CN116132037A - Safety hidden communication method - Google Patents

Safety hidden communication method Download PDF

Info

Publication number
CN116132037A
CN116132037A CN202310131799.7A CN202310131799A CN116132037A CN 116132037 A CN116132037 A CN 116132037A CN 202310131799 A CN202310131799 A CN 202310131799A CN 116132037 A CN116132037 A CN 116132037A
Authority
CN
China
Prior art keywords
information
picture
secret
module
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310131799.7A
Other languages
Chinese (zh)
Inventor
朱婷婷
魏国珩
张晓�
何涛
孙志宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Naval University of Engineering PLA
Original Assignee
Naval University of Engineering PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Naval University of Engineering PLA filed Critical Naval University of Engineering PLA
Priority to CN202310131799.7A priority Critical patent/CN116132037A/en
Publication of CN116132037A publication Critical patent/CN116132037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of safety communication, in particular to a safety hidden communication method, which comprises the following steps: acquiring information sent by a sending end, and encrypting the information into an information ciphertext; randomly selecting a picture, embedding the information ciphertext into the selected picture, generating a corresponding secret key, and outputting a secret-carrying picture; uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform; and the receiving end decrypts the encrypted picture based on the secret key and extracts information sent by the sending end. The safety hidden communication method provided by the invention is used for solving the defect that the interaction safety and concealment of mobile communication information cannot be effectively guaranteed in the prior art, realizing the efficient protection of user privacy and information, enhancing the privacy protection of user communication information and protecting the safety and concealment of a user information channel.

Description

Safety hidden communication method
Technical Field
The invention relates to the technical field of safety communication, in particular to a safety hidden communication method.
Background
With the popularization of mobile intelligent terminals, instant messaging software similar to WeChat has a large number of users, various instant messaging software among users sends messages and/or shares files, however, the information and files sent by the instant messaging software are unsafe, and as the messages and files are transferred through a server, the server can intercept the information and files, analyze and filter the privacy of individuals and enterprises, analyze personal behaviors and enterprise data, and meanwhile, the information can be intercepted and compromised by equipment in a network.
At present, in order to ensure the information security of the mobile intelligent terminal when in communication, the communication security is mainly ensured by two types of schemes, including a secure communication scheme based on a password technology and a secure communication scheme based on an information hiding technology; the security communication scheme based on the cryptographic technology utilizes the idea of realizing content hiding by the cryptographic technology, generally encrypts secret information by using a relatively secure encryption algorithm to enable the content to be unrecognizable, and transmits the secret information through a public way, wherein the security depends on the security of a secret key, and the scheme is difficult to avoid the fact that the secret information communication can be revealed, so that an attacker can attack the secret information in a targeted manner; the security communication scheme based on the information hiding technology aims at hiding the communication behavior, the secret information is hidden in the multimedia carrier and is not perceived, the security of the security communication scheme is derived from imperceptibility of the information hiding behavior, the security communication scheme is particularly suitable for an environment where the privacy communication is always monitored nowadays, but the scheme only pays attention to an algorithm for realizing encryption information, and the security concealment of an information channel is ignored.
Therefore, there is currently no effective secure communication method applied to the mobile communication terminal.
Disclosure of Invention
The invention provides a safe hidden communication method which is used for solving the defect that the interaction safety and the concealment of mobile communication information cannot be effectively guaranteed in the prior art, realizing the efficient protection of user privacy and information, enhancing the privacy protection of the user communication information and protecting the safety and the concealment of a user information channel.
The invention provides a safe hidden communication method, which specifically comprises the following steps:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a picture, embedding the information ciphertext into the selected picture, generating a corresponding secret key, and outputting a secret-carrying picture;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture based on the secret key and extracts information sent by the sending end.
According to the secure hidden communication method provided by the invention, the receiving end decrypts the encrypted picture, extracts the information sent by the sending end, and comprises the following steps:
extracting the secret-carrying picture from the cloud platform;
inputting a secret key corresponding to the secret-carrying picture, and checking the secret key;
if the secret key passes the verification, extracting an original information ciphertext from the secret-carrying picture;
and decrypting the information ciphertext to obtain the original information sent by the sending end.
According to the secure hidden communication method provided by the invention, before the receiving end sends information and the sending end receives information, the identity of the receiving end and the sending end is verified, comprising the following steps:
acquiring verification information sent by the receiving end and the sending end;
comparing the verification information with the stored verification information, and if the verification information is consistent with the stored verification information, passing the identity verification by the receiving end and/or the sending end.
The invention also provides a safety hidden communication system, which comprises a hidden module, an extraction and verification module and a communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a picture, embeds the information ciphertext into the selected picture through the secret module, generates a corresponding secret key and outputs a secret-loaded picture;
the sending end uploads the encrypted picture to a cloud platform through the communication module, and the encrypted picture is sent to the receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture through the extraction verification module based on the secret key, and extracts the information sent by the sending end.
The invention provides a safety hidden communication system, which also comprises an authentication module, before the receiving end sends information and the sending end receives the information, the authentication module is used for carrying out identity verification on the receiving end and the sending end, and the safety hidden communication system comprises the following steps:
the authentication module receives verification information sent by the receiving end and the sending end;
and the authentication module compares the authentication information with the stored authentication information, and if the authentication information is consistent with the stored authentication information, the receiving end and/or the sending end pass identity authentication.
On the other hand, the invention also provides a safety hidden communication method, which comprises the following steps:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a plurality of pictures, and sorting all the selected pictures according to a set sequence;
dividing the information ciphertext into the same number of pictures, sequentially embedding each divided information ciphertext into each picture arranged according to the set sequence, and generating the encrypted pictures with the same number of pictures;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture and performs integrity check, and extracts information sent by the sending end.
According to the secure hidden communication method provided by the invention, the receiving end decrypts the encrypted picture, extracts the information sent by the sending end, and comprises the following steps:
extracting all the secret-carried pictures from the cloud platform;
sorting all the secret-loaded images, and comparing the sorting of the secret-loaded images with the set sequence;
if the order of the encrypted images is the same as the set order, extracting the information ciphertext in all the encrypted images through decryption verification;
and sequentially integrating each information ciphertext into a complete information ciphertext, and decrypting to obtain the information sent by the sending end.
According to the secure hidden communication method provided by the invention, after extracting the information sent by the sending end, the information is subjected to integrity verification, and the secure hidden communication method comprises the following steps:
acquiring the information abstract value of the complete information ciphertext in an initial state;
re-encrypting the information to obtain the information abstract value of the current state;
and comparing the information abstract values of the initial state and the current state, and if the information abstract values of the two states are consistent, checking the integrity of the information.
In still another aspect, the present invention further provides a secure covert communication system, including a covert module, an extraction verification module, and a communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a plurality of pictures, sequences all the selected pictures according to a set sequence, divides the information ciphertext into parts with the same number as the pictures through the stealth module, and sequentially embeds each divided part of information ciphertext into each picture arranged according to the set sequence through the stealth module to generate the encrypted pictures with the same number as the pictures; the sending end uploads all the encrypted pictures to a cloud platform through the communication module, and the encrypted pictures are sent to the receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture through the extraction verification module and performs integrity verification, and extracts information sent by the sending end.
According to the secure hidden communication system provided by the invention, the receiving end decrypts the encrypted picture through the extraction verification module, extracts the information sent by the sending end, and comprises the following steps:
the receiving end extracts all the secret-carried pictures from the cloud platform;
the receiving end sorts all the secret-loaded images, the sorting of the secret-loaded images is compared with the sorting of the set sequence through the extraction and verification module, and if the sorting of the secret-loaded images is the same as the original set sequence, the information ciphertext in all the secret-loaded images is extracted through verification;
and sequentially integrating each information ciphertext into a complete information ciphertext through the extraction verification module, and decrypting to obtain the information sent by the sending end.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the secure covert communication method as described in any of the above when executing the program.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the secure covert communication method as described in any of the above.
The safety hidden communication method provided by the invention has at least the following technical effects:
(1) The encrypted information output after the information is encrypted is embedded into any picture selected by a user to generate a secret-carrying picture, so that the confidentiality of the information is enhanced; the cloud platform is used as a middle point to transmit the sent secret-carrying picture, so that a receiver can only acquire the encryption information from the secret-carrying picture through the correct secret key, and then can acquire the original information through decrypting the encryption information, the secret-carrying information is prevented from being directly decrypted, and meanwhile imperceptibility of secret information and safety concealment of a channel are realized.
(2) The method comprises the steps of sorting a plurality of selected pictures according to a set sequence through encryption information output after the information is encrypted, dividing the encryption information into a corresponding number of encryption information, and respectively and sequentially embedding the encryption information into the sorted pictures, so that the encryption information is secondarily encrypted according to the picture sequence, and the encryption strength is improved along with the number of the selected pictures;
(3) All the encrypted pictures transmitted are transmitted by taking the cloud platform as a middle point, so that a receiver can only acquire all the encrypted information by correctly ordering the encrypted pictures, and the safety of the information is greatly improved; and because the encryption information is segmented according to the number of pictures, even if the information is intercepted and decoded, the incompleteness of the information acquired by an attacker is ensured, the direct decryption of the carried secret information is avoided, and meanwhile, the imperceptibility of the secret information and the safety concealment of a channel are realized.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a method of secure covert communication provided by the invention;
FIG. 2 is a schematic diagram of the structure of the secure covert communication system provided by the invention;
fig. 3 is a second flow chart of the method for secure hidden communication according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the foregoing drawings are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to only those steps or modules but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the term "first/second" related to the present invention is merely to distinguish similar objects, and does not represent a specific order for the objects, and it should be understood that "first/second" may interchange a specific order or precedence where allowed. It is to be understood that the "first\second" distinguishing aspects may be interchanged where appropriate to enable embodiments of the invention described herein to be implemented in sequences other than those described or illustrated herein.
Embodiment 1, as shown in fig. 1, the method for secure covert communication provided by the invention specifically includes the steps of:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a picture, embedding the information ciphertext into the selected picture, generating a corresponding secret key, and outputting a secret-carrying picture;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture based on the secret key and extracts information sent by the sending end.
According to the secure hidden communication method provided by the invention, the receiving end decrypts the encrypted picture, extracts the information sent by the sending end, and comprises the following steps:
extracting the secret-carrying picture from the cloud platform;
inputting a secret key corresponding to the secret-carrying picture, and checking the secret key;
if the secret key passes the verification, extracting an original information ciphertext from the secret-carrying picture;
and decrypting the information ciphertext to obtain the original information sent by the sending end.
According to the secure hidden communication method provided by the invention, before the receiving end sends information and the sending end receives information, the identity of the receiving end and the sending end is verified, comprising the following steps:
acquiring verification information sent by the receiving end and the sending end;
comparing the verification information with the stored verification information, and if the verification information is consistent with the stored verification information, passing identity verification by the receiving end and/or the sending end;
optionally, the information sent by the sending end may include two options, namely text and picture; as an example, text information is manually input by a user, while picture information is photographed by the user or selected from a mobile phone photo album, and the text information or the picture information to be transmitted is converted into ciphertext;
optionally, embedding the information ciphertext into the picture according to a JPEG (joint photographic experts group) steganography algorithm for anti-steganography detection, thereby generating a secret-loaded picture;
optionally, various cloud services such as WeChat public numbers and icoeld can be used as a cloud platform for transfer, and as an example, the encrypted picture can be pushed to a user focusing on the push party WeChat public platform through an API interface of WeChat;
embodiment 2, as shown in fig. 2, the present invention further provides a secure covert communication system, including a covert module, an extraction verification module, and a communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a picture, embeds the information ciphertext into the selected picture through the secret module, generates a corresponding secret key and outputs a secret-loaded picture;
the sending end uploads the encrypted picture to a cloud platform through the communication module, and the encrypted picture is sent to the receiving end through the cloud platform;
the receiving end decrypts the encrypted picture through the extraction verification module based on the secret key, and extracts information sent by the sending end;
specifically, the encryption information extracted from the encrypted image is decrypted through the extraction and verification module, the key input by the user at the receiving end is matched with the actual key of the encryption information, and if the matching is successful, the ciphertext is decrypted through the key through verification;
specifically, the system further comprises an authentication module, before the receiving end sends information and the sending end receives information, the authentication module is used for carrying out identity verification on the receiving end and the sending end, and the system comprises:
the authentication module receives verification information sent by the receiving end and the sending end;
and the authentication module compares the authentication information with the stored authentication information, and if the authentication information is consistent with the stored authentication information, the receiving end and/or the sending end pass identity authentication.
Optionally, the authentication module performs earnest on the identity information of the user according to the password-based identity authentication technology, and is used for realizing functions including user registration, login authentication, gesture password unlocking, password recovery and the like; the user registration function mainly realizes the registration of a new user, the login authentication mainly realizes the forbidden access to an illegal user and the admittance to an legal user, the gesture password unlocking function mainly realizes the convenient and individual login of the legal user, and the password retrieving function mainly realizes the service of resetting the password when the legal user forgets the password, which is only used for further explanation of the embodiment of the invention and is not to be regarded as limiting the invention;
as an example, the user registration function includes: when a new user is registered, the system uploads the new user name to a server, the server verifies whether the new user name is repeated with the user name stored in the database by inquiring the user information database, and when the user name is not stored in the user database, the information such as a new user name ID, a password and the like is stored in the user database;
the login authentication function includes: when the user performs login authentication, the system uploads the user name and the password to the server, and the server verifies whether the authentication information uploaded by the user is matched with the user list information stored in the database by inquiring the user information database. If the authentication result is matched, the user is considered as a legal user, otherwise, the service is refused, and the authentication result is returned to the client;
the gesture password unlocking function comprises the following steps: a user who successfully logs in can set a gesture password to replace a password, and the gesture password is also stored in user list information corresponding to a user name;
the password retrieving function includes: when the user selects the password retrieving function, the system requests the user to upload the identity information such as the mobile phone number stored during registration, the server queries the user information database to compare, and after the comparison is passed, the user is provided with password resetting service and corresponding updating is performed in the user database;
embodiment 3, as shown in fig. 3, the present invention further provides a secure hidden communication method, which further improves the security of a user when sending and/or receiving information, and encrypts the information through 2 or more pictures, specifically including:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a plurality of pictures, and sorting all the selected pictures according to a set sequence;
dividing the information ciphertext into the same number of pictures, sequentially embedding each divided information ciphertext into each picture arranged according to the set sequence, and generating the encrypted pictures with the same number of pictures;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture and performs integrity check, and extracts information sent by the sending end.
Specifically, the receiving end decrypts the encrypted picture, extracts information sent by the sending end, and includes:
extracting all the secret-carried pictures from the cloud platform;
sorting all the secret-loaded images, and comparing the sorting of the secret-loaded images with the set sequence;
if the order of the encrypted images is the same as the set order, extracting the information ciphertext in all the encrypted images through decryption verification;
sequentially integrating each information ciphertext into a complete information ciphertext, and decrypting to obtain information sent by a sending end;
specifically, a transmitting end user selects 2 or more than 2 pictures, and the arrangement sequence of the pictures is customized, so that the information ciphertext is divided into a plurality of parts, and the parts are the same as the number of the pictures;
taking 9 pictures as an example, equally dividing the information ciphertext into 9 parts, and respectively embedding the 9 parts of information ciphertext into each picture according to the arrangement sequence of the pictures; the information ciphertext is encrypted according to different arrangement sequences of the pictures, when a receiving end user extracts the information in the secret carrier, the pictures are required to be placed into an extraction frame or arranged in other modes according to the embedding sequence of a pushing party, and the secret information can be extracted only if the sequence is consistent with the sequence set by a transmitting end;
for example, the information sender sets 3 pictures A, B, C, sets the picture sequence as B-ase:Sub>A-C, divides the information ciphertext into three segments, and sequentially embeds the three segments in B, A, C;
the information receiving end receives all the secret-loaded images through the cloud platform, and the order of all the secret-loaded images received by the information receiving end is random, the receiving end user is required to arrange all the secret-loaded images, and only the arrangement order generated by the receiving end user is consistent with the picture order set by the sending end, the receiving end user can acquire all the ciphertexts;
further, after the information ciphertext is decomposed, the sequence of the information ciphertext can be recorded, a sequence mark is generated, the decomposed information ciphertext is scrambled and then embedded into the ordered pictures, after the receiving end user orders the load-secret images, all the information ciphertext is obtained, and the information ciphertext is required to be ordered correctly according to the sequence mark of the information ciphertext, so that the safety of the ciphertext is further enhanced;
the information ciphertext may be divided uniformly or unevenly, and the information ciphertext is divided into a plurality of parts corresponding to the number of images;
optionally, the source of the carrier picture may include, but is not limited to, one or more of equipment real-time photographing, equipment gallery, and system-pushed alternative image gallery, etc., which is not limited in the present invention;
preferably, since the above method disassembles the original ciphertext information, after extracting the information sent by the sending end, the integrity verification of the extracted information is further required, including:
acquiring the information abstract value of the complete information ciphertext in an initial state;
re-encrypting the information to obtain the information abstract value of the current state;
comparing the information abstract values of the initial state and the current state, and if the information abstract values of the two states are consistent, checking the integrity of the information;
optionally, performing MD5 code verification on the information, and performing MD5 encryption on the information refers to transforming a byte string of any length into a large integer of 128 bits;
before decrypting the information, obtaining an information abstract value of an initial state; after decrypting the information, carrying out MD5 encryption on the file again, and obtaining the information abstract value of the current state of the file;
comparing the information abstract values obtained by the two encryption, if the two values are the same, the integrity of the information is good, otherwise, the integrity of the information is destroyed.
Embodiment 4, as shown in fig. 2, the secure covert communication system provided by the invention comprises a covert module, an extraction verification module and a communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a plurality of pictures, sequences all the selected pictures according to a set sequence, divides the information ciphertext into parts with the same number as the pictures through the stealth module, and sequentially embeds each divided part of information ciphertext into each picture arranged according to the set sequence through the stealth module to generate the encrypted pictures with the same number as the pictures;
the sending end uploads all the encrypted pictures to a cloud platform through the communication module, and the encrypted pictures are sent to the receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture through the extraction verification module and performs integrity verification, and extracts information sent by the sending end.
According to the secure hidden communication system provided by the invention, the receiving end decrypts the encrypted picture through the extraction verification module, extracts the information sent by the sending end, and comprises the following steps:
the receiving end extracts all the secret-carried pictures from the cloud platform;
the receiving end sorts all the secret-loaded images, the sorting of the secret-loaded images is compared with the sorting of the set sequence through the extraction and verification module, and if the sorting of the secret-loaded images is the same as the original set sequence, the information ciphertext in all the secret-loaded images is extracted through verification;
sequentially integrating each information ciphertext into a complete information ciphertext through the extraction verification module, and decrypting to obtain information sent by a sending end;
specifically, the user of the information sending end can self-define the encryption mode of the selected information, can select a simple mode of carrying out encryption on a single picture, and can also select a complex mode of encrypting a plurality of pictures;
wherein, simple mode: and taking a picture as a secret carrier, embedding the information ciphertext into the picture, setting a password, pushing the secret-carrying picture to a receiving end user through one of a WeChat public platform or a cloud platform such as icoeld, extracting after the user receives the picture, and finally displaying secret information, thereby ensuring the safety of the user when receiving the pushed information.
Complex mode: the safety of the user when receiving the push information is further improved, on the basis of a simple mode, instead of taking one picture as a secret carrier, a plurality of pictures are selected, the embedding sequence of the pictures is selected, and the information ciphertext is segmented and embedded into the pictures, so that a password is not required to be set. When the receiving end user extracts the information in the secret carrier, the pictures are required to be placed into an extraction frame or arranged in other modes according to the embedding sequence of the pushing party, and the secret information can be extracted only if the sequence is consistent with the sequence set by the sending end.
The present invention also provides an electronic device, which may include: a processor (processor), a communication interface (Communications Interface), a memory (memory) and a communication bus, wherein the processor, the communication interface, and the memory communicate with each other via the communication bus. The processor may invoke logic instructions in the memory to perform the steps of the secure covert communication method provided by the methods described above.
Further, the logic instructions in the memory described above may be implemented in the form of software functional units and stored in a computer-readable storage medium when sold or used as a stand-alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, are capable of performing the steps of the secure covert communication method provided by the methods described above.
In yet another aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform the steps of the secure covert communication method provided by the methods described above.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of secure covert communication comprising:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a picture, embedding the information ciphertext into the selected picture, generating a corresponding secret key, and outputting a secret-carrying picture;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture based on the secret key and extracts information sent by the sending end.
2. The method for secure covert communication according to claim 1, wherein said receiving terminal decrypts said encrypted picture, extracts information transmitted by the transmitting terminal, and comprises:
extracting the secret-carrying picture from the cloud platform;
inputting a secret key corresponding to the secret-carrying picture, and checking the secret key;
if the secret key passes the verification, extracting an original information ciphertext from the secret-carrying picture;
and decrypting the information ciphertext to obtain the original information sent by the sending end.
3. The method for secure covert communication according to any one of claims 1-2, wherein authenticating said receiving end and said transmitting end before said receiving end transmits information and said transmitting end receives information comprises:
acquiring verification information sent by the receiving end and the sending end;
comparing the verification information with the stored verification information, and if the verification information is consistent with the stored verification information, passing the identity verification by the receiving end and/or the sending end.
4. The utility model provides a safe hidden communication system which characterized in that includes secret module, draws check-up module and communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a picture, embeds the information ciphertext into the selected picture through the secret module, generates a corresponding secret key and outputs a secret-loaded picture;
the sending end uploads the encrypted picture to a cloud platform through the communication module, and the encrypted picture is sent to the receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture through the extraction verification module based on the secret key, and extracts the information sent by the sending end.
5. The secure covert communication system of claim 4, further comprising an authentication module, wherein prior to said receiving end transmitting information and said transmitting end receiving information, said authentication module is configured to authenticate said receiving end and said transmitting end, comprising:
the authentication module receives verification information sent by the receiving end and the sending end;
and the authentication module compares the authentication information with the stored authentication information, and if the authentication information is consistent with the stored authentication information, the receiving end and/or the sending end pass identity authentication.
6. A method of secure covert communication comprising:
acquiring information sent by a sending end, and encrypting the information into an information ciphertext;
randomly selecting a plurality of pictures, and sorting all the selected pictures according to a set sequence;
dividing the information ciphertext into the same number of pictures, sequentially embedding each divided information ciphertext into each picture arranged according to the set sequence, and generating the encrypted pictures with the same number of pictures;
uploading the encrypted picture to a cloud platform, and sending the encrypted picture to a receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture and performs integrity check, and extracts information sent by the sending end.
7. The method for secure covert communication according to claim 6, wherein the receiving terminal decrypts the encrypted picture, extracts information transmitted by the transmitting terminal, and comprises:
extracting all the secret-carried pictures from the cloud platform;
sorting all the secret-loaded images, and comparing the sorting of the secret-loaded images with the set sequence;
if the order of the encrypted images is the same as the set order, extracting the information ciphertext in all the encrypted images through decryption verification;
and sequentially integrating each information ciphertext into a complete information ciphertext, and decrypting to obtain the information sent by the sending end.
8. The method for secure covert communication according to any one of claims 6-7, wherein after extracting the information sent by the sender, performing integrity verification on the information, comprising:
acquiring the information abstract value of the complete information ciphertext in an initial state;
re-encrypting the information to obtain the information abstract value of the current state;
and comparing the information abstract values of the initial state and the current state, and if the information abstract values of the two states are consistent, checking the integrity of the information.
9. The utility model provides a safe hidden communication system which characterized in that includes secret module, draws check-up module and communication module, wherein:
the sending end encrypts the information to be sent into an information ciphertext through the secret module;
the sending end randomly selects a plurality of pictures, sequences all the selected pictures according to a set sequence, divides the information ciphertext into parts with the same number as the pictures through the stealth module, and sequentially embeds each divided part of information ciphertext into each picture arranged according to the set sequence through the stealth module to generate the encrypted pictures with the same number as the pictures;
the sending end uploads all the encrypted pictures to a cloud platform through the communication module, and the encrypted pictures are sent to the receiving end through the cloud platform;
and the receiving end decrypts the encrypted picture through the extraction verification module and performs integrity verification, and extracts information sent by the sending end.
10. The secure covert communication system of claim 9, wherein said receiving terminal decrypts said encrypted picture via said extraction verification module, extracts information transmitted by said transmitting terminal, comprising:
the receiving end extracts all the secret-carried pictures from the cloud platform;
the receiving end sorts all the secret-loaded images, the sorting of the secret-loaded images is compared with the sorting of the set sequence through the extraction and verification module, and if the sorting of the secret-loaded images is the same as the original set sequence, the information ciphertext in all the secret-loaded images is extracted through verification;
and sequentially integrating each information ciphertext into a complete information ciphertext through the extraction verification module, and decrypting to obtain the information sent by the sending end.
CN202310131799.7A 2023-02-17 2023-02-17 Safety hidden communication method Pending CN116132037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310131799.7A CN116132037A (en) 2023-02-17 2023-02-17 Safety hidden communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310131799.7A CN116132037A (en) 2023-02-17 2023-02-17 Safety hidden communication method

