CN104917747A - Concealed communication method - Google Patents

Concealed communication method Download PDF

Info

Publication number
CN104917747A
CN104917747A CN201510140010.XA CN201510140010A CN104917747A CN 104917747 A CN104917747 A CN 104917747A CN 201510140010 A CN201510140010 A CN 201510140010A CN 104917747 A CN104917747 A CN 104917747A
Authority
CN
China
Prior art keywords
chinese character
transmitting terminal
sequence
information
receiving terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510140010.XA
Other languages
Chinese (zh)
Other versions
CN104917747B (en
Inventor
黄刘生
张宇飞
张恒华
沈瑶
杨威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Institute for Advanced Study USTC
Original Assignee
Suzhou Institute for Advanced Study USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Institute for Advanced Study USTC filed Critical Suzhou Institute for Advanced Study USTC
Priority to CN201510140010.XA priority Critical patent/CN104917747B/en
Publication of CN104917747A publication Critical patent/CN104917747A/en
Application granted granted Critical
Publication of CN104917747B publication Critical patent/CN104917747B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Abstract

The invention discloses a concealed communication method. The method comprises the following steps that encryption is performed on first original data on a sending end and a receiving end so as to form concealed information and generate a binary sequence of the concealed information, and the binary sequence is recorded as a sending-end original cipher; the binary sequence of the concealed information is converted into a sending-end Chinese character sequence and is sent to the receiving end; the receiving end receives the concealed information and carries out decryption. Through the above mode, by using the concealed communication method provided in the invention, a Chinese character coding is used to embed the concealed communication into a Chinese character; through analyzing the concealed information which needs to be transmitted, the concealed information is converted into English letters in a split-up mode and then are converted into a Chinese character; then the Chinese character is transmitted to a target site through forms of a mail, a webpage and a picture so that a purpose of transmitting the concealed information is reached. A concealed channel established by using the method possesses advantages of a high capacity and high concealed performance. In the method, the concealed information is packed and transmitted in a data portion of an IP data packet.

