CN105846994A - Physical layer steganography method and physical layer steganography system - Google Patents

Physical layer steganography method and physical layer steganography system Download PDF

Info

Publication number
CN105846994A
CN105846994A CN201610177470.4A CN201610177470A CN105846994A CN 105846994 A CN105846994 A CN 105846994A CN 201610177470 A CN201610177470 A CN 201610177470A CN 105846994 A CN105846994 A CN 105846994A
Authority
CN
China
Prior art keywords
signal
steganography
coding
hiding
carrier signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610177470.4A
Other languages
Chinese (zh)
Other versions
CN105846994B (en
Inventor
谢宁
张莉
黄继武
王晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201610177470.4A priority Critical patent/CN105846994B/en
Priority to PCT/CN2016/079801 priority patent/WO2017161616A1/en
Publication of CN105846994A publication Critical patent/CN105846994A/en
Application granted granted Critical
Publication of CN105846994B publication Critical patent/CN105846994B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

An embodiment of the invention discloses a physical layer steganography method and a physical layer steganography system, wherein the physical layer steganography method and the physical layer steganography system are applied in the field of communication technology. According to the physical layer steganography method, after a signal transmitting end performs channel coding on a carrier signal, the embedding manner of a hidden signal in the coded carrier signal is determined according to a steganography safety grade and a preset strategy, and a random sequence is generated so that the random sequence indicates the embedding position of the hidden signal in the coded carrier signal; and finally a steganography signal is obtained through embedding the hidden signal into the coded carrier signal according to the embedding manner and the random sequence, and then the steganography signal is modulated and transmitted to outside. Therefore in transmission of the hidden signal, in consideration of the channel coding process, the hidden signal is embedded into the coded carrier signal for transmission, and furthermore the signal transmitting end determines a relatively safe hidden signal embedding manner so that the steganography signal is not suspected by a hostile monitoring end, thereby improving transmission safety of the hidden signal.

