CN107809309B - Information detection method and device based on amplitude difference and receiving equipment - Google Patents

Information detection method and device based on amplitude difference and receiving equipment Download PDF

Info

Publication number
CN107809309B
CN107809309B CN201711131900.XA CN201711131900A CN107809309B CN 107809309 B CN107809309 B CN 107809309B CN 201711131900 A CN201711131900 A CN 201711131900A CN 107809309 B CN107809309 B CN 107809309B
Authority
CN
China
Prior art keywords
carrier information
information
carrier
steganography
different
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711131900.XA
Other languages
Chinese (zh)
Other versions
CN107809309A (en
Inventor
谢宁
谭杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711131900.XA priority Critical patent/CN107809309B/en
Publication of CN107809309A publication Critical patent/CN107809309A/en
Application granted granted Critical
Publication of CN107809309B publication Critical patent/CN107809309B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/18Phase-modulated carrier systems, i.e. using phase-shift keying
    • H04L27/22Demodulator circuits; Receiver circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses an information detection method, a device and a receiving device based on amplitude difference, wherein the method comprises the following steps: receiving the first carrier information after replacing the steganography; processing the first carrier information to obtain original carrier information; processing the original carrier information to obtain second carrier information before replacing steganography; comparing whether the first carrier information is different from the second carrier information; and if the first carrier information is different from the second carrier information, determining that secret information exists. The embodiment of the invention can accurately detect the secret information.

