WO2019095177A1 - Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception - Google Patents

Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception Download PDF

Info

Publication number
WO2019095177A1
WO2019095177A1 PCT/CN2017/111218 CN2017111218W WO2019095177A1 WO 2019095177 A1 WO2019095177 A1 WO 2019095177A1 CN 2017111218 W CN2017111218 W CN 2017111218W WO 2019095177 A1 WO2019095177 A1 WO 2019095177A1
Authority
WO
WIPO (PCT)
Prior art keywords
carrier information
information
value
original
standard deviation
Prior art date
Application number
PCT/CN2017/111218
Other languages
English (en)
Chinese (zh)
Inventor
谢宁
谭杰
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/111218 priority Critical patent/WO2019095177A1/fr
Publication of WO2019095177A1 publication Critical patent/WO2019095177A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an information detection method, apparatus, and receiving apparatus based on group variance.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the chi-square detection method is the earliest detection algorithm for the detection of Least Significant Bit (LSB) steganography, which tests the image by defining a chi-square statistic.
  • the probability of statistical characteristics enables detection of sequential LSB replacement, but does not detect LSB replacement at random locations.
  • the detection algorithm for LSB matching basically adopts methods such as neural network and pattern recognition.
  • the feature set is trained to extract effective features, and then the joint information of multiple features is used to detect the hidden information.
  • these methods are computationally intensive.
  • the test results are not precise enough and have limitations.
  • the embodiment of the invention discloses a method, a device and a receiving device for detecting information based on group variance, which can accurately detect the secret information.
  • the first aspect of the embodiments of the present invention discloses a method for detecting information based on group variance, including:
  • the method further includes:
  • the preset threshold is determined according to the second standard deviation.
  • the performing, by the related processing on the first carrier information, sequentially obtaining the second carrier information, the original carrier information, and the third carrier information includes:
  • the original carrier information is remodulated to obtain third carrier information.
  • the method further includes:
  • the first standard deviation is less than or equal to the preset threshold, determining that there is no secret information in the first carrier information.
  • a second aspect of the embodiments of the present invention discloses an information detecting apparatus, including:
  • a receiving unit configured to receive the first carrier information that is matched by the channel
  • a processing unit configured to perform correlation processing on the first carrier information, and sequentially obtain second carrier information, original carrier information, and third carrier information;
  • a comparison determining unit configured to compare the second carrier information with the original carrier information, and Determining a location of the second carrier information different from the original carrier information
  • An extraction determining unit configured to extract a first value at the different position of the first carrier information and extract a second value at the different position of the third carrier information, and determine the first a first standard deviation of the difference between the value and the second value;
  • a determining unit configured to determine whether the first standard deviation is greater than a preset threshold
  • a determining unit configured to determine that the first carrier information is greater than the preset threshold when determining that the first standard deviation is greater than the preset threshold.
  • the comparison determining unit is further configured to determine a location where the second carrier information is the same as the original carrier information
  • the extraction determining unit is further configured to extract a third value on the same location of the first carrier information and extract a fourth value on the same location of the third carrier information, and determine a second standard deviation of the difference between the third value and the fourth value;
  • the information detecting apparatus further includes:
  • a determining unit configured to determine the preset threshold according to the second standard deviation.
  • the processing unit performs related processing on the first carrier information, and sequentially obtains second carrier information, original carrier information, and third carrier information, including :
  • the original carrier information is remodulated to obtain third carrier information.
  • the determining unit is further configured to: when the determining unit determines that the first standard deviation is less than or equal to the preset threshold, determining There is no secret information in the first carrier information.
  • a third aspect of the embodiments of the present invention discloses a receiving device, where the receiving device includes a processor and a memory, and the processor executes the computer program stored in the memory to implement the group variance based on any one of the foregoing first aspects. Information detection method.
  • a computer readable storage medium storing at least one instruction, the at least one instruction being executed by a processor to implement the group variance based information detection method of any of the above first aspects.
  • the embodiment of the invention has the following beneficial effects:
  • the receiving device may receive the first carrier information that is matched by the channel, perform related processing on the first carrier information, and obtain the second carrier information, the original carrier information, and the third carrier information in sequence; a second carrier information and the original carrier information, and determining a location of the second carrier information different from the original carrier information; extracting a first value at the different location of the first carrier information and extracting a location Determining a second value at the different position of the third carrier information, and determining a first standard deviation of the difference between the first value and the second value; determining whether the first standard deviation is greater than a preset a threshold; if yes, determining that there is secret information in the first carrier information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention
  • FIG. 2 is a schematic flow chart of a method for detecting information based on group variance according to an embodiment of the present invention
  • 3 is a schematic diagram of standard deviation and signal to noise ratio at different positions according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a detection success rate and a signal to noise ratio according to an embodiment of the present invention
  • 5 is a schematic diagram of standard deviation and signal to noise ratio at another different position disclosed in an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of another detection success rate and a signal to noise ratio according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the embodiment of the invention discloses a method, a device and a receiving device for detecting information based on group variance, which can accurately detect the secret information.
  • the details are described below in conjunction with the drawings.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention.
  • the alternative steganographic communication model can include two processes: a transmitting process and a receiving process.
  • the sending process is mainly performed by the sending device.
  • the sending device may include a base station or a user equipment.
  • a base station eg, an access point
  • a base station may refer to an access network that passes through an air interface. Or a device that communicates with a wireless terminal in multiple sectors.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
  • the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
  • the transmitting device is divided into two paths, one is that the carrier information is encoded, and the other is that the secret information is encoded. After the two are encoded, the secret information is embedded in the carrier information, modulated, and then sent to the channel. The channel is sent to the receiving device.
  • the receiving process is mainly performed by the receiving device.
  • the receiving device may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • the embodiments of the present invention are not limited, but are not limited to the Android operating system, the IOS operating system, the Symbian operating system, the Blackberry operating system, the Windows Phone 8 operating system, and the like.
  • the demodulated signal is extracted and then decoded to obtain the secret information, and then the signal after the secret information is extracted is decoded to obtain the carrier information.
  • the specific embedding method of the secret information may be BINARY PHASE SHIFT KEYING (BPSK) as an example.
  • the carrier information is encoded into 0, 1 sequence, and the secret information is also 0, 1 sequence.
  • the secret information can randomly replace some positions of the carrier information to hide the information.
  • the carrier information 0 can be replaced by the secret information 1
  • the carrier information 1 can be replaced by the secret information 0, after BPSK is - 1 changes to 1, 1 changes to -1.
  • the number of bits of the secret information needs to be smaller than the number of bits that can be corrected by the error correction capability of the carrier information. For example, suppose that the encoded information bits have k bits, for a total of n symbols, then the number of bits that can be corrected Take an integer, so the number of bits of the secret information is less than t in order to replace the steganography.
  • FIG. 2 is a schematic flowchart of a method for detecting information based on group variance according to an embodiment of the present invention. As shown in FIG. 2, the packet variance based information detecting method may include the following steps:
  • Step 201 The receiving device receives the first carrier information that is matched by the channel.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the transmitting device transmits the first bearer information after the steganography is replaced, and the receiving device can receive the first bearer information from the channel, wherein the first bearer information is the coded and modulated information.
  • the channel is a fading channel, that is, a channel whose channel fades with distance, and if the distance is constant, the channel is constant.
  • Y is the carrier information after multiplying channel H
  • conj(H) is the conjugate of H
  • noise is noise
  • Y1 is the first carrier information
  • Step 202 The receiving device performs related processing on the first carrier information, and sequentially obtains second carrier information, original carrier information, and third carrier information.
  • the manner in which the receiving device performs related processing on the first carrier information, and sequentially obtains the second carrier information, the original carrier information, and the third carrier information may be specifically:
  • the original carrier information is remodulated to obtain third carrier information.
  • the hidden information that may be hidden in the second carrier information can be erased, and after re-encoding, the original carrier information can be obtained.
  • the first carrier information may include secret information
  • the third carrier information does not include secret information.
  • Step 203 The receiving device compares the second carrier information with the original carrier information, and determines a location where the second carrier information is different from the original carrier information.
  • the second carrier information and the original carrier information are each represented by a multi-bit value (such as 0, 1).
  • the receiving device can compare the second carrier information with the original carrier information to determine the same location and different locations of the second carrier information as the original carrier information. For example, if the second carrier information is 00, the original carrier information is 01, and the second carrier information and the original carrier information are in the same position, the second carrier information and the The original carrier information has a different position in the second place.
  • Step 204 The receiving device extracts a first value on the different location of the first carrier information, and extracts a second value on the different location of the third carrier information, and determines the first value. a first standard deviation of the difference from the second value.
  • the receiving device after determining that the second carrier information is different from the original carrier information, extracts a first value at the different location of the first carrier information and extracts the third carrier a second value at the different locations of the information, for example: hypothetical
  • the second carrier information is the same as the original carrier information, and the second carrier information is different from the original carrier information, and the receiving device may extract the first carrier information. a first value on the second bit and a second value on the second bit of the third carrier information.
  • the receiving device may determine a first standard deviation of the difference between the first value and the second value.
  • Step 205 The receiving device determines whether the first standard deviation is greater than a preset threshold. If yes, go to step 206. If no, go to step 207.
  • the method further includes the following steps:
  • the receiving device may further determine the location of the second carrier information and the original carrier information, thereby extracting the a third value at the same position of the first carrier information and a fourth value at the same position at which the third carrier information is extracted, and determining a difference between the third value and the fourth value
  • the second standard deviation of the value For example, if the second carrier information is the same as the original carrier information, and the second carrier information is different from the original carrier information, the receiving device may extract a third value on the first bit of the first carrier information and a fourth value on the first bit of the third carrier information. Further, the receiving device may determine the third value and the fourth value. The second standard deviation of the difference in values.
  • the receiving device may determine the preset threshold according to the second standard deviation.
  • the preset threshold can be determined by referring to the following formula:
  • T 0 is the preset threshold
  • is the standard Gaussian cumulative distribution function
  • T is the distribution variable of the standard Gaussian cumulative distribution function
  • std_same is the second standard deviation at the same position
  • PFA is the false alarm probability.
  • the false alarm probability can be understood as the probability that the first carrier information in which the secret information does not exist is determined as the first carrier information in which the secret information exists.
  • the preset threshold can be determined by limiting the false alarm probability and maximizing the detection rate of the secret information.
  • Step 206 The receiving device determines that there is hidden information in the first carrier information, and ends the process.
  • Step 207 The receiving device determines that there is no secret information in the first carrier information.
  • FIG. 3 is a schematic diagram of standard deviation and signal to noise ratio at different positions according to an embodiment of the present invention
  • FIG. 4 is a detection success rate and a letter disclosed in the embodiment of the present invention.
  • the abscissa SNR is the signal to noise ratio.
  • SNR 6
  • the curve without hidden information is below the threshold curve, and the curve with hidden information is above the threshold curve.
  • FIG. 4 is a schematic diagram showing the detection success rate and the signal-to-noise ratio of the secret information by using the detection method of the present invention.
  • the curve with the secret information follows the SNR. Increase and increase, while the curve without hidden information remains unchanged as the SNR increases.
  • the detection information of the present invention can accurately detect the secret information.
  • FIG. 5 is a schematic diagram of another standard position difference and signal to noise ratio disclosed in an embodiment of the present invention
  • FIG. 6 is another detection success rate disclosed in the embodiment of the present invention.
  • the horizontal coordinate SNR is the signal to noise ratio.
  • the trend of the curve without hidden information and the curve with hidden information is different, that is, whether there is hidden information, and the standard deviation and signal-to-noise ratio curves at different positions are different.
  • the SNR is close to 12
  • the curve without hidden information is below the threshold curve
  • the curve with hidden information is above the threshold curve.
  • Figure 6 is a view of the use of the present invention
  • the detection method is used to detect the detection success rate of the secret information and the signal-to-noise ratio curve.
  • the curve with the secret information increases with the increase of the SNR, and no The curve of the secret information remains unchanged as the SNR increases.
  • the detection information of the present invention can accurately detect the secret information.
  • the receiving device may receive the first carrier information that is matched by the channel, and perform related processing on the first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information. Comparing the second carrier information with the original carrier information, and determining a location of the second carrier information different from the original carrier information; extracting the first location at the different location of the first carrier information And determining a second value at the different position of the third carrier information, and determining a first standard deviation of the difference between the first value and the second value; determining the first standard deviation Whether it is greater than a preset threshold; if yes, determining that there is secret information in the first carrier information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • FIG. 7 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • the information detecting apparatus described in FIG. 7 may be used to perform some or all of the steps in the packet variance-based information detecting method described in FIG. 2 .
  • the information detecting apparatus may include:
  • the receiving unit 101 is configured to receive the first carrier information that is matched by the channel;
  • the processing unit 102 is configured to perform correlation processing on the first carrier information, and sequentially obtain second carrier information, original carrier information, and third carrier information;
  • the comparison determining unit 103 is configured to compare the second carrier information with the original carrier information, and determine a location where the second carrier information is different from the original carrier information;
  • An extraction determining unit 104 configured to extract the different locations of the first carrier information a first value and a second value at the different position of the third carrier information, and determining a first standard deviation of the difference between the first value and the second value;
  • the determining unit 105 is configured to determine whether the first standard deviation is greater than a preset threshold
  • the determining unit 106 is configured to determine that the secret information exists in the first carrier information when the determining unit 105 determines that the first standard deviation is greater than the preset threshold.
  • the comparison determining unit 103 is further configured to determine that the second carrier information is the same location as the original carrier information
  • the extraction determining unit 104 is further configured to extract a third value on the same location of the first carrier information and extract a fourth value on the same location of the third carrier information, and determine a second standard deviation of the difference between the third value and the fourth value;
  • the information detecting apparatus further includes:
  • the determining unit 107 is configured to determine the preset threshold according to the second standard deviation.
  • the processing unit 102 performs related processing on the first carrier information, and sequentially obtains the second carrier information, the original carrier information, and the third carrier information, including:
  • the original carrier information is remodulated to obtain third carrier information.
  • the determining unit 106 is further configured to: when the determining unit 105 determines that the first standard deviation is less than or equal to the preset threshold, determine that there is no secret information in the first carrier information.
  • the information detecting apparatus described in FIG. 7 can receive the first carrier information that is matched by the channel, and perform related processing on the first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information. Comparing the second carrier information with the original carrier information, and determining a location of the second carrier information different from the original carrier information; extracting the first location at the different location of the first carrier information And determining a second value at the different position of the third carrier information, and determining a first standard deviation of the difference between the first value and the second value; determining the first standard deviation Whether it is greater than a preset threshold; if yes, determining the first load There is hidden information in the body information.
  • the received first carrier information may be processed in association, and the second carrier information, the original carrier information, and the third carrier information are sequentially obtained, and further, the first carrier information and the second carrier information are obtained.
  • the original carrier information and the third carrier information are compared and analyzed to determine that there is hidden information in the first carrier information, so that the secret information can be accurately detected.
  • the above-described integrated unit implemented in the form of a software function module can be stored in a computer readable storage medium.
  • the computer readable storage medium can store a computer program, which when executed by the processor, can implement the steps in the foregoing method embodiments.
  • the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
  • the computer readable storage medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only Memory). ), random access memory (RAM, Random-Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction.
  • FIG. 8 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the receiving device shown in FIG. 8 includes a processor 801 and a memory 802.
  • the processor 801 and the memory 802 are respectively connected to the communication bus.
  • the memory 802 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the receiving device shown in FIG. 8 does not constitute a limitation of the present invention, and it may be a bus-shaped structure or a star-shaped structure, and may further include more than that shown in FIG. More or less parts, or some parts, or different parts.
  • the processor 801 is a control center of the receiving device, and may be a central processing unit (CPU).
  • the processor 801 connects various parts of the entire receiving device by using various interfaces and lines, and is stored in the memory 802 by running or executing.
  • processor 801 may also call program code stored in the memory 802 for performing the following operations:
  • the preset threshold is determined according to the second standard deviation.
  • the performing, by the related processing on the first carrier information, sequentially obtaining the second carrier information, the original carrier information, and the third carrier information includes:
  • the original carrier information is remodulated to obtain third carrier information.
  • processor 801 may also call program code stored in the memory 802 for performing the following operations:
  • the first standard deviation is less than or equal to the preset threshold, determining that there is no secret information in the first carrier information.
  • receiving the first carrier information after channel matching Performing related processing on the first carrier information, sequentially obtaining second carrier information, original carrier information, and third carrier information; comparing the second carrier information with the original carrier information, and determining the second carrier information and the a different location of the original carrier information; extracting a first value at the different location of the first carrier information and extracting a second value at the different location of the third carrier information, and determining the number a first standard deviation of a difference between the value and the second value; determining whether the first standard deviation is greater than a preset threshold; if yes, determining that the first carrier information has secret information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de détection d'informations en fonction d'une variance de paquets. Le procédé consiste : à recevoir des premières informations de porteuse après la mise en correspondance de canaux; à effectuer un traitement associé sur les premières informations de porteuse pour obtenir des secondes informations de porteuse, des informations de porteuse d'origine et des troisièmes informations de porteuse en séquence; à comparer les secondes informations de porteuse aux informations de porteuse d'origine, et à déterminer différentes positions des secondes informations de porteuse et des informations de porteuse d'origine; à extraire une première valeur numérique sur les différentes positions des premières informations de porteuse et à extraire une seconde valeur numérique sur les différentes positions des troisièmes informations de porteuse, et à déterminer un premier écart-type d'une valeur de différence de la première valeur numérique et de la seconde valeur numérique; à déterminer si le premier écart type est supérieur à un seuil préétabli; et si tel est le cas, à déterminer que des informations cachées existent dans les premières informations de porteuse. Au moyen des modes de réalisation de la présente invention, des informations cachées peuvent être détectées avec précision.
PCT/CN2017/111218 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception WO2019095177A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111218 WO2019095177A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111218 WO2019095177A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception

Publications (1)

Publication Number Publication Date
WO2019095177A1 true WO2019095177A1 (fr) 2019-05-23

Family

ID=66538379

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/111218 WO2019095177A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception

Country Status (1)

Country Link
WO (1) WO2019095177A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080199093A1 (en) * 2007-02-19 2008-08-21 New Jersey Institute Of Technology Appratus and method for reversible data hiding for jpeg images
CN101494051A (zh) * 2008-01-23 2009-07-29 武汉大学 一种针对时域音频lsb隐写的检测方法
CN101504760A (zh) * 2009-02-27 2009-08-12 上海师范大学 一种数字图像隐密信息检测与定位的方法
CN102509551A (zh) * 2011-11-23 2012-06-20 北京邮电大学 基于倒谱和差分方差的音频隐写分析算法
CN103886864A (zh) * 2014-03-03 2014-06-25 南京邮电大学 一种对dwt域失真补偿量化嵌入的隐秘信息检测方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080199093A1 (en) * 2007-02-19 2008-08-21 New Jersey Institute Of Technology Appratus and method for reversible data hiding for jpeg images
CN101494051A (zh) * 2008-01-23 2009-07-29 武汉大学 一种针对时域音频lsb隐写的检测方法
CN101504760A (zh) * 2009-02-27 2009-08-12 上海师范大学 一种数字图像隐密信息检测与定位的方法
CN102509551A (zh) * 2011-11-23 2012-06-20 北京邮电大学 基于倒谱和差分方差的音频隐写分析算法
CN103886864A (zh) * 2014-03-03 2014-06-25 南京邮电大学 一种对dwt域失真补偿量化嵌入的隐秘信息检测方法

Similar Documents

Publication Publication Date Title
JP2008535323A (ja) 信号変調フォーマットタイプの検出
CN101094002A (zh) 直流偏移除去装置及直流偏移除去方法
JP2020509436A (ja) システム言語切替方法およびシステム言語切替端末機器
JP2021521716A (ja) 非協調システムにおける干渉検出および抑制
WO2019061514A1 (fr) Procédé et appareil d'authentification de pente de couche physique de communication sans fil sécurisée
CN107809310B (zh) 基于分组方差的信息检测方法、装置及接收设备
CN106330391B (zh) 用户终端及其pbch检测方法及装置
CN109640096B (zh) 一种基于视频解码电磁泄漏的隐蔽通信方法
US7971108B2 (en) Modem-assisted bit error concealment for audio communications systems
CN107766771B (zh) 二维码检测方法以及终端
CN108173791B (zh) 基于平滑技术的时变衰落信道的物理层盲认证方法及系统
WO2019095177A1 (fr) Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception
WO2019095176A1 (fr) Procédé et appareil de détection d'informations basés sur une valeur de différence d'énergie de paquet et dispositif de réception
WO2019095178A1 (fr) Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception
KR20160145711A (ko) 정보 손실을 감소시킨 전자 통신들을 위한 시스템들, 방법들 및 디바이스들
WO2019095174A1 (fr) Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception
WO2019095175A1 (fr) Procédé et appareil de détection d'informations sur la base d'une distance de points de constellation, et dispositif de réception
CN107947898B (zh) 基于优化分组方差的信息检测方法、装置及接收设备
WO2013075484A1 (fr) Procédé et appareil de détection d'interférence
CN107819568B (zh) 基于星座点距离的信息检测方法、装置及接收设备
CN107809309B (zh) 基于幅度差的信息检测方法、装置及接收设备
CN115314054A (zh) 极化码译码方法、装置、通信设备及存储介质
Dai et al. Magcode: Nfc-enabled barcodes for nfc-disabled smartphones
CN109714284B (zh) 一种基于k-s检测的射频水印检测方法
WO2017206246A1 (fr) Procédé et serveur d'indication de duplication de carte de module d'identité d'abonné

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931987

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/08/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17931987

Country of ref document: EP

Kind code of ref document: A1