Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generative text covert communication method based on theme guidance

A covert communication, generative technology, applied in the field of secret data transmission, can solve the problems of high computational complexity and low information hiding efficiency

Active Publication Date: 2021-09-03
SHANGHAI UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, due to the high computational complexity of Huffman coding and arithmetic coding, the efficiency of information hiding is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generative text covert communication method based on theme guidance
  • Generative text covert communication method based on theme guidance
  • Generative text covert communication method based on theme guidance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, a topic-guided generative text covert communication method, the specific operation steps are as follows: Among them, the specific operation steps of the sender are as follows:

[0032] Step 1: extract the subject phrase of each text segment according to the public data set;

[0033] Step 2: According to figure 2 , build a language model, and use the subject phrase and data set obtained in step 1 to train the model;

[0034] Step 3: Use run-length coding to encode the secret information as m=N 0 0N 1 1...,N 0 ,N 1 ∈[1,9];

[0035] Step 4: Subject expansion and clustering of the public subject words to obtain three groups of subject phrases, generate three text segments according to the subject phrases, respectively encode "0", "1" and "0" and order of "1";

[0036] Step 5: The sender sends the generated ciphertext and model parameters to the receiver.

[0037] The specific operation steps of the receiver are as follows:

[0038] Step 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a generative text covert communication method based on theme guidance. The attention of a subject term is introduced into the GPT2 self-attention model, so that the model is controlled by the subject term at any time in the text generation process, and the generated long text is semantically and statistically fitted with a real text; the information hiding capacity is improved; a multi-paragraph text is generated by expanding a subject word group, so that redundant bits of hidden secret information are reduced, and the text quality is improved; in addition, run-length coding is adopted, so that the information hiding efficiency is improved on the premise of ensuring the text quality. The information hiding capacity is improved, the information hiding efficiency is improved, and the attack resistance of the text carrier is enhanced.

Description

technical field [0001] The invention relates to the field of secret data transmission, in particular to a generating text covert communication method based on topic guidance. The text carrier is automatically generated based on the subject headings, and the secret data is hidden in the text carrier by applying run-length coding at the same time. The communication parties only need to transmit the generated cipher text to realize covert communication. Background technique [0002] Steganography means that the sender transmits the secret information to the receiver through the carrier without arousing the suspicion of the third party. With the development of the Internet, the carriers of secret information have gradually expanded from early digital images to text, audio and network social behaviors. Among them, text has become an excellent choice for steganographic carriers due to its wide application and high mobility. Early text steganography methods mainly hide information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F16/35G06F40/126
CPCG06F21/60G06F16/35G06F40/126
Inventor 康慧娴吴汉舟冯国瑞张新鹏
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products