Description

A kind of physical layer steganography method and system
Technical field
The present invention relates to communication technical field, particularly to a kind of physical layer steganography method and system.
Background technology
The transmitting terminal steganography by physical layer, by carrier signal, stego-key and chnnel coding, The situation of a part of information (such as receiving signal, channel coding method) can be obtained at monitoring end Lower receiving terminal that hiding signal is transferred to, and during this, monitoring end will not suspect hiding signal/channel Exist, thus hiding signal is not attacked and revised, it is ensured that the safety in steganography signals transmission Property and robustness.
A kind of transmission method of existing steganography signal is that hiding signal is embedded into adding of carrier signal In position (also referred to as filler) and Cyclic Prefix, but owing to extra order and Cyclic Prefix are typically all fixing Value, steganography signal transmit during be easy to cause the suspection of hostility monitoring side.Another kind of transmission Method is to be embedded in carrier signal by hiding signal during signal maps, and this way can be at letter Number planisphere on leave a trace, the most easily by hostility monitoring side find.And how to carry in communication process The safety of high secret communication and robustness so that communication process does not sees exception as far as possible, and then avoids Monitor suspection and the attack of end, be an important problem.
Summary of the invention
The embodiment of the present invention provides a kind of physical layer steganography method and system, it is achieved that entering carrier signal Steganography signal is embedded after row chnnel coding.
The embodiment of the present invention provides a kind of physical layer steganography method, including:
Carrier signal is carried out the carrier signal after chnnel coding is encoded;
Parameter value according at least one parameter following determines steganography level of security: transmitting terminal and receiving terminal Noise parameter in communication environment, the parameter of described chnnel coding, and the modulation ginseng to the modulation of steganography signal Number;
Determine that hiding signal is after described coding according to described steganography level of security and preset steganography strategy Carrier signal in embedded mode;
Generating random sequence, described random sequence is for indicating described hiding signal load after described coding Embedded location in body signal;
According to described embedded mode and random sequence, the carrier signal after described coding embeds and hide letter Number obtain steganography signal;
Described steganography signal is modulated and sends.
The embodiment of the present invention provides a kind of physical layer steganography method, including:
The steganography signal that receiving end/sending end sends;
Described steganography signal is demodulated the steganography signal after being demodulated, the steganography letter after described demodulation Number comprise the hiding signal in the carrier signal after being embedded into coding;
Generate random sequence, in described random sequence instruction described hiding signal carrier signal in encoded Embedded location;
Obtain the embedded mode in described hiding signal carrier signal in encoded, and described hiding signal Figure place;
According to described embedded mode, hide figure place and the random sequence steganography letter after described demodulation of signal Described hiding signal is obtained in number.
The embodiment of the present invention also provides for a kind of physical layer steganography device, including:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following: Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit Steganography strategy determine in hiding signal carrier signal after the coding that described coding unit obtains embedding Enter mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains to be hidden Signal obtains steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send.
The embodiment of the present invention also provides for a kind of physical layer steganography device, including:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to information acquisition unit, hides the position of signal The random sequence that several and described signal generating unit generates steganography letter after the demodulation that described demodulating unit obtains Described hiding signal is obtained in number.
The embodiment of the present invention also provides for a kind of physical layer steganographic system, including transmitting terminal and receiving terminal, described Transmitting terminal includes:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following: Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit Steganography strategy determine in hiding signal carrier signal after the coding that described coding unit obtains embedding Enter mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains to be hidden Signal obtains steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send;
Described receiving terminal includes:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to information acquisition unit, hides the position of signal The random sequence that several and described signal generating unit generates steganography letter after the demodulation that described demodulating unit obtains Described hiding signal is obtained in number.
Visible, in the method for the present embodiment, the transmitting terminal of signal can carry out channel volume to carrier signal After Ma, determine hiding signal carrier letter in encoded according to steganography level of security and preset steganography strategy Embedded mode in number, and generate random sequence make it indicate in hiding signal carrier signal in encoded Embedded location, finally according to embedded mode and random sequence, hiding signal is embedded into the carrier after coding Obtaining steganography signal in signal, modulation sends.In this sample embodiment when signal is hidden in transmission, In view of the process of chnnel coding, hiding signal is embedded in the carrier signal after coding transmission, and sends out Sending end can determine the embedded mode of a kind of safer hiding signal according to steganography strategy so that either From the capability analysis to signal sequence itself, or the analysis from the bit error rate that receiving terminal is received signal, Can ensure that hiding signal is not easy to be found under certain conditions, i.e. steganography signal is not easy to be opposed Meaning is monitored end and is suspected, improves the safety of hiding signal transmission.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below, Accompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of a kind of physical layer steganography method that the embodiment of the present invention provides;
Fig. 2 is the schematic diagram of the carrier signal after the coding that in the embodiment of the present invention, transmitting terminal obtains;
Fig. 3 is the flow chart of the another kind of physical layer steganography method that the embodiment of the present invention provides;
Fig. 4 is communication disclosed in the embodiment of the present invention and the schematic diagram of secret communication;
Fig. 5 a is the curve chart that in the embodiment of the present invention, bit error rate changes along with the signal to noise ratio of channel;
Fig. 5 b is the curve chart that during the present invention implements, capacity changes along with the signal to noise ratio of channel;
Fig. 6 is the signal sequence after the carrier signal after hiding signal is embedded in the embodiment of the present invention coding The schematic diagram of row;
Fig. 7 is the structural representation of a kind of physical layer steganography device that the embodiment of the present invention provides;
Fig. 8 is the structural representation of the another kind of physical layer steganography device that the embodiment of the present invention provides;
Fig. 9 is the structural representation of the another kind of physical layer steganography device that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, and It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making Go out the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " Three " (if present) such as " 4th " is for distinguishing similar object, the most suitable without being used for describing Sequence or precedence.Should be appreciated that the data of so use can be exchanged in the appropriate case, in order to here The embodiments of the invention described such as can suitable with in addition to those here illustrating or describing Sequence is implemented.Additionally, term " includes " and " having " and their any deformation, it is intended that cover not Exclusive comprises, such as, contain series of steps or the process of unit, method, system, product or Equipment is not necessarily limited to those steps or the unit clearly listed, but can include the most clearly listing Or for intrinsic other step of these processes, method, product or equipment or unit.
