Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Compressed file data embedding method and device capable of resisting longest matching detection

A technology for longest matching and compressing files, which is applied in the field of data security, and can solve problems such as data embedding security risks, breaking algorithm matching rules, etc.

Inactive Publication Date: 2015-07-29
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because this type of data embedding method directly modifies the length of the generated string during the embedding process, which destroys the matching rules of the algorithm itself, the opponent is likely to use the length detection method to identify whether the compressed file contains hidden information. , and then crack it, which leaves a hidden danger for the security of data embedding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compressed file data embedding method and device capable of resisting longest matching detection
  • Compressed file data embedding method and device capable of resisting longest matching detection
  • Compressed file data embedding method and device capable of resisting longest matching detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] In this embodiment, the zlib compression and decompression library supporting the deflate algorithm is used to complete the data embedding of the deflate algorithm in the fast mode. zlib is a function library for data compression, developed by Jean-loup Gailly and Mark Adler, the first version 0.9 was published on May 1, 1995. zlib uses the abstract DEFLATE algorithm, which was originally written for the libpng library, and later it is generally used by many software. This library is free software, licensed with zlib. As of March 2007, zlib is an open source project included in Coverity's US Department of Homeland Security sponsor that has chosen to continue review. In this embodiment, version 1.2.8 of zlib is used as the instance object. The concrete steps of embodiment are as follows:

[0061] A. Obtain the zlib 1.2.8 source code

[0062] The source code for version 1.2.8 of zlib can be downloaded from the zlib Home Site (http: / / www.zlib.net / ). This embodiment us...

Embodiment 2

[0104] Such as Figure 4 Shown is a compressed file data embedding device resistant to longest matching detection, including an embedded data acquisition unit, a file data acquisition unit to be compressed, a linked list processing unit, a longest matching length calculation unit, and a longest matching length output unit; the file data to be compressed The acquisition unit is connected to the linked list processing unit, the linked list processing unit and the embedded data acquisition unit are respectively connected to the longest matching length calculation unit, and the longest matching length calculation unit is connected to the longest matching length output unit;

[0105] Embedded data acquisition unit: acquire the embedded data, convert the embedded data into a binary bit sequence and store it in the bitBuf array, define the bitBuf array as a global array, and directly access the bitBuf data during data embedding to obtain the data to be embedded;

[0106] Data acquisi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a compressed file data embedding method and device capable of resisting longest matching detection and belongs to the technical field of data safety. According to the method, hidden information is embedded through modifying an optimal matched length searching process of a deflate compression algorithm so that whether a compressed file contains the hidden information or not cannot be detected by a longest matching detection manner; the specific process is that a deflate source code longest matching process is modified and embedded data is used for controlling a matched length generation process, so that the matched length containing the embedded data, generated by the algorithm, meets the longest matching condition, and furthermore, whether the compressed file contains the hidden information or not cannot be detected by the longest matching detection manner. Compared with an existing data embedding method based on an LZW compression algorithm, the longest matched length searching process of the compression algorithm is controlled by using the hidden data and the searched longest matching length is not directly modified, so that whether the embedded data exists or not cannot be detected by the longest matching detection method.

Description

technical field [0001] The invention relates to a method and device for embedding compressed file data resistant to longest matching detection, in particular to a method and device for embedding compressed file data resistant to longest matching detection based on a deflate data compression algorithm, belonging to the technical field of data security. Background technique [0002] Data compression is a technology that replaces the original data with a shorter data code without losing useful information, thereby reducing the storage space of the data. In the current network environment where the amount of information and data is increasing exponentially, reducing the storage space of data plays an essential role in reducing the difficulty of data management and reducing the cost of data transmission. [0003] Data compression algorithms can be divided into lossless data compression and lossy data compression. Lossless compression uses the statistical redundancy of data to com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H03M7/30
Inventor 梁晨李元章张师玮张全新谭毓安周佳琪
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products