[go: up one dir, main page]

CN117792783A - Back-to-back covert communication architecture for public social network platforms - Google Patents

Back-to-back covert communication architecture for public social network platforms Download PDF

Info

Publication number
CN117792783A
CN117792783A CN202410011249.6A CN202410011249A CN117792783A CN 117792783 A CN117792783 A CN 117792783A CN 202410011249 A CN202410011249 A CN 202410011249A CN 117792783 A CN117792783 A CN 117792783A
Authority
CN
China
Prior art keywords
layer
new
information
steganography
steganographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410011249.6A
Other languages
Chinese (zh)
Inventor
黄永峰
张子毅
杨金帅
高悦
王慧丽
陈程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN202410011249.6A priority Critical patent/CN117792783A/en
Publication of CN117792783A publication Critical patent/CN117792783A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明涉及网络空间安全和隐蔽通信技术领域,特别涉及一种面向公共社交网络平台的背对背隐蔽通信架构,包括:用户层,用于管理会话,并控制发送隐私消息和接收新隐私消息;适配层,用于将隐私消息封装成格式化信息;或对新格式化信息进行解封装和校验,根据校验结果对新格式化信息进行预设处理,得到新隐私消息;隐写层,用于对格式化信息进行分片和隐写处理,得到隐写载体,以将隐写载体以预设方式发送到目标社交网络媒体中;或在目标社交网络媒体中接收新隐写载体,对新隐写载体进行提取和组合,得到新格式化信息,将新格式化信息传递至适配层。由此,解决了隐蔽通信中收发双方的行为隐蔽性等问题。

The invention relates to the technical field of cyberspace security and covert communication, and in particular to a back-to-back covert communication architecture for public social network platforms, including: a user layer for managing sessions and controlling sending private messages and receiving new private messages; adaptation The layer is used to encapsulate private messages into formatted information; or to decapsulate and verify the new formatted information, and perform preset processing on the new formatted information based on the verification results to obtain new private messages; the steganographic layer is used to For fragmenting and steganographic processing of formatted information, the steganographic carrier is obtained, and the steganographic carrier is sent to the target social network media in a preset manner; or a new steganographic carrier is received in the target social network media, and the new steganographic carrier is sent to the target social network media in a preset manner. The steganographic carrier is extracted and combined to obtain new formatted information, and the new formatted information is passed to the adaptation layer. This solves the problem of concealment of the behavior of both the sender and the receiver in covert communication.

Description

面向公共社交网络平台的背对背隐蔽通信架构Back-to-back covert communication architecture for public social networking platforms

技术领域Technical field

本发明涉及网络空间安全和隐蔽通信技术领域,特别涉及一种面向公共社交网络平台的背对背隐蔽通信架构。The present invention relates to the technical field of cyberspace security and covert communication, and in particular to a back-to-back covert communication architecture for public social network platforms.

背景技术Background technique

克劳德·E·香农认为,加密系统、隐私系统和隐蔽通信系统是网络空间中的三大信息保密系统。加密系统和隐私系统只能隐藏信息的内容,并不能掩盖信息的存在性和“传递隐私信息”的行为,只能提高信息的内容安全性,但实际场景下,攻击者可以针对信息传输的信道,对信息进行拦截,或者直接对信息的发送方和接收方进行攻击,使得隐私信息无法正常传递。相对于前述系统,隐蔽通信系统可以运用隐写技术将秘密信息隐藏在如数字媒体等常见载体中,使得攻击者难以察觉其存在性,这一系统有效地掩盖了发送方“传递隐私信息”这一行为。此外,公共社交网络平台海量多样的数字媒体数据和公开便捷的访问为隐蔽通信提供了便利,利用公共社交网络平台和隐蔽通信系统,可以极大程度地保障隐私信息传递的安全性。Claude E. Shannon believes that encryption systems, privacy systems and covert communication systems are the three major information security systems in cyberspace. Encryption systems and privacy systems can only hide the content of information, but cannot cover up the existence of information and the behavior of "transmitting private information". They can only improve the security of the content of information. However, in actual scenarios, attackers can target the channel for information transmission. , intercept the information, or directly attack the sender and receiver of the information, preventing the normal transmission of private information. Compared with the aforementioned systems, the covert communication system can use steganography technology to hide secret information in common carriers such as digital media, making it difficult for attackers to detect its existence. This system effectively conceals the sender's "transmitting private information" One act. In addition, the massive and diverse digital media data and open and convenient access to public social network platforms facilitate covert communication. The use of public social network platforms and covert communication systems can greatly ensure the security of private information transmission.

隐蔽通信协议是隐蔽通信系统的基础,它包括了信息的收发同步机制、隐写编解码算法等多个重要部分。当前的隐蔽通信协议大多是基于Simmons提出的囚犯模型,该模型描述如下:Alice和Bob是监狱中的两个囚犯,两人谋划共同越狱,但两人的所有通信都需要在看守Wendy的监视下进行,即Alice和Bob需要将秘密信息隐藏到含密载体中,使得监视者Wendy难以察觉含密载体和正常载体之间的差别。囚犯模型在大数据环境下存在诸多安全风险,该模型往往只关注含密载体与正常载体在内容上的不可区分性,忽视了隐蔽通信的用户行为隐蔽性问题(如通信双方的频繁交互等异常行为将会暴露通信双方的关联性)。当前隐蔽通信协议针对囚犯模型提出了多种保障含密载体内容不可区分性的算法,保障了隐私信息的编解码部分的安全性,对于隐私信息的安全收发没有设计有效的保障机制,没有解决隐蔽通信中的用户行为隐蔽性问题。Covert communication protocol is the basis of covert communication system. It includes many important parts such as information sending and receiving synchronization mechanism and steganographic coding and decoding algorithm. Most of the current covert communication protocols are based on the prisoner model proposed by Simmons. The model is described as follows: Alice and Bob are two prisoners in the prison. The two plan to escape from the prison together, but all communications between the two need to be monitored by the guard Wendy. To proceed, Alice and Bob need to hide the secret information in a confidential carrier, making it difficult for the monitor Wendy to detect the difference between the confidential carrier and the normal carrier. The prisoner model has many security risks in the big data environment. This model often only focuses on the indistinguishability of the content of the confidential carrier and the normal carrier, and ignores the concealment of user behavior in covert communication (such as frequent interactions between the communicating parties and other anomalies). Behavior will reveal the relevance of the communicating parties). The current covert communication protocol proposes a variety of algorithms to ensure the indistinguishability of the content of the covert carrier for the prisoner model, ensuring the security of the encoding and decoding part of the private information. There is no effective guarantee mechanism designed for the safe sending and receiving of private information, and no solution to concealment. The problem of user behavior concealment in communication.

现有隐蔽通信协议都是根据共享的秘钥或超参数,将秘密信息通过隐写算法嵌入到正常载体中,将含密载体以点对点的形式发送给接收方,接收方再通过共享的参数提取含密载体中的秘密信息。在这一类隐蔽通信方案中,收发双方往往具有明显的关联性,导致行为不隐蔽。Existing covert communication protocols all embed secret information into normal carriers through steganographic algorithms based on shared secret keys or hyperparameters, and send the secret carriers to the receivers in a point-to-point manner. The receivers then extract the secret information from the secret carriers through the shared parameters. In this type of covert communication scheme, the sender and receiver often have obvious correlations, resulting in unclear behaviors.

相关技术一Fan P,Zhang H,Cai Y,et al.A Robust Video SteganographicMethod against Social Networking Transcoding Based on Steganographic SideChannel[C]//IH&MMSec'20:ACM Workshop on Information Hiding and MultimediaSecurity.ACM,2020.提出了一种收发机制,即将包含秘密信息的视频以广播式发布的形式发送到社交网络上;相关技术二Bauer L A,Howes IV J K,Markelon S A,et al.CovertMessage Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption[J].arXiv preprint arXiv:2110.07009,2021提出了一种机制,即在秘密信息头部加入校验标签,通过公开的社交网络环境以广播式发布的形式传递含密载体。但上述两种机制都未考虑信息接收者频繁访问信息发布者信息导致的异常交互行为,对于社交网络中发送信息的个人账号而言,其发送的含密载体的潜在访问者可能会非常有限,作为信息接收者的用户访问相应帖子的频率必定会大大高于正常用户,信息接收者频繁访问信息发送者的社交网络帖子的行为会在通信双方之间形成明显的流量通路,暴露通信双方的关联性,行为层面的隐蔽性差。Related technology: Fan P, Zhang H, Cai Y, et al.A Robust Video SteganographicMethod against Social Networking Transcoding Based on Steganographic SideChannel[C]//IH&MMSec'20: ACM Workshop on Information Hiding and MultimediaSecurity.ACM, 2020. Proposed A sending and receiving mechanism that sends videos containing secret information to social networks in the form of broadcast releases; related technology 2 Bauer L A, Howes IV J K, Markelon S A, et al. CovertMessage Passing over Public Internet Platforms Using Model-Based Format -Transforming Encryption[J].arXiv preprint arXiv:2110.07009,2021 proposes a mechanism that adds a verification tag to the header of the secret information and delivers the secret carrier in the form of a broadcast release through a public social network environment. However, neither of the above two mechanisms takes into account the abnormal interaction behavior caused by the information recipient's frequent access to the information publisher's information. For personal accounts that send information in social networks, the potential visitors of the confidential carriers they send may be very limited. Users who are information receivers will definitely visit corresponding posts much more frequently than normal users. Information receivers’ frequent access to the information sender’s social network posts will form an obvious traffic path between the communicating parties and expose the relationship between the communicating parties. Sexual and behavioral aspects are poorly concealed.

发明内容Contents of the invention

本发明提供一种面向公共社交网络平台的背对背隐蔽通信架构(Social NetworkCovert Communication Protocol,以下简称“SNCC协议”),以解决隐蔽通信中收发双方的行为隐蔽性等问题。The present invention provides a back-to-back covert communication architecture (Social Network Covert Communication Protocol, hereinafter referred to as "SNCC Protocol") for public social network platforms to solve problems such as the concealment of the behavior of both senders and receivers in covert communications.

本发明第一方面实施例提供一种面向公共社交网络平台的背对背隐蔽通信架构,包括:用户层,用于管理会话,并控制发送隐私消息和接收新隐私消息;适配层,用于将所述隐私消息封装成格式化信息;或对新格式化信息进行解封装和校验,根据校验结果对所述新格式化信息进行预设处理,得到所述新隐私消息;隐写层,用于对所述格式化信息进行分片和隐写处理,得到隐写载体,以将所述隐写载体以预设方式发送到目标社交网络媒体中;或在所述目标社交网络媒体中接收新隐写载体,对所述新隐写载体进行提取和组合,得到所述新格式化信息,将所述新格式化信息传递至所述适配层。The first embodiment of the present invention provides a back-to-back covert communication architecture for public social network platforms, including: a user layer, used to manage sessions, and control sending private messages and receiving new private messages; an adaptation layer, used to The private message is encapsulated into formatted information; or the new formatted information is decapsulated and verified, and the new formatted information is preset processed according to the verification result to obtain the new private message; the steganographic layer is used Perform fragmentation and steganography processing on the formatted information to obtain a steganographic carrier, so as to send the steganographic carrier to the target social network media in a preset manner; or receive new information in the target social network media. The steganographic carrier extracts and combines the new steganographic carrier to obtain the new formatted information, and transmits the new formatted information to the adaptation layer.

可选地,还包括:Optionally, also includes:

数据准备层,用于根据所述目标社交网络媒体收集预设数量的用户信息作为所述隐写载体的预选发送地址,并准备预设数量的可用账号作为发送所述隐写载体或接收所述新隐写载体的媒介;The data preparation layer is used to collect a preset amount of user information as the preselected sending address of the steganographic carrier according to the target social network media, and prepare a preset number of available accounts as the sending address of the steganographic carrier or to receive the steganographic carrier. A medium for new steganographic carriers;

构建算法层,用于构建所述预设隐写算法,以将帧队列嵌入所述隐私消息中,生成所述隐写载体。An algorithm layer is constructed to construct the preset steganographic algorithm to embed the frame queue into the private message and generate the steganographic carrier.

可选地,所述用户层进一步用于调用所述适配层提供的消息包装接口,以对所述隐私信息进行格式化处理,并通过UI组件获取所述隐写载体;Optionally, the user layer is further configured to call the message packaging interface provided by the adaptation layer to format the private information and obtain the steganographic carrier through the UI component;

所述用户层进一步用于调用所述隐写层提供的发送接口传递所述隐写载体,或调用所述隐写层提供的信息接收接口启动所述目标社交网络媒体中的新隐写载体的接收线程。The user layer is further configured to call the sending interface provided by the steganographic layer to transfer the steganographic carrier, or call the information receiving interface provided by the steganographic layer to start a new steganographic carrier in the target social network media. receiving thread.

可选地,所述适配层进一步用于对所述用户层提供隐私消息可靠发送的服务,根据隐写载体处理接口对所述新隐写载体进行校验,并将所述校验结果向所述用户层进行相应的反馈,以保证所述隐私消息的可靠传输;Optionally, the adaptation layer is further configured to provide a service for reliable sending of private messages to the user layer, verify the new steganographic carrier according to the steganographic carrier processing interface, and send the verification result to the The user layer performs corresponding feedback to ensure reliable transmission of the private message;

所述适配层进一步用于调用所述隐写层提供的发送接口传递所述新隐写载体;The adaptation layer is further used to call the sending interface provided by the stego layer to transfer the new stego carrier;

所述适配层进一步用于调用所述隐写层提供的嵌入接口实现所述格式化信息的切分和帧队列的嵌入;The adaptation layer is further configured to call the embedding interface provided by the steganographic layer to implement segmentation of the formatted information and embedding of the frame queue;

所述隐写层进一步用于调用所述适配层提供的隐写载体处理接口完成所述帧队列拼接或所述新隐写载体提取、所述格式化信息封装、所述新格式化信息解封装和校验处理。The steganographic layer is further configured to call the steganographic carrier processing interface provided by the adaptation layer to complete the frame queue splicing or the new steganographic carrier extraction, the formatted information encapsulation, and the new formatted information decoding. Encapsulation and verification processing.

可选地,所述用户层包括:Optionally, the user layer includes:

会话初始化子层,用于根据用户输入的会话密钥、会话开始时间、会话持续时间、预定义的最大消息数量以及所述隐私消息构建多个会话,并生成隐写矢量集,将发送或接收指针归零;Session initialization sub-layer, used to build multiple sessions based on the user-entered session key, session start time, session duration, predefined maximum number of messages, and the private message, and generate a set of steganographic vectors that will be sent or received The pointer returns to zero;

启动或终止会话子层,用于根据所述会话开始时间和所述会话持续时间同步启动和终止会话;Start or terminate the session sublayer, used to start and terminate the session synchronously according to the session start time and the session duration;

隐私消息传递子层,用于对所述隐私信息进行格式化处理并通过UI组件向用户反馈所述隐写载体,并传递所述隐写载体,并启动所述目标社交网络媒体中的新隐写载体的接收线程。The private messaging sub-layer is used to format the private information and feedback the steganographic carrier to the user through the UI component, transfer the steganographic carrier, and start new hidden messages in the target social network media. The receiving thread that writes the carrier.

可选地,所述每个会话对应一个隐写矢量环,每个隐写矢量环中的各个元素均为隐写矢量,每个隐写矢量利用多维正交隐写特征实现单位隐私信息传输。Optionally, each session corresponds to a steganographic vector ring, each element in each steganographic vector ring is a steganographic vector, and each steganographic vector utilizes a multi-dimensional orthogonal steganographic feature to realize unit privacy information transmission.

可选地,所述适配层包括:Optionally, the adaptation layer includes:

封装或解封装子层,用于将所述隐私信息进行格式化处理转换为二进制编码,并对所述二进制编码加入首部和尾部校验封装为所述格式化信息,或将所述新格式化信息进行解封装,得到所述新隐私消息;The encapsulation or decapsulation sub-layer is used to format the private information and convert it into binary encoding, add header and tail verification to the binary encoding and encapsulate it into the formatted information, or convert the new formatted information into binary encoding. The information is decapsulated to obtain the new private message;

差错重传子层,用于检验所述新格式化信息的格式正确性,并根据CRC(CyclicRedundancy Check,循环冗余校验码)校验码验证所述新隐私消息的完整性,若校验成功,则构建确认字符(ACKnowledge Character,ACK)的格式化信息,若校验失败,则构建否认应答(Negative Acknowledgment,NAK)的格式化信息,调用所述隐写层提供的嵌入接口和发送接口对所述否认应答NAK的格式化信息进行隐写嵌入,并判断是否对所述新隐私消息进行差错控制。The error retransmission sublayer is used to check the format correctness of the new formatted information and verify the integrity of the new private message according to the CRC (Cyclic Redundancy Check) check code. If the check succeeds, the formatted information of the confirmation character (ACKnowledge Character, ACK) is constructed. If the check fails, the formatted information of the negative acknowledgment (Negative Acknowledgment, NAK) is constructed, and the embedding interface and the sending interface provided by the stego layer are called to perform steganographic embedding on the formatted information of the negative acknowledgment NAK, and determine whether to perform error control on the new private message.

可选地,所述格式化信息和所述新格式化信息的格式为:类型、有效载荷和CRC校验码,其中,Optionally, the formats of the formatted information and the new formatted information are: type, payload and CRC check code, wherein:

所述类型包括Message、所述隐私信息00、重传隐私信息01、确认字符ACK10和否认应答NAK11;The types include Message, the private information 00, retransmission private information 01, confirmation character ACK10 and negative response NAK11;

所述有效载荷包括隐私信息内容或所述格式化信息对应的隐写矢量的索引;The payload includes the private information content or the index of the steganographic vector corresponding to the formatted information;

所述CRC校验码包括所述有效载荷的循环冗余校验码或空。The CRC check code includes a cyclic redundancy check code of the payload or null.

可选地,所述隐写层包括:Optionally, the steganographic layer includes:

分片或组合子层,用于将所述适配层的格式化信息切分为预设长度的帧队列,或对新帧队列进行组合,得到所述新格式化信息;Slicing or combining sub-layers are used to segment the formatted information of the adaptation layer into frame queues of a preset length, or to combine new frame queues to obtain the new formatted information;

隐写或提取子层,用于利用所述预设隐写算法对所述帧队列进行隐写,得到所述隐写载体,或对所述新隐写载体进行提取,得到所述新帧队列;Steganography or extraction sub-layer, used to use the preset steganography algorithm to perform steganography on the frame queue to obtain the steganographic carrier, or to extract the new steganographic carrier to obtain the new frame queue ;

发送或接收子层,用于根据所述用户层或所述适配层的指令信息,将所述隐写载体以回帖评论形式发送到所述目标社交网络媒体中,或从所述目标社交网络媒体接收所述新隐写载体,并调用所述适配层提供的接口将所述新隐写载体交予所述适配层进行校验处理。The sending or receiving sub-layer is used to send the steganographic carrier to the target social network media in the form of a reply comment or from the target social network according to the instruction information of the user layer or the adaptation layer. The media receives the new steganographic carrier and calls the interface provided by the adaptation layer to hand the new steganographic carrier to the adaptation layer for verification processing.

本发明第二方面实施例提供一种基于背对背隐蔽通信架构的隐蔽通信系统,包括:如上述实施例所述的面向公共社交网络平台的背对背隐蔽通信架构。An embodiment of the second aspect of the present invention provides a covert communication system based on a back-to-back covert communication architecture, including: a back-to-back covert communication architecture for a public social network platform as described in the above embodiment.

本发明实施例提出的面向公共社交网络平台的背对背隐蔽通信架构,可以适用于当前互联网上主流任意的社交网络平台,可以实现隐蔽通信行为抗关联,有效提升隐蔽通信收发的行为隐蔽性,可以进一步保障信息的有效传递;且基于该通信结构所构建的的软件,代码简明清晰,成本低,部署使用方便。由此,解决了隐蔽通信中收发双方的行为隐蔽性等问题。The back-to-back covert communication architecture for public social network platforms proposed in the embodiment of the present invention can be applied to any mainstream social network platform on the current Internet, can achieve anti-association of covert communication behavior, effectively improve the concealment of covert communication sending and receiving behavior, and can further ensure the effective transmission of information; and the software built based on the communication structure has concise and clear code, low cost, and easy deployment and use. Therefore, the problem of behavioral concealment of both senders and receivers in covert communication is solved.

本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。Additional aspects and advantages of the present invention will be given in part in the following description and in part will be obvious from the following description, or will be learned through practice of the present invention.

附图说明Description of the drawings

本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present invention will become apparent and easily understood from the following description of the embodiments in conjunction with the accompanying drawings, in which:

图1为本发明实施例所提供的一种面向公共社交网络平台的背对背隐蔽通信架构的结构示意图;Figure 1 is a schematic structural diagram of a back-to-back covert communication architecture for a public social network platform provided by an embodiment of the present invention;

图2为本发明实施例所提供的格式化信息示意图;Figure 2 is a schematic diagram of formatted information provided by an embodiment of the present invention;

图3为本发明实施例所提供的每个隐写分量环中的隐写分量构成的环形链表示意图;FIG3 is a schematic diagram of a ring chain formed by steganographic components in each steganographic component ring provided by an embodiment of the present invention;

图4为本发明实施例所提供的面向公共社交网络平台的背对背隐蔽通信架构的一次发送示例示意图;Figure 4 is a schematic diagram of an example of one transmission of the back-to-back covert communication architecture for public social network platforms provided by an embodiment of the present invention;

图5为本发明实施例所提供的基于背对背隐蔽通信架构的隐蔽通信系统的方框示意图。Figure 5 is a block diagram of a covert communication system based on a back-to-back covert communication architecture provided by an embodiment of the present invention.

具体实施方式Detailed ways

下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals throughout represent the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the drawings are exemplary and are intended to explain the present invention and are not to be construed as limiting the present invention.

需要说明的是,会话(Session)指一次连续时间段内隐私信息的传递过程。在一个Session中可能需要交互多个Message。一次会话初始化由会话密钥、会话开始和截止时间、以及最大Message数量等参数来确定。一次会话对应一个隐写能力集。消息(Message)指在会话中收发双方一次发送或接收的隐私信息或响应消息(例如ACK或NAK),单次发送的隐私消息具有最大长度限制,需要进行格式化处理。一个隐私消息由一个隐写矢量来传递。帧(Frame)指对格式化消息(Packet)按照隐写矢量组成规则(例如,按照等长切分规则等)进行切分得到的一个隐写隐私信息单位,可利用隐写矢量中的某个分量对其进行网络态隐写。格式化消息(Packet)指经过格式化处理后的隐私消息,由消息头部、消息体和消息尾部组成。隐写载体(Stego)指一帧(Frame)信息经网络态隐写生成的含密载体。隐写矢量(Steganographic Vector)指根据网络态多维隐写理论,利用多维正交隐写特征来实现单位隐私信息(例如,一条Message)传输的方法。隐写能力集指具体隐私信息传递设备能支撑的所有隐写矢量集合。隐写分量(Steganographic Component)指利用某一隐写特征(例如,一条社交文本、图像的某特征),采用相应的具体隐写算法和网络账号,实现消息中的一帧隐私信息的嵌入和提取的方法。网络态隐写(Net-Stego)指以网络环境下各种数字媒体及其组成结构为特征,实现信息隐藏的方式。It should be noted that a session refers to the process of transmitting private information within a continuous period of time. Multiple messages may need to be exchanged in a session. The initialization of a session is determined by parameters such as the session key, the start and end time of the session, and the maximum number of messages. A session corresponds to a steganographic capability set. A message refers to the private information or response message (such as ACK or NAK) sent or received by the sender and receiver at one time in a session. The private message sent once has a maximum length limit and needs to be formatted. A private message is transmitted by a stego vector. A frame refers to a unit of steganographic private information obtained by segmenting a formatted message (Packet) according to the stego vector composition rule (for example, according to the equal length segmentation rule, etc.), and a component in the stego vector can be used for network-state steganography. A formatted message (Packet) refers to a private message after formatting, which consists of a message header, a message body, and a message tail. A stego carrier (Stego) refers to a secret carrier generated by a frame of information (Frame) through network-state steganography. Steganographic vector refers to a method of transmitting unit private information (for example, a message) by using multi-dimensional orthogonal steganographic features based on the network multi-dimensional steganography theory. Steganographic capability set refers to the set of all steganographic vectors that a specific private information transmission device can support. Steganographic component refers to a method of embedding and extracting a frame of private information in a message by using a certain steganographic feature (for example, a feature of a social text or image), using a corresponding specific steganographic algorithm and network account. Network steganography (Net-Stego) refers to a method of hiding information by using various digital media and their component structures in a network environment.

下面参考附图描述本发明实施例的面向公共社交网络平台的背对背隐蔽通信架构。The back-to-back covert communication architecture for a public social network platform according to the embodiment of the present invention will be described below with reference to the accompanying drawings.

具体而言,图1为本发明实施例所提供的一种面向公共社交网络平台的背对背隐蔽通信架构的结构示意图。Specifically, FIG. 1 is a schematic structural diagram of a back-to-back covert communication architecture for a public social network platform provided by an embodiment of the present invention.

