CN103118139A - Distributed information hiding transmission system and transmission method thereof - Google Patents
Distributed information hiding transmission system and transmission method thereof Download PDFInfo
- Publication number
- CN103118139A CN103118139A CN2013100686990A CN201310068699A CN103118139A CN 103118139 A CN103118139 A CN 103118139A CN 2013100686990 A CN2013100686990 A CN 2013100686990A CN 201310068699 A CN201310068699 A CN 201310068699A CN 103118139 A CN103118139 A CN 103118139A
- Authority
- CN
- China
- Prior art keywords
- secret
- http
- fragment
- client computer
- http request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a distributed information hiding transmission system which is characterized in that a secret file is coded through a coder and is decomposed into a plurality of secret sections through a data wafer separator, and the plurality of secret sections are transmitted to a transmitting selector according to the bite sequence in the secret file; the transmitting selector selects corresponding hyper text transport protocol (HTTP) clients to transmit an HTTP request according to the specific value of the secret sections; a server receives the HTTP request transmitted by the HTTP clients, analyzes the secret sections, performs normal HTTP response for the HTTP clients, and transmits the analyzed secret sections to a receiving control main machine in sequence; and the receiving control main machine splices the secret sections through a data splicer and then performs decoding through a decoder to obtain a secret file. The distributed information hiding transmission system can effectively resist detection of various existing detection methods and achieves the purpose of safe hiding transmission.
Description
Technical field
The invention belongs to the Security Data Transmission technical field, be specifically related to a kind of distributed information and hide transmission system and transmission method thereof.
Background technology
Along with the raising that security for all countries department requires information transmission safety, the Information Hiding Techniques that is used for the information hiding transmission progressively becomes the study hotspot of information security field.Traditional Information Hiding Techniques general action can access the Still Media of abundant guarantee in the reliabilities such as text, image and integrality, but the progressively raising along with detection technique, Information Hiding Techniques development under the traditional static media is increasingly slow, therefore, the Information Hiding Techniques of the dynamic media such as agreement Network Based has become a new research excitement.
Information hiding based on agreement mainly is divided into delaying type Information hiding and storage-type Information hiding.The delaying type Information hiding is mainly to utilize the transmission between the Internet protocol data bag to carry out data encoding interval time, and the storage-type Information hiding be mainly utilize the field of default value is arranged in the procotol message content or wait until expansion still untapped field carry out direct or indirect data and embed.The delaying type information concealing method was risen in the late 20th century, once once placed high hopes, but years of researches and grope to have proved it and impracticable.Because network jitter is ubiquitous, the delay coded message of transmit leg can't accurately arrive the recipient at all, the reliability of its coding transmission can only be protected in the local network of single level, after spanning multilayer time complex network, can produce the high surprising error rate that gets.Therefore, guaranteeing under the demand of hidden transmission reliability, becoming gradually main flow for the research of storage-type Information Hiding Techniques.Along with the fast-developing of the new technologies such as ecommerce, web game and social networks and universal, in the network traffics in the present age, the HTTP(HTML (Hypertext Markup Language)) message is ubiquitous, and therefore, HTTP becomes natural in Information hiding researcher eye, good hiding carrier.
Existing storage-type Information Hiding Techniques based on HTTP mainly contains adds head, directly filling, header parameter sequence, the filling of linear space, keyword sequence and capital and small letter coding.These methods have all been utilized laxity and the redundancy of HTTP message content, utilize not strictly determined text feature loose in RFC2616 to carry out the coding of secret information.For these hidden methods, researchers proposed based on agreement detection method, differentiate and statistical detection method detects carrying confidential information stream based on the detection method of Applied Digital signature and based on the various modes such as detection method of employing fingerprint, and these methods have all obtained extraordinary detection effect on all information concealing methods.Therefore, on the hiding direction of forward, progressively stagnate based on the development of the Information Hiding Techniques of HTTP, do not obtain further progress.
Yet, along with the development of Distributed Application and universal, existingly also progressively embody for the deficiency based on the detection method of HTTP Information hiding.Existing detection method all is based on the detection of single current, namely for the detection of http session between the http session of a TCP four-tuple or a pair of communication IP, all statistics and identifying are all on this single session stream, so, adopt the distributed transmission structure of multimachine device can effectively dilute the hiding feature that has now based on the information concealing method of HTTP, thereby reach the purpose of anti-detection.The present invention therefore.
Summary of the invention
The invention provides a kind of distributed storage type information concealing method based on HTTP of reliable anti-detection, when completing the hidden transmission of secret information, guarantee the inerrancy of transmission, and guarantee simultaneously the anti-detection transmitted.By technical scheme of the present invention, the transmit leg of secret information can carry out hidden transmission on a reliable hidden passageway of logic, and can effectively resist the detection of existing various detection methods, reaches the purpose of transmission safe and out of sight.
In order to solve these problems of the prior art, technical scheme provided by the invention is:
A kind of distributed information is hidden transmission system, comprises as the transmission main control system of transmit leg with as recipient's reception main control system, it is characterized in that described transmission main control system is provided with encoder, data fragmentation device and send selector, and with 2
nThe individual HTTP client network that sends the HTTP request connects, and described reception main control system is provided with data splicer and decoder, and is connected with the server that can receive the HTTP request, and described server is connected with the equal network of each HTTP client computer; Described encoder resolves into several secret fragments by the data fragmentation device with coded file after secret papers are encoded, and is sent to the transmission selector according to the bit-order in secret papers; According to the occurrence of secret fragment, described transmission selector selects corresponding HTTP client computer to send a HTTP request to server; Described server receives the HTTP request that the HTTP client computer sends, and parses secret fragment, carry out normal http response to the HTTP client computer, and the secret fragment that will parse sends to the reception main control system according to the order of sequence; Described reception main control system splices secret fragment by the data splicer, then decodes by decoder, obtains secret papers; Wherein n is the integer more than or equal to 1.
Preferably, described transmit leg is transferred to the recipient with secret papers in accordance with the following steps:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response, (guaranteeing according to this integrality and the legitimacy of http communication);
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
Preferably, described transmission selector is safeguarded the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
Preferably, to embed the method for secret fragment in the HTTP message be header format conversion method to described client computer.2
nIn individual client computer, for each client computer, make its HTTP that sends with a certain set form ask to server, this set form namely represents a certain fixing n bit fragment; Wherein, client computer with the header form must be unique, mutually different, like this, 2
nIndividual client computer just can embed all 2
nIndividual n bit fragment.
The set form of http header namely represents a certain fixing n bit fragment; Wherein, client computer with the header form must be unique, mutually different, 2
nIndividual client computer just can embed all 2
nIndividual n bit fragment
Another object of the present invention is to provide a kind of distributed information to hide transmission method, it is characterized in that in described method, the transmission main control system as transmit leg is provided with encoder, data fragmentation device and transmission selector, and with 2
nThe individual HTTP client network that sends the HTTP request connects, reception main control system as the recipient is provided with data splicer and decoder, and be connected with the server that can receive the HTTP request, described server is connected with the equal network of each HTTP client computer, and wherein n is the integer more than or equal to 1; Said method comprising the steps of:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server guarantees integrality and the legitimacy of http communication according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
Preferably, send selector in described method and safeguard the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
Preferably, the method that client computer embeds secret fragment in the HTTP message in described method step (2) is header format conversion method.2
nIn individual client computer, for each client computer, make its HTTP that sends with a certain set form ask to server, this set form namely represents a certain fixing n bit fragment.Wherein, client computer with the header form must be unique, mutually different.Like this, 2
nIndividual client computer just can embed all 2
nIndividual n bit fragment.
With respect to scheme of the prior art, advantage of the present invention is:
The hiding feature that the distributed frame that the reliable distributed HTTP information concealing method of technical solution of the present invention transmits by multimachine has effectively diluted existing header format conversion information concealing method, thereby can effectively resist existing detection method for the HTTP Information hiding, reach the purpose of transmission safe and out of sight.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples:
Fig. 1 is the system architecture diagram that distributed information of the present invention is hidden transmission system;
Fig. 2 is the method flow diagram that distributed information of the present invention is hidden transmission method.
Embodiment
Below in conjunction with specific embodiment, such scheme is described further.Should be understood that these embodiment are not limited to limit the scope of the invention for explanation the present invention.The implementation condition that adopts in embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in normal experiment.
Embodiment
The demand of technical solution of the present invention is: the existing a binary system secret papers of transmit leg need to send a recipient who can be used as http server to, because transmit leg is strictly monitored, so any explicit transport behavior all can be under an embargo.Do not use by shutoff, whether to contain suspicious information stream but the http session meeting is detected with definite its as HTTP used in everyday.With this understanding, transmit leg carries out the transmission of secret papers by a kind of reliable distributed HTTP information concealing method, thereby reaches the purpose of transmission safe and out of sight.
As shown in Figure 1, hide the system of systems Organization Chart for the reliable distributed information of the present invention.Be divided into transmit leg and recipient on this entire system.Transmit leg is by encoder, data fragmentation device and send selector and 2
nIndividual HTTP client computer forms [C
1, C
2..., C
2 n], encoder wherein, data fragmentation device and send selector and can be integrated in and send on main control system.The recipient is comprised of server, data splicer and decoder, and wherein data splicer and decoder can be integrated in and receive on main control system.Transmit leg is encoded to secret papers by encoder, and the file after coding is divided into the fragment that t length is the n bit, and sends for the suitable HTTP client computer of each Piece Selection by sending selector.The recipient passes through decoding after splicing in order with these fragments processes again, thereby obtains secret papers by the server information segment that parsing disperses from the HTTP request.
On the client computer of transmit leg, the present invention adopts existing storage-type information concealing method based on the HTTP information of carrying out to embed.From existing information concealing method, therefore the header format conversion hidden method that mainly is based on text feature that can dilute information hiding feature by distributed frame describes as an example of wherein keyword sort algorithm example here.For client computer C
i, the HTTP request that we make it send fixing a certain form is used for representing i n bit fragment n_seg
i(1<=i<=2
n).For example: " 00 " is the 1st 2 bit fragments, and " 01 " is the 2nd 2 bit fragments, and " 10 " are the 3rd 2 bit fragments, and " 11 " are the 4th 2 bit fragments.Specifically, choose g in numerous keywords of http protocol content, g and n satisfy relational expression: g! 〉=2
nPartial ordering relation a: H set up in g keyword for this reason
1<H
2<...<H
gThis partial ordering relation is strict fixing, that share and consistent on transmit leg and recipient.When the recipient receives a HTTP request, the recipient will extract arrangement a: H ' of this g head keyword
1, H '
2..., H '
gNext, can be further by health holder expansion:
k=a[1]*(g-1)!+a[2]*(g-2)!+...+a[g]*0!+1
Calculating this arrangement is k arrangement of this partial ordering relation, and this HTTP asks just to have encoded n_seg so
kFragment.Wherein, a[u] be illustrated in this arrangement and satisfy H '
j<H '
uAnd j〉H ' of u
jNumber.C so
iThe message format of the HTTP request that sends just keeps i arrangement of this partial ordering relation regularly, thereby reaches the purpose of distributed transmission data fragmentation.Like this hide and analysis mode can farthest keep independence and the accuracy of encoding and extracting.Wherein, 1<=i, j, u, k<=2
n
For example according to following hidden method respectively can coding binary " 0 " and " 1 "." 0 " is expressed as in the HTTP request message keyword for like this:
GET/HTTP/1.1
Accept:*/*
Accept-Language:en-gb
Accept-Encoding:gzip,deflate
User-Agent:Mozilla/4.0(compatible;MSIE6.0)
Host:www.google.com
Connection:Keep-Alive;
" 1 " is expressed as in the HTTP request message keyword for like this:
GET/HTTP/1.1
Accept:*/*
Accept-Language:en-gb
Accept-Encoding:gzip,deflate
Host:www.google.com
User-Agent:Mozilla/4.0(compatible;MSIE6.0)
Connection:Keep-Alive。
Wherein the sequence of keyword " Host ", " User-Agent " is different.
The process of Code And Decode is arranged respectively transmit leg and recipient, and this a pair of process is reciprocal, can adopt the public key encryption technology such as the symmetric cryptosystems such as AES or DES or RSA.Under symmetric cryptosystem, both sides' key is shared consistent; Under the public key encryption technology, this is exactly a pair of PKI and private key to key.Adopt this encryption technology process can further guarantee the fail safe of secret papers, but the most important thing is the number of times that each data fragmentation of equalization occurs, thereby the balanced HTTP request that each sends client computer sends load.
As shown in Figure 2, be the workflow diagram of our Information hiding transmission method, transmit leg is chosen a computer with higher configured as sending main control system (SCH), integrated document No., data fragmentation and transmission selection function in SCH; Choose 2
nThe individual common computer of HTTP request that can send is as the HTTP client computer.The recipient chooses a http server (S), in order to receive the HTTP request of transmit leg; Choose a common computer as receiving main control system (RCH), integrated data splicing and file decoding function in RCH.SCH and each client computer have a direct bi-directional communication channel, in order to mutual control information.S has a direct uni directional communication channel in order to send the secret information fragment of resolving from the HTTP request to RCH.Each client computer will be set up a TCP with 80 ports of S and be connected, in order to carry out http communication.Specifically comprise the following steps:
Step 1: in SCH, secret papers are broken down into t n bit fragment [s through after encoder encodes
1, s
2... s
t], this t n bit fragment is sent to the transmission selector according to the bit-order in secret papers.
Step 2: for each n bit fragment, send selector and judge that at first which n bit fragment is this fragment be.Might as well establish this fragment is k n bit fragment n_seg
k, send so selector and will arrange C
kSend a HTTP message with its unique set form to S (1<=k<=2
n).In process of transmitting, send selector and will safeguard the fragment that a queue stores is sended over by wafer breaker, after the HTTP request with the secret fragment of the client computer previous embedding of mutual confirmation has been received by S, again next fragment is sent, thereby guarantee that fragment is in the definitely orderly and correctness of receiving terminal.
Step 3: client computer with waiting for the feedback of S, after it receives first ACK, will be notified to send the next secret fragment of selector transmission after sending a HTTP request.After this, client computer will continue to complete the process of the response that receives this HTTP request.
Step 4: S after receiving the HTTP request that client computer sends parses the secret fragment of the t in request, sends to according to the order of sequence RCH.Simultaneously, S can send corresponding response message to each HTTP request, keeps the integrality of http communication interbehavior.
Step 5: in RCH, t secret fragment spliced according to the order of sequence, finally obtains secret papers by decoding.
A kind of reliable distributed HTTP information concealing method.The distributed frame that sends by multimachine effectively dilutes hiding feature, resists existing detection method.Guarantee the in order correct of transfer of data on private communication channel by the transmission means such as stopping.The transmission safe and out of sight that reliability by guaranteeing this hidden method and anti-detection guarantee secret information.Specifically, after systems technology was ready, this hidden method can be divided into three phases.Phase I is that secret papers embed the stage, comprises step 1 and step 2; Second stage is the secret information sending and receiving stage, comprises step 3 and step 4; Phase III is the secret information resolution phase, is step 5.
Below we explain the course of work of the method with a specific embodiment.In this example, we need to be with the method text that to transmit a size be 1KB.We are 4 with the n value, and being about to secret papers, to be divided into length be the data slot of 4 bits, has 16 client computer to participate in transmissions.In http protocol, we choose 4 head keywords and set up partial ordering relation: " Accept "<" User-Agent "<" Host "<" Connection ".C so
1HTTP request have fixedly keyword array format: Accept, User-Agent, Host, Connection; C
2HTTP request have fixedly keyword array format: Accept, User-Agent, Connection, Host; C
16HTTP request have fixedly keyword array format: Connection, Host, User-Agent, Accept.
The text of phase I: 1KB obtains the encrypt file of a 1KB by a des encryption process, it is represented with binary digit, and be broken down into 2048 4 bit fragments.These 2048 4 bit fragments will be given in an orderly manner sends selector [s
1, s
2..., s
2048].
S
KRepresent the n bit fragment that concrete file is divided into, and 4_seg
KRepresent k n bit fragment, such as " 00 " " 01 " " 10 " " 11 " is respectively the 1st, 2,3,42 bit fragments.But the fragment that file is divided into is the sequence by the mixed and disorderly combination of these fragments, as 000011100101, is exactly 6 sequences that 2 bit fragments form, wherein 1<=k<=2
n
Second stage: send selector and extract in order 4 bit fragments, and send the HTTP request according to the Piece Selection client computer.Specifically, need to send as 4 bit fragments " 0110 ", at first the transmission selector identifies " 0110 " is the 6th 4 bit fragment, i.e. 4_seg
6Subsequently, send selector to C
6Transmit and send instruction, C so
6To send a HTTP request to S.At C
6After confirming that this HTTP request has been received by S, can feed back to confirmation of transmission selector, notice sends selector can continue to send next burst.Recipient S receives C
6HTTP request after, the keyword that extracts is wherein arranged: Accept, Connection, Host, User-Agent.Arrange us according to this and can be calculated by health holder expansion the 6th arrangement that this arrangement is partial ordering relation: 0*3! + 2*2! + 1*1! + 0*0! + 1=6.After obtaining this and being arranged as the 6th arrangement, S can parse " 0110 " this 4 bit fragment, sends it to RCH.
2048 secret information fragments that phase III: RCH will receive from S obtain the encrypt file of 1KB in order after splicing, obtain the text of 1KB by the DES decrypting process.
Parameter arranges:
In concrete enforcement, SCH, RCH, S and All Clients all adopt ordinary individual's computer, adopt the system platform of Windows764-bit, the hardware platform of Intel Core2Duo2.94GHZ processor and 4GB internal memory, the network egress bandwidth condition of 10Mbps.
In the middle of the operation of whole hidden method, the value of n directly has influence on the speed of hidden transmission, and we get respectively 1,2,3,4,5,6 with n, sends the text of 1KB, and its transmission required time is as shown in table 1.Data from table can see that the n value is larger, and efficiency of transmission is higher.But the increase of n value means that our required transmission client computer also increases being exponential type, determines so the value of concrete n need to be done many-sided balance, and this value is not changeless.
n | 1 | 2 | 3 | 4 | 5 | 6 |
Transmission time (s) | 39.1 | 28.4 | 14.2 | 10.7 | 9.5 | 7.5 |
Table 1: the transmission time under different n values
Anti-detection experimental result:
In order to test the anti-detection of information concealing method designed in the present invention, we adopt respectively detection method based on agreement, based on the detection method of Applied Digital signature with based on the detection method of employing fingerprint, the http session data flow that this information concealing method produces are detected.Detection method based on agreement is to detect in the http protocol message whether comprise the complete http protocol content of a minimum and whether added other invalid informations, and main detected object is to add the head method.Detection method based on the Applied Digital signature is whether detection http communication both sides carry out information coding by the text feature that changes protocol contents in communication process, and main detected object is that fill in header parameter sequence, linear space, keyword sorts and the capital and small letter coding.Detection method based on employing fingerprint is to detect the http communication both sides whether to carry out data interaction by the solid data in message, and main detected object is direct completion method.We shut from marginal network and have collected 10000 pairs of daily http sessions and flow as legal http session, respectively with three kinds of detection methods for 5000 pairs of each self-generatings of information concealing method carry close http session stream, then generate 5000 pairs with the designed information concealing method of the present invention and carry close http session and flow.For the http session of collecting stream, the session that we produce legitimate conversation stream, the present invention respectively with three kinds of methods flow and separately for the session stream that produces of information concealing method detect, provide and be detected as power, as shown in table 2.Can see to have 7.9% probability successfully to detect the designed information concealing method of the present invention based on the detection method of employing fingerprint from table.Legitimate conversation stream also has 3.6% successful detection probability, shows that namely the method has certain false drop rate, can not think that the method can detect the designed information concealing method of the present invention by such testing result but simultaneously.Therefore, we may safely draw the conclusion: existing main detection method all can not detect the designed reliable distributed HTTP information concealing method of the present invention.
By above-mentioned analysis as seen, the designed HTTP information concealing method of the present invention can be resisted the detection of existing detection method effectively, and guarantee the inerrancy that transmits by the mode such as stop, make the method possess simultaneously reliability and anti-detection, this is that general information concealing method is not available.This shows, the present invention has substantive technical characterstic and significant technological progress, and its application prospect is boundless.
? | Legitimate conversation stream | Session stream of the present invention | Institute flows for the hidden method session |
Based on agreement | 0% | 0% | 100% |
Sign based on Applied Digital | 0% | 0% | 100% |
Based on employing fingerprint | 3.6% | 7.9% | 99.7% |
Table 2: three kinds of detection methods be detected as power
Above-mentioned example only is explanation technical conceive of the present invention and characteristics, and its purpose is to allow the person skilled in the art can understand content of the present invention and implement according to this, can not limit protection scope of the present invention with this.All equivalent transformations that Spirit Essence is done according to the present invention or modification are within all should being encompassed in protection scope of the present invention.
Claims (7)
1. a distributed information is hidden transmission system, comprises as the transmission main control system of transmit leg with as recipient's reception main control system, it is characterized in that described transmission main control system is provided with encoder, data fragmentation device and send selector, and with 2
nThe individual HTTP client network that sends the HTTP request connects, and described reception main control system is provided with data splicer and decoder, and is connected with the server that can receive the HTTP request, and described server is connected with the equal network of each HTTP client computer; Described encoder resolves into several secret fragments by the data fragmentation device with coded file after secret papers are encoded, and is sent to the transmission selector according to the bit-order in secret papers; According to the occurrence of secret fragment, described transmission selector selects corresponding HTTP client computer to send a HTTP request to server; Described server receives the HTTP request that the HTTP client computer sends, and parses secret fragment, carry out normal http response to the HTTP client computer, and the secret fragment that will parse sends to the reception main control system according to the order of sequence; Described reception main control system splices secret fragment by the data splicer, then decodes by decoder, obtains secret papers; Wherein n is the integer more than or equal to 1.
2. system according to claim 1 is characterized in that described transmit leg is transferred to the recipient with secret papers in accordance with the following steps:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
3. system according to claim 2, it is characterized in that secret fragment that queue stores is sended over by the data fragmentation device of described transmission selector maintenance, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
4. system according to claim 2, is characterized in that described client computer embeds secret fragment with header format conversion method in the HTTP message; 2
nIn individual client computer, for each client computer, make its HTTP that sends with a certain fixing head form ask to server, this set form represents a certain fixing n bit fragment; Wherein each client computer with the header form unique, by the set form of HTTP message, 2
nIndividual client computer embed secret papers all 2
nIndividual n bit fragment.
5. a distributed information is hidden transmission method, it is characterized in that in described method, the transmission main control system as transmit leg is provided with encoder, data fragmentation device and transmission selector, and with 2
nThe individual HTTP client network that sends the HTTP request connects, reception main control system as the recipient is provided with data splicer and decoder, and be connected with the server that can receive the HTTP request, described server is connected with the equal network of each HTTP client computer, and wherein n is the integer more than or equal to 1; Said method comprising the steps of:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
6. method according to claim 5, it is characterized in that sending in described method selector and safeguard the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
7. method according to claim 5, is characterized in that in described method step (2), client computer embeds secret fragment with header format conversion method in the HTTP message; 2
nIn individual client computer, for each client computer, make its HTTP that sends with a certain fixing head form ask to server, this set form represents a certain fixing n bit fragment; Wherein each client computer with the header form unique, by the set form of HTTP message, 2
nIndividual client computer embed secret papers all 2
nIndividual n bit fragment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310068699.0A CN103118139B (en) | 2013-03-05 | 2013-03-05 | Distributed information hides transmission system and transmission method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310068699.0A CN103118139B (en) | 2013-03-05 | 2013-03-05 | Distributed information hides transmission system and transmission method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103118139A true CN103118139A (en) | 2013-05-22 |
CN103118139B CN103118139B (en) | 2016-03-30 |
Family
ID=48416409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310068699.0A Expired - Fee Related CN103118139B (en) | 2013-03-05 | 2013-03-05 | Distributed information hides transmission system and transmission method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103118139B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581168A (en) * | 2013-08-02 | 2014-02-12 | 中国科学技术大学苏州研究院 | Hidden information communication method based on IP fragmentation camouflage technology |
CN103841118A (en) * | 2014-03-25 | 2014-06-04 | 中国科学技术大学苏州研究院 | Two-way reliable covert channel based on TCP effective loads |
CN104580241A (en) * | 2015-01-22 | 2015-04-29 | 南京理工大学 | Behavior covert channel based on HTTP protocol |
CN106534144A (en) * | 2016-11-28 | 2017-03-22 | 南京理工大学 | Network covert channel construction method based on Web application directory tree |
CN106911705A (en) * | 2016-12-14 | 2017-06-30 | 中国电子科技集团公司第三十研究所 | Hidden information communication means based on IP fragmentation mechanism |
CN107623855A (en) * | 2016-07-13 | 2018-01-23 | 谭心瑶 | A kind of embedded rate steganography device of height based on compressed encoding and steganography method |
CN109005200A (en) * | 2018-10-12 | 2018-12-14 | 浙江工业大学 | A kind of hidden document transmission method under WiFi physical isolation environment |
CN109088874A (en) * | 2018-08-21 | 2018-12-25 | 北京睦合达信息技术股份有限公司 | A kind of data transmission method and equipment |
CN109246075A (en) * | 2018-07-26 | 2019-01-18 | 复旦大学 | Information concealing method based on social software user's dynamic message forwarding mechanism |
CN111245554A (en) * | 2020-01-14 | 2020-06-05 | 全球能源互联网研究院有限公司 | Interference method and system for network hidden channel |
CN113746631A (en) * | 2021-07-12 | 2021-12-03 | 浙江众合科技股份有限公司 | Safety communication method based on safety code |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645061A (en) * | 2009-09-03 | 2010-02-10 | 张�浩 | Information hiding method taking text information as carrier |
EP2357753A1 (en) * | 2008-11-14 | 2011-08-17 | Oki Semiconductor Co., Ltd. | Confidential information transmission method, confidential information transmission system, and confidential information transmission device |
CN102646179A (en) * | 2012-02-27 | 2012-08-22 | 中山大学 | PDF (Portable Document Format) document information embedding and extraction method based on PDF documents |
CN102857514A (en) * | 2012-09-20 | 2013-01-02 | 中国科学技术大学苏州研究院 | HTTP (hyper text transport protocol) based secret information hidden-transmission method |
CN102917076A (en) * | 2012-11-16 | 2013-02-06 | 网宿科技股份有限公司 | Redundancy encoding-based HTTP (Hyper Text Transport Protocol) message transmission, sending and receiving method |
-
2013
- 2013-03-05 CN CN201310068699.0A patent/CN103118139B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2357753A1 (en) * | 2008-11-14 | 2011-08-17 | Oki Semiconductor Co., Ltd. | Confidential information transmission method, confidential information transmission system, and confidential information transmission device |
CN101645061A (en) * | 2009-09-03 | 2010-02-10 | 张�浩 | Information hiding method taking text information as carrier |
CN102646179A (en) * | 2012-02-27 | 2012-08-22 | 中山大学 | PDF (Portable Document Format) document information embedding and extraction method based on PDF documents |
CN102857514A (en) * | 2012-09-20 | 2013-01-02 | 中国科学技术大学苏州研究院 | HTTP (hyper text transport protocol) based secret information hidden-transmission method |
CN102917076A (en) * | 2012-11-16 | 2013-02-06 | 网宿科技股份有限公司 | Redundancy encoding-based HTTP (Hyper Text Transport Protocol) message transmission, sending and receiving method |
Non-Patent Citations (1)
Title |
---|
朱友文等: "保护私有信息的文本信息隐藏检测算法", 《电子与信息学报》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581168B (en) * | 2013-08-02 | 2016-06-22 | 中国科学技术大学苏州研究院 | Hidden information communication means based on IP fragmentation camouflage |
CN103581168A (en) * | 2013-08-02 | 2014-02-12 | 中国科学技术大学苏州研究院 | Hidden information communication method based on IP fragmentation camouflage technology |
CN103841118A (en) * | 2014-03-25 | 2014-06-04 | 中国科学技术大学苏州研究院 | Two-way reliable covert channel based on TCP effective loads |
CN103841118B (en) * | 2014-03-25 | 2017-03-22 | 中国科学技术大学苏州研究院 | Method for constructing reliable two-way covert channel based on TCP effective loads |
CN104580241A (en) * | 2015-01-22 | 2015-04-29 | 南京理工大学 | Behavior covert channel based on HTTP protocol |
CN107623855A (en) * | 2016-07-13 | 2018-01-23 | 谭心瑶 | A kind of embedded rate steganography device of height based on compressed encoding and steganography method |
CN106534144A (en) * | 2016-11-28 | 2017-03-22 | 南京理工大学 | Network covert channel construction method based on Web application directory tree |
CN106911705A (en) * | 2016-12-14 | 2017-06-30 | 中国电子科技集团公司第三十研究所 | Hidden information communication means based on IP fragmentation mechanism |
CN106911705B (en) * | 2016-12-14 | 2020-03-03 | 中国电子科技集团公司第三十研究所 | Hidden information communication method based on IP fragmentation mechanism |
CN109246075B (en) * | 2018-07-26 | 2020-11-20 | 复旦大学 | Information hiding method based on social software user dynamic message forwarding mechanism |
CN109246075A (en) * | 2018-07-26 | 2019-01-18 | 复旦大学 | Information concealing method based on social software user's dynamic message forwarding mechanism |
CN109088874A (en) * | 2018-08-21 | 2018-12-25 | 北京睦合达信息技术股份有限公司 | A kind of data transmission method and equipment |
CN109005200A (en) * | 2018-10-12 | 2018-12-14 | 浙江工业大学 | A kind of hidden document transmission method under WiFi physical isolation environment |
CN109005200B (en) * | 2018-10-12 | 2021-10-29 | 浙江工业大学 | Hidden file transmission method under WiFi physical isolation environment |
CN111245554A (en) * | 2020-01-14 | 2020-06-05 | 全球能源互联网研究院有限公司 | Interference method and system for network hidden channel |
CN111245554B (en) * | 2020-01-14 | 2022-06-28 | 全球能源互联网研究院有限公司 | Interference method and system for network hidden channel |
CN113746631A (en) * | 2021-07-12 | 2021-12-03 | 浙江众合科技股份有限公司 | Safety communication method based on safety code |
Also Published As
Publication number | Publication date |
---|---|
CN103118139B (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103118139B (en) | Distributed information hides transmission system and transmission method thereof | |
Dyer et al. | Protocol misidentification made easy with format-transforming encryption | |
RU2638639C1 (en) | Encoder, decoder and method for encoding and encrypting input data | |
CN111211901B (en) | 5G-based distribution network communication secure transmission method, system, device and storage medium | |
Ji et al. | A novel covert channel based on length of messages | |
CN106357690B (en) | data transmission method, data sending device and data receiving device | |
CN101651666A (en) | Method and device for identity authentication and single sign-on based on virtual private network | |
CN106850191B (en) | Encryption and decryption method and device for communication protocol of distributed storage system | |
CN112511514A (en) | HTTP encrypted transmission method and device, computer equipment and storage medium | |
CN103841118A (en) | Two-way reliable covert channel based on TCP effective loads | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
CN107947918A (en) | A kind of carrier-free text steganography method based on character feature | |
WO2016116999A1 (en) | Packet transmission device, packet-receiving device, packet transmission program, and packet-receiving program | |
CN107493168A (en) | Quanta identity authentication method and its application process during quantum key distribution | |
CN105959355B (en) | Secret information transmission method under P2P network based on BitTorrent agreement | |
Velasco et al. | Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs | |
CN115242369A (en) | Multi-key homomorphic encryption-based federal learning privacy protection method and device | |
CN105592121B (en) | A kind of RDP data acquisition devices and method | |
CN113225318B (en) | Method and system for government affair big data encryption transmission and safe storage | |
CN104660591B (en) | IP address-based packet length feedback network concealed communication method | |
CN106165340A (en) | encryption method, program and system | |
Lu et al. | Research on information steganography based on network data stream | |
CN116488919B (en) | Data processing method, communication node and storage medium | |
CN102325025A (en) | Data processing method and system for verifying provision source authenticity | |
CN106534144A (en) | Network covert channel construction method based on Web application directory tree |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160330 Termination date: 20180305 |