Publications (1)

Publication Number Publication Date
CN116132037A true CN116132037A (en) 2023-05-16

Family

ID=86311577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310131799.7A Pending CN116132037A (en) 2023-02-17 2023-02-17 Safety hidden communication method

Country Status (1)

Country Link
CN (1) CN116132037A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116963062A (en) * 2023-09-20 2023-10-27 深圳市爱玛森科技有限公司 Mobile equipment interaction method and system based on near communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116963062A (en) * 2023-09-20 2023-10-27 深圳市爱玛森科技有限公司 Mobile equipment interaction method and system based on near communication
CN116963062B (en) * 2023-09-20 2024-03-29 深圳市爱玛森科技有限公司 Mobile equipment interaction method and system based on near communication

Similar Documents

Publication Publication Date Title
CN113572614B (en) Security method and system for data transmission
US9432346B2 (en) Protocol for controlling access to encryption keys
US6959394B1 (en) Splitting knowledge of a password
EP3132368B1 (en) Method and apparatus of verifying usability of biological characteristic image
CN100536393C (en) Secret shared key mechanism based user management method
EP2544117A1 (en) Method and system for sharing or storing personal data without loss of privacy
CN104662870A (en) Data security management system
CN109274644B (en) Data processing method, terminal and watermark server
CN110061967B (en) Service data providing method, device, equipment and computer readable storage medium
CN107294964B (en) Information transmission method
CN105991559B (en) A kind of user security login method based on image encryption technology
CN107332666A (en) Terminal document encryption method
CN116132037A (en) Safety hidden communication method
CN111177748A (en) Fingerprint storage encryption method, device and system
GB2457491A (en) Identifying a remote network user having a password
CN111049641A (en) Bidirectional authentication based image multiple secret transmission method, device and system
CN110996132A (en) Video image splitting, encrypting and transmitting method, device and system
CN108322311B (en) Method and device for generating digital certificate
Harba Advanced password authentication protection by hybrid cryptography & audio steganography
JP2003304228A (en) Encryption system and its method
CN109214163B (en) Identity authentication method and device
US20200304601A1 (en) Verification of data recipient
CN111541652B (en) System for improving security of secret information keeping and transmission
CN110691068A (en) Cloud server login system, method and device
KR20180116628A (en) User access authentication system based on personal image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination