[go: up one dir, main page]

CN119814295A - A network steganographic information encoding and mapping method, device and medium - Google Patents

A network steganographic information encoding and mapping method, device and medium Download PDF

Info

Publication number
CN119814295A
CN119814295A CN202411943626.6A CN202411943626A CN119814295A CN 119814295 A CN119814295 A CN 119814295A CN 202411943626 A CN202411943626 A CN 202411943626A CN 119814295 A CN119814295 A CN 119814295A
Authority
CN
China
Prior art keywords
address
information
mapping
network
service node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411943626.6A
Other languages
Chinese (zh)
Other versions
CN119814295B (en
Inventor
郑静雅
陶高峰
马中骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Original Assignee
Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory filed Critical Shandong Future Network Research Institute Industrial Internet Innovation Application Base Of Zijinshan Laboratory
Priority to CN202411943626.6A priority Critical patent/CN119814295B/en
Publication of CN119814295A publication Critical patent/CN119814295A/en
Application granted granted Critical
Publication of CN119814295B publication Critical patent/CN119814295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a network steganographic information coding and mapping method, device and medium, belonging to the technical field of network communication and security. The method comprises the steps of creating a service node, recording auxiliary information for sending hidden secret information, registering the service node in a sending direction, carrying out binary information coding and address mapping on the hidden secret information to be sent, generating a data packet, sending a request to the service node in the sending direction, establishing communication connection by the service node, registering the total number of the data packet in the communication, then sending the total number of the data packet to a receiving party, checking whether the number of the received data packet is consistent with the total number of the data packet sent by the service node or not by the receiving party after the sending party finishes sending, and decoding into a binary string corresponding to the data packet according to a known information coding rule and an address mapping rule by the receiving party when the number of the data packet is consistent. The invention maximizes the hidden information capacity, has stronger hidden property and has good flexibility and safety.

Description

Network hidden writing information coding and mapping method, device and medium
Technical Field
The invention relates to a network hidden information coding and mapping method, a device and a medium, belonging to the technical field of network communication and security.
Background
Big data analysis may skip data content and mine information from the data background only. When the communication behavior is discovered, people using ciphertext communication are highlighted and thus become key objects to be monitored and analyzed. Modern communication security not only requires content to be kept secret, but also requires process concealment. Steganography is a technology for embedding secret messages into various carriers (such as digital images, audio, video or texts) to realize hidden communication, is an effective means for acquiring big data information, and is a necessary supplement to encryption technology.
Network steganography is a network protocol-based steganography method that constructs hidden channels for secret information transfer. Specifically, the method digs redundant fields in the network protocol and rule loopholes of the network protocol, and places secret information in a network data packet, thereby realizing transmission of the secret information. Compared with the steganography methods such as text, images, audio and video, the network steganography can avoid network equipment such as intermediate network nodes. Meanwhile, network steganography has transparency, namely a user does not have direct perception of network data flow when accessing data.
Common network steganography methods mainly include storage type, time sequence type, mixed type and other hidden channels. Storage network steganography typically chooses to modify the header, payload, etc. of the network protocol. The time sequence network steganography refers to a network steganography method for embedding secret information by modifying a data packet stream structure and utilizing characteristic change of time sequence in data transmission. Hybrid network steganography refers to combining storage-type and time-sequential network steganography methods. Other network steganography methods are mainly to conceal secret information through the length information of the data packet and the classification information of the IP source address.
The method based on IP source address classification conceals the secret information in the steganography process by classifying the source address field of the data packet, selects and uses the IP address existing in the public network, and the IP address actually exists in the network, so that the method is not easy to draw attention of an attacker. The method solves the problem of the existing network steganography method based on the modification of the data packet field.
The existing network steganography method based on the IP source address adopts the combination of the data source address classification and the multidimensional feature mapping of the data packet to carry out information hiding according to the information coding rule, the address classification and the mapping rule. Specifically, the two parties of communication represent a number of bits of binary digital codes using different IP source addresses. The service node is used for recording the basic information and the communication state of the two parties of communication, and the auxiliary confirmation of the secret information integrity is completed through the service node. However, the existing method based on IP source address classification has lower hiding capacity and lower address utilization rate. There is therefore a need to study more efficient related network steganography methods.
Disclosure of Invention
The invention aims to provide a network hidden information coding and mapping method, device and medium, which realize the fine utilization and high-efficiency hidden writing of an IPv6 address space, and maximize the hidden information capacity by formulating different coding and mapping rules for different address classifications, and have stronger concealment and good flexibility and safety.
The invention aims to achieve the aim, and the aim is achieved by the following technical scheme:
Creating a service node, wherein the service node is used for recording auxiliary information for sending hidden secret information, and the auxiliary information comprises a real IP address, IP address classification and number, the number of various multidimensional features and the total number of data packets;
the sending party registers with the service node, and the registration information comprises the real IP address and port of the receiving party and the transmitting party;
binary information coding and address mapping are carried out on the hidden secret information to be sent, a data packet is generated, and a request is sent to a sending direction service node;
the service node establishes communication connection, registers the total number of data packets of the communication, and then sends the total number of the data packets to the receiver;
After the sender finishes transmitting, the receiver checks whether the number of the received data packets is consistent with the total number of the data packets transmitted by the service node;
When the number of data packets is consistent, the receiver decodes the data packets into binary strings corresponding to the data packets according to the known information coding rules and address mapping rules.
Preferably, the binary information coding and address mapping are as follows:
encrypting the secret information M to form an L-bit stream;
dividing all addresses into IPv6 address classification sets of IPv4 mapping according to types and functions of IP source addresses And IPv 6-only address classification set;
Segmenting secret information M according to the multi-dimensional characteristic size of an IPv6 address, taking a first segment of information segment after segmentation as M1, taking other information segments as M2, wherein the information segment M1 corresponds to the addressThe information segment M2 corresponds to an address;
Converting each information segment into a decimal identification;
According to AndAddress mapping is performed on decimal identifications corresponding to the information coding segments of the code.
Preferably, the multi-dimensional featuresThe calculation method is as follows:
