Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Carrier-free steganography method and system based on blockchain private key mapping

A block chain and private key technology, applied in the field of computer information hiding, can solve the problems that the carrier is modified in the channel transmission, the cost of resource search is large, and the efficiency of information transmission is poor.

Active Publication Date: 2021-05-14
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. In the existing multimedia-based carrierless concealment schemes, the problem of carrier modification in channel transmission cannot be well solved. If the channel attributes of the carrier are modified, it is likely that the secret message cannot be recovered
[0009] 2. In the existing multimedia-based carrierless concealment scheme, multiple carriers are required for continuous information transmission. This feature is too obvious, and it is not easy to control the semantic features of the picture. These greatly increase the risk of steganographic behavior being detected. ;
[0010] 3. In the existing blockchain-based carrierless concealment scheme BLOCCE scheme, the channel capacity is too low, and each single output transaction can only embed 1 bit of secret information, and the information transmission efficiency is poor;
[0011] 4. Regardless of the carrierless solution, a carrier database needs to be maintained, the retrieval process is cumbersome, and resource search costs are high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Carrier-free steganography method and system based on blockchain private key mapping
  • Carrier-free steganography method and system based on blockchain private key mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Below in conjunction with accompanying drawing, the present invention will be further described through embodiment.

[0044] A carrierless covert communication scheme based on block chain private key mapping of the present invention comprises the following steps:

[0045] Step 1: Seed sharing: Both parties in the communication pre-generate random number seeds and communicate a unified random number generation algorithm;

[0046] Step 2: Create a table of the private key database: the two parties establish a private key database in a certain communication, and obtain the one-to-one mapping between the secret message and the private key through the serial number;

[0047] Step 3: Information embedding: The message sender selects the corresponding private key in the private key database according to the secret message;

[0048] Step 4: Confidential transactions on the chain: The message sender obtains the corresponding public key of the selected private key through the bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a carrier-free steganography method and system based on blockchain private key mapping. The carrier-free steganography method comprises the steps that: a message sender and a message receiver generate the same private key database respectively; the message sender converts the secret message into one or more serial numbers to obtain corresponding private keys, calculates a public key address of each corresponding private key, takes each public key address as a receiving address in a transaction order, and broadcasts the transaction order on the blockchain; and the message receiver generates a plurality of alternative addresses according to the private key database, obtains a corresponding private key in combination with the receiving address, and recovers the secret message. The blockchain information is used as a carrier, so that the message receiving consistency of two communication parties and the robustness to link noise are realized, the risk that carrier statistical information exposes communication facts is eliminated, the information transmission efficiency is improved, and the resource search overhead is greatly reduced.

Description

technical field [0001] The invention belongs to the field of computer information hiding, and proposes a carrierless steganography method and system based on block chain private key mapping. Background technique [0002] Covert communication technology is a technology that enables people to communicate safely on unsafe channels. Compared with encrypted communication methods, covert communication can also hide the communication behavior itself, so it has a broader application prospect than encryption. [0003] The general covert communication scheme is to hide the secret information in the carrier in a way that the third party cannot perceive, and transmit or release the carrier through an open channel. However, this concealment method needs to modify the carrier information, and the traces of modification can be easily detected by special steganographic detection methods, so safe covert communication is facing a huge challenge. [0004] Therefore, the information hiding sc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08G06Q40/04G06Q20/38G06F21/64G06F21/62G06F16/27
CPCH04L9/0869H04L9/002G06Q40/04G06Q20/3829G06F21/6218G06F21/64G06F16/27H04L9/50
Inventor 吴槟侯柏韬王亚宁
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products