Description

A kind of conceal communication method
Technical field
The present invention relates to a kind of information concealing method, particularly relate to a kind of conceal communication method.
Background technology
Modern society, along with the development of network technology, interpersonal communication becomes more convenient.Information is becoming the important soft power determining a national national power, becomes the grand strategy resource of national politics, economy, science and technology and the aspect such as cultural development.Up-to-date message can be grasped in time and have for national security and overall national strength lifting the effect that can not be substituted; And the problems such as important information leakage propose stern challenge to national security.Therefore information security obtains increasing concern in recent years.Hackers usually use the leak in network service to carry out some illegal acts, and the lighter's subscriber data is stolen, severe one bank finance system destruction, even theft of state secrets, harm national security." hidden channel " technology is exactly the emerging technology of security of network and information field rise in recent years.
" hidden channel " refers to and utilizes correlation technique, confidential information is embedded into the technology of secreted transfering in legitimate channel.Compare information encryption and Information Hiding Techniques, hidden Channel Technology loads the secreted transfering realizing hidden data in the puppet of valid data, can reach higher disguise and counterreconnaissance.Existing hidden Channel Technology mainly contains " memory-type " and " time type " two kinds.Redundant field in memory-type hidden channel usage network packet, is embedded into hidden information in these fields and transmits; In the time interval that the hidden channel of time type is then coded in packet hidden information, reached the object transmitting hidden information by the statistical information at packet time interval.
For the research of hidden channel, the method for the hidden channel of forward research main exploration structure highly concealed type, high-accuracy.Traditional encryption technology is easy to the attention of person under attack, and along with computer hardware and cryptographic development, the code breaking ability of assailant progressively promotes, and brings very large difficulty to information encryption work.Utilize hidden Channel Technology, confidential corespondence can be carried out when assailant does not discover, in conjunction with existing information encryption and concealing technology, greatly can improve the fail safe of information transmission; To the reverse research of hidden channel then main purpose be to find more reliably, private communication channel detection technique more accurately, Timeliness coverage lawless person hidden channel transfering information can be utilized, and take measures in time to disturb illegal channel or eliminate, ensure the fail safe of confidential information.
The hidden channel of current ICP/IP protocol realizes transmission mainly through amendment TCP/IP data packet header content and hides Info, such as Rowland proposes hidden channel (the Covert channels in the TCP/IP protocol suite based on ICP/IP protocol head individual domain, 1996), C. Abad proposes the hidden channel (IP Checksum Covert Channels and Selected Hash Collision, 2001) etc. based on School Affairs territory.Profit builds hidden channel in such a way, efficiency is very low, usually each packet comprising thousands of or more byte can only transmit the hidden information of 1 bit, this mode can affect the statistical nature of hiding field domain in addition, thus be easy to be detected hidden channel, so the disguise of this channel receives very large constraint.Therefore the current hidden Channel Technology proposed mainly contains the little and disguise of capacity and differs from two large shortcomings.
Present invention utilizes the coding of the five-stroke input method in Chinese character to Chinese character, will hide Info and be embedded in each Chinese character.The capacity of channel and disguise are all improved to some extent.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of conceal communication method, Chinese character encoding is utilized to be embedded in Chinese character by hidden information, by analyzing the hidden information needing transmission, broken the whole up into parts and rotatably turned to English alphabet, be converted into Chinese character again, again by the form of Chinese character by mail, webpage, picture is transmitted to targeted sites, reach the object of transmission hidden information, it is large that the private communication channel using the method to set up has capacity, disguised strong advantage and in method hidden information all in the data division packing transmission of IP packet.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: provide a kind of conceal communication method, comprise following operating procedure:
(1), at transmitting terminal and receiving terminal the first initial data is encrypted, forms hidden information, and generate the binary sequence of hidden information, and be recited as transmitting terminal original cipher text;
(2), the binary sequence of hidden information is converted to transmitting terminal Chinese character sequence and is sent to receiving terminal;
(3), receiving terminal receives hidden information, and is decrypted;
(4), step (2), step (3) is repeated, until receiving terminal receives whole hidden information.
In a preferred embodiment, in step (2), first, binary sequence in transmitting terminal original cipher text divides into groups by transmitting terminal, and each group binary sequence is converted into transmitting terminal decimal data, the ASCII character value of each transmitting terminal decimal data and alphabetical A is added, and transmitting terminal original cipher text is converted to transmitting terminal English character sequence;
Secondly, from English character sequence, get continuous print English character, be translated into transmitting terminal Chinese character sequence;
Again, Chinese character sequence encapsulates by transmitting terminal, uses different fonts to distinguish the number of the English character of each Chinese character representative simultaneously, and by packaged Packet Generation to receiving terminal.
In a preferred embodiment, in step (3), first, the packet of receiving terminal receiving end/sending end, and take out the transmitting terminal Chinese character sequence in packet;
Secondly, according to the transmitting terminal Chinese character sequence of taking out, corresponding transmitting terminal English character sequence is extracted;
Again, it is the receiving terminal decimal data of corresponding character ASCII character value by each character translation in transmitting terminal English character sequence, and the ASCII character value of each receiving terminal decimal data and A is subtracted each other, obtains binary number, generate receiving terminal original cipher text.
In a preferred embodiment, receiving terminal, according to the encryption method to the first initial data in step (1), is decrypted the receiving terminal original cipher text in step (3), obtains the second initial data.
In a preferred embodiment, described second initial data is identical with the first original data content.
In a preferred embodiment, described receiving terminal decimal data and transmitting terminal decimal data are between 0-15.
In a preferred embodiment, in described transmitting terminal Chinese character sequence, Chinese character adopts one-level, secondary, three grades of codings or all-key coding.
In a preferred embodiment, the front of described binary information sequence is provided with the field of record transmission information total length, and passes through total bit number of binary system beacon information.
The invention has the beneficial effects as follows: utilize certain Chinese character encoding to be embedded in Chinese character by hidden information, the mode of such as 5-stroke coding, by analyzing the hidden information needing transmission, broken the whole up into parts and rotatably turned to English alphabet, be converted into Chinese character again, again by the form of Chinese character by mail, webpage, picture is transmitted to targeted sites, reach the object of transmission hidden information, it is large that the private communication channel using the method to set up has capacity, disguised strong advantage and in method hidden information all in the data division packing transmission of IP packet.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings, wherein:
Fig. 1 is five one-level brevity code schematic diagrames of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 2 is five secondary brevity code schematic diagrames of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 3 is the five-stroke etymon coding schematic diagram of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 4 is five constructive code coding schematic diagrames of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 5 is the five-stroke Chinese coding schematic diagram of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 6 is the Information hiding communication process schematic diagram based on 5-stroke coding of a kind of conceal communication method one of the present invention preferred embodiment;
Fig. 7 is the Information hiding exemplary construction schematic diagram based on 5-stroke coding of a kind of conceal communication method one of the present invention preferred embodiment.
Embodiment
Be clearly and completely described to the technical scheme in the embodiment of the present invention below, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1-7, provide a kind of conceal communication method in one particular embodiment of the present invention, described conceal communication method comprises following operating procedure:
(1), at transmitting terminal and receiving terminal the first initial data is encrypted, forms hidden information, and generate the binary sequence of hidden information, and be recited as transmitting terminal original cipher text;
(2), the binary sequence of hidden information is converted to transmitting terminal Chinese character sequence and is sent to receiving terminal;
(3), receiving terminal receives hidden information, and is decrypted;
(4), step (2), step (3) is repeated, until receiving terminal receives whole hidden information.
Wherein, in step (2), first, binary sequence in transmitting terminal original cipher text divides into groups by transmitting terminal, and each group binary sequence is converted into transmitting terminal decimal data, the ASCII character value of each transmitting terminal decimal data and alphabetical A is added, and transmitting terminal original cipher text is converted to transmitting terminal English character sequence;
Secondly, from English character sequence, get continuous print English character, be translated into transmitting terminal Chinese character sequence, in described transmitting terminal Chinese character sequence, Chinese character adopts one-level, secondary, three grades of codings or all-key coding various ways to encode.
Again, Chinese character sequence encapsulates by transmitting terminal, uses different fonts to distinguish the number of the English character of each Chinese character representative simultaneously, and by packaged Packet Generation to receiving terminal.
In step (3), first, the packet of receiving terminal receiving end/sending end, and take out the transmitting terminal Chinese character sequence in packet;
Secondly, according to the transmitting terminal Chinese character sequence of taking out, corresponding transmitting terminal English character sequence is extracted;
Again, it is the receiving terminal decimal data of corresponding character ASCII character value by each character translation in transmitting terminal English character sequence, and the ASCII character value of each receiving terminal decimal data and A is subtracted each other, obtains binary number, generate receiving terminal original cipher text.
Receiving terminal is according to the encryption method to the first initial data in step (1), receiving terminal original cipher text in step (3) is decrypted, obtain the second initial data, described second initial data is identical with the first original data content, described receiving terminal decimal data and transmitting terminal decimal data are between 0-15, the front of described binary information sequence is provided with the field of record transmission information total length, and passes through total bit number of binary system beacon information.
In another is specifically implemented, provide a kind of based on five-stroke Chinese coding conceal communication method, its step comprises:
(1) encryption method of transmitting terminal and receiving terminal both sides agreement is used, to initial data be encrypted, generate the binary sequence of the hidden information after encryption, be designated as original cipher text .
(2) binary sequence is converted to Chinese character sequence to send to recipient, step is as follows:
(2.1) transmit leg will in sequence to be divided into 4 bit be one group, each group binary sequence can be converted into the decimal number of a 0-15 , each value and the ASCII character 65 of alphabetical A be added, the ASCII character of A-P can be obtained, thus will be converted into English character sequence .
(2.2) transmit leg for in English character be handled as follows: first take out continuous print 4 English characters, if this 4 character string is the 5-stroke coding of a Chinese character, then be translated into this Chinese character, otherwise, get the sequence execution translating operation above of 3 characters, 2 characters, 1 character, namely adopt greed strategy, make to comprise character as much as possible in each Chinese character, repeatedly from middle taking-up character, until all take, generates Chinese character sequence .
(2.3) transmit leg is by Chinese character sequence be encapsulated in the data division in Email or html web page, use different fonts to distinguish the number of the English character of each Chinese character representative.The regulation of font can be arranged voluntarily by transmit leg and recipient.Such as: the Song typeface is one-level brevity code, black matrix is secondary brevity code, and imitation Song-Dynasty-Style typeface is three-stagebrevitycode, and regular script is all-key.
(2.4) by packaged Packet Generation to object website.
(3) step received at the hidden information of receiving terminal comprises:
(3.1) recipient monitors at designated port, after receiving the normal data packet that transmitting terminal sends, extracts the data division in packet .
(3.2) recipient according to in each Chinese character and its font, find corresponding 5-stroke coding, extract character string .
(3.3) recipient will in each character translation be the decimal number of the ASCII character of corresponding character , for each , it is poor with the ASCII character value 65 of A, obtain the numeral of a 0-15 , will be converted into 4 bits, so just generate original cipher text .
(3.5) repetitive cycling step (2.1)-(2.4) and (3.1)-(3.3), until receiving terminal receives whole cipher-text information just complete transmission;
(3.6) recipient according to transmit leg to hiding Info the encryption method adopted, deciphers cipher-text information and decodes, recovering original initial data .
Wherein, a Chinese character can transmit at most the binary message of 16 bit, and hidden information itself is not directly stored in the data of transmission, and channel is disguised strong, for the coding of Chinese character, employing be the five-stroke Chinese coding of 86 editions.
In a particular embodiment, have employed the 5-stroke coding mode of Chinese character in the present invention, its coding rule is as follows: for each Chinese character, can be splitted into the independently part of no more than 4, be called " radical ".And five use an English alphabet to identify for each radical.If Chinese character can split into the radical more than 4, then adopt the coding of coding as this Chinese character of 4 radicals wherein; If the radical number that Chinese character can split is less than 4, then need interpolation constructive code.Constitute the 5-stroke coding of Chinese character.And in Chinese character, have the coding of multiple Chinese character to have same prefix.Such as, Chinese character " work " be encoded to AAAA, the coding of Chinese character " joint " is ABJ, and the frequency of utilization of Chinese character " work " is higher, therefore when inputting, if user inputs A, then first Display of Chinese characters " work ", like this, as long as an input letter, just can show this Chinese character, such coding is called " one-level brevity code ".Similar, also have: secondary brevity code, three-stagebrevitycode, all-key.Attention: not all Chinese character has the all-key of 4 characters.
One-level, secondary brevity lists, root coding table, constructive code coding schedule and Chinese character encoding sample all can be consulted in Figure of description.Because the quantity of three-stagebrevitycode and all-key is a lot, no longer list here.
Preferred technical scheme of the present invention is: in affiliated step (2.2), and the character string generated in step (2.1) is converted to Chinese character sequence by the mode that have employed five-stroke Chinese coding.But for the Chinese character sequence come by data transaction, be difficult to form grammatical word, phrase, sentence and chapter.Can improve as follows the method: after extracting Chinese character sequence, these sequences are embedded into some articles, in books.Although such improvement channel capacity can be lost, the disguise of information and fail safe will improve further.The another kind of the method is improved to: Chinese character sequence be embedded into in the not too high documents and materials of grammar request, such as: register, phone directory etc.
Wherein, in the ideal case, in the Chinese character sequence generated, each Chinese character all can adopt all-key to encode, thus reach the maximization of channel capacity, needing insertion field record before the binary information sequence sent to need the total length of transmission information, binary mode is adopted to represent total bit number of information.When being translated as Chinese character sequence, this field also can be translated into Chinese character, and and information to put together transmissions, the space-separated in centre.By this measure, when the bit number that just can be implemented in information sequence is not the integral multiple of 4, also can accurate transmission information.
Used one-level, secondary, three-stagebrevitycode and all-key in an encoding process, and then randomness can improve greatly in ciphering process simultaneously, effectively improve the disguise of information.In addition, in the ideal case, if hidden data transformations and in the character string come every 4 letters be the 5-stroke coding of a Chinese character just, the Chinese character sequence so now generated will have the shortest length, and now each Chinese character can carry the hidden information of 2 bytes.Even if all hidden informations all use five one-level brevity codes to be converted into Chinese character, sizableness also can be comprised in the hidden information of 1/4th capacity of the size of packet own.Compare the information that traditional each packet of hidden Channel Technology can only carry several bit, the hidden channel that the method builds has very large channel capacity.
