CN102938888A - Secret document steganography and extraction method suitable for wireless communication environment - Google Patents

Secret document steganography and extraction method suitable for wireless communication environment Download PDF

Info

Publication number
CN102938888A
CN102938888A CN2012104254741A CN201210425474A CN102938888A CN 102938888 A CN102938888 A CN 102938888A CN 2012104254741 A CN2012104254741 A CN 2012104254741A CN 201210425474 A CN201210425474 A CN 201210425474A CN 102938888 A CN102938888 A CN 102938888A
Authority
CN
China
Prior art keywords
byte
hidden
writing
secret
vop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104254741A
Other languages
Chinese (zh)
Other versions
CN102938888B (en
Inventor
何军辉
李敬医
曾潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN201210425474.1A priority Critical patent/CN102938888B/en
Publication of CN102938888A publication Critical patent/CN102938888A/en
Application granted granted Critical
Publication of CN102938888B publication Critical patent/CN102938888B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a secret document steganography and extraction method suitable for a wireless communication environment. A steganography method comprises the steps of secretly writing a secret document into a real-time speech data which are streams with a plurality of bytes, and rewriting the last bit of pseudo-random S bytes in every R-byte speech data into a binary coding of the secret document, wherein every R-byte speech data can be embedded into S-bit data, the speech data totally have S/8 bytes, and S/8 bytes of secrete information is transmitted to the other person involved when every R-byte speech data are transmitted through a communication system. An extraction method comprises the step of extracting the binary coding embedded into the secret document by receiving the sent speech data and using an improved least significant bite (LSB) algorithm to obtain the secrete information sent by a sender. Due to the fact that the confidential information is hidden by means of a steganographic algorithm, even through lawless persons intercept communication information during communication, the lawless persons cannot obtain the secrete document secretly written in the communication information.

Description

Be applicable to hidden the writing and extracting method of secret papers of wireless communications environment
Technical field
The present invention relates to a kind of secure wireless communication technical field that is applicable to, the method that is specifically related to be applicable to the secret papers steganography method of wireless communications environment and extracts secret papers.
Background technology
Along with the development of mobile communication technology and Internet technology and the continuous quickening of people's rhythm of life, people more and more hanker after using all kinds of electronic communication products and other people to link up and exchange.Wireless mobile communications has been penetrated in the middle of people's the work and life, brings great convenience to people.But meanwhile, also there are various safety problems.Transfer of data in the process of communication between base station and base station is used expressly, so the lawless person can intercept and capture and eavesdrop communication data by certain means.Because military market and commercial market are all to communication security and provide the secure transmission of confidential information means to propose a large amount of demands, therefore, we must propose a solution, to realize efficient, available, a safe communication system.
Along with the arriving in 3G epoch, use 3G to become trend of the times.But also there is potential safety hazard to a certain extent in it:
(1) conventional security hidden danger: the lawless person can intercept and capture, distort or the manipulative communications cover signal, all right positioning and communicating position;
(2) new potential safety hazard: 3G standard causes information security degradation and the non-independent intellectual property right of encryption system to have the hidden danger of divulging a secret.
Steganographic algorithm refers to come a kind of novel information protection mode that it is hidden in other media by secret information is embedded into.Now, both at home and abroad to the existing many researchs of the steganographic algorithm of audio frequency and image, but at audio area because the sensitivity of body sounds system is more highly sensitive than the vision system, thus the steganography of audio area that is that all right is ripe.The audio steganography method that exists at present mainly contains: lowest order Shift Method, phase method, echo method, spread spectrum method, transform domain method and compression domain method.
Traditional LSB(Least Significant Bits) algorithm is: secret information is embedded into the least significant bit of carrier image pixel value, also claims least significantly position, it is minimum on the quality impact of carrier image to change this position.Utilizing the LSB algorithm is exactly to rewrite the least significant bit of acoustic information to the principle of audio steganography, because this is redundant, it changes people's ear can't tell, so can be rewritten as other important information.But the fail safe of this algorithm is too poor, be easy to by as
Figure 2012104254741100002DEST_PATH_IMAGE001
Detect and RS detection etc. detects based on the method for adding up, so should invention use a kind of improved LSB algorithm, makes it avoid this detection.And because LSB algorithm itself does not rely on the integrality of audio file, namely can be applicable in the real-time audio stream so change a little.
Summary of the invention
Be defective and the deficiency that solves above-mentioned correlation technique; the present invention proposes to be applicable to hidden the writing and extracting method of secret papers of wireless communications environment; protect whereby the information security of communication user, described secret papers refer to be stored in the file that will protect of any type on the computer.After common wireless speech phone system realizes the method, just can make the user possess the mobile device that utilizes in the hand whenever and wherever possible, with the form of normal speech communication, transmit the ability of specific confidential information, thereby prevent that effectively confidential information from being eavesdropped or intercepting and capturing by the lawless person.In addition, owing to used steganographic algorithm that confidential information is hidden, even the lawless person has intercepted and captured the communication information, also can't obtain the hidden confidential information of writing therein.The present invention is achieved through the following technical solutions.
Be applicable to the secret papers steganography method of wireless communications environment, comprise and writing in the real-time voice data secret papers are hidden, the real-time voice data are the stream of a plurality of bytes, last position of a pseudorandom S byte in every R the byte speech data is rewritten as the hidden position of writing, the speech data of every R byte can embed the data of S position, add up to altogether S/8 byte, the speech data of R byte of the every transmission of phone system is transferred to the other side with regard to the secret information that S/8 byte arranged.When S equaled R, the hidden efficient of writing arrived maximum, is 11.72%.
Further, described S is less than or equal to R and be 8 multiple.
Further, write in the real-time voice data and the process that sends comprises the steps: with secret papers are hidden
(1.1) from secret papers, obtain the hidden relevant information of writing data of needs, comprise filename, filename size, file size and file content;
(1.2) data that step (1.1) got access to change byte arrays into according to total length, byte of padding, filename size, filename, file size, file content respectively, and merge in order a complete byte arrays;
(1.3) each position of each byte expands to a byte in the complete byte arrays that obtains of step (1.2), and last of byte is for needing the position of expansion, the byte composition unit byte arrays after all expansions;
(1.4) length N of acquisition unit byte arrays is carried out modulo operation with N to S, obtains remainder W, and W is as carrying out the hidden size of writing in last VoP;
(1.5) transmit leg is whenever obtaining a VoP from audio communication system, from the unit byte arrays, extract successively S byte, what extract from last VoP is W byte, writes in the VoP by improved LSB algorithm is hidden, obtains the VoP after hidden the writing;
(1.6) utilize audio communication system to transmit by wireless environment the VoP after the above-mentioned steps processing, send on the other side's the equipment;
(1.7) detect whether all unit bytes are sent, if, method ends then; Otherwise forward step (1.5) to.
Further, step (1.5) is described specifically comprises following three steps by hidden the writing of improved LSB algorithm in the VoP:
(1) obtains secret data and the VoP that hiddenly to write;
(2) by pseudo-random generator, S+1 hidden writing position in the random choose VoP;
(3) will want the hidden steganography of writing in (1) on S+1 hidden writing position.
The present invention also provides and has extracted through the hidden method that writes on the secret papers in the real-time voice data of above-mentioned steganography method, comprises the steps:
(2.1) in the communication process, the VoP that receives is write in the local null file, until end of conversation;
(2.2) obtain content in the local file, obtain the byte arrays of local file content;
(2.3) extract front K*8 byte with improved LSB steganographic algorithm from byte arrays obtained in the previous step, K is the byte-sized of an int integer;
(2.4) extract last position of the above-mentioned K*8 that an obtains byte, recombinant gets up to obtain K*8 binary digit, i.e. K byte, and the integer of an int type of K byte composition so just can be determined the length of all hidden secret datas of writing of back;
(2.5) according to the difference of the content that will obtain, change the size of K, repeating step (2.3) and step (2.4) are obtained filename size, filename, file size and file content successively;
(2.6) the filename size, filename, file size and the file content that obtain according to step (2.5) just can be determined whole secret papers, thereby obtain the secret information that transmit leg sends over.
Further, described improved LSB algorithm is the maximum of the hidden secret data amount of writing of energy at every turn, adjusts according to practical communication data volume size.
Further, use improved LSB algorithm that VoP is carried out secret data and extract, comprise following three steps:
(1) obtain a VoP, pseudorandom is selected wherein S+1 hidden writing position;
(2) the position information on S+1 the hidden writing position is extracted, form secret data;
(3) secret data that extracts in (2) is turned back to the outside.
Improved LSB algorithm of the present invention is specifically: LSB (Least Significant Bits) is writing a Chinese character in simplified form of Least significant bit position, the LSB algorithm is a kind of method that the most unessential bit of each carrier information is made amendment, and this modification comprises the replacement of least significant bit and extraction.Improved LSB algorithm is on the basis of traditional LSB algorithm herein, has increased randomness.The secret data that embeds in the primal algorithm is that order is embedded in the carrier information, and the algorithm after improving has been broken this succession, and takes embedding at random, guarantees simultaneously correct extraction.Through after this improvement, this steganographic algorithm can be resisted great majority based on statistical attack method.
Compared with prior art, the present invention has the following advantages and technique effect:
(1) with Information hiding means protection important information, breaks through the thought chains of conventional cryptography method;
(2) the audio steganography technology is applied in the real-time voice call, breaks through tradition and only considers that is stored in a local audio file, Information Hiding Techniques is applied to other field except digital watermarking;
(3) can utilize caching technology, stochastic technique, the technology such as piecemeal processing are improved traditional algorithm, can resist traditional detection, and can be applicable to real-time audio stream of the presently claimed invention, and namely the method is applicable in the real-time wireless communications environment;
(4) traditional LSB algorithm changes the lowest order of whole audio file into hidden write information, can obviously detect audio files by the proterties after changing when statistical analysis, and improved LSB algorithm of the present invention has then been avoided detection effectively.
Description of drawings
Fig. 1 be in the execution mode in the wireless communications environment secret papers hidden write and extract transfer process figure.
Fig. 2 is the hidden format description figure that writes among the embodiment.
Fig. 3 is the schematic diagram of selecting of the hidden writing position of primary voice data bag.
To be that the individual voice packet is hidden in the example write or extract flow chart to Fig. 4.
Embodiment
Below in conjunction with accompanying drawing implementation of the present invention is described further, but enforcement of the present invention and protection range are not limited to this.
Be that secret papers in the wireless communications environment of execution mode hidden write and extracted flow chart such as Fig. 1, this example is decided to be 256 with VoP byte-sized R, is decided to be 240 with carrying out the hidden byte number S that writes in each VoP.Because improved LSB algorithm is the hidden secret papers of writing directly, so before transmit leg and recipient set up voice call, transmit leg at first will carry out preliminary treatment to the secret papers that will hiddenly write, secret papers is treated to the secret data that is fit to improved LSB algorithm.Pre-treatment step is as follows:
(1) from want the hidden secret papers of writing, obtains related data, comprise filename, filename size, file size and file content;
(2) data that above-mentioned steps got access to change byte arrays into according to total size, byte of padding, filename size, filename, file size, file content, as shown in Figure 2, and be merged in order a complete byte arrays, this byte arrays is defined as Bytes, each position of each byte represents that with B B1 as shown in Figure 4 is part 30 byte content among the Bytes to B240 in the Bytes.Wherein total size refers to total size that amounts to of filename size, filename, file size, file content, and total size effect is to determine the hidden line of demarcation of writing data in the speech data, and namely front how many bytes contain the hidden data of writing in the speech data; The filename size refers to that the byte-sized file with the filename of string representation is the filename with string representation; File size refers to the byte-sized of file; File content is the file content that represents with the byte form.Because total size is with an int(4 byte) type integer representation, and the hidden data of writing 30 bytes of VoP energy have more 26 bytes, so fill vacancy with 26 byte of paddings.
(3) each B of each byte expands to byte among the byte arrays Bytes that obtains of above-mentioned steps, last position for needing to expand of byte, byte arrays after all expansions is the unit byte arrays, why the unit's of being referred to as byte arrays is because each array in the unit byte arrays only has last meaningful.Therefore, unit byte arrays size is 8 times of Bytes;
(4) length N of acquisition unit byte arrays to 240 deliverys, obtains remainder, as carrying out the hidden size of writing in last VoP with N;
Through after the above-mentioned steps, be equivalent to secret papers are divided into a plurality of secret datas that can supply improved LSB algorithm to call, both sides just can begin to set up network connection, carry out voice call.
The whole hidden secret data process of writing is carried out around a plurality of transmission VoPs with transmission secret data process.Further, will be from the speech data of microphones capture take 256 bytes as a VoP, VoP of every acquisition just carries out the hidden of secret data and writes.Concrete steps are:
(1) from the transmit leg voice system, gets access to a real-time VoP;
(2) from the unit byte arrays, extract successively 240 bytes and write in the original VoP that is formed by 256 bytes by improved LSB algorithm is hidden, obtain the VoP after hidden the writing; The VoP that above-mentioned steps is obtained is given lower one deck and is for further processing, and for example can send to by the Internet long-range;
(3) go back to step (2), until all bytes in the unit byte arrays are sent.
The concrete steganographic algorithm of mentioning in the above-mentioned steps (2) is
(1) adopt pseudorandom method to select 241 hidden writing positions, and do not adopt the method for order, the position sequence that herein produces is at random controlled by a seed, and can not repeat, and then ignores if any repeating, and obtains at last without the pseudo random sequence that repeats, such as Fig. 3;
(2) R1 refers to 256 bytes in the VoP to R256 among Fig. 3, and X0 refers to that to X240 hidden writing position selects 241 bytes of rear correspondence.LSB (x i) be minimum 1 of sampled point xi.The computational methods of xi are: X i=X i+ R i-(LSB (x I-1)+LSB (x i)) Mod 2, if xi greater than 127, xi=xi-2 then; If xi is less than-128, xi=xi+2 then.
(3) the original xi of xi replacement that is calculated by step (2) just finishes the hidden of each VoP and writes.
Next describe recipient's flow process, the steps include:
(1) whenever receive the VoP that transmit leg is sent from wireless environment, it is sequentially write in the temporary file, until end of conversation by reception.Here suppose the air time long enough, the VoP after all hidden writing can both be transferred to the recipient.Can calculate in advance and estimate the used time, remind, the bust this if the time is short.
(2) as shown in Figure 4, front 256 bytes (content of 1 VoP) of temporary file are extracted, and with improved LSB algorithm general 240 unit byte-extraction wherein out, by bit manipulation last position of 240 bytes is extracted again, obtain 240 positions, the byte arrays of 30 bytes of one-tenth capable of being combined.Because rear 26 bytes in these 30 bytes all are byte of paddings, so only keep the content of front 4 bytes, be converted to the int type, so just obtain the hidden total length N1 that writes content in back, and calculate the hidden big or small N2. that writes byte of last VoP by N1/30
(3) according to the N1 that obtains previously, N1/30 (rounding) is designated as N3, continue to extract an ensuing N3 VoP in the temporary file, these packets can both extract with the method in the step (2) secret data of 30 bytes, and last VoP (i.e. N3+1) to extract the byte-sized of secret data be N2, such as Fig. 2.
(4) secret data that extracts in (3) sequentially is combined by reception, the inside just includes the filename size, filename, file size, these four byte content of file content.At first extract a byte content, this byte specified document name length; Extract ensuing byte by this length, these bytes can be converted to filename; Extract next 4 bytes, these bytes can be converted to an int again, the specified document size; Extract ensuing byte according to file size, these bytes can be converted to file content.
(5) because filename is big or small, filename, file size and file content are determined, just can be restored the hidden secret papers that write in the real-time voice packet of transmit leg.
The hidden method that writes on the secret data (file) in the VoP of concrete extraction in the above-mentioned steps is:
(1) selects 241 hidden writing positions for each VoP adopts the method identical with transmit leg, obtain at last without repeating pseudo random sequence, such as Fig. 3;
(2) equally as shown in Figure 3, R1 refers to 256 bytes in the VoP to R256, and X0 refers to that to X240 hidden writing position selects 241 bytes of rear correspondence.With each unit byte of following formulas Extraction
m i=(LSB(x i-1)+LSB(x i))Mod?2
Wherein last of mi is the Bi among Fig. 4, and we just can obtain 240 unit bytes like this.

Claims (6)

1. be applicable to the secret papers steganography method of wireless communications environment, comprise and writing in the real-time voice data secret papers are hidden, it is characterized in that, the real-time voice data are the stream of a plurality of bytes, last position of a pseudorandom S byte in every R the byte speech data is rewritten as the hidden position of writing, and the speech data of every R byte can embed the data of S position, adds up to altogether S/8 byte, the speech data of R byte of the every transmission of phone system is transferred to the other side with regard to the secret information that S/8 byte arranged.
2. the secret papers steganography method that is applicable to wireless communications environment according to claim 1 is characterized in that described S less than or equal to R and is 8 multiple.
3. the secret papers steganography method that is applicable to wireless communications environment according to claim 1 is characterized in that writing in the real-time voice data and the process that sends comprises the steps: with secret papers are hidden
(1.1) from secret papers, obtain the hidden relevant information of writing data of needs, comprise filename, filename size, file size and file content;
(1.2) data that step (1.1) got access to change byte arrays into according to total length, byte of padding, filename size, filename, file size, file content respectively, and merge in order a complete byte arrays;
(1.3) each position of each byte expands to a byte in the complete byte arrays that obtains of step (1.2), and last of byte is for needing the position of expansion, the byte composition unit byte arrays after all expansions;
(1.4) length N of acquisition unit byte arrays is carried out modulo operation with N to S, obtains remainder W, and W is as carrying out the hidden size of writing in last VoP;
(1.5) transmit leg is whenever obtaining a VoP from audio communication system, from the unit byte arrays, extract successively S byte, what extract from last VoP is W byte, writes in the VoP by improved LSB algorithm is hidden, obtains the VoP after hidden the writing;
(1.6) utilize audio communication system to transmit by wireless environment the VoP after the above-mentioned steps processing, send on the other side's the equipment;
(1.7) detect whether all unit bytes are sent, if, method ends then; Otherwise forward step (1.5) to.
4. the secret papers steganography method that is applicable to wireless communications environment according to claim 3 is characterized in that step (1.5) is described and specifically comprises following three steps in the VoP by hidden the writing of improved LSB algorithm:
(1) obtains secret data and the VoP that hiddenly to write;
(2) by pseudo-random generator, S+1 hidden writing position in the random choose VoP;
(3) will want the hidden steganography of writing in (1) on S+1 hidden writing position.
5. according to claim 4 the described secret papers steganography method that is applicable to wireless communications environment is characterized in that the maximum that described improved LSB algorithm at every turn can the hidden secret data amount of writing, and adjusts according to practical communication data volume size.
6. be applicable to the secret papers extracting method of wireless communications environment, it is characterized in that extracting after hidden the writing of the described steganography method of claim 1 and the secret papers that send, specifically comprise the steps:
(2.1) in the communication process, the VoP that receives is write in the local null file, until end of conversation;
(2.2) obtain content in the local file, obtain the byte arrays of local file content;
(2.3) extract front front K*8 the byte of extracting with improved LSB steganographic algorithm from byte arrays obtained in the previous step, K is the byte-sized of an int integer;
(2.4) extract last position of the above-mentioned K*8 that an obtains byte, recombinant gets up to obtain K*8 binary digit, i.e. K byte, and the integer of an int type of K byte composition so just can be determined the length of all hidden secret datas of writing of back;
(2.5) according to the difference of the content that will obtain, change the size of K, repeating step (2.3) and step (2.4) are obtained filename size, filename, file size and file content successively;
(2.6) the filename size, filename, file size and the file content that obtain according to step (2.5) just can be determined whole secret papers, thereby obtain the secret information that transmit leg sends over.
CN201210425474.1A 2012-10-31 2012-10-31 Secret document steganography and extraction method suitable for wireless communication environment Expired - Fee Related CN102938888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210425474.1A CN102938888B (en) 2012-10-31 2012-10-31 Secret document steganography and extraction method suitable for wireless communication environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210425474.1A CN102938888B (en) 2012-10-31 2012-10-31 Secret document steganography and extraction method suitable for wireless communication environment

Publications (2)

Publication Number Publication Date
CN102938888A true CN102938888A (en) 2013-02-20
CN102938888B CN102938888B (en) 2015-06-03

Family

ID=47697748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210425474.1A Expired - Fee Related CN102938888B (en) 2012-10-31 2012-10-31 Secret document steganography and extraction method suitable for wireless communication environment

Country Status (1)

Country Link
CN (1) CN102938888B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104681031A (en) * 2014-12-08 2015-06-03 华侨大学 Bit combination-based stego-detection method for least significant bits (LSB) of low-bit-rate speeches
CN107169914A (en) * 2017-05-16 2017-09-15 宁波大学 A kind of cipher-text information generation method for image latent writing
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN111526123A (en) * 2017-10-24 2020-08-11 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000025203A1 (en) * 1998-10-28 2000-05-04 Datamark Technologies Pte Ltd. Methods of digital steganography for multimedia data
CN102509551A (en) * 2011-11-23 2012-06-20 北京邮电大学 Audio steganalysis algorithm based on variance of difference of sum cepstrum

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000025203A1 (en) * 1998-10-28 2000-05-04 Datamark Technologies Pte Ltd. Methods of digital steganography for multimedia data
CN102509551A (en) * 2011-11-23 2012-06-20 北京邮电大学 Audio steganalysis algorithm based on variance of difference of sum cepstrum

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何军辉等: "基于变步长量化的安全图像隐写", 《计算机科学》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104681031A (en) * 2014-12-08 2015-06-03 华侨大学 Bit combination-based stego-detection method for least significant bits (LSB) of low-bit-rate speeches
CN104681031B (en) * 2014-12-08 2018-03-09 华侨大学 A kind of low-bit-rate speech coding least significant bit Stego-detection method based on bit combination
CN107169914A (en) * 2017-05-16 2017-09-15 宁波大学 A kind of cipher-text information generation method for image latent writing
CN107169914B (en) * 2017-05-16 2018-04-20 宁波大学 A kind of cipher-text information generation method for image latent writing
CN111526123A (en) * 2017-10-24 2020-08-11 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium
CN111526123B (en) * 2017-10-24 2022-02-25 大国创新智能科技(东莞)有限公司 Big data-based information steganography method, extraction method, system, equipment and medium
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN102938888B (en) 2015-06-03

Similar Documents

Publication Publication Date Title
Sarmah et al. Proposed system for data hiding using cryptography and steganography
CN101277194B (en) Transmitting/receiving method for secret communication
CN101478391B (en) IP voice hidden communication method based on stream encryption
CN101488852B (en) IP voice concealed communication method based on m sequence
CN105590297B (en) Based on GF (27) significant (K, the N) image point of finite field and double authentication deposits reconstructing method
CN102938888B (en) Secret document steganography and extraction method suitable for wireless communication environment
CN101882296A (en) Method for hiding Chebyshev neural network chaotic digital watermark information
CN105260981A (en) Optimal coupling image steganography method based on packet replacement
Nain et al. A reliable covert channel over IEEE 802.15. 4 using steganography
Wang et al. A double interval centroid-based watermark for network flow traceback
CN109547663A (en) A kind of improvement LSB image latent writing method of combining cipher
CN1889428B (en) Biological characteristic data safety hidden transmitting method under network environment
CN113923312B (en) Robust reversible watermarking method of digital image coding layer based on wireless communication
CN103023630A (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN104660591B (en) IP address-based packet length feedback network concealed communication method
US8971531B2 (en) Data embedding system
CN111327631B (en) Secret information transmission method and system based on TCP and UDP
CN104159118A (en) Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
Parah et al. On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA)
Srivastava et al. Data Hiding using Image Steganography
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Zhang et al. MSAC and multi-flow attacks resistant spread spectrum watermarks for network flows
Geetha et al. Implementation of ETAS (embedding text in audio signal) model to ensure secrecy
Tiwari et al. A Robust Method for Image Steganography based on chaos theory
CN112637442A (en) Method and device for encrypting circulating image by cloud server and local end

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150603

Termination date: 20201031