CN104765773A - Multi-account network news commentary time based covert communication method - Google Patents

Multi-account network news commentary time based covert communication method Download PDF

Info

Publication number
CN104765773A
CN104765773A CN201510113988.7A CN201510113988A CN104765773A CN 104765773 A CN104765773 A CN 104765773A CN 201510113988 A CN201510113988 A CN 201510113988A CN 104765773 A CN104765773 A CN 104765773A
Authority
CN
China
Prior art keywords
news
transmit leg
time
account
comment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510113988.7A
Other languages
Chinese (zh)
Other versions
CN104765773B (en
Inventor
黄刘生
张恒华
张宇飞
沈瑶
杨威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Institute for Advanced Study USTC
Original Assignee
Suzhou Institute for Advanced Study USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Institute for Advanced Study USTC filed Critical Suzhou Institute for Advanced Study USTC
Priority to CN201510113988.7A priority Critical patent/CN104765773B/en
Publication of CN104765773A publication Critical patent/CN104765773A/en
Application granted granted Critical
Publication of CN104765773B publication Critical patent/CN104765773B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a multi-account network news commentary time based covert communication method. Through the network news commentary time based covert communication method, a sender converts to-be-sent covert information into 01 bit sequences through preprocessing and encodes the bit sequences into news commentary time, the sender comments news in a plurality of news plates in certain portal through a plurality of registered accounts, the receiver collects comment making time to perform comment time statistical ranking, obtains hidden bit sequences through decoding and converts the bit sequences into real hidden information through reverse processing, accordingly, covert communication is achieved. The method has the advantages that the covert channel detection resistance is improved greatly, and broad application prospects are provided.

Description

Based on the conceal communication method of many accounts on-line news and commentary time
Technical field
The present invention relates to Information Hiding Techniques field, particularly relate to a kind of conceal communication method based on many accounts on-line news and commentary time.
Background technology
Information Hiding Techniques obtains in recent years and develops rapidly.It will be embedded in disclosed carrier information after secret information process, secret information sends and do not discovered by the transmission along with carrier information.The hidden channel of network is exactly a kind of technology utilizing Information hiding to transmit secret information, and due to the disguise that it has, this technology can bring the potential threat of information leakage.The hidden channel of network can be divided into the hidden channel of storage-type and the hidden channel of sequential type, and wherein the hidden channel of sequential type mainly utilizes the modes such as transfer rate or network packet interval time to realize, and compares the hidden channel of memory-type and has stronger disguise.
The concept of private communication channel is proposed first in the ACM conference of 1973 by Lampson.Subsequently, researchist has carried out many-sided research to private communication channel.The people such as Padlipsky propose the hidden channel of ON-OFF sequential type in article " Limitations of End-to-End Encryption in Secure Computer Networks ", by whether sending packet to embed in a certain time interval hide Info.The people such as Cabuk propose the hidden channel of IPCTC sequential type in article " Network Covert Channels:Design, Analysis, Detection, and Elimination ".Other main hidden channels of sequential type also have TRCTC, JitterBug, DM etc.
The hidden channel of current sequential type is mainly by the modulation transmission gap of normal data packet thus the illegal data of the transmission of secret.By the transmission interval in transmit leg modulation normal data packet, and be 0 or 1 at data receiver by what judge that the time interval receiving packet judges that transmit leg sends.Because time hidden channel is normally by normal network communication channels transmission data, therefore traditional security strategy does not have way and controls this channel.But at present for the hidden channel of sequential type occurred, the researchist of information security aspect has done a lot of correlative studys, relevant detection method also consecutive publications.Therefore the hidden channel of sequential type needs to seek new development.
In recent years, along with the fast development of computer networking technology, internet is widely applied, and masses can be held by pc or mobile terminal accessing news portal website very easily, therefore utilize the on-line news and commentary time to build private communication channel and have feasibility.
Summary of the invention
The technical matters that the present invention mainly solves is to provide a kind of conceal communication method based on many accounts on-line news and commentary time.The method is based on the core concept of hidden channel build, in a new application scenarios, utilize a kind of new thinking to build private communication channel, effectively improve the anti-detection of private communication channel, simultaneously Information Hiding Techniques application and universal on have market outlook widely.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is:
There is provided a kind of conceal communication method based on many accounts on-line news and commentary time, its step comprises:
(1) arrange and agreement prestored information at transmit leg and receiving on square end respectively, described prestored information comprises the conceal communication method of use, the website carrier of secret communication, the accounts information of transmit leg registration, the news column waiting to comment on and check, the news date of waiting to comment on and check, the size (nonnegative integer of 1min doubly) of call duration time sheet and the start time of secret communication and end time; Described call duration time sheet comprises transmitting time sheet, receive slot;
(2) comprise in the step of the secret communication sending method of transmit leg:
(2.1) first transmit leg should open the news portal website with function of making comments, and registers some accounts informations, and registered account is numbered 1 respectively, 2,3 ... n; All accounts of registration divided into groups by the odd even attribute of coding of accounts, the account being wherein numbered odd number is divided into odd number account group, and the account being numbered even number is divided into even number account group; Transmit leg selectes some news column S to be commented on 1, S 2s nand wait the date of commenting on news;
(2.2) transmit leg carries out binary coding to original cipher text M, obtains the cipher-text information M be made up of 0 and 1 k; Arrange the maximum length threshold of ciphertext sequence, described maximum length threshold is the comment sum maximal value that transmit leg can send in arranged transmitting time sheet; According to maximum length threshold by cipher-text information M kcarry out random burst, generate some ciphertext sequence M k1, M k2, M k3m kn, make M k1, M k2, M k3m knlength be less than or equal to maximum length threshold, M k1, M k2, M k3m knbe and hide Info;
(2.3) transmit leg is to ciphertext sequence M k1, M k2, M k3m knencode successively, and embed secret information by selecting the account of some difference numberings to carry out news analysis at random; The ciphertext sequence M that transmit leg will will be made up of 0 and 1 in a transmitting time sheet ki(1≤i≤n) sends end, and sending method has been come by comment news; Suppose ciphertext sequence M kilength be L ibit, namely transmit leg needs to send L in current transmitting time sheet ibar news analysis, every bar news analysis all hides hiding Info of 1bit; Judge the current parity hidden Info needing to send, if be odd number 1, transmit leg chooses an account as comment account from odd number account group; If be even number 0, transmit leg then chooses an account as comment account from even number account group;
(2.4), after having encoded, transmit leg obtains coding result table; After the communication start time that transmit leg and take over party about set, transmit leg, according to the information in gained coding result table, hiding Info by delivering news analysis to send, being all transmitted until hide Info;
(3) comprise in the step of the secret information method of reseptance of receiving end:
(3.1) first take over party obtains whole news that this portal website issues at both sides' appointed day, after the secret communication start time, namely prepares to receive secret information;
(3.2) in units of a receive slot, take over party is at the news column S arranged in advance 1, S 2s nthe time of all news analysis that middle collection transmit leg sends in current receive slot and selected coding of accounts;
(3.3) information of take over party to the news analysis of collecting is added up, and creates the raw data set of a review information, and this raw data concentrates every bar data message to comprise coding of accounts and comment time;
(3.4) take over party is decoded to the data obtained collection by coding/decoding method, and what obtain that transmit leg in current receive slot sends hides Info;
(4) repetitive cycling step (2.1)-(2.4) and (3.1)-(3.4), until the end time of both sides' agreement;
(5) take over party is according to the preprocess method of transmit leg to the M employing that hides Info, to cipher-text information M kcarry out reverse process, recover original original cipher text M.
In a preferred embodiment of the present invention, step (3.4) take over party is decoded to the data obtained collection by coding/decoding method, obtains the concrete steps hidden Info that transmit leg in current receive slot sends and comprises:
First take over party need carry out ascending order arrangement to the data of raw data set according to comment time and coding of accounts successively, obtains the new data set of;
The odd even attribute that take over party numbers according to current account, to the every bar decoding data in new data set, and obtains hiding Info in this comment data;
If current commentary account be numbered odd number, then represent that hiding Info of these data is 1, if current commentary account be numbered even number, then hiding Info of these data is 0;
According to the method described above, take over party obtains current data and concentrates corresponding the hiding Info of whole comment data;
Current gained directly hides Info and to splice with hiding Info of having obtained before by take over party, namely obtains the whole concealed bit sequence sent by the end of current receive slot transmit leg.
In a preferred embodiment of the present invention, transmit leg is assessed according to the call duration time sheet size of making an appointment and current network environment and arranges maximum length threshold.
In a preferred embodiment of the present invention, in described step (2.3), when transmit leg is to ciphertext sequence M kiwhen (1≤i≤n) encodes, the comment account number that transmit leg is selected at random can not exceed the length of this sequence.
In a preferred embodiment of the present invention, in described step (2.3), selected comment account at least uses once in current transmitting time sheet.
In a preferred embodiment of the present invention, in described step (2.3), each ciphertext sequence need be encoded according to coding of accounts order from small to large when encoding, and preferential use numbers less account;
In a preferred embodiment of the present invention, in described step (2.3), for n ciphertext sequence M k1, M k2, M k3m kn, transmit leg needs to be sent completely in n transmitting time sheet.
In a preferred embodiment of the present invention, in described step (2.3), the time interval Δ T of adjacent two transmitting time sheets is set to stochastic variable, and time interval Δ T can be any nonnegative integer times of 1min.
In a preferred embodiment of the present invention, in described step (2.4), transmit leg was collected or is write the comment with news with certain degree of correlation before secret communication starts, and category sets up comment data collection; Transmit leg is when commenting on, and directly from the corresponding classification of comment data collection, random selecting data are commented on.
In a preferred embodiment of the present invention, in described step (3.2), the data of collecting in certain receive slot as take over party are 0, namely when current time sheet is sheet ineffective time, take over party directly skips over step below, circulation performs step (3.2), collects the review information that in next receive slot, transmit leg sends.
The invention has the beneficial effects as follows: the present invention, under the prerequisite not affecting overt channel proper communication, can realize the disguised very strong transmission that hides Info.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings, wherein:
Fig. 1 is the schematic flow sheet of conceal communication method one preferred embodiment based on many accounts on-line news and commentary time of the present invention;
Fig. 2 is transmit leg determines to comment on account structural representation according to ciphertext sequence to be sent;
Fig. 3 is the encoding example structural drawing that hides Info based on many accounts on-line news and commentary time;
Fig. 4 is the structural drawing that take over party decodes to certain review information according to the odd even attribute of coding of accounts.
Embodiment
Be clearly and completely described to the technical scheme in the embodiment of the present invention below, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1-4, the embodiment of the present invention comprises:
Based on the conceal communication method of many accounts on-line news and commentary time, its step comprises:
(1) on transmit leg and take over party, arrange the conceal communication method used respectively, the website carrier of secret communication, transmit leg registers whole accounts information, wait the news column commented on and check, wait the news date commented on and check, call duration time sheet size (nonnegative integer of 1min doubly), and the start time of secret communication and end time etc.
Described call duration time sheet comprises transmitting time sheet, receive slot.
Described call duration time sheet is a saying of being referred to as, and each timeslice identical with prescribed level all can be called call duration time sheet.Transmitting time sheet and receive slot are the statement of call duration time sheet under different conditions, transmitting time sheet for transmit leg, receive slot be for take over party.
Each call duration time sheet has a start time and end time, and do not occur simultaneously between different timeslices, the time interval mainly through adjacent two timeslices controls.
(2) comprise in the step of the secret communication sending method of transmitting terminal:
(2.1) first transmit leg should open the news portal website that can make comments, register some account information, and registered account is numbered 1 respectively, 2,3 ... n, then all accounts of registration divided into groups by the odd even attribute of coding of accounts, the account being wherein numbered odd number is divided into one group, and the account being numbered even number is divided into another group.Then transmit leg selectes some news column S to be commented on 1, S 2s nand wait the date of commenting on news.
(2.2) transmit leg carries out binary coding to original cipher text M, obtains the bit sequence M be made up of 0 and 1 k, subsequently by cipher-text information M kcarry out random burst, generate some ciphertext sequence (M k1, M k2, M k3m kn), M k1, M k2, M k3m knbe and hide Info.Ciphertext sequence M k1, M k2, M k3m kncan be isometric also can be Length discrepancy, but all be no more than certain maximum length threshold preset, i.e. Length(M ki) <=MaxLength (i=1,2,3 ... n).Here maximum length threshold MaxLength represents the comment sum maximal value that transmit leg can send in arranged timeslice, and transmit leg can be assessed according to the timeslice size of making an appointment and current network environment and arrange maximum length threshold MaxLength.
(2.3) transmit leg is to ciphertext sequence M k1, M k2, M k3m knencode successively.It should be explicitly made clear at this point, for the ciphertext sequence M that is made up of 0 and 1 ki(1≤i≤n), transmit leg needs to send in the timeslice that certain time point starts to terminate, and sending method has been come mainly through comment news.Suppose ciphertext sequence M kilength be L ibit then represents that transmit leg needs to send L in current time sheet ibar news analysis, 1bit information is hidden in every bar comment, and whole sizes hidden Info does not need to limit, and the size that hides Info that in each timeslice, transmit leg sends also does not limit, as long as be no more than threshold size.But here " every bar comment hide 1bit information " institute refer to every bar comment on the size of information hidden, here the size hidden Info needs to be limited to 1bit, otherwise just can not specify the figure place that this comment hides Info when take over party gets this comment, also just cannot carry out decode operation.
If need hiding Info of transmission to be 1 current, transmit leg then needs from odd number account group, to choose an account as comment account.
If need hiding Info of transmission to be 0 current, transmit leg then needs from even number account group, to choose an account as comment account.Transmit leg carries out news analysis to embed secret information mainly through selecting the account of some difference numberings at random.
(2.4), after having been encoded by (2.3), transmit leg can obtain coding result table similar to Figure 3.After the communication start time of both sides' agreement, transmit leg according to gained coding result, can hide Info by delivering news analysis to send.All be transmitted until hide Info.
(3) comprise in the step of the secret information method of reseptance of receiving end:
(3.1) first take over party obtains whole news that this portal website issues at both sides' appointed day, after the secret communication start time, namely prepares to receive secret information.
(3.2) in units of a call duration time sheet, take over party is at the news column S arranged in advance 1, S 2s nthe time of all news analysis that middle collection transmit leg uses multiple account to send in current time sheet.
(3.3) take over party needs to add up the collected news analysis time, and create a comment time raw data set DataSet, this data centralization every bar data message is all similar is < coding of accounts, the form of comment time >.
(3.4) take over party is decoded to the data obtained collection by coding/decoding method, and what obtain that transmit leg in current time sheet sends with this hides Info.First take over party need carry out ascending order arrangement to the data of raw data set DataSet according to comment time and coding of accounts successively, obtains the new data set DataSet of 1.Take over party is to DataSet 1in every bar decoding data time need according to the odd even attribute of current account numbering obtain this comment data the information hidden.If current commentary account be numbered odd number, then represent that hiding Info of these data is 1, if current commentary account be numbered even number, then hiding Info of these data is 0.According to the method, take over party can obtain current data and concentrate corresponding the hiding Info of whole comment data.Current gained directly hides Info and the whole concealed bit sequence carrying out splicing and namely obtain and send by the end of current time sheet transmit leg that hides Info obtained before by take over party.
(4) repetitive cycling step (2.1)-(2.4) and (3.1)-(3.4), until the end time of both sides' agreement;
(5) take over party is according to the preprocess method of transmit leg to the M employing that hides Info, to cipher-text information M kcarry out reverse process, recover original original cipher text M.
In described step (2.3), when transmit leg is to certain ciphertext sequence M kiwhen (1≤i≤n) encodes, the account number that transmit leg is selected at random can not exceed the length of this sequence; Selected account at least uses once in current time sheet, can use repeatedly; Each ciphertext sequence need be encoded according to coding of accounts order from small to large when encoding, and preferential use numbers less account; For n ciphertext sequence M k1, M k2, M k3m kn, transmit leg needs to be sent completely in n timeslice.In order to improve the anti-detection of private communication channel further, the time interval Δ T of adjacent two timeslices is set to stochastic variable, and Δ T can be any nonnegative integer times of 1min.But simultaneously in order to can transfer rate be ensured, the value of Δ T can in a less scope random value.
In described step (2.4), in order to improve the efficiency of comment when not affecting comment correlativity, transmit leg can be collected or write the comment with news with certain degree of correlation before secret communication starts, and category sets up comment data collection.Transmit leg is when commenting on, and directly from the corresponding classification of comment data collection, random selecting data carry out commenting on.
In described step (3.2), because transmit leg is when sending each ciphertext sequence, adjacent two effective time sheet the time interval be do not fix, therefore must occur that the data that take over party collects in certain receive slot are 0, namely current time sheet is sheet ineffective time, now take over party directly should skip over step below, circulation (3.2), collects the review information that in future time sheet, transmit leg sends;
Specific embodiment:
Transmit leg Alice:
Step 1: transmit leg Alice and take over party Bob arranges to use " xx news portal website " as secret communication carrier, wait to comment on and check that news column is science and technology news, sports news, entertainment news and military news, wait that the news commented on and check is the news on February 1st, 2015 and on February 3rd, 2015.The account title that Alice registers is respectively A_Mary, A_John, A_Tom, A_ Kevin and A_James, and number consecutively is 1,2,3,4,5; Call duration time sheet size is 1min; The secret communication start time is 08:00am, and the end time is 08:00pm;
Step 2:Alice carries out binary coding to the original M of hiding Info, and obtains cipher-text information M k, then by cipher-text information M kthe size being no more than 4bit by length carries out random burst, generates (M k1, M k2, M k3m kn) sequence.
Step 3:Alice is according to timeslice size, and by modulating the time interval between adjacent two effective transmitting time sheets, the account number selected at random and coding of accounts, and the comment that each account sends in current time sheet domestic demand is total to ciphertext sequence (M k1, M k2, M k3m kn) carry out the coding result table obtained as shown in Figure 3 of encoding successively.
Step 4:Alice is according to ciphertext sequence (M k1, M k2, M k3m kn) coding result deliver the news analysis relevant to selected news in the time of correspondence.
Figure 3 shows that the secret information encoding example adopting this invention, concealed binary message M to be sent k: 0011100101011001, be 5 sections of subsequence M being no more than 4bit by random division k1: 001, M k2: 1100, M k3: 101, M k4: 0110 and M k5: 01, then according to the coding method used in the present invention successively to M kiencode, obtain coding result table.The information that Alice provides according to this table, chooses corresponding account, delivers news analysis according to the time in news column.
Take over party Bob:
Step 1: first take over party Bob obtains on February 1st, 2015 and whole news that on February 3rd, 2015, " xx news portal website " issued, after the communication start time 08:00am of both sides' agreement, namely prepares reception and hides Info;
Step 2: from 08:00am, with a timeslice (1min) for unit, collect account in the science and technology news of Bob in this website, sports news, entertainment news and military news four columns and be called A_Mary, A_John, A_Tom, A_ Kevin and A_James (time in current time sheet current~ time current+ 1min) whole news analysis times of sending, and obtain a data set, the data of this data centralization are < coding of accounts, the form of comment time >.
Step 3:Bob resolves current the data obtained collection according to the coding/decoding method provided in the present invention after collecting whole review information that Alice sends in current time sheet, obtain successively the every bar data of this data centralization the information hidden;
Step 4: repetitive cycling until both sides agreement end time, whole cipher-text information M kjust can be transmitted;
Step 5: the preprocess method that take over party Bob adopts the M that hides Info according to transmit leg, to cipher-text information M kcarry out reverse process, recover original original cipher text M.
Now, take over party successfully have received hiding Info of transmit leg transmission, and secret communication completes.
In order to improve the disguise of secret information transmission in the present invention, both sides have arranged the news date waiting to comment on and check in advance.This just requires that communicating pair needs to find the website can checking all news some day.Find through investigation, current existing a lot of news portal website all provides previous news or previous webpage to look back, and certainly, both sides also can directly arrange to use the news on the same day as comment object, and this agreement that therefore the present invention mentions is feasible.
Because needs transmit leg utilizes multiple account to comment on news in the present invention, will inevitably occur that transmit leg needs to send in a timeslice by multiple account the situation of many comments.In order to the efficiency improving comment when not increasing communications cost makes transmit leg can complete comment task, here two kinds of methods are mainly provided: method one, existing a lot of browser provides the functional mechanism simultaneously logging in multiple account on a website, therefore transmit leg can use the browser that simultaneously can log in multiple account in communication process, can greatly improve comment efficiency like this when carrying out the comment of many accounts.Method two, as priority scheme in summary of the invention mentioned, transmit leg can create a news analysis data set by news category in advance before the secret communication start time, when transmit leg carries out news analysis, directly choose the comment of a corresponding classification, effectively save comment issuing time.
The present invention is based on the conceal communication method of many accounts on-line news and commentary time, set up a private communication channel based on many accounts on-line news and commentary time.Network environment has a certain impact to the transmission hidden Info.Based on the actual conditions of Experimental Network, the present embodiment test experiments carries out under network packet loss rate is less than the environment of 5%.
Embodiment test experiments has carried out 4 groups of different experiments, and wherein often the secret information of 1KB size is all transmitted in group experiment, but often group transmission experiment all arranges different parameters, is the test result of this hiding instance communications shown in table 1.
As shown in table 1, in current experimental situation, when timeslice value is 1min, the value of fragmentation threshold MaxLength is 8, and namely transmit leg can deliver at most 8 news analysis in 1min, and 1bit information is hidden in every bar comment.In test process, the 1st group and the 3rd group of experiment, transmit leg send secret information time, adjacent two effective time sheet the time interval be all set to 0min, now transmit T.T. minimum, transfer rate is the highest, average out to 7.48 B/min.When carrying out the 2nd group and the 4th group of experiment, the time interval is random value in 0 ~ 5min then, and now transmission increases T.T. to some extent, but channel disguise is stronger, transfer rate average out to 4.60 B/min.
The beneficial effect that the present invention is based on the conceal communication method of many accounts on-line news and commentary time is: the present invention is under the prerequisite not affecting overt channel proper communication, the disguised very strong transmission that hides Info can be realized, relative to scheme of the prior art, advantage of the present invention is:
1. the present invention is different from the method for designing of general packet Network Based, proposes the conceal communication method of a kind of news analysis time Network Based, builds private communication channel, have certain novelty in a new application scenarios;
2. the present invention uses the news portal website generally used in people's daily life as secret communication carrier, makes secret communication more simple and easy, and the private communication channel that therefore the present invention builds has more menace;
3. arbitrarily can choose due to transmit leg and take over party the website carrier carrying out secret communication in the present invention and comment on column, transmit leg can use multiple account to make comments simultaneously, drastically increases the anti-detection of private communication channel;
4. the present invention is based on on-line news and commentary time construction private communication channel, the private communication channel comparing data packet layout Network Based has less time delay, effectively can improve the transmission reliability of secret information.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize description of the present invention to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. based on the conceal communication method of many accounts on-line news and commentary time, it is characterized in that, step comprises:
(1) arrange and agreement prestored information at transmit leg and receiving on square end respectively, described prestored information comprises the conceal communication method of use, the website carrier of secret communication, the accounts information of transmit leg registration, the news column waiting to comment on and check, the news date of waiting to comment on and check, the size (nonnegative integer of 1min doubly) of call duration time sheet and the start time of secret communication and end time; Described call duration time sheet comprises transmitting time sheet, receive slot;
(2) comprise in the step of the secret communication sending method of transmit leg:
(2.1) first transmit leg should open the news portal website with function of making comments, and registers some accounts informations, and registered account is numbered 1 respectively, 2,3 ... n; All accounts of registration divided into groups by the odd even attribute of coding of accounts, the account being wherein numbered odd number is divided into odd number account group, and the account being numbered even number is divided into even number account group; Transmit leg selectes some news column S to be commented on 1, S 2s nand wait the date of commenting on news;
(2.2) transmit leg carries out binary coding to original cipher text M, obtains the cipher-text information M be made up of 0 and 1 k; Arrange the maximum length threshold of ciphertext sequence, described maximum length threshold is the comment sum maximal value that transmit leg can send in arranged transmitting time sheet; According to maximum length threshold by cipher-text information M kcarry out random burst, generate some ciphertext sequence M k1, M k2, M k3m kn, make M k1, M k2, M k3m knlength be less than or equal to maximum length threshold, M k1, M k2, M k3m knbe and hide Info;
(2.3) transmit leg is to ciphertext sequence M k1, M k2, M k3m knencode successively, and embed secret information by selecting the account of some difference numberings to carry out news analysis at random; The ciphertext sequence M that transmit leg will will be made up of 0 and 1 in a transmitting time sheet ki(1≤i≤n) sends end, and sending method has been come by comment news; Suppose ciphertext sequence M kilength be L ibit, namely transmit leg needs to send L in current transmitting time sheet ibar news analysis, every bar news analysis all hides hiding Info of 1bit; Judge the current parity hidden Info needing to send, if be odd number 1, transmit leg chooses an account as comment account from odd number account group; If be even number 0, transmit leg then chooses an account as comment account from even number account group;
(2.4), after having encoded, transmit leg obtains coding result table; After the communication start time that transmit leg and take over party about set, transmit leg, according to the information in gained coding result table, hiding Info by delivering news analysis to send, being all transmitted until hide Info;
(3) comprise in the step of the secret information method of reseptance of receiving end:
(3.1) first take over party obtains whole news that this portal website issues at both sides' appointed day, after the secret communication start time, namely prepares to receive secret information;
(3.2) in units of a receive slot, take over party is at the news column S arranged in advance 1, S 2s nthe time of all news analysis that middle collection transmit leg sends in current receive slot and selected coding of accounts;
(3.3) information of take over party to the news analysis of collecting is added up, and creates the raw data set of a review information, and this raw data concentrates every bar data message to comprise coding of accounts and comment time;
(3.4) take over party is decoded to the data obtained collection by coding/decoding method, and what obtain that transmit leg in current receive slot sends hides Info;
(4) repetitive cycling step (2.1)-(2.4) and (3.1)-(3.4), until the end time of both sides' agreement;
(5) take over party is according to the preprocess method of transmit leg to the M employing that hides Info, to cipher-text information M kcarry out reverse process, recover original original cipher text M.
2. the conceal communication method based on many accounts on-line news and commentary time according to claim 1, it is characterized in that, step (3.4) take over party is decoded to the data obtained collection by coding/decoding method, obtains the concrete steps hidden Info that transmit leg in current receive slot sends and comprises:
First take over party need carry out ascending order arrangement to the data of raw data set according to comment time and coding of accounts successively, obtains the new data set of;
The odd even attribute that take over party numbers according to current account, to the every bar decoding data in new data set, and obtains hiding Info in this comment data;
If current commentary account be numbered odd number, then represent that hiding Info of these data is 1, if current commentary account be numbered even number, then hiding Info of these data is 0;
According to the method described above, take over party obtains current data and concentrates corresponding the hiding Info of whole comment data;
Current gained directly hides Info and to splice with hiding Info of having obtained before by take over party, namely obtains the whole concealed bit sequence sent by the end of current receive slot transmit leg.
3. the conceal communication method based on many accounts on-line news and commentary time according to claim 1, is characterized in that, transmit leg is assessed according to the call duration time sheet size of making an appointment and current network environment and arranges maximum length threshold.
4. the conceal communication method based on many accounts on-line news and commentary time according to claim 1, is characterized in that, in described step (2.3), when transmit leg is to ciphertext sequence M kiwhen (1≤i≤n) encodes, the comment account number that transmit leg is selected at random can not exceed the length of this sequence.
5. the conceal communication method based on many accounts on-line news and commentary time according to claim 4, is characterized in that, in described step (2.3), selected comment account at least uses once in current transmitting time sheet.
6. the conceal communication method based on many accounts on-line news and commentary time according to claim 5, it is characterized in that, in described step (2.3), each ciphertext sequence need be encoded according to coding of accounts order from small to large when encoding, and preferential use numbers less account.
7. the conceal communication method based on many accounts on-line news and commentary time according to claim 6, is characterized in that, in described step (2.3), for n ciphertext sequence M k1, M k2, M k3m kn, transmit leg needs to be sent completely in n transmitting time sheet.
8. the conceal communication method based on many accounts on-line news and commentary time according to claim 7, it is characterized in that, in described step (2.3), the time interval Δ T of adjacent two transmitting time sheets is set to stochastic variable, and time interval Δ T can be any nonnegative integer times of 1min.
9. the conceal communication method based on many accounts on-line news and commentary time according to claim 1, it is characterized in that, in described step (2.4), transmit leg was collected or is write the comment with news with certain degree of correlation before secret communication starts, and category sets up comment data collection; Transmit leg is when commenting on, and directly from the corresponding classification of comment data collection, random selecting data are commented on.
10. the conceal communication method based on many accounts on-line news and commentary time according to claim 1, it is characterized in that, in described step (3.2), the data of collecting in certain receive slot as take over party are 0, namely when current time sheet is sheet ineffective time, take over party directly skips over step below, and circulation performs step (3.2), collects the review information that in next receive slot, transmit leg sends.
CN201510113988.7A 2015-03-17 2015-03-17 Secret communication method based on more account on-line news and commentary times Expired - Fee Related CN104765773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510113988.7A CN104765773B (en) 2015-03-17 2015-03-17 Secret communication method based on more account on-line news and commentary times

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510113988.7A CN104765773B (en) 2015-03-17 2015-03-17 Secret communication method based on more account on-line news and commentary times

Publications (2)

Publication Number Publication Date
CN104765773A true CN104765773A (en) 2015-07-08
CN104765773B CN104765773B (en) 2018-05-11

Family

ID=53647604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510113988.7A Expired - Fee Related CN104765773B (en) 2015-03-17 2015-03-17 Secret communication method based on more account on-line news and commentary times

Country Status (1)

Country Link
CN (1) CN104765773B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source
CN107579950A (en) * 2017-07-11 2018-01-12 上海大学 A kind of method that secret information transmission is carried out by social networks
CN109246075A (en) * 2018-07-26 2019-01-18 复旦大学 Information concealing method based on social software user's dynamic message forwarding mechanism
CN109934643A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of review record method
CN109934644A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of information creating method
CN109933757A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of comment inquiry edit methods
CN110019804A (en) * 2017-12-15 2019-07-16 西安比卓电子科技有限公司 A kind of method and device that comment is recommended
CN111368321A (en) * 2020-03-09 2020-07-03 北京丁牛科技有限公司 Communication anti-monitoring method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080162227A1 (en) * 2006-12-08 2008-07-03 Bjorn Markus Jakobsson Method and apparatus for combatting click fraud
CN102012980A (en) * 2010-11-16 2011-04-13 中国科学技术大学苏州研究院 Method for securely detecting hidden text information based on homomorphic encryption system
CN103138913A (en) * 2013-02-25 2013-06-05 南京理工大学常熟研究院有限公司 Optical fiber web encryption communication system based on time hidden signal channel
CN103634098A (en) * 2013-12-04 2014-03-12 重庆大学 Method for hiding information on basis of time intervals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080162227A1 (en) * 2006-12-08 2008-07-03 Bjorn Markus Jakobsson Method and apparatus for combatting click fraud
CN102012980A (en) * 2010-11-16 2011-04-13 中国科学技术大学苏州研究院 Method for securely detecting hidden text information based on homomorphic encryption system
CN103138913A (en) * 2013-02-25 2013-06-05 南京理工大学常熟研究院有限公司 Optical fiber web encryption communication system based on time hidden signal channel
CN103634098A (en) * 2013-12-04 2014-03-12 重庆大学 Method for hiding information on basis of time intervals

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐丽: "基于微博的信息隐藏技术研究", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *
张树勇等: "基于模型的时间隐蔽信道的一种算法", 《应用科技》 *
钱玉文等: "一种基于Web的可靠网络隐蔽时间信道的研究", 《计算机研究与发展》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source
CN107579950A (en) * 2017-07-11 2018-01-12 上海大学 A kind of method that secret information transmission is carried out by social networks
CN107579950B (en) * 2017-07-11 2020-11-24 上海大学 Method for transmitting secret information through social network
CN109934643A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of review record method
CN109934644A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of information creating method
CN109933757A (en) * 2017-12-15 2019-06-25 西安比卓电子科技有限公司 A kind of comment inquiry edit methods
CN110019804A (en) * 2017-12-15 2019-07-16 西安比卓电子科技有限公司 A kind of method and device that comment is recommended
CN109246075A (en) * 2018-07-26 2019-01-18 复旦大学 Information concealing method based on social software user's dynamic message forwarding mechanism
CN109246075B (en) * 2018-07-26 2020-11-20 复旦大学 Information hiding method based on social software user dynamic message forwarding mechanism
CN111368321A (en) * 2020-03-09 2020-07-03 北京丁牛科技有限公司 Communication anti-monitoring method and device
CN111368321B (en) * 2020-03-09 2022-08-02 北京丁牛科技有限公司 Communication anti-monitoring method and device

Also Published As

Publication number Publication date
CN104765773B (en) 2018-05-11

Similar Documents

Publication Publication Date Title
CN104765773A (en) Multi-account network news commentary time based covert communication method
Zhou et al. Joint physical-application layer security for wireless multimedia delivery
CN103118139B (en) Distributed information hides transmission system and transmission method thereof
CN110225016A (en) A kind of data hiding transmission method based on block chain network
CN106487487B (en) A kind of improved data transmission method
CN102594557A (en) Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
ATE505041T1 (en) COMPOSITE MESSAGE AUTHENTICATION CODE
CN106255037A (en) Internet of things equipment accidental access method based on extensive MIMO technology and system thereof
CN105450644A (en) Secret communication method and device based on multi-application fragmented transmission
CN107872300B (en) Feedback information processing method, device and system, base station and terminal
Russell et al. Neighbor discovery in wireless networks with multipacket reception
CN102611557A (en) Safe network coding data transmission method based on knapsack cryptosystem
CN104504342A (en) Method for hiding information by using invisible characters based on Unicode codes
CN109361492B (en) High-performance decoding method combining physical layer network coding and polarization code
CN115277094A (en) Block chain-based communication method, terminal, system and storage medium
CN103179564B (en) Based on the network application login method of mobile terminal authentication
CN105392124A (en) Short message verification method, mobile terminal, server and system
CN103023630A (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN108768902A (en) It is a kind of improved based on fountain codes anti-eavesdrop method
CN105049456B (en) A kind of secret communication method based on web page interlinkage request
CN103002504B (en) Data transmission method for uplink and access point, data receiver method and website, system
KR101210078B1 (en) Method and system for transferring contents based on multi-source multicast
CN101867434B (en) Method for enhancing confidentiality of optical code-division multiple access network information transmission
CN103002505A (en) Data communication method and data communication equipment
CN105139058A (en) Method for coding two-dimensional code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180511

Termination date: 20200317

CF01 Termination of patent right due to non-payment of annual fee