In another embodiment, concrete operations are as follows:
Transmit leg Alice: the step 1:Alice binary sequence that will send information: 01,101,001,001,110,010 00110, is denoted as: , , ..., .This sequence is divided into 4 bit mono-group, generates the ten's digit sequence of corresponding 0-15 , , ..., .If wherein the bit number of data is not the integral multiple of 4, then add 0 at end and supplement, the value of k is 22 here, then value be 6.
Step 2: by sequence: , , ..., in each numeral be added with the ASCII character value 65 of alphabetical A, generate the ASCII character of alphabetical A-P, so generation correspondence character string , , ..., .In this example, this sequence is: F, I, D, I, B, H.
Step 3: utilize 5-stroke coding rule by character string , , ..., , be converted to Chinese character sequence: , , ..., .Here adopt the strategy of greed, namely allow each Chinese character comprise character as much as possible, namely consider all-key, three-stagebrevitycode, secondary brevity code, one-level brevity code successively.The Chinese character sequence generated in this example is: " reason(black matrix) thick(imitation Song-Dynasty-style typeface) no(Song typeface) ".
Step 4: add up the bit number that this sends data, the k namely in this example, shows by binary digit, and k is 22 here, is expressed as binary number and is: 00011000, by 5-stroke coding mode, length information is also encoded to Chinese character sequence , , ..., .In this example, this sequence is: " grandson(black matrix) ".
Step 5: by length sequences , , ..., and content array , , ..., couple together, by a space-separated, formation sequence: , , ..., , (space), , , ..., the sequence generated in this example is: " sun Lihou is not".
Step 6: by sequence above , , ..., , (space), , , ..., be embedded in the text of webpage html file, utilize the function of HTML to be that each Chinese character sets correct font.Notify that recipient receives information.
Recipient Bob: step 1: recipient, by the specific webpage of browser access, according to the agreement of both sides, finds the Chinese character sequence comprising hidden information at webpage ad-hoc location , , ..., , (space), , , ..., .
Step 2: find the space in sequence, sequence is divided into two parts, respectively: length sequences , , ..., and content array: , , ..., .
Step 3: utilize the font of 5-stroke coding rule and each Chinese character to resolve content field, reverted to alphabetical sequence , , ..., , the sequence that in this example, length field is converted is: F, I, D, I, B, H.
Step 4: the Serial No. alphabetical sequence be transformed being converted into ASCII character above: , , ..., , be 71,74,68,74,66,73 in this example.It is 65 poor the ASCII character of each numeral and A to be worth, and obtains Serial No.: 6,9,3,9,1,8.
Step 5: be 42 system numbers by each digital conversion in the Serial No. extracted above, the binary sequence obtained is: 011010010011100100011000, and the length of this sequence is 24.
Step 6: for the length Chinese character sequence received, also perform the process of step 3-step 5, the binary sequence obtained is 00011000, and being converted into the decimal system is 22.
Step 7: the total length now obtaining data is 22, and the sequence length obtained in step 5 is 24, therefore can infer that 20 of end for filling bit, should leave out, so the information received is exactly 0110100100111001000110.Now recipient finishes receiving.
Now, recipient successfully have received the secret papers of transmit leg transmission, and Communication hiding completes.
The file that embodiment test experiments have employed different size is tested, because the read-write of file and transmission all adopt binary form, so do not need in experiment to distinguish the type of file.Local area network (LAN) in experiment employing laboratory is built channel and is carried out transfer files, and therefore the time of file transfer depends primarily on the time to information encryption and deciphering, is below the data of experiment.
File Size The transmission used time Average transmission rate
File 1 31.2KB 87ms 358.62KB/s
File 2 242KB 193ms 1.22MB/s
File 3 822KB 1s 303ms 630.85KB/s
File 4 2.37MB 9s 828ms 246.93KB/s
File 5 5.94MB 1min 1s 297ms 99.23KB/s
File 6 9.14MB 2min 18s 550ms 67.55KB/s
Experimental data shows, the hidden channel of the method establishment utilizing this invention to provide, and average transmission speed is 437.20KB/s, has very considerable transmission speed.
The present invention utilizes the mode of five-stroke Chinese coding to achieve the mechanism being stored in by hidden information and carrying out secret transmissions in Chinese character.Compare the hidden channel of traditional memory-type and the hidden channel of time type, this transmission means has following advantage:
Channel capacity is large, and the capacity of channel linearly increases along with Chinese character number.In the ideal case, each Chinese character can carry the hidden information of 2 bytes (16bit).
Information hiding is strong.In the process of data processing, used the user of five-stroke input method reducing gradually in recent years, and used this coded system be of little use to hide Info and will strengthen the difficulty of decoding.Have employed one-level, secondary, three-stagebrevitycode and all-key in the present invention in addition simultaneously, which in turns increases complexity during transfer of data, and improve Information Security further.
Transport vehicle is flexible.Use method provided by the invention to transmit hidden information, can variety carrier be selected.Webpage, Email, SMS, paper printing publication all can as carrier.
Therefore, the present invention has the following advantages: utilize Chinese character encoding to be embedded in Chinese character by hidden information, by analyzing the hidden information needing transmission, broken the whole up into parts and rotatably turned to English alphabet, be converted into Chinese character again, again by the form of Chinese character by mail, webpage, picture is transmitted to targeted sites, reach the object of transmission hidden information, it is large that the private communication channel using the method to set up has capacity, disguised strong advantage and in method hidden information all in the data division packing transmission of IP packet.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize description of the present invention to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (8)

1. a conceal communication method, is characterized in that, comprises following operating procedure:
(1), at transmitting terminal and receiving terminal the first initial data is encrypted, forms hidden information, and generate the binary sequence of hidden information, and be recited as transmitting terminal original cipher text;
(2), the binary sequence of hidden information is converted to transmitting terminal Chinese character sequence and is sent to receiving terminal;
(3), receiving terminal receives hidden information, and is decrypted;
(4), step (2), step (3) is repeated, until receiving terminal receives whole hidden information.
2. conceal communication method according to claim 1, it is characterized in that, in step (2), first, binary sequence in transmitting terminal original cipher text divides into groups by transmitting terminal, and each group binary sequence is converted into transmitting terminal decimal data, the ASCII character value of each transmitting terminal decimal data and alphabetical A is added, and transmitting terminal original cipher text is converted to transmitting terminal English character sequence;
Secondly, from English character sequence, get continuous print English character, be translated into transmitting terminal Chinese character sequence;
Again, Chinese character sequence encapsulates by transmitting terminal, uses different fonts to distinguish the number of the English character of each Chinese character representative simultaneously, and by packaged Packet Generation to receiving terminal.
3. conceal communication method according to claim 2, is characterized in that, in step (3), first, and the packet of receiving terminal receiving end/sending end, and take out the transmitting terminal Chinese character sequence in packet;
Secondly, according to the transmitting terminal Chinese character sequence of taking out, corresponding transmitting terminal English character sequence is extracted;
Again, it is the receiving terminal decimal data of corresponding character ASCII character value by each character translation in transmitting terminal English character sequence, and the ASCII character value of each receiving terminal decimal data and A is subtracted each other, obtains binary number, generate receiving terminal original cipher text.
4. conceal communication method according to claim 3, is characterized in that, receiving terminal, according to the encryption method to the first initial data in step (1), is decrypted the receiving terminal original cipher text in step (3), obtains the second initial data.
5. conceal communication method according to claim 4, is characterized in that, described second initial data is identical with the first original data content.
6. conceal communication method according to claim 4, is characterized in that, described receiving terminal decimal data and transmitting terminal decimal data are between 0-15.
7. conceal communication method according to claim 1, is characterized in that, in described transmitting terminal Chinese character sequence, Chinese character adopts one-level, secondary, three grades of codings or all-key coding.
8. conceal communication method according to claim 4, is characterized in that, the front of described binary information sequence is provided with the field of record transmission information total length, and passes through total bit number of binary system beacon information.
CN201510140010.XA 2015-03-27 2015-03-27 A kind of secret communication method Expired - Fee Related CN104917747B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510140010.XA CN104917747B (en) 2015-03-27 2015-03-27 A kind of secret communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510140010.XA CN104917747B (en) 2015-03-27 2015-03-27 A kind of secret communication method

Publications (2)

Publication Number Publication Date
CN104917747A true CN104917747A (en) 2015-09-16
CN104917747B CN104917747B (en) 2018-07-10

Family

ID=54086454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510140010.XA Expired - Fee Related CN104917747B (en) 2015-03-27 2015-03-27 A kind of secret communication method

Country Status (1)

Country Link
CN (1) CN104917747B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763424A (en) * 2016-03-22 2016-07-13 网易有道信息技术(北京)有限公司 Method and device for processing text information
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process
CN107222890A (en) * 2017-07-11 2017-09-29 中国科学技术大学苏州研究院 The method for building private communication channel using 4G mobile communication protocols layer characteristic
CN108629157A (en) * 2017-03-22 2018-10-09 深圳华大基因科技服务有限公司 One kind being used for nucleic acid sequencing data compression and encrypted method
CN108809919A (en) * 2017-05-04 2018-11-13 北京大学 Secret communication method and device for text carrier
CN110324795A (en) * 2019-06-24 2019-10-11 西安空间无线电技术研究所 A kind of satellite short message and information synergism transmission method
CN110737908A (en) * 2019-10-12 2020-01-31 京东数字科技控股有限公司 Encryption method and apparatus, decryption method and apparatus, electronic device, and medium
CN111327631A (en) * 2020-03-04 2020-06-23 南京信息工程大学 Secret information transmission method and system based on TCP and UDP
CN114973772A (en) * 2022-04-27 2022-08-30 浙江海洋大学 Ship collision early warning system and method based on unmanned aerial vehicle
CN115296887A (en) * 2022-08-02 2022-11-04 中国电子科技集团公司信息科学研究院 Data transmission method and device, electronic equipment and storage medium
US11924095B1 (en) * 2022-12-29 2024-03-05 Code-X, Inc. Utilizing network routing to communicate covert message

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277194A (en) * 2008-05-13 2008-10-01 江苏科技大学 Transmitting/receiving method for secret communication
US20100166181A1 (en) * 2008-12-29 2010-07-01 Nortel Networks Limited Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
CN104283888A (en) * 2014-10-20 2015-01-14 中国科学技术大学苏州研究院 Covert communication method based on data package multilayer packaging

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277194A (en) * 2008-05-13 2008-10-01 江苏科技大学 Transmitting/receiving method for secret communication
US20100166181A1 (en) * 2008-12-29 2010-07-01 Nortel Networks Limited Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
CN104283888A (en) * 2014-10-20 2015-01-14 中国科学技术大学苏州研究院 Covert communication method based on data package multilayer packaging

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙新梅等: ""一种简单实用的中文信息隐写算法"", 《计算机工程与应用》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763424A (en) * 2016-03-22 2016-07-13 网易有道信息技术(北京)有限公司 Method and device for processing text information
CN105763424B (en) * 2016-03-22 2019-05-07 网易有道信息技术(北京)有限公司 A kind of literal information processing method and device
CN106714148B (en) * 2016-12-09 2019-07-05 浙江警察学院 A kind of concealed communication method based on joint normal stochastic process
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process
CN108629157B (en) * 2017-03-22 2021-08-31 深圳华大基因科技服务有限公司 Method for compressing and encrypting nucleic acid sequencing data
CN108629157A (en) * 2017-03-22 2018-10-09 深圳华大基因科技服务有限公司 One kind being used for nucleic acid sequencing data compression and encrypted method
CN108809919A (en) * 2017-05-04 2018-11-13 北京大学 Secret communication method and device for text carrier
CN107222890B (en) * 2017-07-11 2020-04-07 中国科学技术大学苏州研究院 Method for constructing hidden channel by using characteristics of 4G mobile communication protocol layer
CN107222890A (en) * 2017-07-11 2017-09-29 中国科学技术大学苏州研究院 The method for building private communication channel using 4G mobile communication protocols layer characteristic
CN110324795A (en) * 2019-06-24 2019-10-11 西安空间无线电技术研究所 A kind of satellite short message and information synergism transmission method
CN110324795B (en) * 2019-06-24 2021-06-11 西安空间无线电技术研究所 Satellite short message and information cooperative transmission method
CN110737908A (en) * 2019-10-12 2020-01-31 京东数字科技控股有限公司 Encryption method and apparatus, decryption method and apparatus, electronic device, and medium
CN111327631A (en) * 2020-03-04 2020-06-23 南京信息工程大学 Secret information transmission method and system based on TCP and UDP
CN114973772A (en) * 2022-04-27 2022-08-30 浙江海洋大学 Ship collision early warning system and method based on unmanned aerial vehicle
CN114973772B (en) * 2022-04-27 2023-09-22 浙江海洋大学 Ship collision early warning system and method based on unmanned aerial vehicle
CN115296887A (en) * 2022-08-02 2022-11-04 中国电子科技集团公司信息科学研究院 Data transmission method and device, electronic equipment and storage medium
CN115296887B (en) * 2022-08-02 2023-11-17 中国电子科技集团公司信息科学研究院 Data transmission method, device, electronic equipment and storage medium
US11924095B1 (en) * 2022-12-29 2024-03-05 Code-X, Inc. Utilizing network routing to communicate covert message

Also Published As

Publication number Publication date
CN104917747B (en) 2018-07-10

Similar Documents

Publication Publication Date Title
CN104917747A (en) Concealed communication method
CN109818739B (en) Generation type image steganography method based on countermeasure network
CN102282798B (en) Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN107947918A (en) A kind of carrier-free text steganography method based on character feature
CN106254074A (en) A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption
CN102025482A (en) Virtual genome-based cryptosystem (VGC)
CN108418683A (en) A kind of carrier-free text steganography method based on feature of Chinese characters structure
Aung et al. A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher)
CN102761418A (en) Character compression encrypting method
CN102447558B (en) Encryption method using random sequence on-demand and having misleading function
CN116707771B (en) Communication method based on data encryption
Vinodhini et al. A survey on DNA and image steganography
CN111698222B (en) Covert communication method of special bitcoin address generated based on vanitygen
Anwar et al. Stegocrypt scheme using LSB-AES base64
CN102857514B (en) HTTP (hyper text transport protocol) based secret information hidden-transmission method
CN104640091A (en) Method for encryption communication of short message of mobile phone
Rafat et al. Secure digital steganography for ASCII text documents
CN109981246A (en) A kind of encryption method and decryption method of character string
CN103679051A (en) File hiding method
Torvi et al. An unique data security using text steganography
CN110830261A (en) Encryption method, device, computer equipment and storage medium
Dubey et al. An innovative data security techniques using cryptography and steganographic techniques
CN114584407A (en) System for embedding and extracting multilingual hidden data in online message
Bazli et al. Data encryption using bio-molecular information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180710

Termination date: 20200327