Description

Information detection method and device based on amplitude difference and receiving equipment
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an information detection method and apparatus based on amplitude difference, and a receiving device.
Background
Replacing steganography means that after channel coding, the original information is embedded with the stego information, and the stego information directly replaces the original partial information to achieve the purpose of information hiding.
Currently, in steganography analysis technology, in terms of detection of Least Significant Bit (LSB) steganography, the chi-square detection method is the earliest detection algorithm, which tests the probability of the image having such statistical characteristics by defining a chi-square statistic, realizes detection of sequential LSB replacement, but cannot detect LSB replacement at random positions. The detection algorithm aiming at LSB matching basically adopts methods such as neural network and pattern recognition to train a feature set to extract effective features, and then realizes the detection of the secret information through the joint judgment of a plurality of features, but the methods have large computation amount, inaccurate detection result and limitation.
Disclosure of Invention
The embodiment of the invention discloses an information detection method, an information detection device and receiving equipment based on amplitude difference, which can accurately detect secret information.
The first aspect of the embodiments of the present invention discloses an information detection method based on amplitude difference, including:
receiving the first carrier information after replacing the steganography;
processing the first carrier information to obtain original carrier information;
processing the original carrier information to obtain second carrier information before replacing steganography;
comparing whether the first carrier information is different from the second carrier information;
and if the first carrier information is different from the second carrier information, determining that secret information exists.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
determining a position where the first carrier information is different from the second carrier information as a modification position for replacing steganography;
and acquiring the secret information at the modification position of the first carrier information.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the processing the first carrier information to obtain original carrier information includes:
and demodulating and carrying out error correction coding processing on the first carrier information to obtain original carrier information.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the comparing whether the first carrier information and the second carrier information are different includes:
comparing whether the waveform of the first carrier information is different from the waveform of the second carrier information; or
Comparing whether the bit sequence of the first carrier information is different from the bit sequence of the second carrier information.
A second aspect of an embodiment of the present invention discloses an information detection apparatus, including:
a receiving unit, configured to receive the first carrier information after replacing the steganography;
the first acquisition unit is used for processing the first carrier information to obtain original carrier information;
the second acquisition unit is used for processing the original carrier information to acquire second carrier information before replacing steganography;
a comparison unit configured to compare whether there is a difference between the first carrier information and the second carrier information;
a determining unit, configured to determine that secret information exists if the first carrier information is different from the second carrier information.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the determining unit is further configured to determine a position where the first carrier information and the second carrier information are different as a modification position for replacing steganography;
the second obtaining unit is further configured to obtain the secret information at the modification position of the first carrier information.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the processing the first carrier information by the first obtaining unit, and obtaining original carrier information includes:
and demodulating and carrying out error correction coding processing on the first carrier information to obtain original carrier information.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the comparing unit compares whether there is a difference between the first carrier information and the second carrier information, and includes:
comparing whether the waveform of the first carrier information is different from the waveform of the second carrier information; or
Comparing whether the bit sequence of the first carrier information is different from the bit sequence of the second carrier information.
A third aspect of embodiments of the present invention discloses a receiving device, where the receiving device includes a processor and a memory, and the processor executes a computer program stored in the memory to implement the amplitude difference-based information detection method according to any one of the first aspect.
A computer-readable storage medium storing at least one instruction which, when executed by a processor, implements the amplitude difference-based information detection method according to any one of the first aspects.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, receiving equipment can receive the first carrier information after replacing steganography; processing the first carrier information to obtain original carrier information; processing the original carrier information to obtain second carrier information before replacing steganography; comparing whether the first carrier information is different from the second carrier information; and if the first carrier information is different from the second carrier information, determining that secret information exists. Therefore, by implementing the embodiment of the invention, the receiving device can restore the original carrier information, further compare the first carrier information after replacing steganography with the second carrier information before replacing steganography, and if the first carrier information and the second carrier information are different, the position where the information is replaced can be detected, so that the existence of the steganography information can be determined.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a diagram of an alternative steganographic communication model disclosed in an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an information detection method based on amplitude difference according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of another amplitude difference-based information detection method disclosed in the embodiments of the present invention;
FIG. 4 is a schematic structural diagram of an information detection apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first" and "second", etc. in the description and claims of the present invention and the above-described drawings are used for distinguishing different objects and are not used for describing a specific order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses an information detection method, an information detection device and receiving equipment based on amplitude difference, which can accurately detect secret information. The following detailed description is made with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a communication model diagram of replacing steganography according to an embodiment of the present invention. As shown in fig. 1, the communication model of replacing steganography may include two processes: a transmission process and a reception process.
Wherein the sending process is mainly performed by the sending device. The transmitting device may include a base station or a user equipment. A base station (e.g., access point) can refer to a device in an access network that communicates over the air-interface, through one or more sectors, with wireless terminals. The base station may be configured to interconvert received air frames and IP packets as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate management of attributes for the air interface. For example, the base station may be a base station (BTS) in GSM or CDMA, a base station (NodeB) in WCDMA, or an evolved Node B (NodeB or eNB or e-NodeB) in LTE, which is not limited in the embodiment of the present invention. The user equipment may include, but is not limited to, various electronic devices such as a smart Phone, a notebook Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), wherein an operating system of the user equipment may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and embodiments of the present invention are not limited thereto.
In the sending process, the sending equipment is divided into two paths, one path is that carrier information is coded, the other path is that secret information is coded, after the two paths are coded, the secret information is embedded into the carrier information to be modulated, and then the carrier information is sent into a channel and sent to the receiving equipment through the channel.
Wherein the receiving process is mainly performed by the receiving device. Wherein, the receiving device may comprise a base station or a user equipment. A base station (e.g., access point) can refer to a device in an access network that communicates over the air-interface, through one or more sectors, with wireless terminals. The base station may be configured to interconvert received air frames and IP packets as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate management of attributes for the air interface. For example, the base station may be a base station (BTS) in GSM or CDMA, a base station (NodeB) in WCDMA, or an evolved Node B (NodeB or eNB or e-NodeB) in LTE, which is not limited in the embodiment of the present invention. The user equipment may include, but is not limited to, various electronic devices such as a smart Phone, a notebook Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), wherein an operating system of the user equipment may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and embodiments of the present invention are not limited thereto.
In the receiving process, after demodulating the received signal, the receiving device extracts the demodulated signal and then decodes the demodulated signal to obtain the secret information, and then decodes the signal from which the secret information is extracted to obtain the carrier information.
Specifically, the specific embedding manner of the secret information can be exemplified by binary phase shift keying (binaryshift keying SHIFTKEYING, BPSK), the carrier information becomes a 0, 1 sequence after being encoded, and the secret information also becomes a 0, 1 sequence after being encoded, so that the secret information can randomly replace some positions of the carrier information to hide the information, at this time, 0 of the carrier information can be replaced by 1 of the secret information, 1 of the carrier information can be replaced by 0 of the secret information, and changing from-1 to 1, namely changing from-1 to 1, changing from 1 to-1 through BPSK. Of course, to ensure that the original carrier information can be subsequently recovered, the number of bits of the stego information needs to be less than the number of bits that can be corrected by the error correction capability of the carrier information. For example, assuming that the encoded information bits have k bits and a total of n symbols, the number of bits that can be corrected
Figure BDA0001469741930000061
And taking an integer, so that the bit number of the secret information is less than t, and the replacing steganography can be carried out.
Referring to fig. 2, fig. 2 is a schematic flowchart of an information detection method based on amplitude difference according to an embodiment of the present invention. As shown in fig. 2, the information detection method based on the amplitude difference may include the steps of:
step 201, the receiving device receives the first carrier information after replacing the steganography.
Replacing steganography means that after channel coding, the original information is embedded with the stego information, and the stego information directly replaces the original partial information to achieve the purpose of information hiding.
In the invention, the sending device sends out the first carrier information after replacing the steganography through a channel, and the receiving device can receive the first carrier information from the channel, wherein the first carrier information is information after being coded and modulated.
Step 202, the receiving device processes the first carrier information to obtain original carrier information.
In the invention, after receiving the first carrier information, the receiving device can process the first carrier information.
Specifically, the processing, by the receiving device, the first carrier information, and obtaining the original carrier information includes:
and demodulating and carrying out error correction coding processing on the first carrier information to obtain original carrier information.
In this embodiment, after the receiving apparatus demodulates the first carrier information, further, an error correction encoding process may be performed. The replacement part does not affect the recovery recognition of the original information based on the error correction capability of the error correction code, and the receiving device can recover the original carrier information by using the error correction capability.
And 203, the receiving device processes the original carrier information to obtain second carrier information before replacing steganography.
Specifically, after obtaining the original carrier information, the receiving device may perform encoding and modulation processing on the original carrier information to obtain the second carrier information before replacing steganography.
In the invention, the encoding and modulation processing are performed on the original carrier information, so as to ensure that the obtained second carrier information and the first carrier information are subjected to the same processing for better comparison in the following.
Step 204, the receiving device compares whether the first carrier information and the second carrier information are different.
In the invention, after obtaining the second carrier information before replacing steganography, the receiving device can compare the first carrier information with the second carrier information to determine whether the first carrier information and the second carrier information are different.
Specifically, the comparing, by the receiving device, whether the first carrier information and the second carrier information are different includes:
comparing whether the waveform of the first carrier information is different from the waveform of the second carrier information; or
Comparing whether the bit sequence of the first carrier information is different from the bit sequence of the second carrier information.
In this embodiment, the receiving device may compare whether the waveform of the first carrier information differs from the waveform of the second carrier information, specifically, may compare whether the peak values of the waveforms of the first carrier information and the second carrier information differ, and if so, may determine that the first carrier information differs from the second carrier information.
Alternatively, the receiving device may compare whether the bit sequence of the first carrier information differs from the bit sequence of the second carrier information, such as: the bit sequence of the first carrier information is 1-111-1, the bit sequence of the second carrier information is 1-11-1-1, it can be seen that the difference between the 4 th bit and the second carrier information is 2, the difference between the other bits is 0, and the difference is obvious, so that the difference between the first carrier information and the second carrier information can be determined. Due to the influence of noise, at the time of specific processing, when the phase difference is greater than or equal to 2, the difference is considered to exist.
Step 205, if the first carrier information is different from the second carrier information, the receiving device determines that the secret information exists.
In the present invention, the second carrier information is information obtained by encoding and modulating the original carrier information, and no other information is embedded in the second carrier information, and if the first carrier information is different from the second carrier information, it can be determined that other information is embedded in a position in the first carrier information that is different from the second carrier information, and it can be further determined that the embedded other information is secret information.
In which, implementing the method described in fig. 2, the receiving device may receive the first carrier information after replacing the steganography; processing the first carrier information to obtain original carrier information; processing the original carrier information to obtain second carrier information before replacing steganography; comparing whether the first carrier information is different from the second carrier information; and if the first carrier information is different from the second carrier information, determining that secret information exists. Therefore, by implementing the embodiment of the invention, the receiving device can restore the original carrier information, further compare the first carrier information after replacing steganography with the second carrier information before replacing steganography, and if the first carrier information and the second carrier information are different, the position where the information is replaced can be detected, so that the existence of the steganography information can be determined.
Referring to fig. 3, fig. 3 is a schematic flowchart of another amplitude difference-based information detection method according to an embodiment of the present invention. As shown in fig. 3, the information detection method based on the amplitude difference may include the steps of:
step 301, the receiving device receives the first carrier information after replacing the steganography.
Step 302, the receiving device processes the first carrier information to obtain original carrier information.
Step 303, the receiving device processes the original carrier information to obtain the second carrier information before replacing steganography.
Step 304, the receiving device compares whether the first carrier information and the second carrier information are different.
Step 305, if the first carrier information is different from the second carrier information, the receiving device determines that the secret information exists.
Step 306, the receiving device determines the position where the first carrier information is different from the second carrier information as a modification position for replacing the steganography.
In the present invention, the second carrier information is information obtained by encoding and modulating the original carrier information, and no other information is embedded in the second carrier information, and if the first carrier information is different from the second carrier information, it can be determined that other information (i.e., secret information) is embedded in a position in the first carrier information that is different from the second carrier information. Further, the receiving device may determine a location where the first carrier information differs from the second carrier information as a modification location to replace steganography.
Step 307, the receiving device obtains the secret information at the modification position of the first carrier information.
In the invention, after the receiving device has determined the position where the steganographic information is replaced by steganographic information, the steganographic information can be obtained after demodulation and a corresponding decoding mode are performed at the modification position of the first carrier information.
In which the method described in fig. 3 is implemented to obtain the steganographic information at the location of the replacement steganographic after detecting the presence of the steganographic information.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention. The information detection apparatus described in fig. 4 may be configured to perform part or all of the steps in the information detection method based on the amplitude difference described in fig. 2 or fig. 3, for which reference is specifically made to the relevant description in fig. 2 or fig. 3, which is not repeated herein. As shown in fig. 4, the information detecting apparatus may include:
a receiving unit 401, configured to receive the first carrier information after replacing the steganography;
a first obtaining unit 402, configured to process the first carrier information to obtain original carrier information;
a second obtaining unit 403, configured to process the original carrier information to obtain second carrier information before replacing steganography;
a comparing unit 404, configured to compare whether there is a difference between the first carrier information and the second carrier information;
a determining unit 405, configured to determine that secret information exists if the first carrier information is different from the second carrier information.
Optionally, the determining unit 405 is further configured to determine a position where the first carrier information and the second carrier information are different as a modification position for replacing steganography;
the second obtaining unit 403 is further configured to obtain the secret information at the modification position of the first carrier information.
Optionally, the processing the first carrier information by the first obtaining unit 402, and obtaining the original carrier information includes:
and demodulating and carrying out error correction coding processing on the first carrier information to obtain original carrier information.
Optionally, the comparing unit 404 compares whether the first carrier information and the second carrier information are different, including:
comparing whether the waveform of the first carrier information is different from the waveform of the second carrier information; or
Comparing whether the bit sequence of the first carrier information is different from the bit sequence of the second carrier information.
The information detection apparatus described in fig. 4 may be implemented to receive the first carrier information after replacing the steganography; processing the first carrier information to obtain original carrier information; processing the original carrier information to obtain second carrier information before replacing steganography; comparing whether the first carrier information is different from the second carrier information; and if the first carrier information is different from the second carrier information, determining that secret information exists. Therefore, by implementing the embodiment of the invention, the original carrier information can be restored, the first carrier information after replacing steganography is further compared with the second carrier information before replacing steganography, and if the first carrier information and the second carrier information are different, the position where the information is replaced can be detected, so that the existence of the steganography information can be determined.
The integrated unit implemented in the form of a software functional module may be stored in a computer readable storage medium. Wherein the computer readable storage medium may store a computer program which, when executed by a processor, may implement the steps of the above-described respective method embodiments. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM), Random-Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the contents contained in the computer-readable storage medium can be increased or decreased as appropriate according to the requirements of legislation and patent practice in the jurisdiction.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a receiving device according to an embodiment of the present invention. The receiving device shown in fig. 5 includes a processor 501 and a memory 502. The processor 501 and the memory 502 are connected to a communication bus, respectively. The memory 502 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory). Those skilled in the art will appreciate that the configuration of the receiving device shown in fig. 5 is not intended to limit the present invention, and may be a bus configuration, a star configuration, a combination of more or fewer components than those shown in fig. 5, or a different arrangement of components.
The processor 501 is a control center of the receiving device, and may be a Central Processing Unit (CPU), where the processor 501 is connected to various parts of the receiving device by using various interfaces and lines, and executes or executes software programs and/or modules stored in the memory 502 and calls program codes stored in the memory 502 to perform the following operations:
receiving the first carrier information after replacing the steganography;
processing the first carrier information to obtain original carrier information;
processing the original carrier information to obtain second carrier information before replacing steganography;
comparing whether the first carrier information is different from the second carrier information;
and if the first carrier information is different from the second carrier information, determining that secret information exists.
As an alternative embodiment, the processor 501 may also call the program code stored in the memory 502 for performing the following operations:
determining a position where the first carrier information is different from the second carrier information as a modification position for replacing steganography;
and acquiring the secret information at the modification position of the first carrier information.
As an optional implementation manner, the processing the first carrier information to obtain original carrier information includes:
and demodulating and carrying out error correction coding processing on the first carrier information to obtain original carrier information.
As an optional implementation, the comparing whether the first carrier information and the second carrier information are different includes:
comparing whether the waveform of the first carrier information is different from the waveform of the second carrier information; or
Comparing whether the bit sequence of the first carrier information is different from the bit sequence of the second carrier information.
In the receiving device depicted in fig. 5, the receiving device may receive the first carrier information after replacing the steganography; processing the first carrier information to obtain original carrier information; processing the original carrier information to obtain second carrier information before replacing steganography; comparing whether the first carrier information is different from the second carrier information; and if the first carrier information is different from the second carrier information, determining that secret information exists. Therefore, by implementing the embodiment of the invention, the receiving device can restore the original carrier information, further compare the first carrier information after replacing steganography with the second carrier information before replacing steganography, and if the first carrier information and the second carrier information are different, the position where the information is replaced can be detected, so that the existence of the steganography information can be determined.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above detailed description is given to the information detection method, apparatus and receiving device based on amplitude difference, which are disclosed in the embodiments of the present invention, and a specific example is applied in this document to explain the principle and implementation of the present invention, and the description of the above embodiments is only used to help understanding the method and its core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (6)

1. An information detection method based on amplitude difference is characterized by comprising the following steps:
receiving the first carrier information after replacing the steganography;
processing the first carrier information to obtain original carrier information, and demodulating and error correction coding the first carrier information to obtain the original carrier information;
processing the original carrier information to obtain second carrier information before replacing steganography, and coding and modulating the original carrier information to obtain the second carrier information before replacing steganography;
comparing whether the first carrier information is different from the second carrier information, by comparing whether a waveform of the first carrier information is different from a waveform of the second carrier information, or comparing whether a bit sequence of the first carrier information is different from a bit sequence of the second carrier information;
and if the first carrier information is different from the second carrier information, determining that secret information exists.
2. The method of claim 1, further comprising:
determining a position where the first carrier information is different from the second carrier information as a modification position for replacing steganography;
and acquiring the secret information at the modification position of the first carrier information.
3. An information detecting apparatus, characterized by comprising:
a receiving unit, configured to receive the first carrier information after replacing the steganography;
a first obtaining unit, configured to process the first carrier information to obtain original carrier information, and obtain the original carrier information by performing demodulation and error correction coding on the first carrier information;
the second obtaining unit is used for processing the original carrier information to obtain second carrier information before replacing steganography, and coding and modulating the original carrier information to obtain the second carrier information before replacing steganography;
a comparing unit for comparing whether the first carrier information is different from the second carrier information, by comparing whether a waveform of the first carrier information is different from a waveform of the second carrier information, or by comparing whether a bit sequence of the first carrier information is different from a bit sequence of the second carrier information;
a determining unit, configured to determine that secret information exists if the first carrier information is different from the second carrier information.
4. The information detecting apparatus according to claim 3,
the determining unit is further configured to determine a position where the first carrier information is different from the second carrier information as a modification position for replacing steganography;
the second obtaining unit is further configured to obtain the secret information at the modification position of the first carrier information.
5. A receiving device characterized in that the receiving device comprises a processor and a memory, the processor executing a computer program stored in the memory to implement the amplitude difference-based information detection method according to any one of claims 1 to 2.
6. A computer-readable storage medium storing at least one instruction which, when executed by a processor, implements the amplitude difference-based information detection method according to any one of claims 1 to 2.
CN201711131900.XA 2017-11-15 2017-11-15 Information detection method and device based on amplitude difference and receiving equipment Active CN107809309B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711131900.XA CN107809309B (en) 2017-11-15 2017-11-15 Information detection method and device based on amplitude difference and receiving equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711131900.XA CN107809309B (en) 2017-11-15 2017-11-15 Information detection method and device based on amplitude difference and receiving equipment

