Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Stream media hidden communication method based on hierarchical model

A covert communication and layered model technology, applied in the field of streaming media information hiding, can solve the problems of lack of data transmission integrity, inconvenient covert communication system interoperability, and application support of covert communication systems are not considered.

Inactive Publication Date: 2008-09-17
武汉世纪金桥安全技术有限公司
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These achievements put forward the corresponding concealment algorithm and preliminary transmission scheme, but the transmission scheme is related to the specific carrier, which is not convenient for the interoperability between covert communication systems based on various carriers; The applications actually supported by the communication system are also not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stream media hidden communication method based on hierarchical model
  • Stream media hidden communication method based on hierarchical model
  • Stream media hidden communication method based on hierarchical model

Examples

Experimental program
Comparison scheme
Effect test

example

[0164] The network address of the user 1 terminal is set to 192.168.1.2, the network address of the user 2 terminal is set to 192.168.1.3, and the voice compression coding method is selected as G.711u.

[0165] User 1 inputs the network address of destination terminal user 2 on the system interface, and sends a stream media transmission request to user 2. After user 2 receives the streaming media transmission request from user 1, user 2 agrees to streaming media transmission, and sends a consent request to user 1. After user 1 receives the message from user 2 agreeing to streaming media transmission, it will reply a confirmation message to user 2. At the same time, the microphone of user 1 terminal starts to collect voice, and compresses the collected voice data into G.711 coded files. The encoded file is encapsulated into an RTP data packet and sent to the destination end user 2 through the network. After receiving the confirmation message from user 1, user 2 also starts to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A streaming media concealed communication method based on hierarchical model belongs to a streaming media information concealing field. The invention is characterized in that before the entering of the source end for transmitting, and after the outputting of the target end from the internet, a secret information insertion module and a secret information extraction are respectively arranged for together forming a concealed communication module which is composed of a concealed application layer, a concealed transmission management layer and a concealed transmission adapting and executing layer in sequence. The input of the secret information, the reliable and concealed transmission of the secret information and the insertion and extraction operation of the secret information are respectively executed. The synchronous control and mistake control of the transmission management layer homogeneously adopt a sequence number mechanism. A finite state machine with a predetermined state flag bit is adopted for confirming the response under each state. A slide window is adopted for flow control. An application style token is adopted for realizing the transmission of different concealed applications in a same transmission channel according to priority. The invention has the advantages of wide adaptability and reliable transmission.

Description

technical field [0001] It belongs to the information hiding field of streaming media. Background technique [0002] Information hiding is an emerging technology in the field of information security. It is different from encryption technology and is attracting more and more researchers' attention. Internationally accepted definitions of information hiding technology are as follows: the confidential information to be hidden is called the embedded object, and the public information used to hide the embedded object is called the cover object, usually also called the carrier. Through a specific embedding algorithm, the embedding object is hidden into the cover object to generate a hidden object. This process is called the embedding process. Conversely, the process of extracting embedded objects from hidden objects using a specific extraction algorithm is called the extraction process. The executors of the embedding process and the extraction process are called embedders and ext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06
Inventor 黄永峰肖博熊磊
Owner 武汉世纪金桥安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products