CN101931602A - Secret signal synchronized method based on fractional Fourier transform domain - Google Patents

Secret signal synchronized method based on fractional Fourier transform domain Download PDF

Info

Publication number
CN101931602A
CN101931602A CN2010102598365A CN201010259836A CN101931602A CN 101931602 A CN101931602 A CN 101931602A CN 2010102598365 A CN2010102598365 A CN 2010102598365A CN 201010259836 A CN201010259836 A CN 201010259836A CN 101931602 A CN101931602 A CN 101931602A
Authority
CN
China
Prior art keywords
fourier transform
fractional fourier
formula
signal
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102598365A
Other languages
Chinese (zh)
Inventor
包永强
邹采荣
赵力
奚吉
王开
魏昕
唐加能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN2010102598365A priority Critical patent/CN101931602A/en
Publication of CN101931602A publication Critical patent/CN101931602A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a secret signal synchronized method based on a fractional Fourier transform (FRFT) domain, which comprises the following steps: (1) carrying out the FRFT domain; (2) obtaining a spectral overlap formula based on the FRFT; (3) and synchronously analyzing secret signals of a voice information hide system. The secret information of the invention can be embedded any time and any where, and the invention has wide application prospects in the voice information hide field.

Description

A kind of secret signal synchronized method based on fractional Fourier transform domain
Technical field
The present invention relates to a kind of secret signal synchronized method, particularly a kind of voice messaging based on fractional Fourier transform domain is hidden the secret signal synchronized method in the system.
Background technology
How utilizing call voice to carry out the long-distance transmission of concealed data in recent years is focus and the difficult point that the voice manipulative communications deception becomes military security department and voice signal processing researcher extensive concern.In existing technology and the method, people utilize LSB technology audio signal is embedded on wavelet field.In addition, the subband amplitude modulation technique also has some to use in the audio frequency letter is hidden, and has obtained certain effect.But at present the certain methods that proposes mainly concentrates on the audio signal that frequency band is 20~20KHz, and is that the method hidden of the call voice of 300~3400Hz is ripe not enough to frequency band.
Voice messaging is hidden, and general flow process judges exactly whether present frame is speech frame, embeds if just carry out concealed data.This method exist bigger potential safety hazard, if the prison hearer suspects this section voice, just find the hiding-place of secret signal easily by simple analysis.Therefore must improve the embedding means, guarantee that secret information can embed at random, this just brings a problem, is exactly how the recipient knows which point has embedded secret information, and which point does not have, i.e. the secret information stationary problem.The method for synchronous that voice messaging is hidden mainly still depends on the synchronous system of digital communication system itself at present, does not also have method synchronous about secret signal and that the digital communication system separated in synchronization comes.
Summary of the invention
The present invention seeks to provides a kind of secret signal synchronized method based on fractional Fourier transform domain at the defective that prior art exists.
The present invention adopts following technical scheme for achieving the above object:
The secret signal synchronized method that the present invention is based on fractional Fourier transform domain may further comprise the steps:
(1) fractional Fourier transform domain
The a rank fractional fourier transform algorithm of input voice sequence s (t) is as follows:
S a(u)=F a(s(t))
In the formula, 0<| p|<2, n is an integer, j is an imaginary unit;
(2) based on the overlapping formula of the spectrum on the fractional fourier transform
The centre frequency of each waveform is u in the formula cCsca+f i, u c, λ i, f i, (i=1 .. N) are constant, and X (u) and x (t) are respectively the frequency domain and the time domain form of output signal.
(3) secret signal of the hiding system of voice messaging is analyzed synchronously
When sending carrier signal, send one group and be lower than channel noise level, satisfy formula f iSina+ τ iCosa=u 0Condition, amplitude are subjected to the signal of pseudo noise code control, and receiving terminal is u on fractional Fourier transform domain cThe place is judged.
Advantage of the present invention and effect are:
Concealed synchronizing signal all can not effectively be found at time domain, frequency domain, under the prerequisite of known fraction rank factor a, can effectively extract concealed synchronizing signal on score field.Theoretical research and experimental analysis show that by this method, secret information can embed whenever and wherever possible, and the present invention hides in the field at voice messaging and has broad application prospects.
Description of drawings
Fig. 1 is a carrier wave voice manipulative communications deception system transmitting element.
Fig. 2 is based on the embedding grammar at random of LSB.
Fig. 3 is a carrier wave voice manipulative communications deception system receiving element.
Fig. 4 is Chebyshev mapping and the 8 bit quantization sequence characteristics of W=4.
Fig. 5 is a 2FSK carrier wave voice manipulative communications deception system model.
Fig. 6 is 2FSK modulating system output waveform and the frequency spectrum that does not embed crypto-synchronization information.
Fig. 7 is 2FSK modulating system output waveform and the frequency spectrum that embeds crypto-synchronization information.
Fig. 8 is 2FSK modulating system receiving terminal waveform and the frequency spectrum that embeds crypto-synchronization information.
Fig. 9 is a concealed synchronizing signal mark amplitude spectrum under the noise circumstance.
Figure 10 is a mark amplitude spectrum under the pink noise circumstance.
Figure 11 is the mark amplitude spectrum under the volvo automobile noise environment.
Figure 12 is a mark amplitude spectrum under the noise circumstance of factory workshop.
Embodiment
A kind of secret signal synchronized method based on fractional Fourier transform domain of the present invention is characterized in that may further comprise the steps:
(1) fractional Fourier transform domain
The a rank fractional fourier transform algorithm of input voice sequence s (t) is as follows:
S a(u)=F a(s(t))
In the formula,
Figure BSA00000239315000032
0<| p|<2, n is an integer, j is an imaginary unit.
(2) based on the overlapping derivation of the spectrum on the fractional fourier transform
Order:
λ in the following formula i, f i, τ i, (i=1 .. N) are constant.Then have:
X a(u)=F a(x(t))
Formula makes u '=u-f in (3) iSina substitution (3), and make t '=t-τ i, the abbreviation arrangement then has:
Make u "=u '-τ iCosa, substitution formula (4) is further put in order:
With u "=u '-τ iCosa, u '=u-f iSina substitution formula (5) is also further put in order:
In the following formula:
Select one group of suitable f i, τ i, satisfy:
f isina+τ icosa=u 0 (8)
Make u 0=0, then have:
f isina+τ icosa=0 (9)
In formula (10),
d
Order: S a(u)=δ (u-u c)
Then:
Then formula (10) is:
Formula (13) (14) shows, N time domain waveform formula (8) energy height on fractional Fourier transform domain that satisfies condition concentrates on u cPoint, only u cThe place is non-0 value, and other is all 0.According to principle of conservation of energy, if N wave level all is lower than noise level, then, at last at fractional Fourier transform domain u cThe place can form the level above decision threshold.Formula (15) is similar to the chirp signal, and the centre frequency of each waveform is u in the formula cCsca+f i
(3) secret signal of the hiding system of voice messaging is analyzed synchronously
In manipulative communications deception, according to the characteristic of some communication channels, exist characteristics such as multipath transmisstion and frequency dispersal as wireless channels such as short wave channels, if adopt FSK modulation and non-coherent demodulation mode, can utilize carrier signal to carry the secret information synchronizing signal.That is to say, when sending carrier signal, can send one group be lower than channel noise level, signal that (8) condition that satisfies formula, amplitude are subjected to pseudo noise code control, receiving terminal can be on fractional Fourier transform domain u cThe place is judged.
Below in conjunction with drawings and Examples, technical solutions according to the invention are further elaborated.
In order to analyze a kind of superior function of hiding the secret signal synchronized method of system based on the voice messaging of fractional Fourier transform domain set forth above, at first we have provided the carrier wave voice manipulative communications deception model on the fractional Fourier transform domain, experimentize then and provide experimental data.
1. the carrier wave voice manipulative communications deception model on the fractional Fourier transform domain
For the purpose of the simple analysis, make N=2, λ i0Be constant, make formula (14) at u cPoint reaches maximum, can make that its exponential term is 0, then has:
f 2=2u cseca-f 1 (16)
By formula (8) (16) as can be known, if f 1Determine, then f 2, τ 1, τ 2, all can determine.f 1Can control by one group of frequency hopping code sequence:
f 1=k(n)Δf (17)
In the following formula, Δ f is a frequency interval, and k (n) is the frequency hop sequences on GF (p) territory.Then formula (11) can be:
In chaos sign indicating number sequence, the Chebyshev chaos sequence is better than modified model Logistic chaos sequence in performance aspect correlation properties, distance of swimming characteristic, the balance quality.This paper adopts the Chebyshev chaos sequence to control k (n).
Exponent number is that the Chebyshev chaotic maps of w is as follows:
x n+1=cos(warccosx n) (19)
To x nCarry out the m bit quantization, then have:
k(n)=[2 mx n] (20)
[y] is bracket function in the following formula, is expressed as the maximum integer less than y.The k (n) that obtains according to formula (20) is GF (p=2 m) frequency hop sequences on the territory.
In order to check the secret information synchronization scenario, introduce following carrier wave voice manipulative communications deception system.In carrier wave voice manipulative communications deception system, the voice messaging bit rate is 64kbit/s, adopts the 2FSK mode to modulate and non-coherent demodulation.The secret information embedded mode adopts low bit mode, and the secret information transmission rate is 32bit/s.
Among Fig. 1, voice signal adopts the 8kHz sampling, 8bit quantizes, per 256 is 1 frame, and the interframe zero lap carries out secret information LSB to speech frame and embeds, be that per 1 frame embeds 1 bit, at speech frame, embedded mode can embed by full frame together, and also can adopt length is whether the binary system random sequence of N=256 is controlled and embedded at current point.The binary system random sequence can be by sample back and carry out normalized and obtain of noise to external world.
When agwn (n)=1, the voice sample point is carried out LSB embed.
If f C0, f C1Be the carrier frequency of 2FSK modulating system, then formula (15) the formula centre frequency that provides waveform must fall within the receiver pass-band scope, does not consider the base band speech bandwidth, can make for the purpose of the simple analysis:
f c0<f i+u ccsca<f c1 (22)
In the following formula, f i(i=1,2) are provided respectively by formula (16) (17).Formula (16) (17) substitution formula (22) can be got:
f c0cosa<u c<f c1cosa (23)
Corresponding receiving element as shown in Figure 3.
Carrier wave voice manipulative communications deception system adopts incoherent reception, comes gating two-way band stop filter by output symbol after the 2FSK demodulation as command character among Fig. 3, its objective is the f that removes in the received signal C0, f C1Composition makes it include the secret information synchronized component.Make its concentration of energy in u by fractional fourier transform 0Point is to adjudicate.If u 0Point value then carries out secret information and receives greater than decision threshold.
2. experiment and analysis
In all experiments of the present invention, the signal of voice signal in the laboratory, recording, sample frequency is 8KHz, sampling resolution 8bit.At stack white Gaussian noise and nonstationary noise (noise source is provided by the Dutch RSRE research center under the Britain TNO perception association) on the clean speech signal.
(a) Chebyshev mapping curve among Fig. 4; (b) Chebyshev mapping time-frequency characteristic; (c) the multi-system Chebyshev sequence after 8bit quantizes; (d) Chebyshev sequence dependent features has provided time domain specification, spectral characteristic and the correlation properties of Chebyshev sequence, and as can be seen from Figure, the Chebyshev sequence is evenly distributed on time-frequency domain, has good correlation properties.
Fig. 5, (a) information sequence among Fig. 6; (b) information sequence after the demodulation; (c) modulation waveform; (d) demodulator input waveform; (e) modulated signal frequency spectrum; (f) demodulator input signal spectrum, the waveform that (a) formula (13) provides among Fig. 7; (b) signal spectrum that provides of formula (13); (c) concealed synchronizing signal; (d) concealed synchronizing signal frequency spectrum; (e) modulated signal frequency spectrum; (f) modulated signal frequency spectrum, (a) demodulator input signal among Fig. 8; (b) demodulator input signal spectrum; (c) by the output signal behind two band resistance devices; (d), provided the 2FSK system modulation demodulation simulation waveform of the employing secret information synchronization scenario under systemview, f by the output signal spectrum behind two band resistance devices C0=1000Hz, f C1=2000Hz.Concealed synchronizing signal frequency spectrum is between 1000~2000Hz.Can find out that from Fig. 7,8 under noise circumstance, concealed synchronizing signal is neither on time domain and the frequency domain to be found easily.Concealed synchronizing signal is 1: 1 with the ratio of noise level among Fig. 7,8.
Fig. 9,10,11,12 have provided concealed synchronizing signal amplitude spectrum change curve on fractional Fourier transform domain under stationary noise white Gaussian noise, nonstationary noise pink noise, volvo automobile noise, factory workshop noise circumstance, concealed synchronizing signal is-10dB a=1.082 with the ratio of noise power.Therefrom can find out concealed synchronizing signal u 0=1400 places have sharp-pointed peak value.White noise distributes more even on score field, and pink noise, workshop noise, volvo automobile noise energy mainly concentrate on low-frequency range, more ironically, the volvo automobile noise also is the concentration of energy characteristic on score field, but mainly concentrates on low-frequency range.

Claims (1)

1. secret signal synchronized method based on fractional Fourier transform domain is characterized in that may further comprise the steps:
(1) fractional Fourier transform domain
The a rank fractional fourier transform algorithm of input voice sequence s (t) is as follows:
S a(u)=F a(s(t))
= 1 - j cot a 2 π ∫ - ∞ + ∞ exp ( j u 2 + t 2 2 cot a - jut sin a ) s ( t ) dt a ≠ nπ s ( t ) a = 2 nπ s ( - t ) a = ( 2 n ± 1 ) π - - - ( 1 )
In the formula, 0<| p|<2, n is an integer, j is an imaginary unit;
(2) based on the overlapping formula of the spectrum on the fractional fourier transform
X ( u ) = λ ( u c ) δ ( u - u c ) = Σ i = 1 N λ i exp [ jπ ( 2 f i u c sec a - f i 2 tan a ) ] δ ( u - u c ) - - - ( 2 )
x ( t ) = exp ( - j 1 2 a ) - j sin a Σ i = 1 N λ i exp [ jπ ( 2 ( f i + u c csc a ) t - t 2 ctga - u c 2 ctga ) ] - - - ( 3 )
The centre frequency of each waveform is u in the formula cCsca+f i, u c, λ i, f i, (i=1 .. N) are constant, and X (u) and x (t) are respectively the frequency domain and the time domain form of output signal;
(3) secret signal of the hiding system of voice messaging is analyzed synchronously
When sending carrier signal, send one group and be lower than channel noise level, satisfy formula f iSina+ τ iCosa=u 0Condition, amplitude are subjected to the signal of pseudo noise code control, and receiving terminal is u on fractional Fourier transform domain cThe place is judged.
CN2010102598365A 2010-08-20 2010-08-20 Secret signal synchronized method based on fractional Fourier transform domain Pending CN101931602A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102598365A CN101931602A (en) 2010-08-20 2010-08-20 Secret signal synchronized method based on fractional Fourier transform domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102598365A CN101931602A (en) 2010-08-20 2010-08-20 Secret signal synchronized method based on fractional Fourier transform domain

Publications (1)

Publication Number Publication Date
CN101931602A true CN101931602A (en) 2010-12-29

Family

ID=43370533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102598365A Pending CN101931602A (en) 2010-08-20 2010-08-20 Secret signal synchronized method based on fractional Fourier transform domain

Country Status (1)

Country Link
CN (1) CN101931602A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281104A (en) * 2013-03-18 2013-09-04 苏州五希通信科技有限公司 Modulation-demodulation method based on transmission of distant protection command by power line carrier
CN106161785A (en) * 2016-06-28 2016-11-23 武汉大学 A kind of smart mobile phone real-time communication method based on hidden acoustical signal
CN110739984A (en) * 2019-11-08 2020-01-31 江苏科技大学 camouflage communication method based on wavelet analysis

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133535B2 (en) * 2002-12-21 2006-11-07 Microsoft Corp. System and method for real time lip synchronization
CN101217333A (en) * 2007-12-30 2008-07-09 哈尔滨工业大学 A transmission method and the corresponding acceptance method of channel resource reusing
CN101237253A (en) * 2008-02-29 2008-08-06 哈尔滨工业大学 Self-adapted interference separation signal receiving/transmission device based on fraction Fourier conversion
CN101252560A (en) * 2007-11-01 2008-08-27 复旦大学 High-performance OFDM frame synchronization algorithm
CN101478391A (en) * 2009-01-13 2009-07-08 华中科技大学 IP voice hidden communication method based on stream encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133535B2 (en) * 2002-12-21 2006-11-07 Microsoft Corp. System and method for real time lip synchronization
CN101252560A (en) * 2007-11-01 2008-08-27 复旦大学 High-performance OFDM frame synchronization algorithm
CN101217333A (en) * 2007-12-30 2008-07-09 哈尔滨工业大学 A transmission method and the corresponding acceptance method of channel resource reusing
CN101237253A (en) * 2008-02-29 2008-08-06 哈尔滨工业大学 Self-adapted interference separation signal receiving/transmission device based on fraction Fourier conversion
CN101478391A (en) * 2009-01-13 2009-07-08 华中科技大学 IP voice hidden communication method based on stream encryption

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281104A (en) * 2013-03-18 2013-09-04 苏州五希通信科技有限公司 Modulation-demodulation method based on transmission of distant protection command by power line carrier
CN106161785A (en) * 2016-06-28 2016-11-23 武汉大学 A kind of smart mobile phone real-time communication method based on hidden acoustical signal
CN106161785B (en) * 2016-06-28 2019-06-11 武汉大学 A kind of smart phone real-time communication method based on hidden voice signal
CN110739984A (en) * 2019-11-08 2020-01-31 江苏科技大学 camouflage communication method based on wavelet analysis
CN110739984B (en) * 2019-11-08 2021-07-02 江苏科技大学 Camouflage communication method based on wavelet analysis

Similar Documents

Publication Publication Date Title
US11870502B2 (en) Data delivery using acoustic transmissions
CN102546061B (en) Self-adaptive time-frequency hole detection method based on wavelet transformation
CN103095638B (en) The blind evaluation method of the sampling frequency deviation of ofdm system under a kind of multidiameter fading channel
CN103391268B (en) Multi-I/O OFDM shallow-sea underwater acoustic communication pattern selection peak-to-average ratio suppressing method
CN103368660A (en) Differential pattern time delay shift coding-based bionic underwater sound communication method
Liu et al. Covert underwater acoustic communication using whale noise masking on DSSS signal
CN105185382B (en) A kind of imitative dolphin whistle underwater acoustic communication method to be stretched based on time-frequency spectrum
CN103401619A (en) Underwater acoustic communication method based on virtual time reversal mirror M element bionic signal coding
CN100521670C (en) Detecting and analyzing method for multi system frequency shift key control signal
Liu et al. Biologically inspired covert underwater acoustic communication using high frequency dolphin clicks
CN101217333B (en) A transmission method and the corresponding acceptance method of channel resource reusing
CN101741414A (en) Chirp signal-based signal transmitting and receiving method for ultra wide band secret communication
CN101931602A (en) Secret signal synchronized method based on fractional Fourier transform domain
CN103441980A (en) Sideband-information-free shallow sea underwater acoustic communication pattern selection peak-to-average ratio restraining algorithm based on frequency reversal mirror technology
Lei et al. Implementation of a high reliable chirp underwater acoustic modem
CN104320243A (en) Analysis processing method of CD-FM-CDSK secret communication system
CN102832964A (en) Multi-band DS-MFSK (Direct Sequence-Multi Frequency Shift Keying) modem
Alyaoui et al. The fourth generation 3GPP LTE identification for cognitive radio
Prema et al. Blind spectrum sensing method for OFDM signal detection in Cognitive Radio communications
Shishkin Identification of radiotelephony transmissions in VHF band of maritime radio communications
Asim et al. Cell search techniques for underwater acoustic cellular systems
CN104363092A (en) Fixed-range device authentication based on audio physical fingerprints
CN101594123B (en) Method for establishing equivalent parallel filter, voice transmission method, device and system
CN202772879U (en) Multiband DS-MFSK modem
Shokri et al. Voice quality in speech watermarking using spread spectrum technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20101229

C20 Patent right or utility model deemed to be abandoned or is abandoned