如图1所示,该面向公共社交网络平台的背对背隐蔽通信架构10包括:用户层101、适配层102和隐写层103。该通信架构实现通信用户与目标社交网络媒体之间的“背靠背”传输,保障隐私信息传递。As shown in Figure 1, the back-to-back covert communication architecture 10 for public social network platforms includes: user layer 101, adaptation layer 102 and steganography layer 103. This communication architecture realizes "back-to-back" transmission between communication users and target social network media, ensuring the transmission of private information.

其中,用户层101用于管理会话,并控制发送隐私消息和接收新隐私消息。适配层102,用于将隐私消息封装成格式化信息;或对新格式化信息进行解封装和校验,根据校验结果对新格式化信息进行预设处理,得到新隐私消息。隐写层103,用于对格式化信息进行分片和隐写处理,得到隐写载体,以将隐写载体以预设方式发送到目标社交网络媒体中;或在目标社交网络媒体中接收新隐写载体,对新隐写载体进行提取和组合,得到新格式化信息,将新格式化信息传递至适配层102。Among them, the user layer 101 is used to manage sessions and control sending private messages and receiving new private messages. The adaptation layer 102 is used to encapsulate private messages into formatted information; or to decapsulate and verify the new formatted information, and perform preset processing on the new formatted information based on the verification results to obtain new private messages. The steganographic layer 103 is used to fragment and steganographically process the formatted information to obtain a steganographic carrier, so as to send the steganographic carrier to the target social network media in a preset manner; or to receive new information in the target social network media. The steganographic carrier extracts and combines the new steganographic carrier to obtain new formatted information, and transmits the new formatted information to the adaptation layer 102.

进一步地,本发明实施例还包括:数据准备层和构建算法层,其中,Further, the embodiment of the present invention also includes: a data preparation layer and a construction algorithm layer, wherein,

数据准备层,用于根据目标社交网络媒体收集预设数量的用户信息作为隐写载体的预选发送地址,并准备预设数量的可用账号作为发送隐写载体或接收新隐写载体的媒介;The data preparation layer is used to collect a preset amount of user information based on the target social network media as a preselected sending address for the steganographic carrier, and prepare a preset number of available accounts as a medium for sending steganographic carriers or receiving new steganographic carriers;

构建算法层,用于构建预设隐写算法,以将帧队列嵌入正常载体中,生成隐写载体。Construct an algorithm layer for constructing a preset steganographic algorithm to embed a frame queue into a normal carrier to generate a steganographic carrier.

进一步地,本发明实施例中各层之间可通过层间接口交换信息,其中,Further, in the embodiment of the present invention, information can be exchanged between each layer through an inter-layer interface, where,

用户层调用适配层提供的消息包装接口,以对隐私信息进行格式化处理,并通过UI组件获取隐写载体;用户层还可调用隐写层提供的发送接口传递隐写载体,或调用隐写层提供的信息接收接口启动目标社交网络媒体中的新隐写载体的接收线程。以此来控制整个会话流程。The user layer calls the message packaging interface provided by the adaptation layer to format the private information and obtain the steganographic carrier through the UI component; the user layer can also call the sending interface provided by the steganographic layer to transmit the steganographic carrier, or call the information receiving interface provided by the steganographic layer to start the receiving thread of the new steganographic carrier in the target social network media, so as to control the entire session process.

适配层对用户层提供隐私消息可靠发送的服务,根据层内的隐写载体处理接口对新隐写载体进行校验,并将校验结果向用户层进行相应的反馈,以保证隐私消息的可靠传输;还可以调用隐写层提供的发送接口传递服务于可靠传输的新隐写载体;The adaptation layer provides a service for reliable sending of private messages to the user layer, verifies the new steganographic carrier according to the steganographic carrier processing interface in the layer, and provides corresponding feedback to the user layer on the verification results to ensure the privacy of private messages. Reliable transmission; you can also call the sending interface provided by the steganographic layer to deliver a new steganographic carrier that serves reliable transmission;

适配层调用隐写层提供的嵌入接口实现格式化隐私信息的切分和隐私信息比特帧的嵌入,隐写层调用适配层提供的隐写载体处理接口通过隐写层和适配层的信息交互完成帧队列拼接或新隐写载体提取、格式化信息封装、新格式化信息解封装和校验处理。The adaptation layer calls the embedding interface provided by the steganographic layer to realize the segmentation of formatted private information and the embedding of private information bit frames. The steganographic layer calls the steganographic carrier processing interface provided by the adapting layer through the steganographic layer and the adapting layer. Information interaction completes frame queue splicing or new steganographic carrier extraction, formatted information encapsulation, new formatted information decapsulation and verification processing.

在一些实施例中,用户层101包括:会话初始化子层、启动或终止会话子层和隐私消息传递子层,其中,In some embodiments, the user layer 101 includes: a session initialization sublayer, a session initiation or termination sublayer, and a privacy messaging sublayer, where,

会话初始化子层,用于根据用户输入的会话密钥K、会话开始时间T、会话持续时间△T、预定义的最大消息数量以及隐私消息量等参数来构建多个会话,并生成隐写能力集(即隐写矢量集),将发送或接收指针归零,其中,需要对每个Session做如下限制:一次Session中最多只能交互128条Message;The session initialization sub-layer is used to build multiple sessions based on the session key K entered by the user, the session start time T, the session duration ΔT, the predefined maximum number of messages, and the amount of private messages, and generate steganography capabilities. set (i.e., steganographic vector set), and reset the sending or receiving pointer to zero. Among them, the following restrictions need to be made for each Session: a maximum of 128 Messages can be exchanged in a session;

启动或终止会话子层,用于根据会话开始时间T和会话持续时间△T同步启动和终止会话;Start or terminate the session sub-layer, which is used to start and terminate the session synchronously according to the session start time T and session duration ΔT;

隐私消息传递子层,用于调用适配层102提供的消息包装接口(Pack(Stringtype,String Message))对隐私信息进行格式化处理,生成格式化信息Packet,并通过UI组件向用户反馈隐写载体,并调用隐写层提供的发送接口(send(Vector F,String Stego))传递隐写载体;以一定的频率调用隐写层提供的信息接收接口(getTask(Vector F))来启动目标社交网络媒体中的新隐写载体的接收线程。其中,对每条Message做如下限制:每条Message的长度不超过1024bits(128英文字符/64汉字)。The private message transmission sublayer is used to call the message packaging interface (Pack (String type, String Message)) provided by the adaptation layer 102 to format the private information, generate the formatted information Packet, and feedback the steganographic carrier to the user through the UI component, and call the sending interface (send (Vector F, String Stego)) provided by the stego layer to transmit the steganographic carrier; call the information receiving interface (getTask (Vector F)) provided by the stego layer at a certain frequency to start the receiving thread of the new steganographic carrier in the target social network media. Among them, the following restrictions are imposed on each Message: The length of each Message does not exceed 1024 bits (128 English characters/64 Chinese characters).

在一些实施例中,适配层102包括:封装或解封装子层和差错重传子层,其中,In some embodiments, the adaptation layer 102 includes: an encapsulation or decapsulation sub-layer and an error retransmission sub-layer, wherein,

封装或解封装子层,用于将用户输入的多模态的隐私信息根据消息可靠传输协议构建的信息(Message)进行格式化处理转换为二进制编码,英文按照ASCII码格式,中文按照UTF-8编码的格式,再对二进制编码加入首部和尾部校验封装为格式化信息(或将Packet各字段分离并提取出消息体),还用于将新格式化信息进行解封装,得到多媒体的新隐私消息;The encapsulation or decapsulation sublayer is used to format the multimodal privacy information input by the user according to the information (Message) constructed by the message reliable transmission protocol and convert it into binary code. English is in ASCII code format and Chinese is in UTF-8 encoding format. The binary code is then encapsulated into formatted information by adding header and tail checksums (or separating the fields of the Packet and extracting the message body). It is also used to decapsulate the new formatted information to obtain a new multimedia privacy message.

差错重传子层,用于检验新格式化信息的格式正确性,并根据Packet类型字段决定是否进入差错校验机制。若Packet类型字段为“隐私信息”或“重传隐私信息”,需要根据CRC校验码验证隐私消息的完整性,若校验成功,则构建ACK的格式化信息,若校验失败,则构建NAK的格式化信息,调用隐写层提供的嵌入接口(Model.encode(String Packet,intbit),Model表示隐写模型)和发送接口(send(Vector F,String Stego))对NAK的格式化信息进行隐写嵌入并发送;若Packet类型为ACK,表示接收成功,无需进行差错控制操作;若Packet类型为NAK信息,则需要重新封装原始索引下的Message并重传。The error retransmission sublayer is used to check the format correctness of the new formatted information and decide whether to enter the error checking mechanism based on the Packet type field. If the Packet type field is "private information" or "retransmit private information", the integrity of the private message needs to be verified based on the CRC check code. If the verification is successful, the formatted information of the ACK is constructed. If the verification fails, the formatted information of the ACK is constructed. For the formatted information of NAK, call the embedded interface (Model.encode(String Packet, intbit), Model represents the steganographic model) and the sending interface (send(Vector F, String Stego)) provided by the steganographic layer to format the NAK information. Perform steganographic embedding and send; if the Packet type is ACK, it means the reception is successful, and no error control operation is required; if the Packet type is NAK information, the Message under the original index needs to be re-encapsulated and retransmitted.

其中,如图2所示,格式化信息和新格式化信息的格式为:类型(2bit)、有效载荷(<1024bits)和CRC校验码(8bits),其中,Among them, as shown in Figure 2, the format of the formatted information and the new formatted information is: type (2bit), payload (<1024bits) and CRC check code (8bits), where,

类型包括Message、隐私信息00、重传隐私信息01、确认字符ACK10和否认应答NAK11;Types include Message, private information 00, retransmission private information 01, confirmation character ACK10 and negative response NAK11;

有效载荷包括隐私信息内容(类型为00/01)或格式化信息对应的隐写矢量的索引(类型为10/11);The payload includes the private information content (type 00/01) or the index of the steganographic vector corresponding to the formatted information (type 10/11);

CRC校验码包括有效载荷的循环冗余校验码或空,其中,当类型为00/01时表示有效载荷字段的循环冗余校验码,其他类型时为空。还有可能包含尾部终止符,是否包含该部分由具体实现时适配层和隐写层的编码方式决定。The CRC check code includes the cyclic redundancy check code of the payload or is empty. When the type is 00/01, it represents the cyclic redundancy check code of the payload field. When it is other types, it is empty. It is also possible to include a tail terminator. Whether this part is included is determined by the encoding method of the adaptation layer and steganographic layer during specific implementation.

在一些实施例中,隐写层103包括:In some embodiments, steganographic layer 103 includes:

分片或组合子层,用于将适配层的格式化信息切分为预设长度的帧队列Frame,或对新帧队列进行组合,得到新格式化信息,并传递给适配层102,其中,Frame有两种类型,一种是非结尾的固定长度Frame,每帧128bits,另一种是结尾变长Frame,需要根据隐写算法对结尾进行标记;The fragmentation or combination sub-layer is used to segment the formatting information of the adaptation layer into frame queues of preset length, or to combine new frame queues to obtain new formatting information and pass it to the adaptation layer 102. Among them, there are two types of Frame, one is a non-ending fixed-length Frame with 128 bits per frame, and the other is an ending variable-length Frame, which needs to be marked at the end according to the steganography algorithm;

隐写或提取子层,用于利用预设隐写算法对帧队列进行隐写,得到含密载体(即隐写载体Stego),或对新隐写载体进行提取,得到新帧队列;The steganography or extraction sub-layer is used to steganograph the frame queue using the preset steganography algorithm to obtain the secret carrier (ie, the steganographic carrier Stego), or extract the new steganographic carrier to obtain a new frame queue;

发送或接收子层,用于根据用户层或适配层的指令信息,将隐写载体Stego以回帖评论形式发送到目标社交网络媒体中,或从目标社交网络媒体接收新隐写载体Stego,并调用适配层提供的接口(checkMessage(JSONArray Stego,int countget))以及隐写提取功能,将提取出的新帧队列交予适配层进行拼接和校验处理。其中,发送/接收过程中动态选择隐写分量序列,用于决定每一条含密载体的发送空间。The sending or receiving sublayer is used to send the steganographic carrier Stego to the target social network media in the form of a reply comment according to the instruction information of the user layer or the adaptation layer, or receive a new steganographic carrier Stego from the target social network media, and call the interface (checkMessage(JSONArray Stego,int countget)) and steganographic extraction function provided by the adaptation layer, and hand over the extracted new frame queue to the adaptation layer for splicing and verification. Among them, the steganographic component sequence is dynamically selected during the sending/receiving process to determine the sending space of each secret carrier.

需要说明的是,本发明实施例为双工通信协议,由两个独立的进程分别进行发送和接收,互不干扰。发送/接收信息时使用的隐写矢量由发送/接收指针决定。会话Session初始化后,发送/接收指针首先归零,每次发送时选择指针指向的隐写矢量执行信息发送流程,发送结束后指针+1并指向矢量环中的下一矢量。接收进程采用滑动窗口机制,以对方下一条信息应当出现的隐写矢量为起点,设定长度为3的滑动窗口,每次爬取滑动窗口内的所有隐写矢量。一旦某隐写矢量中出现新信息,则进行接收和处理。接收结束后,进行接收指针的校准,标记在校准过程中跳过的未经处理的隐写矢量,在下一次接收过程中做仅有一次的爬取处理,以免遗漏重要信息。当在矢量环中重复一周后,后发送的含密载体用时间戳与先发送的含密载体进行区分。It should be noted that the embodiment of the present invention is a duplex communication protocol, and two independent processes perform sending and receiving respectively without interfering with each other. The steganographic vector used when sending/receiving information is determined by the sending/receiving pointer. After the session is initialized, the sending/receiving pointer is first reset to zero. Each time the pointer is sent, the steganographic vector pointed to by the pointer is selected to execute the information sending process. After the sending is completed, the pointer is +1 and points to the next vector in the vector ring. The receiving process uses a sliding window mechanism, taking the steganographic vector that should appear in the other party's next message as the starting point, setting a sliding window with a length of 3, and crawling all steganographic vectors in the sliding window each time. Once new information appears in a steganographic vector, it is received and processed. After the reception is completed, the receiving pointer is calibrated, the unprocessed steganographic vectors skipped during the calibration process are marked, and only one crawling process is performed during the next receiving process to avoid missing important information. After one cycle of repetition in the vector ring, the later-sent cryptographic carriers are distinguished from the earlier-sent cryptographic carriers with timestamps.

进一步地,在本发明的一个实施例中,每个会话对应一个隐写矢量环,每个隐写矢量环中的各个元素均为隐写矢量,每个隐写矢量利用多维正交隐写特征实现单位隐私信息传输。Further, in one embodiment of the present invention, each session corresponds to a steganographic vector ring, each element in each steganographic vector ring is a steganographic vector, and each steganographic vector utilizes multi-dimensional orthogonal steganographic features. Realize the transmission of unit privacy information.

具体地,基于网络态多维隐写理论,每个隐写矢量可以理解为各个维度的正交隐写特征的组合。而每一个隐写特征对应一个隐写分量,隐写分量是利用某一隐写特征(例如,一条社交文本、图像的某特征),采用某个具体的隐写算法和网络账号,实现秘密信息中的一帧隐私信息的嵌入和提取的方法。隐写矢量/>可以视为8个隐写分量的有序组合,各个隐写分量用/>来表示,它们共同组成一个隐写分量环。每一个隐写分量/>对应一个Frame的发送信道,为信息传输账号、信息传输地址、隐写算法的共同作用结果,这3个因素分别用表示,分别决定传递一个Frame所用的网络账号、发送/接收一个Frame的网络空间地址以及将一个Frame的信息嵌入到隐私载体中所使用的隐写算法。可以通过隐写分量中的/>分量实现信息的多虚拟用户并发传递,通过较为完善的隐写算法(即/>分量)生成符合正常载体统计规律的隐写载体,在保证含密载体内容安全性的前提下实现隐蔽通信行为抗关联。/>的隐写容量为所有可用的隐写分量的容量之和,在发送隐私信息时,将会根据传递一条Message对应的所有Frame所需要用到的隐写容量,动态地选择可用隐写分量来构建隐写矢量,检测到不可用的部分则自动跳过并选择下一项,当隐写分量环内的可用隐写分量容量之和不能满足发送Message的需求时,将会通过环内分量循环使用的方式来解决问题。一个隐写矢量的组成部分如下表所示:Specifically, based on the network state multi-dimensional steganography theory, each steganographic vector It can be understood as a combination of orthogonal steganographic features in various dimensions. Each steganographic feature corresponds to a steganographic component. A steganographic component is a method of embedding and extracting a frame of private information in secret information by using a certain steganographic feature (for example, a feature of a social text or image), a specific steganographic algorithm and a network account. Steganographic vector/> It can be regarded as an ordered combination of 8 steganographic components, each of which is represented by/> To represent, they together form a steganalysis component ring. Each steganalysis component/> The sending channel of a Frame is the result of the interaction of the information transmission account, information transmission address, and steganography algorithm. These three factors are respectively used Indicates that the network account used to transmit a Frame, the network space address for sending/receiving a Frame, and the steganographic algorithm used to embed the information of a Frame into the privacy carrier are determined respectively. The components realize the concurrent transmission of information by multiple virtual users, and through a more complete steganographic algorithm (i.e. Components) generate stego carriers that conform to the statistical laws of normal carriers, and achieve anti-correlation of covert communication behavior while ensuring the security of the secret carrier content. /> The steganographic capacity is the sum of the capacities of all available steganographic components. When sending private information, the available steganographic components will be dynamically selected to construct the steganographic vector according to the steganographic capacity required to transmit all frames corresponding to a message. If an unavailable part is detected, it will be automatically skipped and the next item will be selected. When the sum of the available steganographic component capacities in the steganographic component ring cannot meet the needs of sending a message, the problem will be solved by recycling the components in the ring. The components of a steganographic vector are shown in the following table:

当针对某一Stego队列进行发送和接收时,如图3所示,在发送方,Stego依次出队,将其从构成隐写矢量的隐写分量环的第一个可用分量开始按照链表顺序依次发送到可用分量中,若出现不可用的,则跳过,并循环访问下一隐写分量。在接收方,依次对环形链表中的每个分量进行爬取,当环形链表中重复一周后,可利用时间戳分辨从隐写分量中接收到的含密载体(Stego)的先后顺序。When sending and receiving for a certain Stego queue, as shown in Figure 3, on the sender side, Stego is dequeued in turn, and it is sent to the available components in the order of the linked list starting from the first available component of the stego component ring that constitutes the stego vector. If an unavailable component appears, it is skipped and the next stego component is accessed in a loop. On the receiver side, each component in the circular linked list is crawled in turn. After a cycle in the circular linked list, the timestamp can be used to distinguish the order of the secret carriers (Stego) received from the stego components.

如图4所示,时刻一,发送方等待,接收方等待;时刻二,发送方发送,接收方等待;时刻三,发送方指向下一隐写矢量并等待,接收方爬取;时刻四,接收方处理结束,指向下一隐写矢量恢复等待状态。As shown in Figure 4, at time one, the sender waits and the receiver waits; at time two, the sender sends and the receiver waits; at time three, the sender points to the next steganographic vector and waits while the receiver crawls; at time four, The receiver finishes processing and points to the next steganographic vector to resume the waiting state.

下面将以面向公共社交网络平台的背对背隐蔽通信架构构建的软件对本发明实施例进一步说明。The embodiments of the present invention will be further described below with software constructed with a back-to-back covert communication architecture oriented to a public social network platform.

步骤S1:在运行软件之前,根据实际需求选定合适的社交平台,准备预设数量的可用账号,并收集相应社交平台上正常用户的信息,其中,可用账号将于后续步骤中用于发送/接收隐写文本,即部分;而正常用户发送的帖子将作为Frame的信息发送地址,即/>部分,后文中将正常用户写作“中间用户”。将账号文件和正常用户的信息配置到软件中。Step S1: Before running the software, select an appropriate social platform based on actual needs, prepare a preset number of available accounts, and collect information about normal users on the corresponding social platform. The available accounts will be used to send/ Receive steganographic text, i.e. part; and the posts sent by normal users will be used as the information sending address of the Frame, that is/> For this part, normal users will be referred to as “intermediate users” in the following text. Configure the account file and normal user information into the software.

步骤S2:根据实际需求选定合适的隐写算法,并将其配置到软件中,本软件配置的是一种以文本作为隐写载体的、基于RNN的载体生成式隐写算法。Step S2: Select an appropriate steganography algorithm based on actual needs and configure it into the software. This software is configured with a carrier-generative steganography algorithm based on RNN that uses text as the steganographic carrier.

需要说明的是,步骤S1~S2为软件使用前的准备工作,接下来即可开始进行隐蔽通信。It should be noted that steps S1 to S2 are preparations before using the software, and then covert communication can begin.

步骤S3:用户通过用户层启动会话,将Session所需参数配置到软件中,包括会话密钥K、会话开始时间T和会话持续时间△T;Step S3: The user starts the session through the user layer and configures the required parameters of the Session into the software, including the session key K, session start time T and session duration ΔT;

当输入新的参数时,发送指针和接收指针清零,软件将事先准备好的可用账号分成两个部分,一部分作为含密载体的发送账号,另一部分作为含密载体的接收账号;软件根据秘钥K和软件内部的可用账号集以及中间用户信息构建隐写矢量集,具体构建方式为:以K为随机数种,生成若干随机数,每8个为一组,作为选择发送账号的隐写分量;再次以K为随机数种,生成若干随机数,每8个为一组,作为指定Stego发送位置的隐写分量,由以上因素共同组成隐写分量环。输入的会话开始时间T和会话持续时间△T将在时间层面上决定软件可接收的信息的范围,软件仅接收在会话开始时间之后发送的信息;收发双方需保证账号库以及秘钥K一致。When new parameters are entered, the sending pointer and receiving pointer are cleared, and the software divides the available accounts prepared in advance into two parts, one part is used as the sending account of the confidential carrier, and the other part is used as the receiving account of the confidential carrier; the software is based on the secret The key K and the available account set inside the software and the intermediate user information construct a steganographic vector set. The specific construction method is: using K as a random number, generate a number of random numbers, each group of 8, as a steganographic selection of the sending account Component; again, K is used as a random number to generate a number of random numbers, each group of 8, as the steganographic component that specifies the Stego sending position. The above factors together form a steganographic component ring. The input session start time T and session duration △T will determine the range of information that the software can receive at the time level. The software will only receive information sent after the session start time; both the sender and the receiver need to ensure that the account database and secret key K are consistent.

步骤S4:发送方和接收方选择账号库,需保证收发双方所选择的账号库不同,如发送方选择账号库1,接收方应选择账号库2,即将这两个账号库分别作为发送账号库和接收账号库。Step S4: The sender and the receiver select an account library. It is necessary to ensure that the account libraries selected by the sender and the receiver are different. For example, if the sender selects account library 1, the receiver should select account library 2, that is, the two account libraries are used as the sending account library and the receiving account library respectively.

步骤S5:用户输入Message,点击“生成”按钮,通过适配层将Message转换成比特流并封装成Packet。Step S5: The user inputs a message and clicks the "Generate" button. The message is converted into a bit stream and encapsulated into a packet through the adaptation layer.

步骤S6:该软件通过调用隐写层接口将Packet切分成Frame(每个Frame最大为128bits),并将Frame通过隐写算法嵌入到文本中生成隐写文本(Stego),并将生成的Stego显示到UI界面中;Step S6: The software divides the Packet into Frames (each Frame is up to 128 bits) by calling the steganographic layer interface, embeds the Frame into the text through the steganographic algorithm to generate steganographic text (Stego), and displays the generated Stego. to the UI interface;

在生成Stego时,会根据Frame的数量返还弹窗信息,若Frame的数量≤8,则弹窗信息显示“可以发送”,可以继续进行下一步;反之,若弹窗信息显示其他内容,如“内容过长”,则需要删减一定的信息,并重复步骤S5、步骤S6直至弹窗信息显示“可以发送”。When Stego is generated, a pop-up message will be returned based on the number of Frames. If the number of Frames is ≤8, the pop-up message will display "OK to send" and you can proceed to the next step. Otherwise, if the pop-up message displays other content, such as "the content is too long", you need to delete some information and repeat steps S5 and S6 until the pop-up message displays "OK to send".

步骤S7:用户点击“发送”按钮,软件将隐写文本传递到隐写层,根据发送指针的值提取出对应索引的隐写矢量,把根据每个Frame生成的Stego发送到隐写矢量中对应隐写分量环的隐写分量上,发送方发送指针+1。Step S7: The user clicks the "Send" button, and the software passes the steganographic text to the stego layer, extracts the steganographic vector of the corresponding index according to the value of the sending pointer, and sends the Stego generated according to each Frame to the steganographic component of the corresponding steganographic component ring in the steganographic vector. The sender sends the pointer +1.

步骤S8:接收方通过隐写层接收隐写文本,采用滑动窗口机制,以当前接收指针对应的隐写矢量为起点,设定长度为3的滑动窗口,爬取滑动窗口中的所有隐写矢量。一旦某个隐写矢量中存在秘密信息,则接收该隐写矢量中的所有含密载体Stego,进入下一步。Step S8: The receiver receives the steganographic text through the stego layer, adopts a sliding window mechanism, takes the steganographic vector corresponding to the current receiving pointer as the starting point, sets a sliding window of length 3, and crawls all the steganographic vectors in the sliding window. Once there is secret information in a certain steganographic vector, all the secret carriers Stego in the steganographic vector are received and the next step is entered.

步骤S9:接收方软件通过隐写层将接收到的Stego还原成Frame,并将Frame拼接成Packet传送到适配层进行后续处理。Step S9: The receiver software restores the received Stego to Frame through the steganographic layer, and splices the Frame into a Packet and sends it to the adaptation layer for subsequent processing.

步骤S10:接收方软件通过适配层将Packet解封装,得到type,有效荷载和CRC校验码。Step S10: The receiver software decapsulates the Packet through the adaptation layer and obtains the type, payload and CRC check code.

步骤S11:若type为“00”(或“01”),则通过CRC验证信息的完整性,校验成功,则对Packet中的有效荷载部分进行解码得到Message,并添加到历史信息中(或者根据重传的Message更新原始历史信息记录),接收方接收指针+1,并进入S12;校验失败,则以当前信息对应的接收指针值作为新的Message构建NAK的Packet,并通过隐写矢量将其反馈给发送方,并记录接收失败的历史信息,接收方发送、接收指针均+1,并进入步骤S13;Step S11: If type is "00" (or "01"), verify the integrity of the information through CRC, and if the verification is successful, decode the payload part of the Packet to obtain the Message, and add it to the historical information (or Update the original historical information record according to the retransmitted Message), the receiver receives the pointer + 1, and enters S12; if the verification fails, use the receiving pointer value corresponding to the current message as a new Message to construct a NAK Packet, and pass the steganographic vector Feed it back to the sender and record the historical information of reception failure. The receiver's sending and receiving pointers are both +1, and enter step S13;

步骤S12:若在S11中type为“00”(或“01”)的消息校验成功,用户可点击“接收”按钮,软件将以当前信息对应的接收指针值作为新的Message构建ACK的Packet,并通过隐写矢量将其反馈给发送方,接收方发送指针+1。Step S12: If the message with type "00" (or "01") in S11 is successfully verified, the user can click the "Receive" button, and the software will use the receiving pointer value corresponding to the current message as a new Message to construct an ACK Packet , and feed it back to the sender through the steganographic vector, and the receiver sends pointer +1.

步骤S13:发送方同样通过步骤S8~S10接收接收方的反馈信息,得到Packet并对其进行解封装,得到type和有效荷载。Step S13: The sender also receives the feedback information from the receiver through steps S8 to S10, obtains the Packet, decapsulates it, and obtains the type and payload.

步骤S14:若type为“10”(或“11”),则验证ACK(或NAK)格式的正确性,格式正确则根据ACK(或NAK)中的指针索引的值,修改对应的历史信息的接收状态为“接收成功”(或重新提取对应历史信息中的Message以及指针count重新封装成Packet并进行差错重传),发送方接收指针+1(若存在差错重传,则发送方发送指针也+1),完成整个信息收发流程;Step S14: If type is "10" (or "11"), verify the correctness of the ACK (or NAK) format. If the format is correct, modify the corresponding historical information based on the value of the pointer index in the ACK (or NAK). The receiving status is "reception successful" (or the Message and pointer count in the corresponding historical information are re-extracted and repackaged into a Packet and the error is retransmitted), and the sender's receiving pointer is +1 (if there is an error retransmission, the sender's sending pointer is also +1), complete the entire information sending and receiving process;

若出现格式错误则以当前信息对应的接收指针值作为新的Message构建NAK的Packet并通过隐写矢量将其反馈给接收方,并记录接收失败的历史信息,发送方发送、接收指针均+1。If a format error occurs, the receive pointer value corresponding to the current message is used as a new Message to construct a NAK Packet and feed it back to the receiver through the steganographic vector, and record the historical information of reception failure. The sender's sending and receiving pointers are both +1. .

根据本发明实施例提出的面向公共社交网络平台的背对背隐蔽通信架构,可以适用于当前互联网上主流任意的社交网络平台,可以实现隐蔽通信行为抗关联,有效提升隐蔽通信收发的行为隐蔽性,可以进一步保障信息的有效传递;且基于该通信结构所构建的软件,代码简明清晰,成本低,部署使用方便。The back-to-back covert communication architecture for public social network platforms proposed according to the embodiment of the present invention can be applied to any mainstream social network platform on the current Internet, can achieve anti-correlation of covert communication behaviors, effectively improve the concealment of covert communication transceivers, and can This further ensures the effective transmission of information; and the software built based on this communication structure has concise and clear code, low cost, and is easy to deploy and use.

本发明实施例还提供一种基于背对背隐蔽通信架构的隐蔽通信系统,包括:如上述实施例的面向公共社交网络平台的背对背隐蔽通信架构。Embodiments of the present invention also provide a covert communication system based on a back-to-back covert communication architecture, including: a back-to-back covert communication architecture for a public social network platform as in the above embodiment.

具体地,如图5所示,基于背对背隐蔽通信架构的隐蔽通信系统50包括:用户层模块501、适配层模块502、隐写层模块503和其他辅助模块504。Specifically, as shown in Figure 5, the covert communication system 50 based on the back-to-back covert communication architecture includes: user layer module 501, adaptation layer module 502, steganographic layer module 503 and other auxiliary modules 504.

用户层模块501为系统之外的逻辑模块,包含可供用户操作的UI界面,可以调用适配层和隐写层,发起会话,控制隐私消息的发送和接收。The user layer module 501 is a logical module outside the system, including a UI interface for user operation. It can call the adaptation layer and the steganographic layer, initiate a session, and control the sending and receiving of private messages.

适配层模块502为系统中的通信控制模块,用于从用户层接收隐私消息将其转换成Packet,将Packet传递给隐写层得到隐写文本并将其返还到用户层;还用于从隐写层接收隐写文本,将其通过隐写层中的模块返还成Packet并对其进行校验,根据校验结果进行相应的处理以保证可靠传输。The adaptation layer module 502 is the communication control module in the system. It is used to receive private messages from the user layer, convert them into Packets, pass the Packets to the steganographic layer to obtain the steganographic text and return it to the user layer; it is also used to obtain the hidden text from the user layer. The steganographic layer receives the steganographic text, returns it to a Packet through the module in the steganographic layer and verifies it, and performs corresponding processing based on the verification results to ensure reliable transmission.

隐写层模块503为系统中的通信模块,用于对从适配层得到的Packet进行分片处理得到Frame,并对其进行编码得到隐写文本,等待用户层的指令将隐写文本发送到对应的隐写矢量中;还用于根据用户层的指令定期从对应的隐写矢量中爬取信息,爬取成功,则将得到的隐写文本经过解码还原成Frame并拼接得到Packet交给适配层进行后续处理。The steganographic layer module 503 is the communication module in the system. It is used to segment the Packet obtained from the adaptation layer to obtain the Frame, encode it to obtain the steganographic text, and wait for instructions from the user layer to send the steganographic text to in the corresponding steganographic vector; it is also used to regularly crawl information from the corresponding steganographic vector according to the instructions of the user layer. If the crawling is successful, the obtained steganographic text will be decoded and restored into a Frame and spliced to obtain a Packet and handed over to the appropriate Layer for subsequent processing.

其他辅助模块504,用于辅助软件的正常运作,主要负责管理系统中的各项数据文件,如会话密钥K、会话开始时间T和会话持续时间△T、隐写矢量、历史信息等。Other auxiliary modules 504 are used to assist the normal operation of the software and are mainly responsible for managing various data files in the system, such as session key K, session start time T and session duration ΔT, steganographic vectors, historical information, etc.

根据本发明实施例提出的基于背对背隐蔽通信架构的隐蔽通信系统,可以适用于当前互联网上主流任意的社交网络平台,可以实现隐蔽通信行为抗关联,有效提升隐蔽通信收发的行为隐蔽性,可以进一步保障信息的有效传递。发明的软件,代码简明清晰,成本低,部署使用方便。The covert communication system based on the back-to-back covert communication architecture proposed according to the embodiment of the present invention can be applied to any mainstream social network platform on the current Internet, can realize anti-correlation of covert communication behaviors, effectively improve the concealment of covert communication transceivers, and can further Ensure the effective transmission of information. The invented software has concise and clear code, low cost, and is easy to deploy and use.

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或N个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" etc. means that the specific features, structures, materials or characteristics described in conjunction with the embodiment or example are included in at least one embodiment or example of the present invention. In this specification, the schematic representations of the above terms do not necessarily refer to the same embodiment or example. Moreover, the specific features, structures, materials or characteristics described may be combined in any one or N embodiments or examples in a suitable manner. In addition, those skilled in the art may combine and combine the different embodiments or examples described in this specification and the features of the different embodiments or examples, without contradiction.

此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“N个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In addition, the terms "first" and "second" are used for descriptive purposes only and should not be understood as indicating or implying relative importance or implicitly indicating the number of the indicated technical features. Therefore, the features defined as "first" and "second" may explicitly or implicitly include at least one of the features. In the description of the present invention, the meaning of "N" is at least two, such as two, three, etc., unless otherwise clearly and specifically defined.

Claims (10)

1. A back-to-back covert communication architecture for a public social network platform, comprising:
a user layer for managing sessions and controlling the sending of private messages and the receiving of new private messages;
an adaptation layer for encapsulating the privacy message into formatted information;
or unpacking and checking the new formatted information, and performing preset processing on the new formatted information according to a checking result to obtain the new privacy message;
the steganography layer is used for carrying out slicing and steganography processing on the formatted information to obtain a steganography carrier, and sending the steganography carrier to a target social network medium in a preset mode;
or receiving a new steganography carrier in the target social network media, extracting and combining the new steganography carrier to obtain the new formatting information, and transmitting the new formatting information to the adaptation layer.
2. The public social network platform-oriented back-to-back covert communication architecture of claim 1, further comprising:
the data preparation layer is used for collecting preset quantity of user information as a preselected sending address of the steganography carrier according to the target social network media, and preparing preset quantity of available accounts as a medium for sending the steganography carrier or receiving the new steganography carrier;
and the construction algorithm layer is used for constructing the preset steganography algorithm so as to embed a frame queue into the privacy message and generate the steganography carrier.
3. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein the user layer is further configured to invoke a message wrapper interface provided by the adaptation layer to format the privacy information and obtain the steganographic carrier through a UI component;
the user layer is further used for calling a sending interface provided by the steganography layer to transfer the steganography carrier or calling an information receiving interface provided by the steganography layer to start a receiving thread of a new steganography carrier in the target social network media.
4. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein,
the adaptation layer is further used for providing a service for reliably sending the privacy message to the user layer, checking the new steganography carrier according to a steganography carrier processing interface, and feeding back the checking result to the user layer correspondingly so as to ensure the reliable transmission of the privacy message;
the adaptation layer is further used for calling a sending interface provided by the steganography layer to transfer the new steganography carrier;
the adaptation layer is further used for calling an embedding interface provided by the steganography layer to realize segmentation of the formatting information and embedding of a frame queue;
the steganography layer is further used for calling a steganography carrier processing interface provided by the adaptation layer to finish the frame queue splicing or the new steganography carrier extracting, the formatting information packaging, the new formatting information decapsulating and the verification processing.
5. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein said user layer comprises:
a session initialization sub-layer, configured to construct a plurality of sessions according to a session key, a session start time, a session duration, a predefined maximum message number and the privacy message input by a user, generate a steganography vector set, and zero a sending or receiving pointer;
a session starting or terminating sub-layer for synchronously starting and terminating a session according to the session starting time and the session duration;
and the privacy message transmission sub-layer is used for formatting the privacy information, feeding back the steganography carrier to a user through a UI component, transmitting the steganography carrier and starting a receiving thread of a new steganography carrier in the target social network media.
6. The public social network platform-oriented back-to-back covert communication architecture of claim 5, wherein each session corresponds to a steganographic vector ring, wherein each element in each steganographic vector ring is a steganographic vector, and each steganographic vector utilizes a multidimensional orthogonal steganographic feature to realize unit privacy information transmission.
7. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein said adaptation layer comprises:
the encapsulation or decapsulation sub-layer is used for converting the privacy information into binary codes through formatting treatment, adding head and tail verification into the binary codes to encapsulate the binary codes into the formatting information, or decapsulating the new formatting information to obtain the new privacy information;
and the error retransmission sub-layer is used for checking the format correctness of the new formatted information, verifying the integrity of the new privacy information according to the CRC check code, if the check is successful, constructing the formatted information of the acknowledgement character ACK, if the check is failed, constructing the formatted information of the negative acknowledgement NAK, calling an embedding interface and a sending interface provided by the steganography layer to steganographically embed the formatted information of the negative acknowledgement NAK, and judging whether the new privacy information is subjected to error control.
8. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein the format of the formatting information and the new formatting information is: type, payload, and CRC check code, wherein,
the types include Message, the privacy information 00, retransmission privacy information 01, acknowledgement character ACK10, and negative acknowledgement NAK11;
the payload comprises private information content or an index of a steganography vector corresponding to the formatting information;
the CRC check code includes a cyclic redundancy check code or null of the payload.
9. The public social network platform-oriented back-to-back covert communication architecture of claim 1, wherein the steganography layer comprises:
a slicing or combining sub-layer, configured to slice the formatting information of the adaptation layer into a frame queue with a preset length, or combine a new frame queue to obtain the new formatting information;
a steganography or extraction sublayer, configured to steganographically the frame queue by using the preset steganography algorithm to obtain the steganography carrier, or extract the new steganography carrier to obtain the new frame queue;
and the sending or receiving sub-layer is used for sending the steganography carrier to the target social network media in a form of a reply comment according to the instruction information of the user layer or the adaptation layer, or receiving the new steganography carrier from the target social network media, and calling an interface provided by the adaptation layer to deliver the new steganography carrier to the adaptation layer for verification processing.
10. A covert communication system based on a back-to-back covert communication architecture, comprising: the public social network platform-oriented back-to-back covert communication architecture of any of claims 1-9.
CN202410011249.6A 2024-01-03 2024-01-03 Back-to-back covert communication architecture for public social network platforms Pending CN117792783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410011249.6A CN117792783A (en) 2024-01-03 2024-01-03 Back-to-back covert communication architecture for public social network platforms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410011249.6A CN117792783A (en) 2024-01-03 2024-01-03 Back-to-back covert communication architecture for public social network platforms

Publications (1)

Publication Number Publication Date
CN117792783A true CN117792783A (en) 2024-03-29

Family

ID=90387102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410011249.6A Pending CN117792783A (en) 2024-01-03 2024-01-03 Back-to-back covert communication architecture for public social network platforms

Country Status (1)

Country Link
CN (1) CN117792783A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118802327A (en) * 2024-06-18 2024-10-18 湖北大学 A steganographic method based on social behavior

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118802327A (en) * 2024-06-18 2024-10-18 湖北大学 A steganographic method based on social behavior

Similar Documents

Publication Publication Date Title
US10491575B2 (en) Secure dynamic communication network and protocol
Weinberg et al. Stegotorus: a camouflage proxy for the tor anonymity system
US10326798B2 (en) System and method for secure data transmission and storage
CN1787495B (en) Reliably transferring queued application messages
Dyer et al. Marionette: A programmable network traffic obfuscation system
US5825890A (en) Secure socket layer application program apparatus and method
US8024788B2 (en) Method and apparatus for reliable, high speed data transfers in a high assurance multiple level secure environment
CN103118139B (en) Distributed information hides transmission system and transmission method thereof
CN106357690B (en) data transmission method, data sending device and data receiving device
WO2004042537A2 (en) System and method for securing digital messages
CN109005194A (en) Portless shadow communication means and computer storage medium based on KCP agreement
CN117792783A (en) Back-to-back covert communication architecture for public social network platforms
CN113507483B (en) Instant messaging method, device, server and storage medium
CN105959355B (en) Secret information transmission method under P2P network based on BitTorrent agreement
CN103888433B (en) A kind of method and system communicated between browser client and IM clients
WO2023214344A1 (en) System and method for establishing secure communication and authentication by embedding pulse codes into content in real-time
CN113452694B (en) Covert communication method for realizing network control on terminal application based on public channel
US20030223587A1 (en) Classified communication system which classifies the signal between interfaces and supports a media transport encoding scheme for a direct current balanced stream simultaneously
CN118300880B (en) Cloud platform data encryption transmission system and method thereof
CN110912974A (en) Resource processing method and device, electronic equipment and computer readable storage medium
CN114124390B (en) Physical isolation-based transmitting method, physical isolation-based receiving method and physical isolation-based receiving system
EP2820802B1 (en) Electronic communication
CN112637360B (en) System, method, device, processor and storage medium for realizing secure communication between mobile terminal and web
CN112398643B (en) Communication digital right protection method and system
Bistarelli et al. A Preliminary Study on the Creation of a Covert Channel with HTTP Headers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination