WO2019095178A1 - Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception - Google Patents

Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception Download PDF

Info

Publication number
WO2019095178A1
WO2019095178A1 PCT/CN2017/111219 CN2017111219W WO2019095178A1 WO 2019095178 A1 WO2019095178 A1 WO 2019095178A1 CN 2017111219 W CN2017111219 W CN 2017111219W WO 2019095178 A1 WO2019095178 A1 WO 2019095178A1
Authority
WO
WIPO (PCT)
Prior art keywords
carrier information
information
value
original
standard deviation
Prior art date
Application number
PCT/CN2017/111219
Other languages
English (en)
Chinese (zh)
Inventor
谢宁
谭杰
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/111219 priority Critical patent/WO2019095178A1/fr
Publication of WO2019095178A1 publication Critical patent/WO2019095178A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an information detection method, apparatus, and receiving apparatus based on optimized packets.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the chi-square detection method is the earliest detection algorithm for the detection of Least Significant Bit (LSB) steganography, which tests the image by defining a chi-square statistic.
  • the probability of statistical characteristics enables detection of sequential LSB replacement, but does not detect LSB replacement at random locations.
  • the detection algorithm for LSB matching basically adopts methods such as neural network and pattern recognition.
  • the feature set is trained to extract effective features, and then the joint information of multiple features is used to detect the hidden information.
  • these methods are computationally intensive.
  • the test results are not precise enough and have limitations.
  • the embodiment of the invention discloses an information detection method, device and receiving device based on optimized grouping, which can accurately detect the secret information.
  • a first aspect of the embodiments of the present invention discloses an information detection method based on an optimized packet, including:
  • the method further includes:
  • the preset threshold is determined according to the second standard deviation.
  • the performing, by the related processing on the first carrier information, sequentially obtaining the second carrier information, the original carrier information, and the third carrier information includes:
  • the original carrier information is remodulated to obtain third carrier information.
  • the method further includes:
  • the first standard deviation is less than or equal to the preset threshold, determining that there is no secret information in the first carrier information.
  • a second aspect of the embodiments of the present invention discloses an information detecting apparatus, including:
  • a receiving unit configured to receive the first carrier information that is matched by the channel
  • a processing unit configured to perform correlation processing on the first carrier information, and sequentially obtain second carrier information, original carrier information, and third carrier information;
  • a comparison determining unit configured to compare the second carrier information with the original carrier information, and determine, according to a modulation order, a first position where the original carrier information has the largest number of errors with respect to the second carrier information ;
  • An extraction determining unit configured to extract a first value on the first location of the first carrier information and extract a second value on the first location of the third carrier information, and determine the first a first standard deviation of the difference between the value and the second value;
  • a determining unit configured to determine whether the first standard deviation is greater than a preset threshold
  • a determining unit configured to determine that the first carrier information is greater than the preset threshold when determining that the first standard deviation is greater than the preset threshold.
  • the comparison determining unit is further configured to determine, according to the modulation order, that the original carrier information is the same as the second carrier information. The second position with the largest number;
  • the extraction determining unit is further configured to extract a third value on the second location of the first carrier information and extract a fourth value on the second location of the third carrier information, and determine a second standard deviation of the difference between the third value and the fourth value;
  • the information detecting apparatus further includes:
  • a determining unit configured to determine the preset threshold according to the second standard deviation.
  • the processing unit performs related processing on the first carrier information, and sequentially obtains second carrier information, original carrier information, and third carrier information, including :
  • the original carrier information is remodulated to obtain third carrier information.
  • the determining unit is further configured to: when the determining unit determines that the first standard deviation is less than or equal to the preset threshold, determining There is no secret information in the first carrier information.
  • a third aspect of the embodiments of the present invention discloses a receiving device, where the receiving device includes a processor and a memory, and the processor executes the computer program stored in the memory to implement the optimized grouping according to any one of the above first aspects. Information detection method.
  • a computer readable storage medium storing at least one instruction, the at least one instruction being executed by a processor to implement the optimized packet based information detection method of any of the above first aspects.
  • the embodiment of the invention has the following beneficial effects:
  • the receiving device may receive the first carrier information that is matched by the channel, perform related processing on the first carrier information, and obtain the second carrier information, the original carrier information, and the third carrier information in sequence; Determining, by the second carrier information, the original carrier information, and determining, according to the modulation order, a first location where the original carrier information has the largest number of errors with respect to the second carrier information; extracting the first carrier information a first value at the first location and a second value at the first location of the third carrier information and a first criterion for determining a difference between the first value and the second value Poor; determining whether the first standard deviation is greater than a preset threshold; if yes, determining that the first carrier information has secret information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart diagram of an information detection method based on optimized grouping according to an embodiment of the present invention
  • 3 is a schematic diagram of standard deviation and signal to noise ratio at different positions according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a detection success rate and a signal to noise ratio according to an embodiment of the present invention
  • 5 is a schematic diagram of standard deviation and signal to noise ratio at another different position disclosed in an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of another detection success rate and a signal to noise ratio according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the embodiment of the invention discloses an information detection method, device and receiving device based on optimized grouping, which can accurately detect the secret information. The details are described below in conjunction with the drawings.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention.
  • the alternative steganographic communication model can include two processes: the sending process and the receiving process. Cheng.
  • the sending process is mainly performed by the sending device.
  • the sending device may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
  • the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
  • the transmitting device is divided into two paths, one is that the carrier information is encoded, and the other is that the secret information is encoded. After the two are encoded, the secret information is embedded in the carrier information, modulated, and then sent to the channel. The channel is sent to the receiving device.
  • the receiving process is mainly performed by the receiving device.
  • the receiving device may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
  • BTS Base Transceiver Station
  • NodeB base station
  • NodeB evolved base station
  • LTE NodeB or eNB or e-NodeB, evolutional Node B
  • User equipment may include, but is not limited to, a smartphone, a laptop, a personal computer (Personal Computer, PC), Personal Digital Assistant (PDA), Mobile Internet Device (MID), wearable devices (such as smart watches, smart bracelets, smart glasses) and other electronic devices, including
  • the operating system of the user equipment may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Blackberry operating system, a Windows Phone 8 operating system, etc., which are not limited in the embodiment of the present invention. .
  • the demodulated signal is extracted and then decoded to obtain the secret information, and then the signal after the secret information is extracted is decoded to obtain the carrier information.
  • the specific embedding method of the secret information may be BINARY PHASE SHIFT KEYING (BPSK) as an example.
  • the carrier information is encoded into 0, 1 sequence, and the secret information is also 0, 1 sequence.
  • the secret information can randomly replace some positions of the carrier information to hide the information.
  • the carrier information 0 can be replaced by the secret information 1
  • the carrier information 1 can be replaced by the secret information 0, after BPSK is - 1 changes to 1, 1 changes to -1.
  • the number of bits of the secret information needs to be smaller than the number of bits that can be corrected by the error correction capability of the carrier information. For example, suppose that the encoded information bits have k bits, for a total of n symbols, then the number of bits that can be corrected Take an integer, so the number of bits of the secret information is less than t in order to replace the steganography.
  • FIG. 2 is a schematic flowchart diagram of an information detection method based on an optimized packet according to an embodiment of the present invention.
  • the optimized packet-based information detecting method may include the following steps:
  • Step 201 The receiving device receives the first carrier information that is matched by the channel.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the transmitting device transmits the first bearer information after the steganography is replaced, and the receiving device can receive the first bearer information from the channel, where the first bearer information is Encode the modulated information.
  • the channel is a fading channel, that is, a channel whose channel fades with distance, and if the distance is constant, the channel is constant.
  • Y is the carrier information after multiplying channel H
  • conj(H) is the conjugate of H
  • noise is noise
  • Y1 is the first carrier information
  • Step 202 The receiving device performs related processing on the first carrier information, and sequentially obtains second carrier information, original carrier information, and third carrier information.
  • the manner in which the receiving device performs related processing on the first carrier information, and sequentially obtains the second carrier information, the original carrier information, and the third carrier information may be specifically:
  • the original carrier information is remodulated to obtain third carrier information.
  • the hidden information that may be hidden in the second carrier information can be erased, and after re-encoding, the original carrier information can be obtained.
  • the first carrier information may include secret information
  • the third carrier information does not include secret information.
  • Step 203 The receiving device compares the second carrier information with the original carrier information, and determines, according to the modulation order, a first location where the original carrier information has the largest number of bits of error with respect to the second carrier information.
  • the second carrier information and the original carrier information are each represented by a multi-bit value (such as 0, 1).
  • the receiving device may compare the second carrier information with the original carrier information, and determine, according to the modulation order, a first location where the original carrier information has the largest number of errors with respect to the second carrier information. For example, if the modulation order is 4, after comparing the second carrier information with the original carrier information, it may be found that the number of bits in which the original carrier information is erroneous with respect to the second carrier information may be one.
  • the receiving device can determine the position with the most digits of the error. For the first position. Where the error occurred There can be hidden information that needs further confirmation.
  • the noise influence is small, and there may be no error two bits. In this case, the number of the wrong bits may be the most. .
  • Step 204 The receiving device extracts a first value on the first location of the first carrier information, and extracts a second value on the first location of the third carrier information, and determines the first value. a first standard deviation of the difference from the second value.
  • the receiving device may extract the first information of the first carrier information. a first value at a location and a second value at the first location at which the third carrier information is extracted, for example, assuming that the original carrier information has an incorrect number of bits relative to the second carrier information.
  • the least first position is a position where both of the errors occur, and at this time, the first value on the first position of the first carrier information and the first position in which the third carrier information is extracted may be extracted. a second value; further, the receiving device may determine a first standard deviation of the difference between the first value and the second value.
  • Step 205 The receiving device determines whether the first standard deviation is greater than a preset threshold. If yes, go to step 206. If no, go to step 207.
  • the method further includes the following steps:
  • the receiving device may further determine, according to the modulation order, the original carrier information relative to the second carrier information. a second position having the same maximum number, and further extracting a third value on the second position of the first carrier information and extracting a second position on the second position of the third carrier information Four values, and determining a second standard deviation of the difference between the third value and the fourth value. For example, if the modulation order is 4, after comparing the second carrier information with the original carrier information, it can be found that the same number of the original carrier information is the same as the second carrier information. No error, the receiving device can determine the position where both of the two are not wrong as the second position. Further, the third value on the second position of the first carrier information can be extracted and the third carrier can be extracted. a fourth value at the second location of the information and a second standard deviation of the difference between the third value and the fourth value.
  • the receiving device may determine the preset threshold according to the second standard deviation.
  • the preset threshold can be determined by referring to the following formula:
  • T 0 is a preset threshold
  • is a standard Gaussian cumulative distribution function
  • T is a distribution variable of a standard Gaussian cumulative distribution function
  • std_same is a second standard deviation at the same position
  • PFA is a false alarm probability.
  • the false alarm probability can be understood as the probability that the first carrier information in which the secret information does not exist is determined as the first carrier information in which the secret information exists.
  • the preset threshold can be determined by limiting the false alarm probability and maximizing the detection rate of the secret information.
  • Step 206 The receiving device determines that there is hidden information in the first carrier information, and ends the process.
  • Step 207 The receiving device determines that there is no secret information in the first carrier information.
  • FIG. 3 is a schematic diagram of standard deviation and signal to noise ratio at different positions according to an embodiment of the present invention
  • FIG. 4 is a detection success rate and a letter disclosed in the embodiment of the present invention.
  • the modulation order M 4
  • the false alarm probability PFA 0.003
  • the abscissa SNR is the signal-to-noise ratio.
  • the curve without hidden information and the trend of the curve with hidden information It is different, that is, there is no hidden information, and the standard deviation and signal-to-noise ratio curves at different positions are different.
  • FIG. 4 is a schematic diagram showing the detection success rate and the signal-to-noise ratio of the secret information by using the detection method of the present invention.
  • the curve of the secret information increases with the SNR. And promote without hidden The curve of the information remains unchanged as the SNR increases.
  • the detection information of the present invention can accurately detect the secret information.
  • FIG. 5 is a schematic diagram of another standard position difference and signal to noise ratio disclosed in an embodiment of the present invention
  • FIG. 6 is another detection success rate disclosed in the embodiment of the present invention.
  • the abscissa SNR is the signal to noise ratio. It can be seen from Fig. 5 that the variation trend of the Cover curve and the Stego curve is different, that is, whether there is hidden information, and the standard deviation and signal-to-noise ratio curves at different positions are different.
  • the SNR is close to 10
  • the curve without hidden information is below the threshold curve, and the curve with hidden information is above the threshold curve.
  • FIG. 6 is a schematic diagram showing the detection success rate and the signal-to-noise ratio of the secret information by using the detection method of the present invention.
  • the curve with the secret information follows the SNR. Increase and increase, while the curve without hidden information remains unchanged as the SNR increases.
  • the detection information of the present invention can accurately detect the secret information.
  • the receiving device may receive the first carrier information that is matched by the channel, and perform related processing on the first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information. Comparing the second carrier information with the original carrier information, and determining, according to a modulation order, a first location in which the number of bits of the original carrier information that is erroneous with respect to the second carrier information is the largest; extracting the first a first value at the first location of the carrier information and a second value at the first location of the third carrier information, and determining a difference between the first value and the second value a first standard deviation; determining whether the first standard deviation is greater than a preset threshold; if yes, determining that the first carrier information has secret information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • FIG. 7 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • the information detecting apparatus described in FIG. 7 may be used to perform some or all of the steps in the method for detecting the information based on the optimized packet described in FIG. 2 .
  • the information detecting apparatus may include:
  • the receiving unit 101 is configured to receive the first carrier information that is matched by the channel;
  • the processing unit 102 is configured to perform correlation processing on the first carrier information, and sequentially obtain second carrier information, original carrier information, and third carrier information;
  • the comparison determining unit 103 is configured to compare the second carrier information with the original carrier information, and determine, according to the modulation order, the first number of bits in which the original carrier information has the largest number of errors with respect to the second carrier information. position;
  • An extraction determining unit 104 configured to extract a first value on the first location of the first carrier information and extract a second value on the first location of the third carrier information, and determine the first a first standard deviation of a difference between the value and the second value;
  • the determining unit 105 is configured to determine whether the first standard deviation is greater than a preset threshold
  • the determining unit 106 is configured to determine that the secret information exists in the first carrier information when the determining unit 105 determines that the first standard deviation is greater than the preset threshold.
  • the comparison determining unit 103 is further configured to determine, according to the modulation order, a second location in which the original carrier information is the same number as the second carrier information;
  • the extraction determining unit 104 is further configured to extract a third value on the second location of the first carrier information and extract a fourth value on the second location of the third carrier information, and determine a second standard deviation of the difference between the third value and the fourth value;
  • the information detecting apparatus further includes:
  • the determining unit 107 is configured to determine the preset threshold according to the second standard deviation.
  • the processing unit 102 performs related processing on the first carrier information, and sequentially obtains the second carrier information, the original carrier information, and the third carrier information, including:
  • the original carrier information is remodulated to obtain third carrier information.
  • the determining unit 106 is further configured to: when the determining unit 105 determines that the first standard deviation is less than or equal to the preset threshold, determine that there is no secret information in the first carrier information.
  • the information detecting apparatus described in FIG. 7 can receive the first carrier information that is matched by the channel, and perform related processing on the first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information. Comparing the second carrier information with the original carrier information, and determining, according to a modulation order, a first location in which the number of bits of the original carrier information that is erroneous with respect to the second carrier information is the largest; extracting the first a first value at the first location of the carrier information and a second value at the first location of the third carrier information, and determining a difference between the first value and the second value a first standard deviation; determining whether the first standard deviation is greater than a preset threshold; if yes, determining that the first carrier information has secret information.
  • the received first carrier information may be processed in association, and the second carrier information, the original carrier information, and the third carrier information are sequentially obtained, and further, the first carrier information and the second carrier information are obtained.
  • the original carrier information and the third carrier information are compared and analyzed to determine that there is hidden information in the first carrier information, so that the secret information can be accurately detected.
  • the above-described integrated unit implemented in the form of a software function module can be stored in a computer readable storage medium.
  • the computer readable storage medium can store a computer program, which when executed by the processor, can implement the steps in the foregoing method embodiments.
  • the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
  • the computer readable storage medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only Memory). ), random access memory (RAM, Random-Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction.
  • FIG. 8 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the receiving device shown in FIG. 8 includes a processor 801 and a memory 802.
  • the processor 801 and the memory 802 are respectively connected to the communication bus.
  • the memory 802 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the receiving device shown in FIG. 8 does not constitute a limitation of the present invention, and it may be a bus-shaped structure or a star-shaped structure, and may further include more than that shown in FIG. More or less parts, or some parts, or different parts.
  • the processor 801 is a control center of the receiving device, and may be a central processing unit (CPU).
  • the processor 801 connects various parts of the entire receiving device by using various interfaces and lines, and is stored in the memory 802 by running or executing.
  • processor 801 may also call program code stored in the memory 802 for performing the following operations:
  • the preset threshold is determined according to the second standard deviation.
  • the performing, by the related processing on the first carrier information, sequentially obtaining the second carrier information, the original carrier information, and the third carrier information includes:
  • the original carrier information is remodulated to obtain third carrier information.
  • processor 801 may also call program code stored in the memory 802 for performing the following operations:
  • the first standard deviation is less than or equal to the preset threshold, determining that there is no secret information in the first carrier information.
  • receiving the first carrier information after channel matching performing correlation processing on the first carrier information, and sequentially obtaining second carrier information, original carrier information, and third carrier information; Determining the second carrier information and the original carrier information, and determining, according to the modulation order, a first location in which the original carrier information has the largest number of errors with respect to the second carrier information; extracting the first carrier information a first value on the first location and a second value on the first location in which the third carrier information is extracted, and determining a first difference between the first value and the second value Standard deviation; determining whether the first standard deviation is greater than a preset threshold; if yes, determining that there is hidden information in the first carrier information.
  • the receiving device may perform related processing on the received first carrier information, and sequentially obtain the second carrier information, the original carrier information, and the third carrier information, and further, the first carrier information and the second The carrier information, the original carrier information, and the third carrier information are compared and analyzed to determine that the secret information exists in the first carrier information, so that the secret information can be accurately detected.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative, such as The division of the elements is only a logical function division, and the actual implementation may have another division manner. For example, multiple units or components may be combined or integrated into another system, or some features may be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de détection d'informations basé sur un paquet optimal, le procédé consistant : à recevoir des premières informations de porteuse après la mise en correspondance de canaux; à réaliser un traitement associé sur les premières informations de porteuse afin d'obtenir des deuxièmes informations de porteuse, des informations de porteuse d'origine et des troisièmes informations de porteuse en séquence; à comparer les deuxièmes informations de porteuse aux informations de porteuse d'origine, et à déterminer une première position comprenant les chiffres les plus erronés des informations de porteuse d'origine par rapport aux deuxièmes informations de porteuse en fonction d'un ordre de modulation; à extraire une première valeur numérique au niveau de la première position des premières informations de porteuse et à extraire une deuxième valeur numérique au niveau de la première position des troisièmes informations de porteuse, et à déterminer un premier écart-type d'une valeur de différence de la première valeur numérique et de la deuxième valeur numérique; à déterminer si le premier écart-type est supérieur à un seuil prédéfini; et si tel est le cas, à déterminer l'existence d'informations cachées dans les premières informations de porteuse. Grâce aux modes de réalisation de la présente invention, des informations cachées peuvent être détectées avec précision.
PCT/CN2017/111219 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception WO2019095178A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111219 WO2019095178A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111219 WO2019095178A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception

Publications (1)

Publication Number Publication Date
WO2019095178A1 true WO2019095178A1 (fr) 2019-05-23

Family

ID=66539243

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/111219 WO2019095178A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception

Country Status (1)

Country Link
WO (1) WO2019095178A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130101059A1 (en) * 2011-10-03 2013-04-25 Ira S. Moskowitz Pre-modulation physical layer steganography
CN103299366A (zh) * 2011-02-07 2013-09-11 高通股份有限公司 用于编码及检测带水印信号的装置
CN103476026A (zh) * 2013-09-06 2013-12-25 中国科学院软件研究所 基于卫星信道编码的自适应隐蔽通信方法
CN105703900A (zh) * 2016-03-24 2016-06-22 深圳大学 一种物理层隐写传输方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103299366A (zh) * 2011-02-07 2013-09-11 高通股份有限公司 用于编码及检测带水印信号的装置
US20130101059A1 (en) * 2011-10-03 2013-04-25 Ira S. Moskowitz Pre-modulation physical layer steganography
CN103476026A (zh) * 2013-09-06 2013-12-25 中国科学院软件研究所 基于卫星信道编码的自适应隐蔽通信方法
CN105703900A (zh) * 2016-03-24 2016-06-22 深圳大学 一种物理层隐写传输方法及系统

Similar Documents

Publication Publication Date Title
US8817934B2 (en) System and method for synchronization tracking in an in-band modem
JP2008535323A (ja) 信号変調フォーマットタイプの検出
JP2004229288A (ja) 信頼性のある無線(rfおよびir)および有線高帯域幅データ伝送のためのデジタル変調および復調技術
JP2008028999A (ja) 符号誤り検出装置、無線システム、及び誤り検出方法
CN101094002A (zh) 直流偏移除去装置及直流偏移除去方法
US20200015082A1 (en) Secure Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
US20070041473A1 (en) Modulation detection in a saic operational environment
CN107809310B (zh) 基于分组方差的信息检测方法、装置及接收设备
CN109640096B (zh) 一种基于视频解码电磁泄漏的隐蔽通信方法
CN107766771B (zh) 二维码检测方法以及终端
CN108173791B (zh) 基于平滑技术的时变衰落信道的物理层盲认证方法及系统
US20240072910A1 (en) Audio transmissions with interleaved data payloads
WO2019095178A1 (fr) Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception
WO2019095177A1 (fr) Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception
WO2019095176A1 (fr) Procédé et appareil de détection d'informations basés sur une valeur de différence d'énergie de paquet et dispositif de réception
WO2019095174A1 (fr) Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception
WO2019095175A1 (fr) Procédé et appareil de détection d'informations sur la base d'une distance de points de constellation, et dispositif de réception
Dai et al. Magcode: Nfc-enabled barcodes for nfc-disabled smartphones
CN107947898B (zh) 基于优化分组方差的信息检测方法、装置及接收设备
US20190123767A1 (en) System and method for improved decoding using identified recurring side information
CN107819568B (zh) 基于星座点距离的信息检测方法、装置及接收设备
CN107809309B (zh) 基于幅度差的信息检测方法、装置及接收设备
CN115314054A (zh) 极化码译码方法、装置、通信设备及存储介质
JP2008054235A (ja) 変調方式判定装置、受信装置、変調方式判定方法及び変調方式判定プログラム
CN110190933B (zh) 基于匹配滤波对物理层隐藏信息的检测方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931873

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24.08.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17931873

Country of ref document: EP

Kind code of ref document: A1