Publications (2)

Publication Number Publication Date
CN107809309A CN107809309A (en) 2018-03-16
CN107809309B true CN107809309B (en) 2020-11-03

Family

ID=61580543

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711131900.XA Active CN107809309B (en) 2017-11-15 2017-11-15 Information detection method and device based on amplitude difference and receiving equipment

Country Status (1)

Country Link
CN (1) CN107809309B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007147170A2 (en) * 2006-06-16 2007-12-21 Bittorrent, Inc. Classification and verification of static file transfer protocols
CN102014239A (en) * 2009-09-08 2011-04-13 周岩 High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image
US8965038B2 (en) * 2012-02-01 2015-02-24 Sam Houston University Steganalysis with neighboring joint density
CN103248791B (en) * 2013-05-16 2015-03-18 东南大学 Secrete fax method and device based on information hiding technology
CN104125467B (en) * 2014-08-01 2015-06-17 郑州师范学院 Embedding and extracting methods for video steganography information
CN105827662A (en) * 2016-06-02 2016-08-03 江苏科技大学 ON-OFF time type covert communication detection method based on DCT

Also Published As

Publication number Publication date
CN107809309A (en) 2018-03-16

Similar Documents

Publication Publication Date Title
US8831542B2 (en) Method and apparatus for conveying antenna configuration information via masking
CN105637971B (en) Method and apparatus for equipment discovery
CN107909133B (en) Two-dimensional code generation method, two-dimensional code decoding method and terminal
CN107809310B (en) Information detection method and device based on grouping variance and receiving equipment
RU2372731C2 (en) Device and method to receive or transmit data
RU2486684C2 (en) Scrambler, scramble processing method and program
CN107766771B (en) Two-dimensional code detection method and terminal
CN111523340B (en) Two-dimensional code identification method and device, electronic equipment and storage medium
CN107809309B (en) Information detection method and device based on amplitude difference and receiving equipment
CN107819568B (en) Information detection method and device based on constellation point distance and receiving equipment
CN107078992B (en) Information transmission method, equipment and system
CN112560554A (en) Lip language-based living body detection method, device and storage medium
WO2019095174A1 (en) Information detection method and apparatus based on amplitude difference, and receiving device
CN115314054A (en) Polar code decoding method, apparatus, communication device and storage medium
CN107947898B (en) Information detection method and device based on optimized grouping variance and receiving equipment
WO2019095176A1 (en) Information detection method and apparatus based on packet energy difference value, and receiving device
WO2019095175A1 (en) Information detection method and apparatus based on constellation point distance, and receiving device
WO2019095178A1 (en) Information detection method and apparatus based on optimal packet variance, and receiving device
US20030021297A1 (en) OFDM transmitting apparatus, receiving apparatus and transmitting system and signal structure of transmission signal for use in the same
US11190303B2 (en) Electronic transceiver device, method and computer program for decoding control information
KR102133416B1 (en) Apparatus and Method for Generating Log-Likelihood Ratio of Pulse Amplitude Modulation and Quadrature Amplitude Modulation
JP6392680B2 (en) Reception device, wireless communication system, and error correction method
CN108600248B (en) Communication safety protection method and device
CN107820093B (en) Information detecting method, device and receiving device based on grouping energy differences
WO2019095171A1 (en) Two-dimensional code detection method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant