CN103118139A - Distributed information hiding transmission system and transmission method thereof - Google Patents

Distributed information hiding transmission system and transmission method thereof Download PDF

Info

Publication number
CN103118139A
CN103118139A CN2013100686990A CN201310068699A CN103118139A CN 103118139 A CN103118139 A CN 103118139A CN 2013100686990 A CN2013100686990 A CN 2013100686990A CN 201310068699 A CN201310068699 A CN 201310068699A CN 103118139 A CN103118139 A CN 103118139A
Authority
CN
China
Prior art keywords
secret
http
fragment
client computer
http request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100686990A
Other languages
Chinese (zh)
Other versions
CN103118139B (en
Inventor
黄刘生
王飞
杨威
陈志立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Institute for Advanced Study USTC
Original Assignee
Suzhou Institute for Advanced Study USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Institute for Advanced Study USTC filed Critical Suzhou Institute for Advanced Study USTC
Priority to CN201310068699.0A priority Critical patent/CN103118139B/en
Publication of CN103118139A publication Critical patent/CN103118139A/en
Application granted granted Critical
Publication of CN103118139B publication Critical patent/CN103118139B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a distributed information hiding transmission system which is characterized in that a secret file is coded through a coder and is decomposed into a plurality of secret sections through a data wafer separator, and the plurality of secret sections are transmitted to a transmitting selector according to the bite sequence in the secret file; the transmitting selector selects corresponding hyper text transport protocol (HTTP) clients to transmit an HTTP request according to the specific value of the secret sections; a server receives the HTTP request transmitted by the HTTP clients, analyzes the secret sections, performs normal HTTP response for the HTTP clients, and transmits the analyzed secret sections to a receiving control main machine in sequence; and the receiving control main machine splices the secret sections through a data splicer and then performs decoding through a decoder to obtain a secret file. The distributed information hiding transmission system can effectively resist detection of various existing detection methods and achieves the purpose of safe hiding transmission.

Description

Distributed information is hidden transmission system and transmission method thereof
Technical field
The invention belongs to the Security Data Transmission technical field, be specifically related to a kind of distributed information and hide transmission system and transmission method thereof.
Background technology
Along with the raising that security for all countries department requires information transmission safety, the Information Hiding Techniques that is used for the information hiding transmission progressively becomes the study hotspot of information security field.Traditional Information Hiding Techniques general action can access the Still Media of abundant guarantee in the reliabilities such as text, image and integrality, but the progressively raising along with detection technique, Information Hiding Techniques development under the traditional static media is increasingly slow, therefore, the Information Hiding Techniques of the dynamic media such as agreement Network Based has become a new research excitement.
Information hiding based on agreement mainly is divided into delaying type Information hiding and storage-type Information hiding.The delaying type Information hiding is mainly to utilize the transmission between the Internet protocol data bag to carry out data encoding interval time, and the storage-type Information hiding be mainly utilize the field of default value is arranged in the procotol message content or wait until expansion still untapped field carry out direct or indirect data and embed.The delaying type information concealing method was risen in the late 20th century, once once placed high hopes, but years of researches and grope to have proved it and impracticable.Because network jitter is ubiquitous, the delay coded message of transmit leg can't accurately arrive the recipient at all, the reliability of its coding transmission can only be protected in the local network of single level, after spanning multilayer time complex network, can produce the high surprising error rate that gets.Therefore, guaranteeing under the demand of hidden transmission reliability, becoming gradually main flow for the research of storage-type Information Hiding Techniques.Along with the fast-developing of the new technologies such as ecommerce, web game and social networks and universal, in the network traffics in the present age, the HTTP(HTML (Hypertext Markup Language)) message is ubiquitous, and therefore, HTTP becomes natural in Information hiding researcher eye, good hiding carrier.
Existing storage-type Information Hiding Techniques based on HTTP mainly contains adds head, directly filling, header parameter sequence, the filling of linear space, keyword sequence and capital and small letter coding.These methods have all been utilized laxity and the redundancy of HTTP message content, utilize not strictly determined text feature loose in RFC2616 to carry out the coding of secret information.For these hidden methods, researchers proposed based on agreement detection method, differentiate and statistical detection method detects carrying confidential information stream based on the detection method of Applied Digital signature and based on the various modes such as detection method of employing fingerprint, and these methods have all obtained extraordinary detection effect on all information concealing methods.Therefore, on the hiding direction of forward, progressively stagnate based on the development of the Information Hiding Techniques of HTTP, do not obtain further progress.
Yet, along with the development of Distributed Application and universal, existingly also progressively embody for the deficiency based on the detection method of HTTP Information hiding.Existing detection method all is based on the detection of single current, namely for the detection of http session between the http session of a TCP four-tuple or a pair of communication IP, all statistics and identifying are all on this single session stream, so, adopt the distributed transmission structure of multimachine device can effectively dilute the hiding feature that has now based on the information concealing method of HTTP, thereby reach the purpose of anti-detection.The present invention therefore.
Summary of the invention
The invention provides a kind of distributed storage type information concealing method based on HTTP of reliable anti-detection, when completing the hidden transmission of secret information, guarantee the inerrancy of transmission, and guarantee simultaneously the anti-detection transmitted.By technical scheme of the present invention, the transmit leg of secret information can carry out hidden transmission on a reliable hidden passageway of logic, and can effectively resist the detection of existing various detection methods, reaches the purpose of transmission safe and out of sight.
In order to solve these problems of the prior art, technical scheme provided by the invention is:
A kind of distributed information is hidden transmission system, comprises as the transmission main control system of transmit leg with as recipient's reception main control system, it is characterized in that described transmission main control system is provided with encoder, data fragmentation device and send selector, and with 2 nThe individual HTTP client network that sends the HTTP request connects, and described reception main control system is provided with data splicer and decoder, and is connected with the server that can receive the HTTP request, and described server is connected with the equal network of each HTTP client computer; Described encoder resolves into several secret fragments by the data fragmentation device with coded file after secret papers are encoded, and is sent to the transmission selector according to the bit-order in secret papers; According to the occurrence of secret fragment, described transmission selector selects corresponding HTTP client computer to send a HTTP request to server; Described server receives the HTTP request that the HTTP client computer sends, and parses secret fragment, carry out normal http response to the HTTP client computer, and the secret fragment that will parse sends to the reception main control system according to the order of sequence; Described reception main control system splices secret fragment by the data splicer, then decodes by decoder, obtains secret papers; Wherein n is the integer more than or equal to 1.
Preferably, described transmit leg is transferred to the recipient with secret papers in accordance with the following steps:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response, (guaranteeing according to this integrality and the legitimacy of http communication);
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
Preferably, described transmission selector is safeguarded the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
Preferably, to embed the method for secret fragment in the HTTP message be header format conversion method to described client computer.2 nIn individual client computer, for each client computer, make its HTTP that sends with a certain set form ask to server, this set form namely represents a certain fixing n bit fragment; Wherein, client computer with the header form must be unique, mutually different, like this, 2 nIndividual client computer just can embed all 2 nIndividual n bit fragment.
The set form of http header namely represents a certain fixing n bit fragment; Wherein, client computer with the header form must be unique, mutually different, 2 nIndividual client computer just can embed all 2 nIndividual n bit fragment
Another object of the present invention is to provide a kind of distributed information to hide transmission method, it is characterized in that in described method, the transmission main control system as transmit leg is provided with encoder, data fragmentation device and transmission selector, and with 2 nThe individual HTTP client network that sends the HTTP request connects, reception main control system as the recipient is provided with data splicer and decoder, and be connected with the server that can receive the HTTP request, described server is connected with the equal network of each HTTP client computer, and wherein n is the integer more than or equal to 1; Said method comprising the steps of:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server guarantees integrality and the legitimacy of http communication according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
Preferably, send selector in described method and safeguard the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
Preferably, the method that client computer embeds secret fragment in the HTTP message in described method step (2) is header format conversion method.2 nIn individual client computer, for each client computer, make its HTTP that sends with a certain set form ask to server, this set form namely represents a certain fixing n bit fragment.Wherein, client computer with the header form must be unique, mutually different.Like this, 2 nIndividual client computer just can embed all 2 nIndividual n bit fragment.
With respect to scheme of the prior art, advantage of the present invention is:
The hiding feature that the distributed frame that the reliable distributed HTTP information concealing method of technical solution of the present invention transmits by multimachine has effectively diluted existing header format conversion information concealing method, thereby can effectively resist existing detection method for the HTTP Information hiding, reach the purpose of transmission safe and out of sight.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples:
Fig. 1 is the system architecture diagram that distributed information of the present invention is hidden transmission system;
Fig. 2 is the method flow diagram that distributed information of the present invention is hidden transmission method.
Embodiment
Below in conjunction with specific embodiment, such scheme is described further.Should be understood that these embodiment are not limited to limit the scope of the invention for explanation the present invention.The implementation condition that adopts in embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in normal experiment.
Embodiment
The demand of technical solution of the present invention is: the existing a binary system secret papers of transmit leg need to send a recipient who can be used as http server to, because transmit leg is strictly monitored, so any explicit transport behavior all can be under an embargo.Do not use by shutoff, whether to contain suspicious information stream but the http session meeting is detected with definite its as HTTP used in everyday.With this understanding, transmit leg carries out the transmission of secret papers by a kind of reliable distributed HTTP information concealing method, thereby reaches the purpose of transmission safe and out of sight.
As shown in Figure 1, hide the system of systems Organization Chart for the reliable distributed information of the present invention.Be divided into transmit leg and recipient on this entire system.Transmit leg is by encoder, data fragmentation device and send selector and 2 nIndividual HTTP client computer forms [C 1, C 2..., C 2 n], encoder wherein, data fragmentation device and send selector and can be integrated in and send on main control system.The recipient is comprised of server, data splicer and decoder, and wherein data splicer and decoder can be integrated in and receive on main control system.Transmit leg is encoded to secret papers by encoder, and the file after coding is divided into the fragment that t length is the n bit, and sends for the suitable HTTP client computer of each Piece Selection by sending selector.The recipient passes through decoding after splicing in order with these fragments processes again, thereby obtains secret papers by the server information segment that parsing disperses from the HTTP request.
On the client computer of transmit leg, the present invention adopts existing storage-type information concealing method based on the HTTP information of carrying out to embed.From existing information concealing method, therefore the header format conversion hidden method that mainly is based on text feature that can dilute information hiding feature by distributed frame describes as an example of wherein keyword sort algorithm example here.For client computer C i, the HTTP request that we make it send fixing a certain form is used for representing i n bit fragment n_seg i(1<=i<=2 n).For example: " 00 " is the 1st 2 bit fragments, and " 01 " is the 2nd 2 bit fragments, and " 10 " are the 3rd 2 bit fragments, and " 11 " are the 4th 2 bit fragments.Specifically, choose g in numerous keywords of http protocol content, g and n satisfy relational expression: g! 〉=2 nPartial ordering relation a: H set up in g keyword for this reason 1<H 2<...<H gThis partial ordering relation is strict fixing, that share and consistent on transmit leg and recipient.When the recipient receives a HTTP request, the recipient will extract arrangement a: H ' of this g head keyword 1, H ' 2..., H ' gNext, can be further by health holder expansion:
k=a[1]*(g-1)!+a[2]*(g-2)!+...+a[g]*0!+1
Calculating this arrangement is k arrangement of this partial ordering relation, and this HTTP asks just to have encoded n_seg so kFragment.Wherein, a[u] be illustrated in this arrangement and satisfy H ' j<H ' uAnd j〉H ' of u jNumber.C so iThe message format of the HTTP request that sends just keeps i arrangement of this partial ordering relation regularly, thereby reaches the purpose of distributed transmission data fragmentation.Like this hide and analysis mode can farthest keep independence and the accuracy of encoding and extracting.Wherein, 1<=i, j, u, k<=2 n
For example according to following hidden method respectively can coding binary " 0 " and " 1 "." 0 " is expressed as in the HTTP request message keyword for like this:
GET/HTTP/1.1
Accept:*/*
Accept-Language:en-gb
Accept-Encoding:gzip,deflate
User-Agent:Mozilla/4.0(compatible;MSIE6.0)
Host:www.google.com
Connection:Keep-Alive;
" 1 " is expressed as in the HTTP request message keyword for like this:
GET/HTTP/1.1
Accept:*/*
Accept-Language:en-gb
Accept-Encoding:gzip,deflate
Host:www.google.com
User-Agent:Mozilla/4.0(compatible;MSIE6.0)
Connection:Keep-Alive。
Wherein the sequence of keyword " Host ", " User-Agent " is different.
The process of Code And Decode is arranged respectively transmit leg and recipient, and this a pair of process is reciprocal, can adopt the public key encryption technology such as the symmetric cryptosystems such as AES or DES or RSA.Under symmetric cryptosystem, both sides' key is shared consistent; Under the public key encryption technology, this is exactly a pair of PKI and private key to key.Adopt this encryption technology process can further guarantee the fail safe of secret papers, but the most important thing is the number of times that each data fragmentation of equalization occurs, thereby the balanced HTTP request that each sends client computer sends load.
As shown in Figure 2, be the workflow diagram of our Information hiding transmission method, transmit leg is chosen a computer with higher configured as sending main control system (SCH), integrated document No., data fragmentation and transmission selection function in SCH; Choose 2 nThe individual common computer of HTTP request that can send is as the HTTP client computer.The recipient chooses a http server (S), in order to receive the HTTP request of transmit leg; Choose a common computer as receiving main control system (RCH), integrated data splicing and file decoding function in RCH.SCH and each client computer have a direct bi-directional communication channel, in order to mutual control information.S has a direct uni directional communication channel in order to send the secret information fragment of resolving from the HTTP request to RCH.Each client computer will be set up a TCP with 80 ports of S and be connected, in order to carry out http communication.Specifically comprise the following steps:
Step 1: in SCH, secret papers are broken down into t n bit fragment [s through after encoder encodes 1, s 2... s t], this t n bit fragment is sent to the transmission selector according to the bit-order in secret papers.
Step 2: for each n bit fragment, send selector and judge that at first which n bit fragment is this fragment be.Might as well establish this fragment is k n bit fragment n_seg k, send so selector and will arrange C kSend a HTTP message with its unique set form to S (1<=k<=2 n).In process of transmitting, send selector and will safeguard the fragment that a queue stores is sended over by wafer breaker, after the HTTP request with the secret fragment of the client computer previous embedding of mutual confirmation has been received by S, again next fragment is sent, thereby guarantee that fragment is in the definitely orderly and correctness of receiving terminal.
Step 3: client computer with waiting for the feedback of S, after it receives first ACK, will be notified to send the next secret fragment of selector transmission after sending a HTTP request.After this, client computer will continue to complete the process of the response that receives this HTTP request.
Step 4: S after receiving the HTTP request that client computer sends parses the secret fragment of the t in request, sends to according to the order of sequence RCH.Simultaneously, S can send corresponding response message to each HTTP request, keeps the integrality of http communication interbehavior.
Step 5: in RCH, t secret fragment spliced according to the order of sequence, finally obtains secret papers by decoding.
A kind of reliable distributed HTTP information concealing method.The distributed frame that sends by multimachine effectively dilutes hiding feature, resists existing detection method.Guarantee the in order correct of transfer of data on private communication channel by the transmission means such as stopping.The transmission safe and out of sight that reliability by guaranteeing this hidden method and anti-detection guarantee secret information.Specifically, after systems technology was ready, this hidden method can be divided into three phases.Phase I is that secret papers embed the stage, comprises step 1 and step 2; Second stage is the secret information sending and receiving stage, comprises step 3 and step 4; Phase III is the secret information resolution phase, is step 5.
Below we explain the course of work of the method with a specific embodiment.In this example, we need to be with the method text that to transmit a size be 1KB.We are 4 with the n value, and being about to secret papers, to be divided into length be the data slot of 4 bits, has 16 client computer to participate in transmissions.In http protocol, we choose 4 head keywords and set up partial ordering relation: " Accept "<" User-Agent "<" Host "<" Connection ".C so 1HTTP request have fixedly keyword array format: Accept, User-Agent, Host, Connection; C 2HTTP request have fixedly keyword array format: Accept, User-Agent, Connection, Host; C 16HTTP request have fixedly keyword array format: Connection, Host, User-Agent, Accept.
The text of phase I: 1KB obtains the encrypt file of a 1KB by a des encryption process, it is represented with binary digit, and be broken down into 2048 4 bit fragments.These 2048 4 bit fragments will be given in an orderly manner sends selector [s 1, s 2..., s 2048].
S KRepresent the n bit fragment that concrete file is divided into, and 4_seg KRepresent k n bit fragment, such as " 00 " " 01 " " 10 " " 11 " is respectively the 1st, 2,3,42 bit fragments.But the fragment that file is divided into is the sequence by the mixed and disorderly combination of these fragments, as 000011100101, is exactly 6 sequences that 2 bit fragments form, wherein 1<=k<=2 n
Second stage: send selector and extract in order 4 bit fragments, and send the HTTP request according to the Piece Selection client computer.Specifically, need to send as 4 bit fragments " 0110 ", at first the transmission selector identifies " 0110 " is the 6th 4 bit fragment, i.e. 4_seg 6Subsequently, send selector to C 6Transmit and send instruction, C so 6To send a HTTP request to S.At C 6After confirming that this HTTP request has been received by S, can feed back to confirmation of transmission selector, notice sends selector can continue to send next burst.Recipient S receives C 6HTTP request after, the keyword that extracts is wherein arranged: Accept, Connection, Host, User-Agent.Arrange us according to this and can be calculated by health holder expansion the 6th arrangement that this arrangement is partial ordering relation: 0*3! + 2*2! + 1*1! + 0*0! + 1=6.After obtaining this and being arranged as the 6th arrangement, S can parse " 0110 " this 4 bit fragment, sends it to RCH.
2048 secret information fragments that phase III: RCH will receive from S obtain the encrypt file of 1KB in order after splicing, obtain the text of 1KB by the DES decrypting process.
Parameter arranges:
In concrete enforcement, SCH, RCH, S and All Clients all adopt ordinary individual's computer, adopt the system platform of Windows764-bit, the hardware platform of Intel Core2Duo2.94GHZ processor and 4GB internal memory, the network egress bandwidth condition of 10Mbps.
In the middle of the operation of whole hidden method, the value of n directly has influence on the speed of hidden transmission, and we get respectively 1,2,3,4,5,6 with n, sends the text of 1KB, and its transmission required time is as shown in table 1.Data from table can see that the n value is larger, and efficiency of transmission is higher.But the increase of n value means that our required transmission client computer also increases being exponential type, determines so the value of concrete n need to be done many-sided balance, and this value is not changeless.
n 1 2 3 4 5 6
Transmission time (s) 39.1 28.4 14.2 10.7 9.5 7.5
Table 1: the transmission time under different n values
Anti-detection experimental result:
In order to test the anti-detection of information concealing method designed in the present invention, we adopt respectively detection method based on agreement, based on the detection method of Applied Digital signature with based on the detection method of employing fingerprint, the http session data flow that this information concealing method produces are detected.Detection method based on agreement is to detect in the http protocol message whether comprise the complete http protocol content of a minimum and whether added other invalid informations, and main detected object is to add the head method.Detection method based on the Applied Digital signature is whether detection http communication both sides carry out information coding by the text feature that changes protocol contents in communication process, and main detected object is that fill in header parameter sequence, linear space, keyword sorts and the capital and small letter coding.Detection method based on employing fingerprint is to detect the http communication both sides whether to carry out data interaction by the solid data in message, and main detected object is direct completion method.We shut from marginal network and have collected 10000 pairs of daily http sessions and flow as legal http session, respectively with three kinds of detection methods for 5000 pairs of each self-generatings of information concealing method carry close http session stream, then generate 5000 pairs with the designed information concealing method of the present invention and carry close http session and flow.For the http session of collecting stream, the session that we produce legitimate conversation stream, the present invention respectively with three kinds of methods flow and separately for the session stream that produces of information concealing method detect, provide and be detected as power, as shown in table 2.Can see to have 7.9% probability successfully to detect the designed information concealing method of the present invention based on the detection method of employing fingerprint from table.Legitimate conversation stream also has 3.6% successful detection probability, shows that namely the method has certain false drop rate, can not think that the method can detect the designed information concealing method of the present invention by such testing result but simultaneously.Therefore, we may safely draw the conclusion: existing main detection method all can not detect the designed reliable distributed HTTP information concealing method of the present invention.
By above-mentioned analysis as seen, the designed HTTP information concealing method of the present invention can be resisted the detection of existing detection method effectively, and guarantee the inerrancy that transmits by the mode such as stop, make the method possess simultaneously reliability and anti-detection, this is that general information concealing method is not available.This shows, the present invention has substantive technical characterstic and significant technological progress, and its application prospect is boundless.
? Legitimate conversation stream Session stream of the present invention Institute flows for the hidden method session
Based on agreement 0% 0% 100%
Sign based on Applied Digital 0% 0% 100%
Based on employing fingerprint 3.6% 7.9% 99.7%
Table 2: three kinds of detection methods be detected as power
Above-mentioned example only is explanation technical conceive of the present invention and characteristics, and its purpose is to allow the person skilled in the art can understand content of the present invention and implement according to this, can not limit protection scope of the present invention with this.All equivalent transformations that Spirit Essence is done according to the present invention or modification are within all should being encompassed in protection scope of the present invention.

Claims (7)

1. a distributed information is hidden transmission system, comprises as the transmission main control system of transmit leg with as recipient's reception main control system, it is characterized in that described transmission main control system is provided with encoder, data fragmentation device and send selector, and with 2 nThe individual HTTP client network that sends the HTTP request connects, and described reception main control system is provided with data splicer and decoder, and is connected with the server that can receive the HTTP request, and described server is connected with the equal network of each HTTP client computer; Described encoder resolves into several secret fragments by the data fragmentation device with coded file after secret papers are encoded, and is sent to the transmission selector according to the bit-order in secret papers; According to the occurrence of secret fragment, described transmission selector selects corresponding HTTP client computer to send a HTTP request to server; Described server receives the HTTP request that the HTTP client computer sends, and parses secret fragment, carry out normal http response to the HTTP client computer, and the secret fragment that will parse sends to the reception main control system according to the order of sequence; Described reception main control system splices secret fragment by the data splicer, then decodes by decoder, obtains secret papers; Wherein n is the integer more than or equal to 1.
2. system according to claim 1 is characterized in that described transmit leg is transferred to the recipient with secret papers in accordance with the following steps:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
3. system according to claim 2, it is characterized in that secret fragment that queue stores is sended over by the data fragmentation device of described transmission selector maintenance, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
4. system according to claim 2, is characterized in that described client computer embeds secret fragment with header format conversion method in the HTTP message; 2 nIn individual client computer, for each client computer, make its HTTP that sends with a certain fixing head form ask to server, this set form represents a certain fixing n bit fragment; Wherein each client computer with the header form unique, by the set form of HTTP message, 2 nIndividual client computer embed secret papers all 2 nIndividual n bit fragment.
5. a distributed information is hidden transmission method, it is characterized in that in described method, the transmission main control system as transmit leg is provided with encoder, data fragmentation device and transmission selector, and with 2 nThe individual HTTP client network that sends the HTTP request connects, reception main control system as the recipient is provided with data splicer and decoder, and be connected with the server that can receive the HTTP request, described server is connected with the equal network of each HTTP client computer, and wherein n is the integer more than or equal to 1; Said method comprising the steps of:
(1) after the transmission main control system is encoded secret papers by encoder, resolved into the secret fragment of several n bits by the data fragmentation device, and secret fragment is sent to the transmission selector according to the bit-order in secret papers;
(2) send selector according to the occurrence of secret fragment, arrange the client computer corresponding with its value to embed this secret fragment in the HTTP request message, and the HTTP request message that will embed secret fragment sends to server; Client computer with the feedback of waiting for server, receive the respective response of server when client computer after, will be notified to send the next secret fragment of selector transmission after sending a HTTP request; So circulation is until server receives the HTTP request message that all embed secret fragment;
(3) after server receives the HTTP request that client computer sends, the secret fragment in the HTTP request is parsed, and send to according to the order of sequence the reception main control system; Simultaneously, server is according to each the HTTP request of http protocol rule normal response;
(4) receive main control system and by the data splicer, several secret fragments are spliced according to the order of sequence, decoding by decoder obtains secret papers.
6. method according to claim 5, it is characterized in that sending in described method selector and safeguard the secret fragment that queue stores is sended over by the data fragmentation device, after serviced device has received with the mutual HTTP request of confirming the secret fragment of previous embedding of client computer, more next fragment is sent.
7. method according to claim 5, is characterized in that in described method step (2), client computer embeds secret fragment with header format conversion method in the HTTP message; 2 nIn individual client computer, for each client computer, make its HTTP that sends with a certain fixing head form ask to server, this set form represents a certain fixing n bit fragment; Wherein each client computer with the header form unique, by the set form of HTTP message, 2 nIndividual client computer embed secret papers all 2 nIndividual n bit fragment.
CN201310068699.0A 2013-03-05 2013-03-05 Distributed information hides transmission system and transmission method thereof Expired - Fee Related CN103118139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310068699.0A CN103118139B (en) 2013-03-05 2013-03-05 Distributed information hides transmission system and transmission method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310068699.0A CN103118139B (en) 2013-03-05 2013-03-05 Distributed information hides transmission system and transmission method thereof

Publications (2)

Publication Number Publication Date
CN103118139A true CN103118139A (en) 2013-05-22
CN103118139B CN103118139B (en) 2016-03-30

Family

ID=48416409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310068699.0A Expired - Fee Related CN103118139B (en) 2013-03-05 2013-03-05 Distributed information hides transmission system and transmission method thereof

Country Status (1)

Country Link
CN (1) CN103118139B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581168A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Hidden information communication method based on IP fragmentation camouflage technology
CN103841118A (en) * 2014-03-25 2014-06-04 中国科学技术大学苏州研究院 Two-way reliable covert channel based on TCP effective loads
CN104580241A (en) * 2015-01-22 2015-04-29 南京理工大学 Behavior covert channel based on HTTP protocol
CN106534144A (en) * 2016-11-28 2017-03-22 南京理工大学 Network covert channel construction method based on Web application directory tree
CN106911705A (en) * 2016-12-14 2017-06-30 中国电子科技集团公司第三十研究所 Hidden information communication means based on IP fragmentation mechanism
CN107623855A (en) * 2016-07-13 2018-01-23 谭心瑶 A kind of embedded rate steganography device of height based on compressed encoding and steganography method
CN109005200A (en) * 2018-10-12 2018-12-14 浙江工业大学 A kind of hidden document transmission method under WiFi physical isolation environment
CN109088874A (en) * 2018-08-21 2018-12-25 北京睦合达信息技术股份有限公司 A kind of data transmission method and equipment
CN109246075A (en) * 2018-07-26 2019-01-18 复旦大学 Information concealing method based on social software user's dynamic message forwarding mechanism
CN111245554A (en) * 2020-01-14 2020-06-05 全球能源互联网研究院有限公司 Interference method and system for network hidden channel
CN113746631A (en) * 2021-07-12 2021-12-03 浙江众合科技股份有限公司 Safety communication method based on safety code

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
EP2357753A1 (en) * 2008-11-14 2011-08-17 Oki Semiconductor Co., Ltd. Confidential information transmission method, confidential information transmission system, and confidential information transmission device
CN102646179A (en) * 2012-02-27 2012-08-22 中山大学 PDF (Portable Document Format) document information embedding and extraction method based on PDF documents
CN102857514A (en) * 2012-09-20 2013-01-02 中国科学技术大学苏州研究院 HTTP (hyper text transport protocol) based secret information hidden-transmission method
CN102917076A (en) * 2012-11-16 2013-02-06 网宿科技股份有限公司 Redundancy encoding-based HTTP (Hyper Text Transport Protocol) message transmission, sending and receiving method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2357753A1 (en) * 2008-11-14 2011-08-17 Oki Semiconductor Co., Ltd. Confidential information transmission method, confidential information transmission system, and confidential information transmission device
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN102646179A (en) * 2012-02-27 2012-08-22 中山大学 PDF (Portable Document Format) document information embedding and extraction method based on PDF documents
CN102857514A (en) * 2012-09-20 2013-01-02 中国科学技术大学苏州研究院 HTTP (hyper text transport protocol) based secret information hidden-transmission method
CN102917076A (en) * 2012-11-16 2013-02-06 网宿科技股份有限公司 Redundancy encoding-based HTTP (Hyper Text Transport Protocol) message transmission, sending and receiving method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱友文等: "保护私有信息的文本信息隐藏检测算法", 《电子与信息学报》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581168B (en) * 2013-08-02 2016-06-22 中国科学技术大学苏州研究院 Hidden information communication means based on IP fragmentation camouflage
CN103581168A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Hidden information communication method based on IP fragmentation camouflage technology
CN103841118A (en) * 2014-03-25 2014-06-04 中国科学技术大学苏州研究院 Two-way reliable covert channel based on TCP effective loads
CN103841118B (en) * 2014-03-25 2017-03-22 中国科学技术大学苏州研究院 Method for constructing reliable two-way covert channel based on TCP effective loads
CN104580241A (en) * 2015-01-22 2015-04-29 南京理工大学 Behavior covert channel based on HTTP protocol
CN107623855A (en) * 2016-07-13 2018-01-23 谭心瑶 A kind of embedded rate steganography device of height based on compressed encoding and steganography method
CN106534144A (en) * 2016-11-28 2017-03-22 南京理工大学 Network covert channel construction method based on Web application directory tree
CN106911705A (en) * 2016-12-14 2017-06-30 中国电子科技集团公司第三十研究所 Hidden information communication means based on IP fragmentation mechanism
CN106911705B (en) * 2016-12-14 2020-03-03 中国电子科技集团公司第三十研究所 Hidden information communication method based on IP fragmentation mechanism
CN109246075B (en) * 2018-07-26 2020-11-20 复旦大学 Information hiding method based on social software user dynamic message forwarding mechanism
CN109246075A (en) * 2018-07-26 2019-01-18 复旦大学 Information concealing method based on social software user's dynamic message forwarding mechanism
CN109088874A (en) * 2018-08-21 2018-12-25 北京睦合达信息技术股份有限公司 A kind of data transmission method and equipment
CN109005200A (en) * 2018-10-12 2018-12-14 浙江工业大学 A kind of hidden document transmission method under WiFi physical isolation environment
CN109005200B (en) * 2018-10-12 2021-10-29 浙江工业大学 Hidden file transmission method under WiFi physical isolation environment
CN111245554A (en) * 2020-01-14 2020-06-05 全球能源互联网研究院有限公司 Interference method and system for network hidden channel
CN111245554B (en) * 2020-01-14 2022-06-28 全球能源互联网研究院有限公司 Interference method and system for network hidden channel
CN113746631A (en) * 2021-07-12 2021-12-03 浙江众合科技股份有限公司 Safety communication method based on safety code

Also Published As

Publication number Publication date
CN103118139B (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN103118139B (en) Distributed information hides transmission system and transmission method thereof
Dyer et al. Protocol misidentification made easy with format-transforming encryption
RU2638639C1 (en) Encoder, decoder and method for encoding and encrypting input data
CN111211901B (en) 5G-based distribution network communication secure transmission method, system, device and storage medium
Ji et al. A novel covert channel based on length of messages
CN106357690B (en) data transmission method, data sending device and data receiving device
CN101651666A (en) Method and device for identity authentication and single sign-on based on virtual private network
CN106850191B (en) Encryption and decryption method and device for communication protocol of distributed storage system
CN112511514A (en) HTTP encrypted transmission method and device, computer equipment and storage medium
CN103841118A (en) Two-way reliable covert channel based on TCP effective loads
CN109005027B (en) Random data encryption and decryption method, device and system
CN107947918A (en) A kind of carrier-free text steganography method based on character feature
WO2016116999A1 (en) Packet transmission device, packet-receiving device, packet transmission program, and packet-receiving program
CN107493168A (en) Quanta identity authentication method and its application process during quantum key distribution
CN105959355B (en) Secret information transmission method under P2P network based on BitTorrent agreement
Velasco et al. Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs
CN115242369A (en) Multi-key homomorphic encryption-based federal learning privacy protection method and device
CN105592121B (en) A kind of RDP data acquisition devices and method
CN113225318B (en) Method and system for government affair big data encryption transmission and safe storage
CN104660591B (en) IP address-based packet length feedback network concealed communication method
CN106165340A (en) encryption method, program and system
Lu et al. Research on information steganography based on network data stream
CN116488919B (en) Data processing method, communication node and storage medium
CN102325025A (en) Data processing method and system for verifying provision source authenticity
CN106534144A (en) Network covert channel construction method based on Web application directory tree

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160330

Termination date: 20180305