the cryptographic algorithm of use is RC4;
Step 2: the information after encrypting is represented with binary bit stream, be divided into one group of 8 bit; If encrypting the length of back information is l, then total m=l/8 group; If the length of encrypting back information is not 8 integral multiple, then in the end " 0 " is filled in one group back; The original order ordering of all groupings by information;
Step 3: construct m transport layer protocol data cell, fill each field and the data field of each protocol Data Unit stem, and generate verification and, insert in the verification territory;
Step 4: the m that obtains in the step 2 group bit stream is embedded into respectively in the verification territory of m the transport layer protocol data cell that obtains in the step 3, and 8 bits of every group are embedded in the protocol Data Unit, and are embedded on the random site that both sides appoint;
Step 5: to each protocol Data Unit that obtains in the step 4, the data field according in its check digit correction data cell that has changed makes verification and still correct;
Step 6:, send to the recipient successively according to the agreement of transport layer and the sequencing of each grouping all m protocol Data Unit that obtains in the step 5.
Above-mentioned transport layer protocol data cell refers to TCP message segment or UDP datagram, and its message format is seen accompanying drawing 5, pseudo-head wherein only be for calculation check and, calculation check and the time pseudo-head and TCP section or the calculating together of UDP newspaper.
The generative process in the verification territory of above-mentioned transport layer protocol data cell, according to TCP and udp checksum and computational methods, promptly head, data and the pseudo-head of TCP section or UDP newspaper calculation check together and.During calculating, earlier the part of wanting verification is divided into the sequence of many 16 words, and verification and zero setting, with the radix-minus-one complement arithmetical operation all 16 word additions after, with obtain and radix-minus-one complement as the verification that generates with.Verification and generative process see accompanying drawing 6.Verification and checking procedure see accompanying drawing 7.
Above-mentioned random site refers to select 8 random bit positions and is used for hiding secret information in 16 bit positions in verification territory.8 random sites arrange to form by both party.8 random sites of each protocol Data Unit should have nothing in common with each other, and set in advance by both party.
The mode of bit replacement is adopted in above-mentioned embedding, promptly replaces the bit of 8 random sites in each transport layer protocol data cell verification territory with every group that obtains in the step 28 bits.
Above-mentioned similar process according to verification in data field in the check digit correction data cell that has changed and the transport layer protocol, promptly the radix-minus-one complement arithmetical operation is reinstated in the verification and of wanting the part (comprising pseudo-head, head and data field) of verification and having embedded secret information, press 16 word additions.If do not embed information in the verification territory, the result that addition obtains should be 1, expression verification and correct.Because make verification and variation has taken place after embedding 8 bit secret informations, still be 1 so need modification protocol Data Unit data field to make the result of addition, to guarantee verification and still correct.Its makeover process is seen accompanying drawing 8.
Above-mentioned sends successively according to the agreement of transport layer and the sequencing of each grouping, and transport layer protocol can be a Transmission Control Protocol, because the Transmission Control Protocol head has sequence number field (seeing accompanying drawing 5), so directly send all message segments by the sequence number field.
Above-mentioned sends successively according to the agreement of transport layer and the sequencing of each grouping, transport layer protocol can be a udp protocol, because the udp protocol head does not have sequence number field, so both sides appoint 16 bits choosing the UDP message territory in advance as the sequence number of representing each UDP datagram, the position of these 16 bits is appointed by both party in advance.
Described method of reseptance comprises the steps:
Step 1: receive all m transport layer protocol data cells according to transport layer protocol, and from small to large all protocol Data Units are sorted according to sequence number;
Step 2: to m the transport layer protocol data cell that obtains in the step 1,8 random sites according in each protocol Data Unit verification territory of both sides' agreement extract the bit value of these 8 positions, form one group of bit stream;
Step 3:, form complete information according to the order in the step 1 with all m group bit streams that obtain in the step 2;
Step 4: with sharing the information that obtains in key and the RC4 cryptographic algorithm decryption step 3, the secret information that acquisition will receive.
Above-mentioned transport layer protocol data cell refers to TCP message segment or UDP datagram, and its heading form is seen accompanying drawing 5, the pseudo-head of UDP datagram only be for calculation check and, calculation check and the time pseudo-head and UDP user datagram calculated together.
Above-mentioned transport layer protocol can be a Transmission Control Protocol, when transmit leg uses Transmission Control Protocol, because the Transmission Control Protocol head has sequence number field (seeing accompanying drawing 5), so the recipient directly sorts to all message segments by the value of sequence number field.
Above-mentioned transport layer protocol can be a udp protocol, because the udp protocol head does not have sequence number field, so both sides appoint that in advance 16 bits choosing the UDP message territory are as the sequence number of representing each UDP datagram, the position of these 16 bits appoints by both party in advance, according to the value of these 16 bits to all datagrams orderings.
Above-mentioned random site refers to select 8 bit positions at random in 16 bit positions in verification territory.8 random sites arrange to form by both party.8 random sites of each protocol Data Unit should have nothing in common with each other, and set in advance by both party.
Transmission/the method for reseptance of a kind of secret communication of the present invention, the characteristics and the beneficial effect that have are:
1, the Hidden field that relies among the present invention is the verification territory of protocol Data Unit header, and this field is not also used by other Information Hiding Techniques, therefore has better disguise;
2, rely on the verification territory to hide among the present invention, make verification and still correct by revising data field conversely again, this is a kind of method of reverse application verification territory completely newly, has good concealment effect;
3, the secret information among the present invention was encrypted with the RC4 cryptographic algorithm earlier before being hidden, and made it have better secret, even the assailant finds the latent existence of writing, also was difficult to decryption information;
4, among the present invention information to be embedded is divided into 8 bits and embeds for one group, only use 8 in 16 bits in verification territory during embedding, make that the statistical nature change in verification territory is less, can resist attack method based on statistical analysis;
5, the present invention adopts the method that embeds at random when the information of embedding, promptly be embedded in 8 random sites in each protocol Data Unit 16 bit check territory, and the random site of each protocol Data Unit is all inequality, makes the assailant be difficult to the discovery rule and attacks, and has good fail safe.
Description of drawings
Fig. 1 among the present invention based on the secret information transmission flow figure of Transmission Control Protocol;
Fig. 2 receives flow chart for the secret information based on Transmission Control Protocol among the present invention;
Fig. 3 among the present invention based on the secret information transmission flow figure of udp protocol;
Fig. 4 receives flow chart for the secret information based on udp protocol among the present invention;
Fig. 5 (a) is a TCP message paragraph header form in the Transmission Control Protocol, is UDP message header form in the udp protocol (b), (c) is pseudo-header format;
Fig. 6 be in Transmission Control Protocol and the udp protocol verification and product process figure;
Fig. 7 is the checking process figure in Transmission Control Protocol and the udp protocol;
Fig. 8 among the present invention according to the verification that has changed with revise data field, make verification and still correct flow chart.
Embodiment
Below in conjunction with accompanying drawing content of the present invention is further detailed.
1, use the data cell of Transmission Control Protocol to be as the method step of hiding carrier (referring to accompanying drawing 1 and accompanying drawing 2):
(1) secret encryption message.Key is shared by transmit leg and recipient, and cryptographic algorithm uses RC4, and the information after the encryption is divided into one group of 8 bit, altogether the m group.
(2) m TCP message segment of structure.Header fields such as the source port of each TCP section, destination interface and sequence number and data field are all inserted corresponding right value, and generate 16 bit checks and.Verification and generative process be the head of TCP section, data and pseudo-head calculation check together and, during calculating, earlier the part of wanting verification is divided into the sequence of many 16 words, and verification and zero setting, with the radix-minus-one complement arithmetical operation all 16 word additions after, with obtain and radix-minus-one complement as the verification that generates and.TCP paragraph header portion form is referring to accompanying drawing 5, verification and generative process referring to accompanying drawing 6.
(3) 8 random bit positions in 16 bit positions appointing in advance according to both sides, each TCP paragraph header portion 16 bit check that obtains from step (2) and extract 8.
(4) with every group 8 Bit data that extracts in the information after the encryption of every group 8 bit obtaining in the step (1) replacement step (3) successively.
(5) again according to random bit position same in the step (3), every group 8 Bit data that step (4) is obtained is put back in the verification territory.
(6) according to the verification territory that has changed in the step (5), revise the data field of message segment, correct to guarantee checksum validation.The Transmission Control Protocol verification and proof procedure be wanting the part (comprising pseudo-head, head and data field) and the verification and of verification to reinstate the radix-minus-one complement arithmetical operation, by 16 word additions, if the result that addition obtains is 1, expression verification and correct, otherwise then verification is incorrect, verification and proof procedure referring to accompanying drawing 7.Verification with makeover process similar to proof procedure, promptly the radix-minus-one complement arithmetical operation is reinstated in the verification and of wanting the part (comprising pseudo-head, head and data field) of verification and having embedded secret information, by 16 word additions, it still is 1 that the data field of modification TCP section makes the result of addition, guaranteeing that verification is correct, verification and makeover process referring to accompanying drawing 8.
(7) transmit leg sends to the recipient sequentially with all TCP message segments.
(8) recipient receives all m TCP message segments.
(9) extract each TCP message segment head 16 bit checks and.
(10) according to 8 random sites in 16 bit positions of prior agreement, each 16 bit check that obtains from step (9) and extract 8.
(11) all bits that step (10) is extracted are formed information according to the order of sequence.
(12),, thereby obtain the secret information that will receive according to RC4 cryptographic algorithm decryption information with sharing key.
2, use the data cell of udp protocol to be as the method step of hiding carrier (referring to accompanying drawing 3 and accompanying drawing 4):
(1) secret encryption message.Key is shared by transmit leg and recipient, and cryptographic algorithm uses RC4, and the information after the encryption is divided into one group of 8 bit, altogether the m group.
(2) structure UDP datagram.In each UDP datagram, header fields such as source port, destination interface and length and data field are all inserted corresponding right value.Choose 16 bits of data field in the UDP newspaper, 16 bit positions are appointed by both party in advance.The sequence number of each UDP newspaper is inserted respectively in these 16 bits, made reception can confirm the order of all UDP datagrams.Generate verification and process be head, data and the pseudo-head of UDP newspaper calculation check together and, during calculating, earlier the part of wanting verification is divided into the sequence of many 16 words, and verification and zero setting, with the radix-minus-one complement arithmetical operation all 16 word additions after, with obtain and radix-minus-one complement as the verification that generates and.The UDP datagram header format is referring to accompanying drawing 5, verification and generative process referring to accompanying drawing 6.
(3) 8 random bit positions in 16 bit positions appointing in advance according to both sides, from each UDP header portion 16 bit check and extract 8.
(4) with every group 8 Bit data that extracts in the information after the encryption of every group 8 bit obtaining in the step (1) replacement step (3) successively.
(5) again according to random bit position same in the step (3), every group 8 Bit data that step (4) is obtained is put back in the verification territory.
(6) according to the verification territory that has changed in the step (5), revise the data field of datagram, correct to guarantee checksum validation.Udp checksum and proof procedure be wanting the part (comprising pseudo-head, head and data field) and the verification and of verification to reinstate the radix-minus-one complement arithmetical operation, by 16 word additions, if the result that addition obtains is 1, expression verification and correct, otherwise then verification is incorrect, verification and proof procedure referring to accompanying drawing 7.Verification with makeover process similar to proof procedure, promptly the radix-minus-one complement arithmetical operation is reinstated in the verification and of wanting the part (comprising pseudo-head, head and data field) of verification and having embedded secret information, by 16 word additions, it still is 1 that the data field of modification UDP newspaper makes the result of addition, guaranteeing that verification is correct, verification and makeover process referring to accompanying drawing 8.
(7) transmit leg sends to the recipient with all UDP datagrams.
(8) recipient receives all UDP newspapers.And 16 bit positions of arranging in the data field according to each datagram, extract the sequence number of each datagram, datagram is sorted.
(9) extract each UDP datagram head 16 bit checks and
(10) according to 8 random sites in 16 bit positions of prior agreement, each 16 bit check that obtains from step (9) and extract 8.
(11) all bits that step (10) is extracted are formed information according to the order of sequence.
(12),, thereby obtain the secret information that will receive according to RC4 cryptographic algorithm decryption information with sharing key.

Claims (7)

1. transmission/the method for reseptance of a secret communication, in network environment the Information hiding that will transmit in carrier, it is characterized in that: this sending method comprises the steps:
Step 1: with sharing the secret information that secret key encryption will send, the cryptographic algorithm of use is RC4;
Step 2: the information after encrypting is represented with binary bit stream, be divided into one group of 8 bit, if encrypting the length of back information is l, then total m=l/8 group, if the length of encrypting back information is not 8 integral multiple, then in the end " 0 " is filled in one group back, the original order ordering of all groupings by information;
Step 3: construct m transport layer protocol data cell, fill each field and the data field of each protocol Data Unit stem, and generate verification and, insert in the verification territory;
Step 4: the m that obtains in the step 2 group bit stream is embedded into respectively in the verification territory of m the transport layer protocol data cell that obtains in the step 3, and 8 bits of every group are embedded in the protocol Data Unit, and are embedded on the random site that both sides appoint;
Step 5: to each protocol Data Unit that obtains in the step 4, revise data field in the data cell, make verification and still correct according to its verification territory that has changed; Wherein, the similar process of verification in the process of revising data field according to the verification territory and the transport layer protocol, promptly the part of wanting verification, the radix-minus-one complement arithmetical operation is reinstated in the verification and that comprises pseudo-head, head and data field and embedded secret information, presses 16 word additions; If do not embed secret information in the verification territory, the result that addition obtains should be 1, expression verification and correct; Because make verification and variation has taken place after embedding 8 bit secret informations, still be 1 so need modification protocol Data Unit data field to make the result of addition, to guarantee verification and still correct;
Step 6:, send to the recipient successively according to the agreement of transport layer and the sequencing of each grouping all m protocol Data Unit that obtains in the step 5;
This method of reseptance is, after the recipient receives network protocol data unit from network, from the information extraction of verification territory.
2. transmission/the method for reseptance of a kind of secret communication according to claim 1, it is characterized in that: described protocol Data Unit refers to TCP message segment or UDP datagram.
3. transmission/the method for reseptance of secret communication according to claim 1, it is characterized in that: the generative process in the verification territory of the transport layer protocol data cell in the described sending method step 3, according to TCP and udp checksum and computational methods, promptly head, data and the pseudo-head of TCP section or UDP newspaper calculation check together and; During calculating, earlier part to be verified is divided into the sequence of many 16 words, and verification and zero setting, with the radix-minus-one complement arithmetical operation all 16 word additions after, with obtain and radix-minus-one complement as the verification that generates with.
4. transmission/the method for reseptance of secret communication according to claim 1, it is characterized in that: telescopiny adopts the mode that bit is replaced in the described sending method step 4, promptly replaces the bit of 8 random sites of the both sides' agreement in each transport layer protocol data cell verification territory with every group that obtains in the step 28 bits.
5. transmission/the method for reseptance of a kind of secret communication according to claim 1, it is characterized in that: described method of reseptance comprises the steps:
Step (1): receive all m transport layer protocol data cells according to transport layer protocol, and from small to large all protocol Data Units are sorted according to sequence number;
Step (2): to m the transport layer protocol data cell that obtains in the step (1), 8 random sites according in each protocol Data Unit verification territory of both sides' agreement extract the bit value of these 8 positions, form one group of bit stream;
Step (3):, form complete information according to the order in the step (1) with all m group bit streams that obtain in the step (2);
Step (4): with sharing the information that obtains in key and the RC4 cryptographic algorithm decryption step (3), the secret information that acquisition will receive.
6. transmission/the method for reseptance of secret communication according to claim 1 or 5, it is characterized in that: described 8 random sites, finger is selected 8 random bit positions and is used for hiding secret information in 16 bit positions in the verification territory of transport layer protocol data cell, 8 random sites arrange to form by both party, 8 random sites of each protocol Data Unit should have nothing in common with each other, and set in advance by both party.
7. transmission/the method for reseptance of secret communication according to claim 1 or 5, it is characterized in that: described transport layer protocol is Transmission Control Protocol or udp protocol, directly sends, receives all message segments by the sequence number field during for Transmission Control Protocol; Appoint in advance by both party during for udp protocol that 16 bits choosing the UDP message territory are as the sequence number of representing each UDP datagram.
CN2008101007958A 2008-05-13 2008-05-13 Transmitting/receiving method for secret communication Expired - Fee Related CN101277194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101007958A CN101277194B (en) 2008-05-13 2008-05-13 Transmitting/receiving method for secret communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101007958A CN101277194B (en) 2008-05-13 2008-05-13 Transmitting/receiving method for secret communication

Publications (2)

Publication Number Publication Date
CN101277194A CN101277194A (en) 2008-10-01
CN101277194B true CN101277194B (en) 2010-06-09

Family

ID=39996234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101007958A Expired - Fee Related CN101277194B (en) 2008-05-13 2008-05-13 Transmitting/receiving method for secret communication

Country Status (1)

Country Link
CN (1) CN101277194B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431578B (en) * 2008-10-30 2010-12-08 南京大学 Information concealing method based on G.723.1 silence detection technology
CN101488852B (en) * 2009-01-13 2010-12-29 华中科技大学 IP voice concealed communication method based on m sequence
CN101478391B (en) * 2009-01-13 2010-12-29 华中科技大学 IP voice hidden communication method based on stream encryption
GB201010735D0 (en) * 2010-06-25 2010-08-11 Omar Ralph M Security improvements for flexible substrates
CN102143155B (en) * 2010-12-30 2014-01-08 南京理工大学 Covert communication method based on IPID (Internet Protocol Identification) bit delta modulation
CN102137096A (en) * 2011-01-13 2011-07-27 华为技术有限公司 Method and equipment for data transmission
CN102523205A (en) * 2011-12-05 2012-06-27 中兴通讯股份有限公司 Determination method and device for content checksum
CN103546475A (en) * 2013-10-29 2014-01-29 冯丽娟 Network communication subject confirmation method and system
CN103581192A (en) * 2013-11-08 2014-02-12 冯丽娟 Method and system for confirming network communication object
CN104917747B (en) * 2015-03-27 2018-07-10 中国科学技术大学苏州研究院 A kind of secret communication method
CN106453225B (en) * 2016-07-18 2019-07-05 北龙中网(北京)科技有限责任公司 Realize the method and client, server of secret communication
CN107612678B (en) * 2017-08-18 2020-05-05 华侨大学 Steganography method based on network topology structure diagram
CN109842597A (en) * 2017-11-28 2019-06-04 中天安泰(北京)信息技术有限公司 Communication uplink data reconstruction method and component
CN108390860B (en) * 2018-01-24 2021-09-14 北京奇艺世纪科技有限公司 Data packet encryption and decryption method and device
CN108268178B (en) * 2018-02-27 2021-07-13 Tcl移动通信科技(宁波)有限公司 Mobile terminal touch screen coordinate output control, mobile terminal and storage medium
CN111970124B (en) * 2020-08-12 2024-07-09 曙光信息产业(北京)有限公司 Computer factory mode control method, device, computer equipment and storage medium
CN112804365B (en) * 2021-04-14 2021-07-13 浙江数秦科技有限公司 Private data distribution method for secure multi-party computing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6108812A (en) * 1996-06-20 2000-08-22 Lsi Logic Corporation Target device XOR engine
CN1643841A (en) * 2002-03-20 2005-07-20 皇家飞利浦电子股份有限公司 Encryption key hiding and recovering method and system
CN1898624A (en) * 2003-12-24 2007-01-17 皇家飞利浦电子股份有限公司 Preserving privacy while using authorization certificates

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6108812A (en) * 1996-06-20 2000-08-22 Lsi Logic Corporation Target device XOR engine
CN1643841A (en) * 2002-03-20 2005-07-20 皇家飞利浦电子股份有限公司 Encryption key hiding and recovering method and system
CN1898624A (en) * 2003-12-24 2007-01-17 皇家飞利浦电子股份有限公司 Preserving privacy while using authorization certificates

Also Published As

Publication number Publication date
CN101277194A (en) 2008-10-01

Similar Documents

Publication Publication Date Title
CN101277194B (en) Transmitting/receiving method for secret communication
US8503681B1 (en) Method and system to securely transport data encryption keys
US7743249B1 (en) Method of securing a document in a system and controlling access to the document and a seal for use in the method
Ji et al. A novel covert channel based on length of messages
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
WO2009101768A1 (en) Encryption processing method and encryption processing device
CN101471769B (en) Enciphering/deciphering method for VoIP medium transmission
CN101383703B (en) Dynamic ciphering method based on broad sense information field
Cauich et al. Data hiding in identification and offset IP fields
CN105959355B (en) Secret information transmission method under P2P network based on BitTorrent agreement
CN103581168A (en) Hidden information communication method based on IP fragmentation camouflage technology
Sharma et al. Adaptive steganographic algorithm using cryptographic encryption RSA algorithms
Dhobale et al. Steganography by hiding data in TCP/IP headers
CN101667912B (en) Network information transmission method and system therefor
CN108566379B (en) Hidden data transmission synchronization method based on protocol field redundancy in P2P network
CN102938888A (en) Secret document steganography and extraction method suitable for wireless communication environment
CN115174520A (en) Network address information hiding method and system
Chen et al. Exploring unobservable blockchain-based covert channel for censorship-resistant systems
Goudar et al. Secure data transmission using steganography based data hiding in TCP/IP
CN103200563A (en) Subliminal channel hiding communication method based on authentication code
CN107612678A (en) A kind of steganography method based on network topology structure figure
CN116866052A (en) Efficient block chain hidden communication method based on address coding
CN117114684A (en) Block chain hidden communication method and system based on transaction amount
US10939163B2 (en) Method for watermarking encrypted digital content, method and device for retrieving a unique identifier from watermarked content and content distribution network
Shah et al. Network based packet watermarking using TCP/IP protocol suite

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100609

Termination date: 20130513

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20081001

Assignee: Jiangsu Xiangjiang Science & Technology Co.,Ltd.

Assignor: Jiangsu University of Science and Technology

Contract record no.: 2011320000757

Denomination of invention: Transmitting/receiving method for secret communication

Granted publication date: 20100609

License type: Exclusive License

Record date: 20110527

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model