The embodiment of the present invention provides performed by the transmitting terminal of a kind of physical layer steganography method, mainly signal Method, during steganography signal is transferred to the legitimate receipt end of signal by transmitting terminal, monitors end and can supervise Listening this transmitting procedure, flow chart is as it is shown in figure 1, include:
Step 101, carries out the carrier signal after chnnel coding is encoded, wherein, carries carrier signal Body signal can be text signal etc..
It is appreciated that chnnel coding can regard the letter that the point on signal constellation (in digital modulation) figure is embedded into more higher-dimension as In number space, by coding techniques such as Hamming code, BCH code, convolutional code or block codings, signaling point is embedded After higher dimensional signal space, distance between points increases, it is provided that corresponding EDC error detection and correction Ability.
Such as shown in Fig. 2, according to the carrier signal after the coding that the channel coding method of block coding obtains it is A string binary signal, specifically can be divided into multiple pieces, and each piece is the information of an a length of n > k, Referred to as coded-bit, further, each piece comprises k information bit, after information bit followed by (n-k) bit check position, is expressed as Cb(n,k)。
Step 102, determines steganography level of security according to the parameter value of at least one parameter following: transmitting terminal With the noise parameter in the communication environment of receiving terminal, above-mentioned steps 101 carries out the parameter of chnnel coding, and Modulation parameter etc. to the modulation of steganography signal.
Specifically, for the noise parameter in the transmitting terminal communication environment with receiving terminal, transmitting terminal can be visited Survey the channel information between transmitting terminal and receiving terminal, according to the noise figure in channel information estimation communication environment, If noise figure is more than the first preset noise figure, then steganography level of security is high, if noise figure is less than The first preset noise figure, then steganography level of security is low.
For the parameter of chnnel coding, transmitting terminal can obtain the letter of the carrier after the coding that chnnel coding obtains The figure place of the check bit in number, if the figure place of check bit is more than the first preset figure place, steganography safety Rank is high, if the figure place of check bit is less than the first preset figure place, then steganography level of security is low.
For the modulation parameter of steganography signal modulation, transmitting terminal can obtain the modulation to the modulation of steganography signal Exponent number, if order of modulation is more than the first preset exponent number, then steganography level of security is high, if modulation Exponent number is less than the first preset exponent number, then steganography level of security is low.
Step 103, the steganography level of security determined according to step 102 and preset steganography strategy determine hiding Embedded mode in signal carrier signal in encoded.Wherein, embedded mode is used to refer to hide signal Scope in carrier signal in encoded, specifically may include that the school of carrier signal in encoded Test position embedding hiding signal, or the whole code word of carrier signal in encoded embed and hide signal etc..
Preset steganography strategy is usually the corresponding relation of steganography level of security and embedded mode, then transmitting terminal When determining embedded mode, if steganography level of security is low, need to use safer embedded mode, Then embedded mode be carrier signal in encoded whole code word in embed hide signal;If steganography is pacified Full rank be height, can use some embedded mode of poor stability, then embedded mode is in encoded The check bit of carrier signal embeds hides signal.
It should be noted that transmitting terminal is after determining embedded mode, the embedded mode that can first will determine And the control information such as the figure place of hiding signal is sent to receiving terminal, in order to receiving terminal can extract accurately Hiding signal, in this case, transmitting terminal is independently of what steganography signal sent when sending control information.
In another case, these, after determining embedded mode, can first need not be controlled by transmitting terminal Information is sent to receiving terminal, but by the embedded mode in hiding signal carrier signal in encoded and hidden Hide before in the carrier signal after the control information such as figure place of signal is embedded into coding several, such as with 2 Position bit mark embedded mode, by the figure place etc. of the hiding signal of 1 bit mark, specifically, can Hide signal to represent to embed in check bit with 01, represent to embed in whole code word with 11 and hide signal.This In the case of Zhong, transmitting terminal is placed in steganography signal together sending out with hiding signal when sending control information Send.
It should be pointed out that, the control information such as the figure place of embedded mode and hiding signal to be placed into steganography letter Safety sent along with steganography signal in number to send these apparently higher than independent of steganography signal Control information, therefore, generally, all uses the figure place etc. by embedded mode and hiding signal to control Information is placed in steganography signal sent along with steganography signal.
Step 104, generates random sequence, and this random sequence is for indicating hiding signal load in encoded Embedded location in body signal.
Specifically, when generating random sequence, the pseudo random sequence generator of transmitting terminal can utilize root close Key generates the binary sequence that length is consistent with the carrier signal length after coding, specifically, if generated Binary sequence in the binary code of a certain position when being " 1 ", then in the carrier signal after coding with The position that this binary code is corresponding is to hide the embedded location in signal carrier signal in encoded.
Wherein, the pseudo random sequence generator of transmitting terminal (Pseudo-Random Number Generator, PRNG) identical with the pseudo random sequence generator of receiving terminal, and transmitting terminal and receiving terminal are in generation at random The root key used during sequence is identical, needs transmitting terminal to consult with receiving terminal, and this root key is for monitoring end It is unknown.Here root key can be m position binary sequence, and m can be the natural number of 1 to 5.
The random sequence that step 105, the embedded mode determined according to above-mentioned steps 103 and step 104 generate Carrier signal in encoded embeds hiding signal and obtains steganography signal.
Specifically, transmitting terminal when obtaining steganography signal, can in random sequence with embedded mode indication The hiding signal shown in the consistent binary sequence of scope in carrier signal in encoded, selected n Position binary code is the position of 1, and wherein, n is consistent with the figure place of hiding signal;Then by embedding for hiding signal Enter in position corresponding with selected position in the carrier signal after coding.
Such as, the embedded mode selected by transmitting terminal is the carrier signal after hiding signal is embedded into coding Whole code word, then in binary sequence all binary codes be the position of 1 be significance bit, can be from effectively Selected n position in Wei;If the embedded mode selected by transmitting terminal is for be embedded into coding by hiding signal After the check bit of carrier signal, then in binary sequence, in corresponding check bit, binary code is that the position of 1 is Significance bit, can select n position from these significance bits.If wherein the figure place of significance bit is more than hidden When hiding figure place n of signal, time i.e. more than n, n can be selected from binary sequence the most successively Significance bit.
Further, the carrier signal after the coding that above-mentioned steps 101 obtains includes multidigit binary code, And above-mentioned selected position is in the primary importance (such as check bit, or whole code word) of random sequence. Position corresponding with selected position in carrier signal after then hiding signal is embedded into coding by transmitting terminal Time, if hide in the second position that signal is corresponding with primary importance with the carrier signal after coding two Ary codes is contrary, by the binary code upset in the second position in the carrier signal after coding, if hidden The binary code in the second position that signal is corresponding with primary importance with the carrier signal after coding is identical, The binary code kept in the carrier signal after coding in the second position is constant.Here primary importance refers to Any one position in random sequence, does not implies that the position coming first.
For example, it is assumed that the carrier signal after Bian Ma is 11011011100111001011, before 6 be information Position, after 14 be check bit;The random sequence generated is 00010100110010100101, needs to send out The hiding signal sent is 11.
If the whole code word that embedded mode is the carrier signal after hiding signal is embedded into coding, then with The 4th, 6,9,10,13,15,18 and 20 of machine sequence is significance bit, according to the carrier after coding Signal and the corresponding relation of random sequence, determine of the carrier signal after hiding signal is embedded into coding 4 and the 6th (have selected the 4th and the significance bit of the 6th of random sequence), due to the load after coding The 4th of body signal is 1, identical with hiding signal, then keep the 4th of the carrier signal after coding not Becoming, the 6th of the carrier signal after coding is 0, contrary with hiding signal, then by the carrier letter after coding The binary code upset of number the 6th is 1, and finally giving steganography signal is 11011101110111001011.
If the check bit that embedded mode is the carrier signal after hiding signal is embedded into coding, from the 7th Bit check position starts, then the 9th, 10,13,15,18 and 20 of random sequence is significance bit, determines The 9th of carrier signal after hiding signal is embedded into coding and the 10th (have selected random sequence 9th and the significance bit of the 10th), owing to the 9th of carrier signal after coding is 1, with hiding signal Identical, then keep the 9th invariant position of the carrier signal after coding, the 10th of the carrier signal after coding Being 0, contrary with hiding signal, then being overturn by the binary code of the carrier signal the 10th after coding is 1.
Step 106, is modulated steganography signal and sends.
It should be noted that do not have absolute order to close between above-mentioned steps 101 to 103, and step 104 System, can perform simultaneously, it is also possible to order performs, and Fig. 1 is one of them concrete implementation mode.
Visible, in the method for the present embodiment, the transmitting terminal of signal can carry out channel volume to carrier signal After Ma, determine hiding signal carrier letter in encoded according to steganography level of security and preset steganography strategy Embedded mode in number, and generate random sequence make it indicate in hiding signal carrier signal in encoded Embedded location, finally according to embedded mode and random sequence, hiding signal is embedded into the carrier after coding Obtaining steganography signal in signal, modulation sends.In this sample embodiment when signal is hidden in transmission, In view of the process of chnnel coding, hiding signal is embedded in the carrier signal after coding transmission, and sends out Sending end can determine the embedded mode of a kind of safer hiding signal according to steganography strategy so that either From the capability analysis to signal sequence itself, or the analysis from the bit error rate that receiving terminal is received signal, Can ensure that hiding signal is not easy to be found under certain conditions, i.e. steganography signal is not easy to be opposed Meaning is monitored end and is suspected, improves the safety of hiding signal transmission.
The embodiment of the present invention provides a kind of physical layer steganography method, mainly signal, and legal receiving terminal is held The method of row, during steganography signal is transferred to the legitimate receipt end of signal by transmitting terminal, monitors end Can monitor this transmitting procedure, flow chart is as it is shown on figure 3, include:
Step 201, the steganography signal that receiving end/sending end sends.
Step 202, is demodulated the steganography signal after being demodulated, the steganography after demodulation by steganography signal Signal packet contains the hiding signal in the carrier signal after being embedded into coding.
Step 203, generates random sequence, and this random sequence is for indicating hiding signal load in encoded Embedded location in body signal.
Specifically, receiving terminal can with the pseudo random sequence generator of receiving terminal utilize root key generate length with The binary sequence that carrier signal length after coding is consistent;Wherein, the pseudo-random sequence of receiving terminal generates Device is identical with the pseudo random sequence generator of transmitting terminal, and the root key of transmitting terminal and the root key of receiving terminal Identical, this root key is unknown for monitoring end.
In actual applications, transmitting terminal and receiving terminal own identical PRNG together (Pseudo-Random Number Generator, PRNG), if transmitting terminal and receiving terminal consult Identical root key, it is possible to obtain identical random sequence.The sequence that the maker of this class draws is Random, the topmost characteristic of such sequence is that source signal based on input produces in a particular manner, The source signal (the most above-mentioned root key) that i.e. two identical maker inputs are identical, the output sequence obtained Row are consistent.
Step 204, obtains the embedded mode and hiding signal hidden in signal carrier signal in encoded Figure place, embedded mode here includes: the check bit of carrier signal in encoded embeds hides signal, Or the whole code word of carrier signal in encoded embeds hiding signal.
Specifically, transmitting terminal can be before transmission steganography signal, can be by some controls of this steganography signal Information processed is sent to transmitting terminal, and these control information can include hiding signal carrier signal in encoded In embedded mode and the information such as figure place of hiding signal.In this case, receiving terminal is obtaining these controls During information processed, receiving terminal can directly receive end from transmitting terminal.
In another case, transmitting terminal can be by the embedding in hiding signal carrier signal in encoded The control information such as the figure place of mode and hiding signal be embedded in the carrier signal after coding before several, I.e. transmitting terminal is placed in steganography signal sent along with hiding signal when sending control information.This In the case of, receiving terminal, when obtaining these and controlling information, can extract from the steganography signal after demodulation Arrive.
Step 205, according to embedded mode, hides figure place and the random sequence steganography after demodulation of signal Signal obtains and hides signal.
Specifically, receiving terminal obtain hide signal time, can in random sequence with embedded mode indication The hiding signal shown in the consistent binary sequence of scope in carrier signal in encoded, selected n Position binary code is the position of 1, and wherein, n is consistent with the figure place of hiding signal;Then receiving terminal is from coding After carrier signal in the position corresponding with selected position extract and obtain n position and hide signal.
Such as, the random sequence that receiving terminal generates is 00010100110010100101, the steganography after demodulation Signal is 11011101110111001011, before 6 be information bit, after 14 be check bit.If The embedded mode that receiving terminal gets is the whole code of the carrier signal after hiding signal is embedded into coding Word, the figure place hiding signal is 2, then the 4th and 6 of random sequence is significance bit, after coding Carrier signal and the corresponding relation of random sequence, the 4th and the 6th extraction of the steganography signal after demodulation Obtaining 2 hiding signals is 11.
It should be noted that can be to perform between above-mentioned steps 204 and step 203 simultaneously, it is also possible to be Order performs, the simply one of which concrete implementation mode shown in Fig. 3.
Visible, in the method for the present embodiment, the transmitting terminal of signal can be according to steganography level of security and preset Steganography strategy determine the embedded mode in hiding signal carrier signal in encoded, and generate stochastic ordering Row make it indicate the embedded location in hiding signal carrier signal in encoded, finally according to embedded mode And random sequence hiding signal is embedded into coding after carrier signal in obtain steganography signal, and by steganography Signal modulation sends, thus receiving terminal can be after to the steganography signal demodulation received, according to generate Random sequence, the embedded mode of acquisition and the figure place of hiding signal can obtain from the steganography signal after demodulation Get hiding signal.In this sample embodiment when signal is hidden in transmission, it is contemplated that the process of chnnel coding, Hiding signal is embedded in the carrier signal after coding transmission, and transmitting terminal can determine according to steganography strategy The embedded mode of a kind of safer hiding signal so that either from the ability to signal sequence itself Analyze, or the analysis from the bit error rate that receiving terminal is received signal, can ensure to hide signal one Be not easy under conditions of Ding to be found, i.e. steganography signal is not easy to be suspected by hostility monitoring end, improves hidden Hide the safety of signal transmission.
The method with a concrete application example, the embodiment of the present invention being described below, as shown in Figure 4, In the present embodiment, the main flow of cordless communication network physical layer includes open communication and secret communication. Open communication refers to the communication process of carrier signal, sees top half dotted line frame in Fig. 4;Secret communication is Refer to hide the communication process of signal, see the dotted line frame of the latter half in Fig. 4.Specifically:
Alice is as signal bolter, it is desirable to be obtained in that radio channel information at listener/assailant Eve In the case of receiving signal, send hiding signal by transmitting terminal to the receiving terminal that recipient Bob uses. In the present embodiment, carrier signal can be with the signal being the forms such as voice, text or multi-media signal. Wherein:
Transmitting terminal uses stego-key, and uses the method in the embodiment shown in above-mentioned Fig. 1 by hiding letter Number ShideIt is embedded into the carrier signal S after codingcoverIn obtain steganography signal sstego, then to steganography X is obtained after signal modulationstego, and be launched in wireless communications environment;Receiving terminal receives signal ystegoThe most demodulated obtainCan then proceed in the method in the embodiment shown in above-mentioned Fig. 3 Acquire hiding signalWith the carrier signal after coding
In practical application, transmitting terminal is after using the following two kinds mode that hiding signal is embedded into coding In carrier signal: (1) is embedded into the information bit in the carrier signal after coding;(2) after being embedded into coding Carrier signal in check bit.Transmit for employing (1st) and (2) kind mode as shown in figure 5a and 5b During steganography signal, bit error rate (Bit Error Rate, BER) and capacity are along with the signal to noise ratio of channel The curve chart that (Signal Noise Ratio, SNR) changes, curve 1 and 2 respectively the most corresponding (2nd) plant with (1st) plants mode, it is seen then that bit error rate all increases with SNR and reduces, but (1st) plants feelings Bit error rate in the case of planting with (2nd) under condition wants big;And at SNR relatively low (such as less than 4dB) When, the capacity in the case of (2nd) kind is bigger.Therefore, (2nd) kind mode is used to transmit steganography During signal, Performance comparision is good, and the sensitivity being primarily due to information bit is higher than the sensitivity of check bit.
It is illustrated in figure 6 the signal sequence after the carrier signal after hiding signal is embedded into coding, specifically Ground, the embedded mode of the most corresponding following several ways of Fig. 6 (a) to (e): (1) does not hide signal; (2) fixed position in the carrier signal after signal is embedded into coding is hidden;(3) signal is hidden random It is embedded in information bit;(4) hide signal and be randomly-embedded check bit;(5) hide signal to be randomly-embedded In whole code word.Visible, when hiding information is embedded into a fixed position, hiding signal is brighter Aobvious, it is easy to causing the suspection of listener Eve, effect is worst, pacify during steganography signal transmits Full property is worst;And the effect ratio that hiding information is randomly-embedded check bit is embedded into the effective of information bit; It is best by the effect that hiding information is randomly-embedded in whole code word, is also safest.
The embodiment of the present invention also provides for a kind of physical layer steganography device, is specifically as follows above-mentioned transmitting terminal, Its structural representation is as it is shown in fig. 7, specifically may include that
Coding unit 10, for carrying out the carrier signal after chnnel coding is encoded to carrier signal.
Rank acquiring unit 11, for determining steganography safe level according to the parameter value of at least one parameter following Other: transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and right The modulation parameter etc. of steganography signal modulation.
Specifically, rank acquiring unit 11 specifically for detection transmitting terminal and receiving terminal between channel information, According to the noise figure in described channel information estimation communication environment, if described noise figure is more than preset the One noise figure, the most described steganography level of security is high, if described noise figure is less than the first preset noise Value, the most described steganography level of security is low;And/or, obtain the load after the coding that described chnnel coding obtains The figure place of the check bit in body signal, if the figure place of described check bit is more than the first preset figure place, Described steganography level of security is high, if the figure place of described check bit is less than the first preset figure place, then institute It is low for stating steganography level of security;And/or, obtain the order of modulation to the modulation of described steganography signal, if institute Stating order of modulation and be more than the first preset exponent number, the most described steganography level of security is high, if described modulation Exponent number is less than the first preset exponent number, and the most described steganography level of security is low.
Mode determines unit 12, for the steganography level of security and preset obtained according to rank acquiring unit 11 Steganography strategy determine the embedded mode in hiding signal carrier signal after described coding.
Be appreciated that if the carrier signal after the coding that obtains of described coding unit 10 include information bit and Check bit;Then mode determines that the embedded mode that unit 12 determines includes: embed described hidden in described check bit Hide in signal, or the whole code word of the carrier signal after described coding and embed described hiding signal.
Specifically, mode determine unit 12 when determining embedded mode, if described steganography level of security is Low, the most described embedded mode be the carrier signal after described coding whole code word in embed described hide Signal;If described steganography level of security is high, the most described embedded mode is the carrier after described coding The check bit of signal embeds described hiding signal.
Sequence generating unit 13, is used for generating random sequence, and described random sequence is used for indicating described hiding Embedded location in signal carrier signal after described coding.This sequence generating unit 13, specifically for The pseudo random sequence generator utilizing transmitting terminal utilizes the carrier after root key generation length and described coding The binary sequence that signal length is consistent;Wherein, the pseudo random sequence generator of described transmitting terminal and reception The pseudo random sequence generator of end is identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal.
According to described mode, steganography unit 14, for determining that embedded mode that unit 12 determines and sequence generate The random sequence that unit 13 generates embeds in the carrier signal after the coding that described coding unit 10 obtains Hiding signal obtains steganography signal.
This steganography unit 14, specifically for hidden with indicated by described embedded mode in described random sequence Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position Binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;Hide described Signal is embedded in the carrier signal after described coding in the position corresponding with described selected position.
Wherein, if the carrier signal after the coding that obtains of described coding unit 10 includes multidigit binary code, The selected primary importance that position is described random sequence of described steganography unit 14;The most described steganography unit 14, If specifically in the carrier signal after described hiding signal and described coding with described primary importance pair The binary code in the second position answered is contrary, is overturn by the binary code in the described second position, if The second position that described hiding signal is corresponding with described primary importance with the carrier signal after described coding On binary code identical, keep the binary code in the described second position constant.
Transmitting element 15, for being modulated the steganography signal that described steganography unit 14 obtains and send.
It should be noted that the device of the present embodiment can also include information process unit 16, in side After formula determines that unit 12 determines embedded mode, by described hiding signal carrier signal after described coding In embedded mode and the figure place of described hiding signal be sent to receiving terminal, or, described hiding signal is existed The embedded mode in carrier signal and the figure place of described hiding signal after described coding are embedded into described volume Before in carrier signal after Ma several.
Visible, in the device of the present embodiment, coding signal 10 after carrier signal is carried out chnnel coding, Mode determines according to steganography level of security and preset steganography strategy, unit 12 determines that hiding signal is at coding After carrier signal in embedded mode, and sequence generating unit 13 generates random sequence, and to make it indicate hiding Embedded location in signal carrier signal in encoded, last steganography unit 14 according to random sequence and with Machine sequence hiding signal is embedded into coding after carrier signal in obtain steganography signal, and by transmitting element The modulation of steganography signal is sent by 15.In this sample embodiment when signal is hidden in transmission, it is contemplated that letter The process of road coding, is embedded in the carrier signal after coding transmission by hiding signal, and transmitting terminal can root The embedded mode of a kind of safer hiding signal is determined so that either to signal according to steganography strategy The capability analysis of sequence itself, or the analysis from the bit error rate that receiving terminal receives signal, can protect Card is hidden signal and is not easy under certain conditions to be found, i.e. steganography signal is not easy to be monitored end by hostility Suspect, improve the safety of hiding signal transmission.
The embodiment of the present invention also provides for a kind of physical layer steganography device, is specifically as follows above-mentioned receiving terminal, Its structural representation as shown in Figure 8, specifically may include that
Receive unit 21, the steganography signal sent for receiving end/sending end.
Demodulating unit 22, for being demodulated being demodulated by the steganography signal that described reception unit 21 receives After steganography signal, the steganography signal packet after described demodulation is hidden containing be embedded in the carrier signal after coding Hide signal.
Signal generating unit 23, is used for generating random sequence, and described random sequence indicates described hiding signal compiling The embedded location in carrier signal after Ma, specifically, described signal generating unit 23, connect specifically for utilizing The pseudo random sequence generator of receiving end utilizes the carrier signal after root key generation length and described coding long Spend consistent binary sequence;Wherein, the pseudo random sequence generator of described receiving terminal and the puppet of transmitting terminal Random sequence generator is identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal.
Information acquisition unit 24, for obtaining the embedded mode in hiding signal carrier signal in encoded And the figure place of described hiding signal.Here embedded mode includes: the verification of carrier signal in encoded Position embeds to hide to embed in signal, or the whole code word of carrier signal in encoded and hides signal.
Specifically, transmitting terminal can be before transmission steganography signal, can be by some controls of this steganography signal Information processed is sent to transmitting terminal, and these control information can include hiding signal carrier signal in encoded In embedded mode and the information such as figure place of hiding signal.So information acquisition unit 24 is obtaining these controls During information processed, receiving terminal can directly receive end from transmitting terminal.
In another case, transmitting terminal can be by the embedding in hiding signal carrier signal in encoded The control information such as the figure place of mode and hiding signal be embedded in the carrier signal after coding before several, I.e. transmitting terminal is placed in steganography signal sent along with hiding signal when sending control information.This In the case of, information acquisition unit 24, can be from the steganography signal after demodulation when obtaining these and controlling information Middle extraction obtains.
Signal acquiring unit 25, for the embedded mode obtained according to described information acquisition unit 24, hides The random sequence that the figure place of signal and signal generating unit 23 generate is after the demodulation that described demodulating unit 22 obtains Steganography signal in obtain described hiding signal.
In the device of the present embodiment, signal acquiring unit 25 is understood after to the steganography signal demodulation received, The embedded mode that can obtain according to information acquisition unit 24, figure place and the signal generating unit 23 of hiding signal are raw Random sequence is become to get hiding signal from the steganography signal after demodulation.Transmitting terminal in this sample embodiment When signal is hidden in transmission, it is contemplated that the process of chnnel coding, hiding signal is embedded into the load after coding Body signal transmits, and transmitting terminal can determine the embedding of a kind of safer hiding signal according to steganography strategy Enter mode so that either from the capability analysis to signal sequence itself, or receive letter to receiving terminal Number the analysis of the bit error rate, can ensure that hiding signal is not easy to be found, i.e. under certain conditions Steganography signal is not easy to be monitored end by hostility and suspects, improves the safety of hiding signal transmission.
The embodiment of the present invention also provides for a kind of physical layer steganography device, its structural representation as it is shown in figure 9, This physical layer steganography device can produce bigger difference because of configuration or performance difference, can include one Or more than one central processing unit (central processing units, CPU) 30 (such as, or Individual above processor) and memorizer 31, one or more storage application programs 321 or data 322 Storage medium 32 (such as one or more mass memory units).Wherein, memorizer 31 and storage Medium 32 can be of short duration storage or persistently store.The program being stored in storage medium 32 can include one Or more than one module (diagram does not marks), each module can include in physical layer steganography device A series of command operatings.Further, central processing unit 30 could be arranged to communicate with storage medium 32, Physical layer steganography device performs a series of command operatings in storage medium 32.
Physical layer steganography device can also include one or more power supplys 33, and one or more have Line or radio network interface 34, one or more input/output interfaces 35, and/or, one or one Above operating system 323, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Described in said method embodiment can be based on this by the step performed by transmitting terminal or receiving terminal The structure of the physical layer steganography device shown in Fig. 9.
The embodiment of the present invention also provides for a kind of physical layer steganographic system, mainly includes transmitting terminal and receiving terminal, Wherein the structure of transmitting terminal can the structure of physical layer steganography device as shown in Fig. 7 or Fig. 9, receiving terminal Structure can the structure of physical layer steganography device as shown in Fig. 8 or Fig. 9, do not repeat at this.
It should be noted that physical layer steganography method and system mainly can be answered in the above embodiment of the present invention In following field:
1, for government organs, every relate to confidential corespondence (as national defense safety, military secrecy, Weapon research, Aero-Space navigation state-of-the-art technology) place.
2, for almost all of enterprises and institutions, every relate to trade secret message file (as Patent, production procedure, material prescription, commercial contract, customer information etc.) transmission be directed to secrecy Communication.
3, for personally for, from protection privacy (such as identity information, medical treatment and insurance information, bank Speech text information during accounts information, personal communication) angle set out, according to everyone to privacy Expectation degree of protection all can carry out secret communication.
One of ordinary skill in the art will appreciate that in the various methods of above-described embodiment is all or part of Step can be by program and completes to instruct relevant hardware, and this program can be stored in a computer In readable storage medium storing program for executing, storage medium may include that read only memory (ROM), random access memory Device RAM), disk or CD etc..
The physical layer steganography method provided the embodiment of the present invention above and system are described in detail, Principle and the embodiment of the present invention are set forth by specific case used herein, above example Explanation be only intended to help to understand method and the core concept thereof of the present invention;Simultaneously for this area Those skilled in the art, according to the thought of the present invention, the most all have and change In place of change, in sum, this specification content should not be construed as limitation of the present invention.

Claims (10)

1. a physical layer steganography method, it is characterised in that including:
Carrier signal is carried out the carrier signal after chnnel coding is encoded;
Parameter value according at least one parameter following determines steganography level of security: transmitting terminal and receiving terminal Noise parameter in communication environment, the parameter of described chnnel coding, and the modulation ginseng to the modulation of steganography signal Number;
Determine that hiding signal is after described coding according to described steganography level of security and preset steganography strategy Embedded mode in carrier signal;
Generating random sequence, described random sequence is for indicating described hiding signal load after described coding Embedded location in body signal;
According to described embedded mode and random sequence, the carrier signal after described coding embeds and hide signal Obtain steganography signal;
Described steganography signal is modulated and sends.
2. the method for claim 1, it is characterised in that described basis at least one parameter following Determine steganography level of security: transmitting terminal and the noise parameter in the communication environment of receiving terminal, described channel is compiled The parameter of code, and the modulation parameter to the modulation of steganography signal, specifically include:
Channel information between detection transmitting terminal and receiving terminal, estimates communication environment according to described channel information In noise figure, if described noise figure is more than preset the first noise figure, the most described steganography level of security For height, if described noise figure is less than the first preset noise figure, the most described steganography level of security is low;
And/or,
Obtain the figure place of check bit in the carrier signal after the coding that described chnnel coding obtains, if institute When stating the figure place of check bit more than preset first figure place, described steganography level of security be height, if described The figure place of check bit is less than the first preset figure place, and the most described steganography level of security is low;
And/or,
Obtain the order of modulation to the modulation of described steganography signal, if described order of modulation is more than preset the One exponent number, the most described steganography level of security is high, if described order of modulation is less than the first preset exponent number, The most described steganography level of security is low;
Described determine that hiding signal is at described coding according to described steganography level of security and preset steganography strategy After carrier signal in embedded mode, specifically include:
If described steganography level of security is low, the most described embedded mode is the carrier letter after described coding Number whole code word in embed described hiding signal;If described steganography level of security is height, described embedding Mode is that the check bit of the carrier signal after described coding embeds described hiding signal.
3. method as claimed in claim 1 or 2, it is characterised in that
Described random sequence is binary sequence, and described generation random sequence specifically includes: the puppet of transmitting terminal Random sequence generator utilizes two that root key generation length is consistent with the carrier signal length after described coding System sequence;Wherein, the pseudo random sequence generator of described transmitting terminal and the pseudo-random sequence of receiving terminal are raw Grow up to be a useful person identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal;
Described embedding in carrier signal after described coding according to described embedded mode and random sequence is hidden Signal obtains steganography signal, specifically includes: in described random sequence with described embedded mode indicated by Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position Binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;Hide described Signal is embedded in the carrier signal after described coding in the position corresponding with described selected position;
Carrier signal after described coding include multidigit binary code, described selected position be described at random The primary importance of sequence;In the most described carrier signal described hiding signal being embedded into after described coding with The position that described selected position is corresponding specifically includes: if after described hiding signal and described coding The binary code in the second position corresponding with described primary importance in carrier signal is contrary, by described second Binary code upset on position, if in the carrier signal after described hiding signal and described coding with institute State the binary code in the second position that primary importance is corresponding identical, keep in the described second position two to enter Code processed is constant.
4. a physical layer steganography method, it is characterised in that including:
The steganography signal that receiving end/sending end sends;
Described steganography signal is demodulated the steganography signal after being demodulated, the steganography letter after described demodulation Number comprise the hiding signal in the carrier signal after being embedded into coding;
Generate random sequence, in described random sequence instruction described hiding signal carrier signal in encoded Embedded location;
Obtain the embedded mode in described hiding signal carrier signal in encoded and described hiding signal Figure place;
According to described embedded mode, hide figure place and the random sequence steganography letter after described demodulation of signal Described hiding signal is obtained in number.
5. method as claimed in claim 4, it is characterised in that described generation random sequence specifically includes:
Carrier after the pseudo random sequence generator of receiving terminal utilizes root key to generate length and described coding is believed Number binary sequence that length is consistent;Wherein, the pseudo random sequence generator of described receiving terminal and transmitting terminal Pseudo random sequence generator identical, and the root key of described transmitting terminal is identical with the root key of receiving terminal;
Described according to described embedded mode, hide hidden after described demodulation of the figure place of signal and random sequence Write signal obtains described hiding signal, specifically includes: with described embedded mode in described random sequence In the binary sequence that the scope in carrier signal after coding described in indicated hiding signal place is consistent, Selected n position binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;From institute State position corresponding with described selected position in the carrier signal after coding to extract and obtain that n position is described to hide Signal.
6. a physical layer steganography device, it is characterised in that including:
Coding unit, for carrying out the carrier signal after chnnel coding is encoded to carrier signal;
Rank acquiring unit, for determining steganography level of security according to the parameter value of at least one parameter following: Transmitting terminal and the noise parameter in the communication environment of receiving terminal, the parameter of described chnnel coding, and to steganography The modulation parameter of signal modulation;
Mode determines unit, for the steganography level of security and preset obtained according to described rank acquiring unit Steganography strategy determine the embedding in hiding signal carrier signal after the coding that described coding unit obtains Mode;
Sequence generating unit, is used for generating random sequence, and described random sequence is used for indicating described hiding letter The embedded location in carrier signal number after described coding;
According to described mode, steganography unit, for determining that embedded mode that unit determines and described sequence generate The random sequence that unit generates embeds in the carrier signal after the coding that described coding unit obtains hides letter Number obtain steganography signal;
Transmitting element, for being modulated the steganography signal that described steganography unit obtains and send.
7. device as claimed in claim 6, it is characterised in that
Described rank acquiring unit specifically for detection transmitting terminal and receiving terminal between channel information, according to Noise figure in described channel information estimation communication environment, if described noise figure is made an uproar more than preset first Sound value, the most described steganography level of security is high, if described noise figure is less than the first preset noise figure, The most described steganography level of security is low;And/or, obtain the letter of the carrier after the coding that described chnnel coding obtains The figure place of the check bit in number, if the figure place of described check bit is more than the first preset figure place, described Steganography level of security is high, if the figure place of described check bit is less than the first preset figure place, the most described hidden It is low for writing level of security;And/or, obtain the order of modulation to the modulation of described steganography signal, if described tune Exponent number processed is more than the first preset exponent number, and the most described steganography level of security is high, if described order of modulation Less than the first preset exponent number, the most described steganography level of security is low;
Described mode determines unit, if being low specifically for described steganography level of security, and the most described embedding Mode be the carrier signal after described coding whole code word in embed described hiding signal;If it is described Steganography level of security is high, and the most described embedded mode is that the check bit of the carrier signal after described coding is embedding Enter described hiding signal.
Device the most as claimed in claims 6 or 7, it is characterised in that
Described sequence generating unit, specifically for utilizing the pseudo random sequence generator of transmitting terminal to utilize root close Key generates the binary sequence that length is consistent with the carrier signal length after described coding;Wherein, described The pseudo random sequence generator of sending end is identical with the pseudo random sequence generator of receiving terminal, and described transmitting terminal Root key identical with the root key of receiving terminal;
Described steganography unit, specifically for hidden with indicated by described embedded mode in described random sequence Hide in the binary sequence that the scope in the carrier signal after coding described in signal place is consistent, selected n position two Ary codes is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;By described hiding letter Number it is embedded in position corresponding with described selected position in the carrier signal after described coding;
Carrier signal after the coding that described coding unit obtains includes multidigit binary code, described steganography list The primary importance that position is described random sequence that unit is selected;Described steganography unit, if specifically for institute State in the second position that hiding signal is corresponding with described primary importance with the carrier signal after described coding Binary code is contrary, is overturn by the binary code in the described second position, if described hiding signal and institute State the binary code in the second position corresponding with described primary importance in the carrier signal after coding identical, Keep the binary code in the described second position constant.
9. a physical layer steganography device, it is characterised in that including:
Receive unit, the steganography signal sent for receiving end/sending end;
Demodulating unit, after being demodulated being demodulated by the steganography signal that described reception unit receives Steganography signal, the steganography signal packet after described demodulation contains the hiding letter in the carrier signal after being embedded into coding Number;
Signal generating unit, is used for generating random sequence, and described random sequence indicates described hiding signal at coding After carrier signal in embedded location;
Information acquisition unit, for obtaining the embedding side in described hiding signal carrier signal in encoded Formula and the figure place of described hiding signal;
Signal acquiring unit, for the embedded mode obtained according to described information acquisition unit, described hiding The random sequence that the figure place of signal and described signal generating unit generate is after the demodulation that described demodulating unit obtains Steganography signal obtains described hiding signal.
10. device as claimed in claim 9, it is characterised in that
Described signal generating unit, specifically for utilizing the pseudo random sequence generator of receiving terminal to utilize root key raw Become the binary sequence that length is consistent with the carrier signal length after described coding;Wherein, described receiving terminal Pseudo random sequence generator identical with the pseudo random sequence generator of transmitting terminal, and the root of described transmitting terminal Key is identical with the root key of receiving terminal;
Described signal acquiring unit, specifically in described random sequence with described embedded mode indicated by Hiding signal place described in the consistent binary sequence of scope in carrier signal after coding, selected n Position binary code is the position of 1, and wherein, described n is consistent with the figure place of described hiding signal;From described volume Position corresponding with described selected position in carrier signal after Ma is extracted and is obtained described hiding signal.
CN201610177470.4A 2016-03-24 2016-03-24 A kind of physical layer steganography method and system Expired - Fee Related CN105846994B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610177470.4A CN105846994B (en) 2016-03-24 2016-03-24 A kind of physical layer steganography method and system
PCT/CN2016/079801 WO2017161616A1 (en) 2016-03-24 2016-04-20 Physical layer steganography method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610177470.4A CN105846994B (en) 2016-03-24 2016-03-24 A kind of physical layer steganography method and system

Publications (2)

Publication Number Publication Date
CN105846994A true CN105846994A (en) 2016-08-10
CN105846994B CN105846994B (en) 2018-11-27

Family

ID=56583875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610177470.4A Expired - Fee Related CN105846994B (en) 2016-03-24 2016-03-24 A kind of physical layer steganography method and system

Country Status (2)

Country Link
CN (1) CN105846994B (en)
WO (1) WO2017161616A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819568A (en) * 2017-11-15 2018-03-20 深圳大学 Information detecting method, device and receiving device based on constellation point distance
CN108966211A (en) * 2017-09-30 2018-12-07 深圳大学 The wireless communication physical layer slope authentication method and device of safety
CN109068284A (en) * 2018-09-28 2018-12-21 深圳大学 The physical layer authentication method and system connected based on group between internet of things equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917527B (en) * 2020-06-01 2022-06-10 常州机电职业技术学院 Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof
CN113923312B (en) * 2021-09-28 2024-01-30 东南大学 Robust reversible watermarking method of digital image coding layer based on wireless communication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866818A (en) * 2006-06-19 2006-11-22 广东省电子技术研究所 Hiding mode of hidden signal in embedded host signal
CN101080013A (en) * 2007-06-19 2007-11-28 中山大学 A JPEG lossless compression image hide writing method based on predictive coding
CN101374230A (en) * 2008-06-02 2009-02-25 裘炅 Method and apparatus for identifying radio frequency information and embedded instrumentality for wireless transmission
CN101478391A (en) * 2009-01-13 2009-07-08 华中科技大学 IP voice hidden communication method based on stream encryption
CN103139191A (en) * 2011-11-25 2013-06-05 北京千橡网景科技发展有限公司 Network authentication method and network authentication equipment
CN103476026A (en) * 2013-09-06 2013-12-25 中国科学院软件研究所 Self-adaption covert communication method based on satellite channel coding
WO2014028757A1 (en) * 2012-08-15 2014-02-20 Ultra Electronics, ProLogic Secure data exchange using messaging service
CN104064193A (en) * 2013-03-21 2014-09-24 中国科学院声学研究所 Information hiding method and extraction method for linear prediction voice coding
CN104091597A (en) * 2014-06-26 2014-10-08 华侨大学 IP voice steganography method based on speed modulation

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866818A (en) * 2006-06-19 2006-11-22 广东省电子技术研究所 Hiding mode of hidden signal in embedded host signal
CN101080013A (en) * 2007-06-19 2007-11-28 中山大学 A JPEG lossless compression image hide writing method based on predictive coding
CN101374230A (en) * 2008-06-02 2009-02-25 裘炅 Method and apparatus for identifying radio frequency information and embedded instrumentality for wireless transmission
CN101478391A (en) * 2009-01-13 2009-07-08 华中科技大学 IP voice hidden communication method based on stream encryption
CN103139191A (en) * 2011-11-25 2013-06-05 北京千橡网景科技发展有限公司 Network authentication method and network authentication equipment
WO2014028757A1 (en) * 2012-08-15 2014-02-20 Ultra Electronics, ProLogic Secure data exchange using messaging service
CN104064193A (en) * 2013-03-21 2014-09-24 中国科学院声学研究所 Information hiding method and extraction method for linear prediction voice coding
CN103476026A (en) * 2013-09-06 2013-12-25 中国科学院软件研究所 Self-adaption covert communication method based on satellite channel coding
CN104091597A (en) * 2014-06-26 2014-10-08 华侨大学 IP voice steganography method based on speed modulation

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108966211A (en) * 2017-09-30 2018-12-07 深圳大学 The wireless communication physical layer slope authentication method and device of safety
CN108966211B (en) * 2017-09-30 2021-08-06 深圳大学 Secure wireless communication physical layer slope authentication method and device
CN107819568A (en) * 2017-11-15 2018-03-20 深圳大学 Information detecting method, device and receiving device based on constellation point distance
CN107819568B (en) * 2017-11-15 2020-11-03 深圳大学 Information detection method and device based on constellation point distance and receiving equipment
CN109068284A (en) * 2018-09-28 2018-12-21 深圳大学 The physical layer authentication method and system connected based on group between internet of things equipment
CN109068284B (en) * 2018-09-28 2021-05-25 深圳大学 Physical layer authentication method and system based on group connection among Internet of things devices

Also Published As

Publication number Publication date
WO2017161616A1 (en) 2017-09-28
CN105846994B (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN105846994A (en) Physical layer steganography method and physical layer steganography system
CN109688160B (en) Data encryption transmission control method and device, computer equipment and storage medium
US8978152B1 (en) Decentralized token table generation
CN106650869B (en) Information hiding method based on two-dimensional code
CN104935429A (en) Data processing method and system employing multi-encryption technology
CN110457873B (en) Watermark embedding and detecting method and device
CN110390191A (en) Method and system for safe biologic identification verifying
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN104951680A (en) Biological characteristic information processing method, storage method and device
CN110224811B (en) Internet of things encryption processing method, device and system
Kulkarni et al. Preserving privacy in sensor-fog networks
CN107017960B (en) A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code
CN105260981A (en) Optimal coupling image steganography method based on packet replacement
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
CN107332664A (en) A kind of hidden water sound communication technique of Double-protection mechanism
CN105959104A (en) Steganalysis method based on Hamming distance distribution
Bhalshankar et al. Audio steganography: LSB technique using a pyramid structure and range of bytes
CN106034122A (en) Information processing method, electronic equipment and server
CN102737639B (en) Safety communication method for voice information
KR20150132467A (en) Privacy preserving knowledge/factor possession tests for persistent authentication
CN106230589A (en) A kind of reverse key machinery of consultation based on low density parity check code
CN105703900B (en) A kind of physical layer steganography transmission method and system
CN102938888B (en) Secret document steganography and extraction method suitable for wireless communication environment
CN110941854B (en) Method and device for saving and recovering private data based on secure multi-party computing
CN104159118A (en) Image byte XOR algorithm based on pseudo random sequence and LSB algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181127

Termination date: 20190324