CN102737639B - Safety communication method for voice information - Google Patents

Safety communication method for voice information Download PDF

Info

Publication number
CN102737639B
CN102737639B CN201210243433.0A CN201210243433A CN102737639B CN 102737639 B CN102737639 B CN 102737639B CN 201210243433 A CN201210243433 A CN 201210243433A CN 102737639 B CN102737639 B CN 102737639B
Authority
CN
China
Prior art keywords
speex
audio file
frame
audio
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210243433.0A
Other languages
Chinese (zh)
Other versions
CN102737639A (en
Inventor
于立涛
祝烈煌
谢驭舟
刘丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201210243433.0A priority Critical patent/CN102737639B/en
Publication of CN102737639A publication Critical patent/CN102737639A/en
Application granted granted Critical
Publication of CN102737639B publication Critical patent/CN102737639B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a safety communication method for voice information. The hiddenness of communication is guaranteed through a discrete cosine transform domain embedding algorithm based on coefficient quantization. A secret voice is encrypted through a selective chaotic encryption algorithm, and only few key bits in audio frequency are encrypted in the encryption process, so that the encryption efficiency is greatly improved, and the confidentiality of the content in the secret voice is guaranteed. The completeness of the content in the secret voice is judged by calculating and comparing a robust message authentication code of the secret voice. While the hiddenness of voice communication is guaranteed, the confidentiality and the completeness of the voice communication content are ensured, and the safe voice communication is realized.