,
Wherein, Represent the firstThe size of the value range of each dimension, whereinIs the number of multidimensional features;
the secret information M is segmented according to the multi-dimensional feature size, and the result is as follows:
,
Wherein, Classifying addressesThe corresponding binary information segment is used to determine,To the point ofClassifying addressesMiddle (f)Binary information segment corresponding to each dimension, wherein;
Preferably, the addressLength of corresponding binary information segment M1The method comprises the following steps:
,
Wherein, Representing address classificationThe total number of addresses contained in the memory.
The addressLength of corresponding information segment M2The method comprises the following steps:
Preferably, for Address, only one-dimensional feature mapping is performed forThe address is mapped by using the multi-dimensional characteristics of the IPv6 address, wherein the multi-dimensional characteristics compriseAddress structure hierarchy such as prefix, subnet identification, and interface identification.
Preferably, the saidThe address mapping is as follows:
,
Wherein, Representation ofCorresponding toIs used to determine the IP address of the packet,A set of IPv6 address classifications for IPv4 mapping,Is thatA corresponding decimal number.
Preferably, the saidThe address mapping is as follows:
,
,
Wherein, A set of prefixes is represented and,Representing a set of sub-networks,Representing a set of interface identifications and,Representation ofThe corresponding decimal value is used to determine,Representation ofThe corresponding decimal value is used to determine,Representation ofA corresponding decimal value.
The invention has the advantages that:
(1) The method based solely on IP source address classification (comparison method) segments information by simple modulo operation, and maps to IPv4 mapping addresses (total 16) and pure IPv6 addresses (total 256) respectively. The information capacity depends on the classification space size (16 IPv4 mapped addresses and 256 IPv 6-only addresses). This results in less information carried by the IPv4 address, which is prone to waste resources in practical applications.
The invention introduces a plurality of characteristics such as subnet identification, interface identification and the like, and each characteristic can independently bear information. The IPv6 address consists of a prefix, a subnet identifier and an interface identifier, and each dimension maps different secret information. The information capacity is obviously improved through the cooperative coding of the multidimensional features, and the secret information which can be carried is larger.
(2) Flexibility of
The multidimensional features (prefix, subnet identification, interface identification and the like) in the method provide high flexibility, and the coding rule of each dimension can be dynamically adjusted according to the application scene. Different network environments (such as prefix dynamization and specific service division) and bearing requirements of various information types can be adapted. The flexible mapping mode is easier to combine with other steganography technologies, so that cross-protocol steganography information transfer is realized.
(3) Safety of
The multidimensional mapping distributes information into a plurality of characteristic dimensions (prefix, subnet identification and interface identification), and the steganography flow dispersibility is obviously improved. An attacker needs to monitor multiple dimensions simultaneously to infer the steganography mode, and the difficulty of detection and analysis is increased. Through the diversified mapping of dynamic prefixes and features, the steganography communication has stronger randomness and uncertainty, and the security is further enhanced.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention.
FIG. 1 is a schematic flow chart of the method of the invention.
Fig. 2 is a schematic diagram of a transmission flow of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
1-2, The network steganography information coding and mapping method combines IP source address classification and multidimensional feature mapping, and achieves fine utilization and efficient steganography of an IPv6 address space. By formulating different coding and mapping rules for different address classifications, the capacity of the hidden writing information is maximized, the hidden property is stronger, and meanwhile, the method has good flexibility and safety. Comprising the following steps:
s1, creating a service node for recording auxiliary information for sending hidden secret information, wherein the auxiliary information comprises a real IP address, IP address classification and number, various multidimensional feature numbers and total number of packets.
As a refinement of the above embodiment, recording the real IP address helps track the source of the message. The IP address class and number, the IP address class and number are used for decoding of the secret information. The total number of the data packets is used for confirming the transmission integrity of both communication parties, and the loss or damage of the hidden information caused by the packet loss is prevented.
And S2, registering the service node by the sending party, wherein the registration information comprises the real IP address and port of the receiving party and the sending party.
S3, binary information coding and address mapping are carried out on the hidden secret information to be sent, a data packet is generated, and a request is sent to a sending direction service node.
And S4, the service node establishes communication connection, registers the total number of data packets of the communication, and then sends the total number of the data packets to the receiver.
And S5, after the sender finishes sending, the receiver checks whether the number of the received data packets is consistent with the total number of the data packets sent by the service node.
And S6, when the number of the data packets is consistent, the receiving party decodes the data packets into binary strings corresponding to the data packets according to the known information coding rule and the address mapping rule.
As a refinement of the above embodiment, the information encoding method is as follows:
the secret information M is encrypted and an L-bit stream file is formed, and expressed as:
dividing all addresses S into IPv4 mapped IPv6 address classification sets according to types and functions of IP source addresses And IPv 6-only address classification setThe address starts with a fixed prefix:: FFFF, representing the mapping from IPv 4.And the address is completely defined according to the IPv6 standard without mapping prefix. According to the classification rule, the binary secret information M is split into two parts M1 and M2, and respectively correspond toAndInformation segments. M is according to the size of the multidimensional featureDividing into a plurality of segments:
,
Wherein, Classifying addressesThe corresponding binary information segment is used to determine,To the point ofClassifying addressesMiddle (f)Binary information segment corresponding to each dimension, wherein
M1 and M2 are segmented according to the address feature dimension. For M1, due toThe scale of the (2) is smaller, the IPv4 mapping address has single characteristic, and multidimensional feature division is not needed. Thus, M1 is divided into only one segment B1, of length:
,
Wherein, Representing address classificationThe total number of addresses contained in the memory.
For M2, its overall length is:
,
because of the rich feature dimension of the IPv 6-only address, the address is divided into a plurality of segments, namely To the point ofRespectively correspond to different IPv6 address features, such as prefix P, subnet identification E, interface identification I, and the like. Each sectionLength of (2)The following formula is satisfied. Wherein, The size of the value range for the ith dimension. Further description of this dimension will follow. Information encoding means to encode each segmentConverted into decimal and expressed as
,
Wherein, Is the number of multidimensional features.
As a refinement of the above embodiment, the address mapping is specifically as follows:
For the following Because the structural characteristics are fixed, only one-dimensional feature mapping is needed, and the mapping rule is as follows:
,
For the following Mapping is performed using the multidimensional characteristics of the IPv6 address. The relevant dimensions include prefix P, subnet identification E, interface identification I, and the like. In particular, when the multidimensional features are prefix P, subnet identification E, interface identification I, respectively, there are,,The prefix P represents a network-wide set of prefixesThe size is. Subnet identification E for collection of regional subnetworksSize, size of. Interface identification I is used to distinguish combinations of hostsSize, size of. The number of bits of the binary string of different dimensions is:
,
m2 is divided into:
,
The mapping rules are respectively as follows:
,
Wherein, A set of prefixes is represented and,Representing a set of sub-networks,Representing a set of interface identifications and,Representation ofThe corresponding decimal value is used to determine,Representation ofThe corresponding decimal value is used to determine,Representation ofA corresponding decimal value.
In particular, when the multidimensional features are prefix P, subnet identification E, interface identification I, respectively, there are,
Namely:;
The final steganography address generation result is:
Coding examples:
Let the bit stream corresponding to the secret information M that needs to be steganographically be 10111010110011, where the length m=14. IP address space division into And. Wherein, Contains 16 addresses, and is formatted as follows:
Wherein, Contains 256 addresses, respectively:
(1) 2001:db8:85a3:1:1:2001:db8:85a3:1:ff
(2) 2001:Db8:85a3:2::: to 2001:db8:85a3:2::: ff
(3) 2001:Db8:85a3:3::: to 2001:db8:85a3:3::: ff
(4) 2001:Db8:85a3:4::2001:db8:85a3:4:ff
Dividing the secret information M according to the address classification proportion,. The splitting result is,
Corresponding to decimal 11, corresponding to. Subsequently, toAnd correspondingly performing multidimensional feature mapping. Assume that there is only a single value 2001:db8:1 in prefix set T1, i.e.Is a number of 1, and is not limited by the specification,No further coding is required. The subnet identification map has four choices, namely 2001:0db8:85a3:0001::/64、2001:0db8:85a3:0002::/64、2001:0db8:85a3:0003::/64、2001:0db8:85a3:0004::/64,4, Then,The ratio is 2001:0db8:85a 3:0003:64. Interface map identity, ranging from 0to 255 (hexadecimal FF), i.e256, Then. Then. The final steganographic address is 2001:0db8:85a 3:0003:b 3.
Decoding example:
at the receiver, assume that the IP addresses of the received packets are:: FFFF:192.0.2.11 and 2001:0db8:85a3:0003:: b3. The receiver judges as respectively AndAn address. For SIPv to 4 addresses, the receiver extracts 11 and converts to binary 1011. For SIPv addresses, the receiver uses the length of each dimension. Searching in the subnet identification dimension information table to obtain 2001:0db8:85a 3:0003:64 which is a binary 10 information segment. Extracting hexadecimal b3 gives binary information segment 10110011.
The embodiment of the disclosure also provides a network steganographic information coding and mapping device, which comprises a processor (processor) and a memory (memory). Optionally, the apparatus may further comprise a communication interface (Communication Interface) and a bus. The processor, the communication interface and the memory can complete communication with each other through the bus. The communication interface may be used for information transfer. The processor may invoke logic instructions in the memory to perform the network steganographic information encoding and mapping methods of the above embodiments.
Further, the logic instructions in the memory described above may be implemented in the form of software functional units and stored in a computer-readable storage medium when sold or used as a stand-alone product.
The memory is used as a computer readable storage medium for storing a software program, a computer executable program, and program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor executes the program instructions/modules stored in the memory to perform the functional application and data processing, i.e., implement the network steganographic information encoding and mapping method in the above embodiments.
The memory may include a storage program area which may store an operating system, an application program required for at least one function, and a storage data area which may store data created according to the use of the terminal device, etc. Further, the memory may include a high-speed random access memory, and may also include a nonvolatile memory.
Embodiments of the present disclosure provide a computer readable storage medium storing computer executable instructions configured to perform the above-described network steganographic information encoding and mapping method.
The computer readable storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium.
It should be noted that the above-mentioned embodiments are merely preferred embodiments of the present invention, and the present invention is not limited thereto, but may be modified or substituted for some of the technical features thereof by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A network hidden writing information coding and mapping method is characterized by comprising the following steps:
Creating a service node, wherein the service node is used for recording auxiliary information for sending hidden secret information, and the auxiliary information comprises a real IP address, IP address classification and number, the number of various multidimensional features and the total number of data packets;
the sending party registers with the service node, and the registration information comprises the real IP address and port of the receiving party and the transmitting party;
binary information coding and address mapping are carried out on the hidden secret information to be sent, a data packet is generated, and a request is sent to a sending direction service node;
the service node establishes communication connection, registers the total number of data packets of the communication, and then sends the total number of the data packets to the receiver;
After the sender finishes transmitting, the receiver checks whether the number of the received data packets is consistent with the total number of the data packets transmitted by the service node;
When the number of data packets is consistent, the receiver decodes the data packets into binary strings corresponding to the data packets according to the known information coding rules and address mapping rules.
2. The network steganographic information encoding and mapping method of claim 1, characterized in that the binary information encoding and address mapping are performed in the following manner:
encrypting the secret information M to form an L-bit stream;
dividing all addresses into IPv6 address classification sets of IPv4 mapping according to types and functions of IP source addresses And IPv 6-only address classification set;
Segmenting secret information M according to the multi-dimensional characteristic size of an IPv6 address, taking a first segment of information segment after segmentation as M1, taking other information segments as M2, wherein the information segment M1 corresponds to the addressThe information segment M2 corresponds to an address;
Converting each information segment into a decimal identification;
According to AndAddress mapping is performed on decimal identifications corresponding to the information coding segments of the code.
3. The network steganographic information encoding and mapping method of claim 2, characterized in that the multidimensional featureThe calculation method is as follows:
,
Wherein, Represent the firstThe size of the value range of each dimension, whereinIs the number of multidimensional features;
the secret information M is segmented according to the multi-dimensional feature size, and the result is as follows:
,
Wherein, Classifying addressesThe corresponding binary information segment is used to determine,To the point ofClassifying addressesMiddle (f)Binary information segment corresponding to each dimension, wherein
4. The network steganographic information encoding and mapping method of claim 3, wherein the addressLength of corresponding binary information segment M1The method comprises the following steps:
,
Wherein, Representing address classificationThe total number of addresses contained in the memory.
5. The addressLength of corresponding information segment M2The method comprises the following steps:
6. the network steganographic information encoding and mapping method of claim 2, characterized in that for Address, only one-dimensional feature mapping is performed forThe address is mapped by using the multi-dimensional characteristics of the IPv6 address, wherein the multi-dimensional characteristics compriseAn address structure hierarchy.
7. The network steganographic information encoding and mapping method of claim 5, characterized in that the followingThe address mapping is as follows:
,
Wherein, Representation ofCorresponding toIs used to determine the IP address of the packet,A set of IPv6 address classifications for IPv4 mapping,Is thatA corresponding decimal number.
8. The network steganographic information encoding and mapping method of claim 5, characterized in that the followingThe address mapping is as follows:
,
,
Wherein, A set of prefixes is represented and,Representing a set of sub-networks,Representing a set of interface identifications and,Representation ofThe corresponding decimal value is used to determine,Representation ofThe corresponding decimal value is used to determine,Representation ofA corresponding decimal value.
9. A network steganographic information encoding and mapping device, comprising a processor and a memory storing program instructions, characterized in that the processor is configured to execute the network steganographic information encoding and mapping method of any one of claims 1-7 when the program instructions are executed.
10. A computer readable storage medium, having stored thereon a computer program which when executed by a processor implements the network steganographic information encoding and mapping method of any one of the preceding claims 1-7.
CN202411943626.6A 2024-12-27 2024-12-27 Network hidden writing information coding and mapping method, device and medium Active CN119814295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411943626.6A CN119814295B (en) 2024-12-27 2024-12-27 Network hidden writing information coding and mapping method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411943626.6A CN119814295B (en) 2024-12-27 2024-12-27 Network hidden writing information coding and mapping method, device and medium

Publications (2)

Publication Number Publication Date
CN119814295A true CN119814295A (en) 2025-04-11
CN119814295B CN119814295B (en) 2026-01-23

Family

ID=95275938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411943626.6A Active CN119814295B (en) 2024-12-27 2024-12-27 Network hidden writing information coding and mapping method, device and medium

Country Status (1)

Country Link
CN (1) CN119814295B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2010125304A (en) * 2010-06-18 2011-12-27 Государственное образовательное учреждение высшего профессионального образования "Поволжский государственный университет телекомму METHOD FOR STEANOGRAPHIC TRANSFER OF INFORMATION ON A TCP / IP NETWORK
US20140069998A1 (en) * 2012-09-12 2014-03-13 Labels That Talk Ltd Bar code system including network acknowledgement
CN105847250A (en) * 2016-03-22 2016-08-10 甘肃农业大学 VoIP stream media multi-dimensional information steganography real time detection method
US20180255075A1 (en) * 2017-03-06 2018-09-06 International Business Machines Corporation Creating a Multi-Dimensional Host Fingerprint for Optimizing Reputation for IPV6
US20180349400A1 (en) * 2017-05-31 2018-12-06 Paypal, Inc. Steganography obsfucation
CN111683093A (en) * 2020-06-09 2020-09-18 湖南大学 Dynamic Covert Communication Method Based on IPv6 Network
US20200301876A1 (en) * 2017-05-17 2020-09-24 Derrick John Hamlin Digital Processing Connectivity
CN112422511A (en) * 2020-10-23 2021-02-26 青岛大学 A Reliable Network Steganography Method Based on IP Source Address
WO2021254897A1 (en) * 2020-06-15 2021-12-23 Signify Holding B.V. An efficient method for mapping between a local short address and a long ip address
CN116456037A (en) * 2023-06-16 2023-07-18 南京信息工程大学 Diffusion model-based generated image steganography method
CN117499367A (en) * 2023-10-20 2024-02-02 天翼安全科技有限公司 Identification method, device, equipment and medium for IPv6 application service address
CN118233192A (en) * 2024-04-08 2024-06-21 北京英迪瑞讯网络科技有限公司 A method, system and computer-readable storage medium for constructing an IPv6 dedicated network

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2010125304A (en) * 2010-06-18 2011-12-27 Государственное образовательное учреждение высшего профессионального образования "Поволжский государственный университет телекомму METHOD FOR STEANOGRAPHIC TRANSFER OF INFORMATION ON A TCP / IP NETWORK
US20140069998A1 (en) * 2012-09-12 2014-03-13 Labels That Talk Ltd Bar code system including network acknowledgement
CN105847250A (en) * 2016-03-22 2016-08-10 甘肃农业大学 VoIP stream media multi-dimensional information steganography real time detection method
US20180255075A1 (en) * 2017-03-06 2018-09-06 International Business Machines Corporation Creating a Multi-Dimensional Host Fingerprint for Optimizing Reputation for IPV6
US20200301876A1 (en) * 2017-05-17 2020-09-24 Derrick John Hamlin Digital Processing Connectivity
US20180349400A1 (en) * 2017-05-31 2018-12-06 Paypal, Inc. Steganography obsfucation
CN111683093A (en) * 2020-06-09 2020-09-18 湖南大学 Dynamic Covert Communication Method Based on IPv6 Network
WO2021254897A1 (en) * 2020-06-15 2021-12-23 Signify Holding B.V. An efficient method for mapping between a local short address and a long ip address
CN112422511A (en) * 2020-10-23 2021-02-26 青岛大学 A Reliable Network Steganography Method Based on IP Source Address
CN116456037A (en) * 2023-06-16 2023-07-18 南京信息工程大学 Diffusion model-based generated image steganography method
CN117499367A (en) * 2023-10-20 2024-02-02 天翼安全科技有限公司 Identification method, device, equipment and medium for IPv6 application service address
CN118233192A (en) * 2024-04-08 2024-06-21 北京英迪瑞讯网络科技有限公司 A method, system and computer-readable storage medium for constructing an IPv6 dedicated network

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
PUNAM BEDI等: "Network Steganography Using Extension Headers in IPv6", 《COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE》, 5 November 2020 (2020-11-05) *
ZHENG, JY等: "A Context-Aware Image Generation Method for Assisted Design of Movie Posters Using Generative Adversarial Network", 《JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS》, 3 April 2023 (2023-04-03) *
杨智丹;刘克胜;李丽;: "IPv6中的网络隐蔽通道技术研究", 东南大学学报(自然科学版), no. 1, 20 September 2007 (2007-09-20) *
赵丹阳: "基于神经网络的网络隐写分析模型设计", 《硕士电子期刊出版信息》, 15 January 2021 (2021-01-15) *
郭浩然;王振兴;余冲;王倩;: "基于IPv6报头的隐蔽通道分析与防范", 计算机工程, no. 14, 20 July 2009 (2009-07-20) *

Also Published As

Publication number Publication date
CN119814295B (en) 2026-01-23

Similar Documents

Publication Publication Date Title
JP2776491B2 (en) Tag determination method and device
CN109257744B (en) 5G data transmission method and system and 5G data sending and receiving device
CN111818031A (en) Block chain based covert communication message security encoding method, system and medium
CN105763317B (en) Secret information transmission method based on BitTorrent agreement Have message
Bhole et al. Steganography over video file using Random Byte Hiding and LSB technique
CN104917747A (en) Concealed communication method
CN116866052B (en) An efficient blockchain covert communication method based on address encoding
Kayarkar et al. A survey on various data hiding techniques and their comparative analysis
CN114567427A (en) Block chain concealed data segmented transmission method
CN111654484A (en) A covert communication method in Ethereum based on whisper protocol
KR20090098833A (en) Unique compressed call identifier
CN111669270A (en) Quantum encryption transmission method and device based on label switching
CN112804046B (en) Carrier-free steganography method and system based on block chain private key mapping
CN105120454B (en) Information transmission method, networking access method and corresponding terminal
CN105959355A (en) Confidential information transmission method in P2P network based on BitTorrent protocol
CN103650457B (en) A detection method, device and terminal device for shared access
CN117114684A (en) Block chain hidden communication method and system based on transaction amount
Debnath et al. An advanced image encryption standard providing dual security: Encryption using hill cipher & RGB image steganography
CN104660591B (en) IP address-based packet length feedback network concealed communication method
Ganivev et al. Improving data hiding methods in network steganography based on packet header manipulation
CN119814295A (en) A network steganographic information encoding and mapping method, device and medium
US10263892B2 (en) Compression method and system for user friendly address in mesh networking
CN116389051B (en) A lightweight, blockchain-based method for covert data transmission
CN117314427A (en) Efficient hidden communication method and communication system based on blockchain remarks
CN112351422B (en) Method, device, equipment and computer storage medium for encrypting and decrypting data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant