CN105846994A - Physical layer steganography method and physical layer steganography system - Google Patents
Physical layer steganography method and physical layer steganography system Download PDFInfo
- Publication number
- CN105846994A CN105846994A CN201610177470.4A CN201610177470A CN105846994A CN 105846994 A CN105846994 A CN 105846994A CN 201610177470 A CN201610177470 A CN 201610177470A CN 105846994 A CN105846994 A CN 105846994A
- Authority
- CN
- China
- Prior art keywords
- signal
- steganography
- coding
- hiding
- carrier signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
An embodiment of the invention discloses a physical layer steganography method and a physical layer steganography system, wherein the physical layer steganography method and the physical layer steganography system are applied in the field of communication technology. According to the physical layer steganography method, after a signal transmitting end performs channel coding on a carrier signal, the embedding manner of a hidden signal in the coded carrier signal is determined according to a steganography safety grade and a preset strategy, and a random sequence is generated so that the random sequence indicates the embedding position of the hidden signal in the coded carrier signal; and finally a steganography signal is obtained through embedding the hidden signal into the coded carrier signal according to the embedding manner and the random sequence, and then the steganography signal is modulated and transmitted to outside. Therefore in transmission of the hidden signal, in consideration of the channel coding process, the hidden signal is embedded into the coded carrier signal for transmission, and furthermore the signal transmitting end determines a relatively safe hidden signal embedding manner so that the steganography signal is not suspected by a hostile monitoring end, thereby improving transmission safety of the hidden signal.
Description
Technical field
The present invention relates to communication technical field, particularly to a kind of physical layer steganography method and system.
Background technology
The transmitting terminal steganography by physical layer, by carrier signal, stego-key and chnnel coding,
The situation of a part of information (such as receiving signal, channel coding method) can be obtained at monitoring end
Lower receiving terminal that hiding signal is transferred to, and during this, monitoring end will not suspect hiding signal/channel
Exist, thus hiding signal is not attacked and revised, it is ensured that the safety in steganography signals transmission
Property and robustness.
A kind of transmission method of existing steganography signal is that hiding signal is embedded into adding of carrier signal
In position (also referred to as filler) and Cyclic Prefix, but owing to extra order and Cyclic Prefix are typically all fixing
Value, steganography signal transmit during be easy to cause the suspection of hostility monitoring side.Another kind of transmission
Method is to be embedded in carrier signal by hiding signal during signal maps, and this way can be at letter
Number planisphere on leave a trace, the most easily by hostility monitoring side find.And how to carry in communication process
The safety of high secret communication and robustness so that communication process does not sees exception as far as possible, and then avoids
Monitor suspection and the attack of end, be an important problem.
Summary of the invention
The embodiment of the present invention provides a kind of physical layer steganography method and system, it is achieved that entering carrier signal
Steganography signal is embedded after row chnnel coding.
The embodiment of the present invention provides a kind of physical layer steganography method, including:
Carrier signal is carried out the carrier signal after chnnel coding is encoded;
Parameter value according at least one parameter following determines steganography level of security: transmitting terminal and receiving terminal
Noise parameter in communication environment, the parameter of described chnnel coding, and the modulation ginseng to the modulation of steganography signal
Number;
Determine that hiding signal is after described coding according to described steganography level of security and preset steganography strategy
Carrier signal in embedded mode;
Generating random sequence, described random sequence is for indicating described hiding signal load after described coding
Embedded location in body signal;
According to described embedded mode and random sequence, the carrier signal after described coding embeds and hide letter
Number obtain steganography signal;
Described steganography signal is modulated and sends.
The embodiment of the present invention provides a kind of physical layer steganography method, including:
The steganography signal that receiving end/sending end sends;
Described steganography signal is demodulated the steganography signal after being demodulated, the steganography letter after described demodulation
Number comprise the hiding signal in the carrier signal after being embedded into coding;
Generate random sequence, in described random sequence instruction described hiding signal carrier signal in encoded
Embedded location;
Obtain the embedded mode in described hiding signal carrier signal in encoded, and described hiding signal
Figure place;
According to described embedded mode, hide figure place and the random sequence steganography letter after described demodulation of signal
Described hiding signal is obtained in number.
The embodiment of the present invention also provides for a kind of physical layer steganography device, including:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following:
Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography
The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit
Steganography strategy determine in hiding signal carrier signal after the coding that described coding unit obtains embedding
Enter mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter
The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate
The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains to be hidden
Signal obtains steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send.
The embodiment of the present invention also provides for a kind of physical layer steganography device, including:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives
Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding
Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding
After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded
Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to information acquisition unit, hides the position of signal
The random sequence that several and described signal generating unit generates steganography letter after the demodulation that described demodulating unit obtains
Described hiding signal is obtained in number.
The embodiment of the present invention also provides for a kind of physical layer steganographic system, including transmitting terminal and receiving terminal, described
Transmitting terminal includes:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following:
Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography
The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit
Steganography strategy determine in hiding signal carrier signal after the coding that described coding unit obtains embedding
Enter mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter
The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate
The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains to be hidden
Signal obtains steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send;
Described receiving terminal includes:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives
Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding
Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding
After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded
Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to information acquisition unit, hides the position of signal
The random sequence that several and described signal generating unit generates steganography letter after the demodulation that described demodulating unit obtains
Described hiding signal is obtained in number.
Visible, in the method for the present embodiment, the transmitting terminal of signal can carry out channel volume to carrier signal
After Ma, determine hiding signal carrier letter in encoded according to steganography level of security and preset steganography strategy
Embedded mode in number, and generate random sequence make it indicate in hiding signal carrier signal in encoded
Embedded location, finally according to embedded mode and random sequence, hiding signal is embedded into the carrier after coding
Obtaining steganography signal in signal, modulation sends.In this sample embodiment when signal is hidden in transmission,
In view of the process of chnnel coding, hiding signal is embedded in the carrier signal after coding transmission, and sends out
Sending end can determine the embedded mode of a kind of safer hiding signal according to steganography strategy so that either
From the capability analysis to signal sequence itself, or the analysis from the bit error rate that receiving terminal is received signal,
Can ensure that hiding signal is not easy to be found under certain conditions, i.e. steganography signal is not easy to be opposed
Meaning is monitored end and is suspected, improves the safety of hiding signal transmission.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below,
Accompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art,
On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of a kind of physical layer steganography method that the embodiment of the present invention provides;
Fig. 2 is the schematic diagram of the carrier signal after the coding that in the embodiment of the present invention, transmitting terminal obtains;
Fig. 3 is the flow chart of the another kind of physical layer steganography method that the embodiment of the present invention provides;
Fig. 4 is communication disclosed in the embodiment of the present invention and the schematic diagram of secret communication;
Fig. 5 a is the curve chart that in the embodiment of the present invention, bit error rate changes along with the signal to noise ratio of channel;
Fig. 5 b is the curve chart that during the present invention implements, capacity changes along with the signal to noise ratio of channel;
Fig. 6 is the signal sequence after the carrier signal after hiding signal is embedded in the embodiment of the present invention coding
The schematic diagram of row;
Fig. 7 is the structural representation of a kind of physical layer steganography device that the embodiment of the present invention provides;
Fig. 8 is the structural representation of the another kind of physical layer steganography device that the embodiment of the present invention provides;
Fig. 9 is the structural representation of the another kind of physical layer steganography device that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, and
It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making
Go out the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", "
Three " (if present) such as " 4th " is for distinguishing similar object, the most suitable without being used for describing
Sequence or precedence.Should be appreciated that the data of so use can be exchanged in the appropriate case, in order to here
The embodiments of the invention described such as can suitable with in addition to those here illustrating or describing
Sequence is implemented.Additionally, term " includes " and " having " and their any deformation, it is intended that cover not
Exclusive comprises, such as, contain series of steps or the process of unit, method, system, product or
Equipment is not necessarily limited to those steps or the unit clearly listed, but can include the most clearly listing
Or for intrinsic other step of these processes, method, product or equipment or unit.
The embodiment of the present invention provides performed by the transmitting terminal of a kind of physical layer steganography method, mainly signal
Method, during steganography signal is transferred to the legitimate receipt end of signal by transmitting terminal, monitors end and can supervise
Listening this transmitting procedure, flow chart is as it is shown in figure 1, include:
Step 101, carries out the carrier signal after chnnel coding is encoded, wherein, carries carrier signal
Body signal can be text signal etc..
It is appreciated that chnnel coding can regard the letter that the point on signal constellation (in digital modulation) figure is embedded into more higher-dimension as
In number space, by coding techniques such as Hamming code, BCH code, convolutional code or block codings, signaling point is embedded
After higher dimensional signal space, distance between points increases, it is provided that corresponding EDC error detection and correction
Ability.
Such as shown in Fig. 2, according to the carrier signal after the coding that the channel coding method of block coding obtains it is
A string binary signal, specifically can be divided into multiple pieces, and each piece is the information of an a length of n > k,
Referred to as coded-bit, further, each piece comprises k information bit, after information bit followed by
(n-k) bit check position, is expressed as Cb(n,k)。
Step 102, determines steganography level of security according to the parameter value of at least one parameter following: transmitting terminal
With the noise parameter in the communication environment of receiving terminal, above-mentioned steps 101 carries out the parameter of chnnel coding, and
Modulation parameter etc. to the modulation of steganography signal.
Specifically, for the noise parameter in the transmitting terminal communication environment with receiving terminal, transmitting terminal can be visited
Survey the channel information between transmitting terminal and receiving terminal, according to the noise figure in channel information estimation communication environment,
If noise figure is more than the first preset noise figure, then steganography level of security is high, if noise figure is less than
The first preset noise figure, then steganography level of security is low.
For the parameter of chnnel coding, transmitting terminal can obtain the letter of the carrier after the coding that chnnel coding obtains
The figure place of the check bit in number, if the figure place of check bit is more than the first preset figure place, steganography safety
Rank is high, if the figure place of check bit is less than the first preset figure place, then steganography level of security is low.
For the modulation parameter of steganography signal modulation, transmitting terminal can obtain the modulation to the modulation of steganography signal
Exponent number, if order of modulation is more than the first preset exponent number, then steganography level of security is high, if modulation
Exponent number is less than the first preset exponent number, then steganography level of security is low.
Step 103, the steganography level of security determined according to step 102 and preset steganography strategy determine hiding
Embedded mode in signal carrier signal in encoded.Wherein, embedded mode is used to refer to hide signal
Scope in carrier signal in encoded, specifically may include that the school of carrier signal in encoded
Test position embedding hiding signal, or the whole code word of carrier signal in encoded embed and hide signal etc..
Preset steganography strategy is usually the corresponding relation of steganography level of security and embedded mode, then transmitting terminal
When determining embedded mode, if steganography level of security is low, need to use safer embedded mode,
Then embedded mode be carrier signal in encoded whole code word in embed hide signal;If steganography is pacified
Full rank be height, can use some embedded mode of poor stability, then embedded mode is in encoded
The check bit of carrier signal embeds hides signal.
It should be noted that transmitting terminal is after determining embedded mode, the embedded mode that can first will determine
And the control information such as the figure place of hiding signal is sent to receiving terminal, in order to receiving terminal can extract accurately
Hiding signal, in this case, transmitting terminal is independently of what steganography signal sent when sending control information.
In another case, these, after determining embedded mode, can first need not be controlled by transmitting terminal
Information is sent to receiving terminal, but by the embedded mode in hiding signal carrier signal in encoded and hidden
Hide before in the carrier signal after the control information such as figure place of signal is embedded into coding several, such as with 2
Position bit mark embedded mode, by the figure place etc. of the hiding signal of 1 bit mark, specifically, can
Hide signal to represent to embed in check bit with 01, represent to embed in whole code word with 11 and hide signal.This
In the case of Zhong, transmitting terminal is placed in steganography signal together sending out with hiding signal when sending control information
Send.
It should be pointed out that, the control information such as the figure place of embedded mode and hiding signal to be placed into steganography letter
Safety sent along with steganography signal in number to send these apparently higher than independent of steganography signal
Control information, therefore, generally, all uses the figure place etc. by embedded mode and hiding signal to control
Information is placed in steganography signal sent along with steganography signal.
Step 104, generates random sequence, and this random sequence is for indicating hiding signal load in encoded
Embedded location in body signal.
Specifically, when generating random sequence, the pseudo random sequence generator of transmitting terminal can utilize root close
Key generates the binary sequence that length is consistent with the carrier signal length after coding, specifically, if generated
Binary sequence in the binary code of a certain position when being " 1 ", then in the carrier signal after coding with
The position that this binary code is corresponding is to hide the embedded location in signal carrier signal in encoded.
Wherein, the pseudo random sequence generator of transmitting terminal (Pseudo-Random Number Generator,
PRNG) identical with the pseudo random sequence generator of receiving terminal, and transmitting terminal and receiving terminal are in generation at random
The root key used during sequence is identical, needs transmitting terminal to consult with receiving terminal, and this root key is for monitoring end
It is unknown.Here root key can be m position binary sequence, and m can be the natural number of 1 to 5.
The random sequence that step 105, the embedded mode determined according to above-mentioned steps 103 and step 104 generate
Carrier signal in encoded embeds hiding signal and obtains steganography signal.
Specifically, transmitting terminal when obtaining steganography signal, can in random sequence with embedded mode indication
The hiding signal shown in the consistent binary sequence of scope in carrier signal in encoded, selected n
Position binary code is the position of 1, and wherein, n is consistent with the figure place of hiding signal;Then by embedding for hiding signal
Enter in position corresponding with selected position in the carrier signal after coding.
Such as, the embedded mode selected by transmitting terminal is the carrier signal after hiding signal is embedded into coding
Whole code word, then in binary sequence all binary codes be the position of 1 be significance bit, can be from effectively
Selected n position in Wei;If the embedded mode selected by transmitting terminal is for be embedded into coding by hiding signal
After the check bit of carrier signal, then in binary sequence, in corresponding check bit, binary code is that the position of 1 is
Significance bit, can select n position from these significance bits.If wherein the figure place of significance bit is more than hidden
When hiding figure place n of signal, time i.e. more than n, n can be selected from binary sequence the most successively
Significance bit.
Further, the carrier signal after the coding that above-mentioned steps 101 obtains includes multidigit binary code,
And above-mentioned selected position is in the primary importance (such as check bit, or whole code word) of random sequence.
Position corresponding with selected position in carrier signal after then hiding signal is embedded into coding by transmitting terminal
Time, if hide in the second position that signal is corresponding with primary importance with the carrier signal after coding two
Ary codes is contrary, by the binary code upset in the second position in the carrier signal after coding, if hidden
The binary code in the second position that signal is corresponding with primary importance with the carrier signal after coding is identical,
The binary code kept in the carrier signal after coding in the second position is constant.Here primary importance refers to
Any one position in random sequence, does not implies that the position coming first.
For example, it is assumed that the carrier signal after Bian Ma is 11011011100111001011, before 6 be information
Position, after 14 be check bit;The random sequence generated is 00010100110010100101, needs to send out
The hiding signal sent is 11.
If the whole code word that embedded mode is the carrier signal after hiding signal is embedded into coding, then with
The 4th, 6,9,10,13,15,18 and 20 of machine sequence is significance bit, according to the carrier after coding
Signal and the corresponding relation of random sequence, determine of the carrier signal after hiding signal is embedded into coding
4 and the 6th (have selected the 4th and the significance bit of the 6th of random sequence), due to the load after coding
The 4th of body signal is 1, identical with hiding signal, then keep the 4th of the carrier signal after coding not
Becoming, the 6th of the carrier signal after coding is 0, contrary with hiding signal, then by the carrier letter after coding
The binary code upset of number the 6th is 1, and finally giving steganography signal is 11011101110111001011.
If the check bit that embedded mode is the carrier signal after hiding signal is embedded into coding, from the 7th
Bit check position starts, then the 9th, 10,13,15,18 and 20 of random sequence is significance bit, determines
The 9th of carrier signal after hiding signal is embedded into coding and the 10th (have selected random sequence
9th and the significance bit of the 10th), owing to the 9th of carrier signal after coding is 1, with hiding signal
Identical, then keep the 9th invariant position of the carrier signal after coding, the 10th of the carrier signal after coding
Being 0, contrary with hiding signal, then being overturn by the binary code of the carrier signal the 10th after coding is 1.
Step 106, is modulated steganography signal and sends.
It should be noted that do not have absolute order to close between above-mentioned steps 101 to 103, and step 104
System, can perform simultaneously, it is also possible to order performs, and Fig. 1 is one of them concrete implementation mode.
Visible, in the method for the present embodiment, the transmitting terminal of signal can carry out channel volume to carrier signal
After Ma, determine hiding signal carrier letter in encoded according to steganography level of security and preset steganography strategy
Embedded mode in number, and generate random sequence make it indicate in hiding signal carrier signal in encoded
Embedded location, finally according to embedded mode and random sequence, hiding signal is embedded into the carrier after coding
Obtaining steganography signal in signal, modulation sends.In this sample embodiment when signal is hidden in transmission,
In view of the process of chnnel coding, hiding signal is embedded in the carrier signal after coding transmission, and sends out
Sending end can determine the embedded mode of a kind of safer hiding signal according to steganography strategy so that either
From the capability analysis to signal sequence itself, or the analysis from the bit error rate that receiving terminal is received signal,
Can ensure that hiding signal is not easy to be found under certain conditions, i.e. steganography signal is not easy to be opposed
Meaning is monitored end and is suspected, improves the safety of hiding signal transmission.
The embodiment of the present invention provides a kind of physical layer steganography method, mainly signal, and legal receiving terminal is held
The method of row, during steganography signal is transferred to the legitimate receipt end of signal by transmitting terminal, monitors end
Can monitor this transmitting procedure, flow chart is as it is shown on figure 3, include:
Step 201, the steganography signal that receiving end/sending end sends.
Step 202, is demodulated the steganography signal after being demodulated, the steganography after demodulation by steganography signal
Signal packet contains the hiding signal in the carrier signal after being embedded into coding.
Step 203, generates random sequence, and this random sequence is for indicating hiding signal load in encoded
Embedded location in body signal.
Specifically, receiving terminal can with the pseudo random sequence generator of receiving terminal utilize root key generate length with
The binary sequence that carrier signal length after coding is consistent;Wherein, the pseudo-random sequence of receiving terminal generates
Device is identical with the pseudo random sequence generator of transmitting terminal, and the root key of transmitting terminal and the root key of receiving terminal
Identical, this root key is unknown for monitoring end.
In actual applications, transmitting terminal and receiving terminal own identical PRNG together
(Pseudo-Random Number Generator, PRNG), if transmitting terminal and receiving terminal consult
Identical root key, it is possible to obtain identical random sequence.The sequence that the maker of this class draws is
Random, the topmost characteristic of such sequence is that source signal based on input produces in a particular manner,
The source signal (the most above-mentioned root key) that i.e. two identical maker inputs are identical, the output sequence obtained
Row are consistent.
Step 204, obtains the embedded mode and hiding signal hidden in signal carrier signal in encoded
Figure place, embedded mode here includes: the check bit of carrier signal in encoded embeds hides signal,
Or the whole code word of carrier signal in encoded embeds hiding signal.
Specifically, transmitting terminal can be before transmission steganography signal, can be by some controls of this steganography signal
Information processed is sent to transmitting terminal, and these control information can include hiding signal carrier signal in encoded
In embedded mode and the information such as figure place of hiding signal.In this case, receiving terminal is obtaining these controls
During information processed, receiving terminal can directly receive end from transmitting terminal.
In another case, transmitting terminal can be by the embedding in hiding signal carrier signal in encoded
The control information such as the figure place of mode and hiding signal be embedded in the carrier signal after coding before several,
I.e. transmitting terminal is placed in steganography signal sent along with hiding signal when sending control information.This
In the case of, receiving terminal, when obtaining these and controlling information, can extract from the steganography signal after demodulation
Arrive.
Step 205, according to embedded mode, hides figure place and the random sequence steganography after demodulation of signal
Signal obtains and hides signal.
Specifically, receiving terminal obtain hide signal time, can in random sequence with embedded mode indication
The hiding signal shown in the consistent binary sequence of scope in carrier signal in encoded, selected n
Position binary code is the position of 1, and wherein, n is consistent with the figure place of hiding signal;Then receiving terminal is from coding
After carrier signal in the position corresponding with selected position extract and obtain n position and hide signal.
Such as, the random sequence that receiving terminal generates is 00010100110010100101, the steganography after demodulation
Signal is 11011101110111001011, before 6 be information bit, after 14 be check bit.If
The embedded mode that receiving terminal gets is the whole code of the carrier signal after hiding signal is embedded into coding
Word, the figure place hiding signal is 2, then the 4th and 6 of random sequence is significance bit, after coding
Carrier signal and the corresponding relation of random sequence, the 4th and the 6th extraction of the steganography signal after demodulation
Obtaining 2 hiding signals is 11.
It should be noted that can be to perform between above-mentioned steps 204 and step 203 simultaneously, it is also possible to be
Order performs, the simply one of which concrete implementation mode shown in Fig. 3.
Visible, in the method for the present embodiment, the transmitting terminal of signal can be according to steganography level of security and preset
Steganography strategy determine the embedded mode in hiding signal carrier signal in encoded, and generate stochastic ordering
Row make it indicate the embedded location in hiding signal carrier signal in encoded, finally according to embedded mode
And random sequence hiding signal is embedded into coding after carrier signal in obtain steganography signal, and by steganography
Signal modulation sends, thus receiving terminal can be after to the steganography signal demodulation received, according to generate
Random sequence, the embedded mode of acquisition and the figure place of hiding signal can obtain from the steganography signal after demodulation
Get hiding signal.In this sample embodiment when signal is hidden in transmission, it is contemplated that the process of chnnel coding,
Hiding signal is embedded in the carrier signal after coding transmission, and transmitting terminal can determine according to steganography strategy
The embedded mode of a kind of safer hiding signal so that either from the ability to signal sequence itself
Analyze, or the analysis from the bit error rate that receiving terminal is received signal, can ensure to hide signal one
Be not easy under conditions of Ding to be found, i.e. steganography signal is not easy to be suspected by hostility monitoring end, improves hidden
Hide the safety of signal transmission.
The method with a concrete application example, the embodiment of the present invention being described below, as shown in Figure 4,
In the present embodiment, the main flow of cordless communication network physical layer includes open communication and secret communication.
Open communication refers to the communication process of carrier signal, sees top half dotted line frame in Fig. 4;Secret communication is
Refer to hide the communication process of signal, see the dotted line frame of the latter half in Fig. 4.Specifically:
Alice is as signal bolter, it is desirable to be obtained in that radio channel information at listener/assailant Eve
In the case of receiving signal, send hiding signal by transmitting terminal to the receiving terminal that recipient Bob uses.
In the present embodiment, carrier signal can be with the signal being the forms such as voice, text or multi-media signal.
Wherein:
Transmitting terminal uses stego-key, and uses the method in the embodiment shown in above-mentioned Fig. 1 by hiding letter
Number ShideIt is embedded into the carrier signal S after codingcoverIn obtain steganography signal sstego, then to steganography
X is obtained after signal modulationstego, and be launched in wireless communications environment;Receiving terminal receives signal
ystegoThe most demodulated obtainCan then proceed in the method in the embodiment shown in above-mentioned Fig. 3
Acquire hiding signalWith the carrier signal after coding
In practical application, transmitting terminal is after using the following two kinds mode that hiding signal is embedded into coding
In carrier signal: (1) is embedded into the information bit in the carrier signal after coding;(2) after being embedded into coding
Carrier signal in check bit.Transmit for employing (1st) and (2) kind mode as shown in figure 5a and 5b
During steganography signal, bit error rate (Bit Error Rate, BER) and capacity are along with the signal to noise ratio of channel
The curve chart that (Signal Noise Ratio, SNR) changes, curve 1 and 2 respectively the most corresponding (2nd) plant with
(1st) plants mode, it is seen then that bit error rate all increases with SNR and reduces, but (1st) plants feelings
Bit error rate in the case of planting with (2nd) under condition wants big;And at SNR relatively low (such as less than 4dB)
When, the capacity in the case of (2nd) kind is bigger.Therefore, (2nd) kind mode is used to transmit steganography
During signal, Performance comparision is good, and the sensitivity being primarily due to information bit is higher than the sensitivity of check bit.
It is illustrated in figure 6 the signal sequence after the carrier signal after hiding signal is embedded into coding, specifically
Ground, the embedded mode of the most corresponding following several ways of Fig. 6 (a) to (e): (1) does not hide signal;
(2) fixed position in the carrier signal after signal is embedded into coding is hidden;(3) signal is hidden random
It is embedded in information bit;(4) hide signal and be randomly-embedded check bit;(5) hide signal to be randomly-embedded
In whole code word.Visible, when hiding information is embedded into a fixed position, hiding signal is brighter
Aobvious, it is easy to causing the suspection of listener Eve, effect is worst, pacify during steganography signal transmits
Full property is worst;And the effect ratio that hiding information is randomly-embedded check bit is embedded into the effective of information bit;
It is best by the effect that hiding information is randomly-embedded in whole code word, is also safest.
The embodiment of the present invention also provides for a kind of physical layer steganography device, is specifically as follows above-mentioned transmitting terminal,
Its structural representation is as it is shown in fig. 7, specifically may include that
Coding unit 10, for carrying out the carrier signal after chnnel coding is encoded to carrier signal.
Rank acquiring unit 11, for determining steganography safe level according to the parameter value of at least one parameter following
Other: transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and right
The modulation parameter etc. of steganography signal modulation.
Specifically, rank acquiring unit 11 specifically for detection transmitting terminal and receiving terminal between channel information,
According to the noise figure in described channel information estimation communication environment, if described noise figure is more than preset the
One noise figure, the most described steganography level of security is high, if described noise figure is less than the first preset noise
Value, the most described steganography level of security is low;And/or, obtain the load after the coding that described chnnel coding obtains
The figure place of the check bit in body signal, if the figure place of described check bit is more than the first preset figure place,
Described steganography level of security is high, if the figure place of described check bit is less than the first preset figure place, then institute
It is low for stating steganography level of security;And/or, obtain the order of modulation to the modulation of described steganography signal, if institute
Stating order of modulation and be more than the first preset exponent number, the most described steganography level of security is high, if described modulation
Exponent number is less than the first preset exponent number, and the most described steganography level of security is low.
Mode determines unit 12, for the steganography level of security and preset obtained according to rank acquiring unit 11
Steganography strategy determine the embedded mode in hiding signal carrier signal after described coding.
Be appreciated that if the carrier signal after the coding that obtains of described coding unit 10 include information bit and
Check bit;Then mode determines that the embedded mode that unit 12 determines includes: embed described hidden in described check bit
Hide in signal, or the whole code word of the carrier signal after described coding and embed described hiding signal.
Specifically, mode determine unit 12 when determining embedded mode, if described steganography level of security is
Low, the most described embedded mode be the carrier signal after described coding whole code word in embed described hide
Signal;If described steganography level of security is high, the most described embedded mode is the carrier after described coding
The check bit of signal embeds described hiding signal.
Sequence generating unit 13, is used for generating random sequence, and described random sequence is used for indicating described hiding
Embedded location in signal carrier signal after described coding.This sequence generating unit 13, specifically for
The pseudo random sequence generator utilizing transmitting terminal utilizes the carrier after root key generation length and described coding
The binary sequence that signal length is consistent;Wherein, the pseudo random sequence generator of described transmitting terminal and reception
The pseudo random sequence generator of end is identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal.
According to described mode, steganography unit 14, for determining that embedded mode that unit 12 determines and sequence generate
The random sequence that unit 13 generates embeds in the carrier signal after the coding that described coding unit 10 obtains
Hiding signal obtains steganography signal.
This steganography unit 14, specifically for hidden with indicated by described embedded mode in described random sequence
Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position
Binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;Hide described
Signal is embedded in the carrier signal after described coding in the position corresponding with described selected position.
Wherein, if the carrier signal after the coding that obtains of described coding unit 10 includes multidigit binary code,
The selected primary importance that position is described random sequence of described steganography unit 14;The most described steganography unit 14,
If specifically in the carrier signal after described hiding signal and described coding with described primary importance pair
The binary code in the second position answered is contrary, is overturn by the binary code in the described second position, if
The second position that described hiding signal is corresponding with described primary importance with the carrier signal after described coding
On binary code identical, keep the binary code in the described second position constant.
Transmitting element 15, for being modulated the steganography signal that described steganography unit 14 obtains and send.
It should be noted that the device of the present embodiment can also include information process unit 16, in side
After formula determines that unit 12 determines embedded mode, by described hiding signal carrier signal after described coding
In embedded mode and the figure place of described hiding signal be sent to receiving terminal, or, described hiding signal is existed
The embedded mode in carrier signal and the figure place of described hiding signal after described coding are embedded into described volume
Before in carrier signal after Ma several.
Visible, in the device of the present embodiment, coding signal 10 after carrier signal is carried out chnnel coding,
Mode determines according to steganography level of security and preset steganography strategy, unit 12 determines that hiding signal is at coding
After carrier signal in embedded mode, and sequence generating unit 13 generates random sequence, and to make it indicate hiding
Embedded location in signal carrier signal in encoded, last steganography unit 14 according to random sequence and with
Machine sequence hiding signal is embedded into coding after carrier signal in obtain steganography signal, and by transmitting element
The modulation of steganography signal is sent by 15.In this sample embodiment when signal is hidden in transmission, it is contemplated that letter
The process of road coding, is embedded in the carrier signal after coding transmission by hiding signal, and transmitting terminal can root
The embedded mode of a kind of safer hiding signal is determined so that either to signal according to steganography strategy
The capability analysis of sequence itself, or the analysis from the bit error rate that receiving terminal receives signal, can protect
Card is hidden signal and is not easy under certain conditions to be found, i.e. steganography signal is not easy to be monitored end by hostility
Suspect, improve the safety of hiding signal transmission.
The embodiment of the present invention also provides for a kind of physical layer steganography device, is specifically as follows above-mentioned receiving terminal,
Its structural representation as shown in Figure 8, specifically may include that
Receive unit 21, the steganography signal sent for receiving end/sending end.
Demodulating unit 22, for being demodulated being demodulated by the steganography signal that described reception unit 21 receives
After steganography signal, the steganography signal packet after described demodulation is hidden containing be embedded in the carrier signal after coding
Hide signal.
Signal generating unit 23, is used for generating random sequence, and described random sequence indicates described hiding signal compiling
The embedded location in carrier signal after Ma, specifically, described signal generating unit 23, connect specifically for utilizing
The pseudo random sequence generator of receiving end utilizes the carrier signal after root key generation length and described coding long
Spend consistent binary sequence;Wherein, the pseudo random sequence generator of described receiving terminal and the puppet of transmitting terminal
Random sequence generator is identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal.
Information acquisition unit 24, for obtaining the embedded mode in hiding signal carrier signal in encoded
And the figure place of described hiding signal.Here embedded mode includes: the verification of carrier signal in encoded
Position embeds to hide to embed in signal, or the whole code word of carrier signal in encoded and hides signal.
Specifically, transmitting terminal can be before transmission steganography signal, can be by some controls of this steganography signal
Information processed is sent to transmitting terminal, and these control information can include hiding signal carrier signal in encoded
In embedded mode and the information such as figure place of hiding signal.So information acquisition unit 24 is obtaining these controls
During information processed, receiving terminal can directly receive end from transmitting terminal.
In another case, transmitting terminal can be by the embedding in hiding signal carrier signal in encoded
The control information such as the figure place of mode and hiding signal be embedded in the carrier signal after coding before several,
I.e. transmitting terminal is placed in steganography signal sent along with hiding signal when sending control information.This
In the case of, information acquisition unit 24, can be from the steganography signal after demodulation when obtaining these and controlling information
Middle extraction obtains.
Signal acquiring unit 25, for the embedded mode obtained according to described information acquisition unit 24, hides
The random sequence that the figure place of signal and signal generating unit 23 generate is after the demodulation that described demodulating unit 22 obtains
Steganography signal in obtain described hiding signal.
In the device of the present embodiment, signal acquiring unit 25 is understood after to the steganography signal demodulation received,
The embedded mode that can obtain according to information acquisition unit 24, figure place and the signal generating unit 23 of hiding signal are raw
Random sequence is become to get hiding signal from the steganography signal after demodulation.Transmitting terminal in this sample embodiment
When signal is hidden in transmission, it is contemplated that the process of chnnel coding, hiding signal is embedded into the load after coding
Body signal transmits, and transmitting terminal can determine the embedding of a kind of safer hiding signal according to steganography strategy
Enter mode so that either from the capability analysis to signal sequence itself, or receive letter to receiving terminal
Number the analysis of the bit error rate, can ensure that hiding signal is not easy to be found, i.e. under certain conditions
Steganography signal is not easy to be monitored end by hostility and suspects, improves the safety of hiding signal transmission.
The embodiment of the present invention also provides for a kind of physical layer steganography device, its structural representation as it is shown in figure 9,
This physical layer steganography device can produce bigger difference because of configuration or performance difference, can include one
Or more than one central processing unit (central processing units, CPU) 30 (such as, or
Individual above processor) and memorizer 31, one or more storage application programs 321 or data 322
Storage medium 32 (such as one or more mass memory units).Wherein, memorizer 31 and storage
Medium 32 can be of short duration storage or persistently store.The program being stored in storage medium 32 can include one
Or more than one module (diagram does not marks), each module can include in physical layer steganography device
A series of command operatings.Further, central processing unit 30 could be arranged to communicate with storage medium 32,
Physical layer steganography device performs a series of command operatings in storage medium 32.
Physical layer steganography device can also include one or more power supplys 33, and one or more have
Line or radio network interface 34, one or more input/output interfaces 35, and/or, one or one
Above operating system 323, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM,
FreeBSDTM etc..
Described in said method embodiment can be based on this by the step performed by transmitting terminal or receiving terminal
The structure of the physical layer steganography device shown in Fig. 9.
The embodiment of the present invention also provides for a kind of physical layer steganographic system, mainly includes transmitting terminal and receiving terminal,
Wherein the structure of transmitting terminal can the structure of physical layer steganography device as shown in Fig. 7 or Fig. 9, receiving terminal
Structure can the structure of physical layer steganography device as shown in Fig. 8 or Fig. 9, do not repeat at this.
It should be noted that physical layer steganography method and system mainly can be answered in the above embodiment of the present invention
In following field:
1, for government organs, every relate to confidential corespondence (as national defense safety, military secrecy,
Weapon research, Aero-Space navigation state-of-the-art technology) place.
2, for almost all of enterprises and institutions, every relate to trade secret message file (as
Patent, production procedure, material prescription, commercial contract, customer information etc.) transmission be directed to secrecy
Communication.
3, for personally for, from protection privacy (such as identity information, medical treatment and insurance information, bank
Speech text information during accounts information, personal communication) angle set out, according to everyone to privacy
Expectation degree of protection all can carry out secret communication.
One of ordinary skill in the art will appreciate that in the various methods of above-described embodiment is all or part of
Step can be by program and completes to instruct relevant hardware, and this program can be stored in a computer
In readable storage medium storing program for executing, storage medium may include that read only memory (ROM), random access memory
Device RAM), disk or CD etc..
The physical layer steganography method provided the embodiment of the present invention above and system are described in detail,
Principle and the embodiment of the present invention are set forth by specific case used herein, above example
Explanation be only intended to help to understand method and the core concept thereof of the present invention;Simultaneously for this area
Those skilled in the art, according to the thought of the present invention, the most all have and change
In place of change, in sum, this specification content should not be construed as limitation of the present invention.
Claims (10)
1. a physical layer steganography method, it is characterised in that including:
Carrier signal is carried out the carrier signal after chnnel coding is encoded;
Parameter value according at least one parameter following determines steganography level of security: transmitting terminal and receiving terminal
Noise parameter in communication environment, the parameter of described chnnel coding, and the modulation ginseng to the modulation of steganography signal
Number;
Determine that hiding signal is after described coding according to described steganography level of security and preset steganography strategy
Embedded mode in carrier signal;
Generating random sequence, described random sequence is for indicating described hiding signal load after described coding
Embedded location in body signal;
According to described embedded mode and random sequence, the carrier signal after described coding embeds and hide signal
Obtain steganography signal;
Described steganography signal is modulated and sends.
2. the method for claim 1, it is characterised in that described basis at least one parameter following
Determine steganography level of security: transmitting terminal and the noise parameter in the communication environment of receiving terminal, described channel is compiled
The parameter of code, and the modulation parameter to the modulation of steganography signal, specifically include:
Channel information between detection transmitting terminal and receiving terminal, estimates communication environment according to described channel information
In noise figure, if described noise figure is more than preset the first noise figure, the most described steganography level of security
For height, if described noise figure is less than the first preset noise figure, the most described steganography level of security is low;
And/or,
Obtain the figure place of check bit in the carrier signal after the coding that described chnnel coding obtains, if institute
When stating the figure place of check bit more than preset first figure place, described steganography level of security be height, if described
The figure place of check bit is less than the first preset figure place, and the most described steganography level of security is low;
And/or,
Obtain the order of modulation to the modulation of described steganography signal, if described order of modulation is more than preset the
One exponent number, the most described steganography level of security is high, if described order of modulation is less than the first preset exponent number,
The most described steganography level of security is low;
Described determine that hiding signal is at described coding according to described steganography level of security and preset steganography strategy
After carrier signal in embedded mode, specifically include:
If described steganography level of security is low, the most described embedded mode is the carrier letter after described coding
Number whole code word in embed described hiding signal;If described steganography level of security is height, described embedding
Mode is that the check bit of the carrier signal after described coding embeds described hiding signal.
3. method as claimed in claim 1 or 2, it is characterised in that
Described random sequence is binary sequence, and described generation random sequence specifically includes: the puppet of transmitting terminal
Random sequence generator utilizes two that root key generation length is consistent with the carrier signal length after described coding
System sequence;Wherein, the pseudo random sequence generator of described transmitting terminal and the pseudo-random sequence of receiving terminal are raw
Grow up to be a useful person identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal;
Described embedding in carrier signal after described coding according to described embedded mode and random sequence is hidden
Signal obtains steganography signal, specifically includes: in described random sequence with described embedded mode indicated by
Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position
Binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;Hide described
Signal is embedded in the carrier signal after described coding in the position corresponding with described selected position;
Carrier signal after described coding include multidigit binary code, described selected position be described at random
The primary importance of sequence;In the most described carrier signal described hiding signal being embedded into after described coding with
The position that described selected position is corresponding specifically includes: if after described hiding signal and described coding
The binary code in the second position corresponding with described primary importance in carrier signal is contrary, by described second
Binary code upset on position, if in the carrier signal after described hiding signal and described coding with institute
State the binary code in the second position that primary importance is corresponding identical, keep in the described second position two to enter
Code processed is constant.
4. a physical layer steganography method, it is characterised in that including:
The steganography signal that receiving end/sending end sends;
Described steganography signal is demodulated the steganography signal after being demodulated, the steganography letter after described demodulation
Number comprise the hiding signal in the carrier signal after being embedded into coding;
Generate random sequence, in described random sequence instruction described hiding signal carrier signal in encoded
Embedded location;
Obtain the embedded mode in described hiding signal carrier signal in encoded and described hiding signal
Figure place;
According to described embedded mode, hide figure place and the random sequence steganography letter after described demodulation of signal
Described hiding signal is obtained in number.
5. method as claimed in claim 4, it is characterised in that described generation random sequence specifically includes:
Carrier after the pseudo random sequence generator of receiving terminal utilizes root key to generate length and described coding is believed
Number binary sequence that length is consistent;Wherein, the pseudo random sequence generator of described receiving terminal and transmitting terminal
Pseudo random sequence generator identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal;
Described according to described embedded mode, hide hidden after described demodulation of the figure place of signal and random sequence
Write signal obtains described hiding signal, specifically includes: with described embedded mode in described random sequence
In the binary sequence that the scope in carrier signal after coding described in indicated hiding signal place is consistent,
Selected n position binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;From institute
State position corresponding with described selected position in the carrier signal after coding to extract and obtain that n position is described to hide
Signal.
6. a physical layer steganography device, it is characterised in that including:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following:
Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography
The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit
Steganography strategy determine the embedding in hiding signal carrier signal after the coding that described coding unit obtains
Mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter
The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate
The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains hides letter
Number obtain steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send.
7. device as claimed in claim 6, it is characterised in that
Described rank acquiring unit specifically for detection transmitting terminal and receiving terminal between channel information, according to
Noise figure in described channel information estimation communication environment, if described noise figure is made an uproar more than preset first
Sound value, the most described steganography level of security is high, if described noise figure is less than the first preset noise figure,
The most described steganography level of security is low;And/or, obtain the letter of the carrier after the coding that described chnnel coding obtains
The figure place of the check bit in number, if the figure place of described check bit is more than the first preset figure place, described
Steganography level of security is high, if the figure place of described check bit is less than the first preset figure place, the most described hidden
It is low for writing level of security;And/or, obtain the order of modulation to the modulation of described steganography signal, if described tune
Exponent number processed is more than the first preset exponent number, and the most described steganography level of security is high, if described order of modulation
Less than the first preset exponent number, the most described steganography level of security is low;
Described mode determines unit, if being low specifically for described steganography level of security, and the most described embedding
Mode be the carrier signal after described coding whole code word in embed described hiding signal;If it is described
Steganography level of security is high, and the most described embedded mode is that the check bit of the carrier signal after described coding is embedding
Enter described hiding signal.
Device the most as claimed in claims 6 or 7, it is characterised in that
Described sequence generating unit, specifically for utilizing the pseudo random sequence generator of transmitting terminal to utilize root close
Key generates the binary sequence that length is consistent with the carrier signal length after described coding;Wherein, described
The pseudo random sequence generator of sending end is identical with the pseudo random sequence generator of receiving terminal, and described transmitting terminal
Root key identical with the root key of receiving terminal;
Described steganography unit, specifically for hidden with indicated by described embedded mode in described random sequence
Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position two
Ary codes is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;By described hiding letter
Number it is embedded in position corresponding with described selected position in the carrier signal after described coding;
Carrier signal after the coding that described coding unit obtains includes multidigit binary code, described steganography list
The primary importance that position is described random sequence that unit is selected;Described steganography unit, if specifically for institute
State in the second position that hiding signal is corresponding with described primary importance with the carrier signal after described coding
Binary code is contrary, is overturn by the binary code in the described second position, if described hiding signal and institute
State the binary code in the second position corresponding with described primary importance in the carrier signal after coding identical,
Keep the binary code in the described second position constant.
9. a physical layer steganography device, it is characterised in that including:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives
Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding
Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding
After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded
Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to described information acquisition unit, described hiding
The random sequence that the figure place of signal and described signal generating unit generate is after the demodulation that described demodulating unit obtains
Steganography signal obtains described hiding signal.
10. device as claimed in claim 9, it is characterised in that
Described signal generating unit, specifically for utilizing the pseudo random sequence generator of receiving terminal to utilize root key raw
Become the binary sequence that length is consistent with the carrier signal length after described coding;Wherein, described receiving terminal
Pseudo random sequence generator identical with the pseudo random sequence generator of transmitting terminal, and the root of described transmitting terminal
Key is identical with the root key of receiving terminal;
Described signal acquiring unit, specifically in described random sequence with described embedded mode indicated by
Hiding signal place described in the consistent binary sequence of scope in carrier signal after coding, selected n
Position binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;From described volume
Position corresponding with described selected position in carrier signal after Ma is extracted and is obtained described hiding signal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610177470.4A CN105846994B (en) | 2016-03-24 | 2016-03-24 | A kind of physical layer steganography method and system |
PCT/CN2016/079801 WO2017161616A1 (en) | 2016-03-24 | 2016-04-20 | Physical layer steganography method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610177470.4A CN105846994B (en) | 2016-03-24 | 2016-03-24 | A kind of physical layer steganography method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105846994A true CN105846994A (en) | 2016-08-10 |
CN105846994B CN105846994B (en) | 2018-11-27 |
Family
ID=56583875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610177470.4A Expired - Fee Related CN105846994B (en) | 2016-03-24 | 2016-03-24 | A kind of physical layer steganography method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105846994B (en) |
WO (1) | WO2017161616A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819568A (en) * | 2017-11-15 | 2018-03-20 | 深圳大学 | Information detecting method, device and receiving device based on constellation point distance |
CN108966211A (en) * | 2017-09-30 | 2018-12-07 | 深圳大学 | The wireless communication physical layer slope authentication method and device of safety |
CN109068284A (en) * | 2018-09-28 | 2018-12-21 | 深圳大学 | The physical layer authentication method and system connected based on group between internet of things equipment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111917527B (en) * | 2020-06-01 | 2022-06-10 | 常州机电职业技术学院 | Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof |
CN113923312B (en) * | 2021-09-28 | 2024-01-30 | 东南大学 | Robust reversible watermarking method of digital image coding layer based on wireless communication |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1866818A (en) * | 2006-06-19 | 2006-11-22 | 广东省电子技术研究所 | Hiding mode of hidden signal in embedded host signal |
CN101080013A (en) * | 2007-06-19 | 2007-11-28 | 中山大学 | A JPEG lossless compression image hide writing method based on predictive coding |
CN101374230A (en) * | 2008-06-02 | 2009-02-25 | 裘炅 | Method and apparatus for identifying radio frequency information and embedded instrumentality for wireless transmission |
CN101478391A (en) * | 2009-01-13 | 2009-07-08 | 华中科技大学 | IP voice hidden communication method based on stream encryption |
CN103139191A (en) * | 2011-11-25 | 2013-06-05 | 北京千橡网景科技发展有限公司 | Network authentication method and network authentication equipment |
CN103476026A (en) * | 2013-09-06 | 2013-12-25 | 中国科学院软件研究所 | Self-adaption covert communication method based on satellite channel coding |
WO2014028757A1 (en) * | 2012-08-15 | 2014-02-20 | Ultra Electronics, ProLogic | Secure data exchange using messaging service |
CN104064193A (en) * | 2013-03-21 | 2014-09-24 | 中国科学院声学研究所 | Information hiding method and extraction method for linear prediction voice coding |
CN104091597A (en) * | 2014-06-26 | 2014-10-08 | 华侨大学 | IP voice steganography method based on speed modulation |
-
2016
- 2016-03-24 CN CN201610177470.4A patent/CN105846994B/en not_active Expired - Fee Related
- 2016-04-20 WO PCT/CN2016/079801 patent/WO2017161616A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1866818A (en) * | 2006-06-19 | 2006-11-22 | 广东省电子技术研究所 | Hiding mode of hidden signal in embedded host signal |
CN101080013A (en) * | 2007-06-19 | 2007-11-28 | 中山大学 | A JPEG lossless compression image hide writing method based on predictive coding |
CN101374230A (en) * | 2008-06-02 | 2009-02-25 | 裘炅 | Method and apparatus for identifying radio frequency information and embedded instrumentality for wireless transmission |
CN101478391A (en) * | 2009-01-13 | 2009-07-08 | 华中科技大学 | IP voice hidden communication method based on stream encryption |
CN103139191A (en) * | 2011-11-25 | 2013-06-05 | 北京千橡网景科技发展有限公司 | Network authentication method and network authentication equipment |
WO2014028757A1 (en) * | 2012-08-15 | 2014-02-20 | Ultra Electronics, ProLogic | Secure data exchange using messaging service |
CN104064193A (en) * | 2013-03-21 | 2014-09-24 | 中国科学院声学研究所 | Information hiding method and extraction method for linear prediction voice coding |
CN103476026A (en) * | 2013-09-06 | 2013-12-25 | 中国科学院软件研究所 | Self-adaption covert communication method based on satellite channel coding |
CN104091597A (en) * | 2014-06-26 | 2014-10-08 | 华侨大学 | IP voice steganography method based on speed modulation |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108966211A (en) * | 2017-09-30 | 2018-12-07 | 深圳大学 | The wireless communication physical layer slope authentication method and device of safety |
CN108966211B (en) * | 2017-09-30 | 2021-08-06 | 深圳大学 | Secure wireless communication physical layer slope authentication method and device |
CN107819568A (en) * | 2017-11-15 | 2018-03-20 | 深圳大学 | Information detecting method, device and receiving device based on constellation point distance |
CN107819568B (en) * | 2017-11-15 | 2020-11-03 | 深圳大学 | Information detection method and device based on constellation point distance and receiving equipment |
CN109068284A (en) * | 2018-09-28 | 2018-12-21 | 深圳大学 | The physical layer authentication method and system connected based on group between internet of things equipment |
CN109068284B (en) * | 2018-09-28 | 2021-05-25 | 深圳大学 | Physical layer authentication method and system based on group connection among Internet of things devices |
Also Published As
Publication number | Publication date |
---|---|
WO2017161616A1 (en) | 2017-09-28 |
CN105846994B (en) | 2018-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105846994A (en) | Physical layer steganography method and physical layer steganography system | |
CN109688160B (en) | Data encryption transmission control method and device, computer equipment and storage medium | |
US8978152B1 (en) | Decentralized token table generation | |
CN106650869B (en) | Information hiding method based on two-dimensional code | |
CN104935429A (en) | Data processing method and system employing multi-encryption technology | |
CN110457873B (en) | Watermark embedding and detecting method and device | |
CN110390191A (en) | Method and system for safe biologic identification verifying | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
CN104951680A (en) | Biological characteristic information processing method, storage method and device | |
CN110224811B (en) | Internet of things encryption processing method, device and system | |
Kulkarni et al. | Preserving privacy in sensor-fog networks | |
CN107017960B (en) | A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code | |
CN105260981A (en) | Optimal coupling image steganography method based on packet replacement | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
CN107332664A (en) | A kind of hidden water sound communication technique of Double-protection mechanism | |
CN105959104A (en) | Steganalysis method based on Hamming distance distribution | |
Bhalshankar et al. | Audio steganography: LSB technique using a pyramid structure and range of bytes | |
CN106034122A (en) | Information processing method, electronic equipment and server | |
CN102737639B (en) | Safety communication method for voice information | |
KR20150132467A (en) | Privacy preserving knowledge/factor possession tests for persistent authentication | |
CN106230589A (en) | A kind of reverse key machinery of consultation based on low density parity check code | |
CN105703900B (en) | A kind of physical layer steganography transmission method and system | |
CN102938888B (en) | Secret document steganography and extraction method suitable for wireless communication environment | |
CN110941854B (en) | Method and device for saving and recovering private data based on secure multi-party computing | |
CN104159118A (en) | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20181127 Termination date: 20190324 |