Description

A kind of voice messaging safety communicating method
Technical field
The present invention relates to voice communication field of information security technology, relate in particular to the communication means of the confidentiality and integrity of a kind of disguise that can simultaneously guarantee voice communication itself, voice communication content.
Background technology
At present, voice communication has spread in each corner of ours at one's side.Along with the development of smart mobile phone, mobile communication technology, multimedia technology, people have also emerged numerous Voice Communications such as rice is chatted, TalkBox, micro-letter at one's side, are presented in face of people as a kind of brand-new communication mode.But picture rice is chatted, these Voice Communications of micro-letter, and they do not consider the problem of fail safe, have only guaranteed the availability of software.This privacy that makes to communicate by letter is subject to great threat, has also limited the application in the environment that this communication mode need to hold in close confidence in business, military affairs etc. simultaneously.
In order to solve the safety problem existing in similar this communication, technical staff has proposed Information Hiding Techniques.Information hiding is to utilize the sensation redundancy of mankind's sense organ to digital signal, and a message (be called and be hidden message or secret information) is hidden in another message (being called carrier).Because message is hidden the surface of the just carrier of rear external presentation, therefore do not change essential characteristic and the use value of carrier message itself.For example, (be called secret voice) using the voice that collect as secret information, (be called carrier voice) using audio file irrelevant another one as carrier.This technology Communication hiding well, thus the safety of communicating by letter guaranteed.But communication security not only comprises transmission security, also comprise content-data safety.
At present, still do not have researcher realizing the concealed while of communication, consider the confidentiality and integrity of Content of Communication.This is because traditional message authentication code (MAC) is frangible, and can not accurately reflect the integrated degree of content.
Summary of the invention
The object of the invention is, for the safety problem existing at present, to propose a kind of voice messaging safety communicating method in voice communication.
The basic principle of the method for the invention is as follows:
By utilizing discrete cosine transform (DCT) transform domain based on coefficient quantization to embed algorithm, guarantee the disguise of communication.By using selectivity chaos encryption algorithm to be encrypted secret voice, when encryption, only close key mapping for the minority in audio frequency and be encrypted, not only significantly improve encryption efficiency, and guaranteed the confidentiality of secret voice content.Judge the integrality of secret voice content by calculating the robust message authentication code (rMAC) of more secret voice, because rMAC is based on human auditory system, therefore uses rMAC can allow user obtain one and feel similar integrity measurement with the sense of hearing.
For achieving the above object, the technical solution used in the present invention is as follows:
A kind of voice messaging safety communicating method, comprises voice process of transmitting and phonetic incepting process two parts, and its implementation procedure as shown in Figure 1.
Step 1, transmitting terminal obtain voice to be sent and its audio file are processed.Specific as follows:
Step 1.1: obtain voice
Can obtain existing speech audio file in transmitting terminal system, also can obtain the audio file of recording through user.The audio file getting is called to secret voice.
Step 1.2: described secret voice are encoded.The handling process of coding is as follows:
First,, according to the complexity of coding, from described secret voice, read a certain amount of audio sample.Wherein, the parameter that the complexity of coding provides for Open Source Code example Speex storehouse, its numerical value is larger, and the Speex audio quality of generation is higher, and institute takes up space also larger, therefore need to choose according to actual conditions.For example, adopt the coded system (parameter that Speex storehouse provides) that complexity is 5, therefore obtain audio sample is 160 at every turn.
Then, be Speex audio frame by obtained audio sample coding (as above-mentioned 160 audio sample), specifically can realize by the coded frame function calling in the Speex code database of increasing income.Then, the Speex audio frame of generation is written in new Speex audio file.
Finally, judge whether to read all audio frequency sample in described secret voice.If all read, perform step 1.3; Otherwise continue read (for example reading the again 160) audio sample of next group equal number and repeat aforesaid operations.If in the time reading, audio sample deficiency, fails to read and the audio sample of aforementioned equivalent (for example 160 audio sample of less than), operates according to the actual audio sample reading, and respective handling can be carried out in Speex storehouse.
Step 1.3: the Speex audio file producing through step 1.2 coding is decoded.The handling process of decoding is as follows:
First, from described Speex audio file, read 1 Speex audio frame.
Afterwards, this 1 Speex audio frame is decoded as to Speex audio sample, can realizes by the decoded frame function calling in the Speex code database of increasing income.
Then, the Speex audio sample getting is write in new Speex audio file.
Finally, judge whether to read whole Speex audio frames.If read whole Speex audio frames, performed step 1.4; Otherwise continue to read next Speex audio frame and carry out aforesaid operations.
Step 1.4: to the Speex audio file producing through step 1.3 decoding, calculate rMAC.Concrete handling process is as follows:
First, in Speex audio file, be designated as a FFT frame with every 1024 audio sample, and each FFT frame is carried out respectively to Fourier transform (FFT) operation.
Then, people's ear, in the frequency sensitive scope 300Hz-3300Hz of sound, as a frequency band, is divided into 30 small frequency sections according to every 100Hz altogether, and is calculated the energy value of each frequency band.
Particularly, the method for the energy value of described calculated rate section is as follows:
For FFT conversion, if N point sequence x (n) (n=0,1 ..., N-1) under sample frequency f, obtain.Its DFT result is also N point sequence,
Figure BDA00001883285300031
the corresponding actual frequency values of k point is f '=(k × f)/N.Therefore, if desired calculate the energy value of some frequency bands in FFT frame, first will find institute that frequency values drops on this frequency band a little, then these point values are carried out to square summation and just can obtain the energy value of this frequency band.
Afterwards, read key file.Key is take 4 integers as one group, the data of totally 128 groups (corresponding to the situations of rMAC length 128).
Then, utilize key and frequency band energy value to calculate rMAC value.Circular is shown in following formula:
H ( m ) = 1 , if e ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) > 0 0 , if e ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) ≤ 0 - - - ( 1 )
Wherein k m, 1, k m, 2, t m, 1, t m, 2be the coefficient of choosing at random that can be used as key, be nonnegative integer.Function e (t, k) is energy function, k the energy summation that frequency band has in t DFT frame of expression audio frequency, and the energy value calculating in step 4, t, k are real number.M represents the position of produced rMAC, is nonnegative integer.H (m) represents to produce the m position of rMAC.
Step 1.5: the Speex audio file obtaining after step 1.2 coding is carried out to the mixed degree of selectivity and encrypt.
Handling process is as follows:
In this step, require each step calculating operation under 16 systems, computational accuracy requires to reach after decimal point 40, in the hope of obtaining more outstanding cipher round results.
First, from Speex audio file, read 4 Speex audio frames, and get 7 to 38 of every frame, 32 altogether.4 audio frames obtain 128 altogether for data.
Then, utilize formula x k+1=μ x k(1-x k), 0≤μ≤4, x k∈ (0,1), calculates next chaos data.In formula, x kthe data of k that represent chaos sequence are real number; μ is self-defining coefficient, is real number; x 0for key, k-1 is the number of times of carrying out.If the x obtaining k+1be greater than 0.9 or be less than 0.1, repeat this operation;
Afterwards, by the x calculating k+1get 128 continuous bit data after decimal point, carry out xor operation with 128 bit data that the 1st step obtains.
Subsequently, replace Speex audio frame Central Plains 128 bit data by 128 bit data that get.
Finally, judge that whether Speex audio file audio frame is all disposed, if Speex audio file is finished dealing with, carries out subsequent step; Otherwise continue to read the Speex audio frame of Speex audio file.
Step 1.6: to carrying out Information hiding processing through step 1.5 Speex audio file after treatment.
First, in described Speex audio file, be designated as a FCT frame with every 1024 samples, each FCT frame is carried out respectively to Fourier transform (FCT) operation.
Then,, for front 256 coefficients that produce through FCT, divided by the length of selected quantized interval, carry out quantization operation.If result of calculation is odd number, this coefficient of mark is in A interval, otherwise mark its in B interval.Obviously, A, B are interval alternately occurs.
Afterwards, successively each coefficient in described 256 coefficients is carried out to following operation:
For each coefficient, first check the state of data to be embedded.If data to be embedded be 1 and coefficient in A interval, or data to be embedded be 0 and coefficient in B interval, be this interval mid point by coefficient modifying; Otherwise coefficient is changed into the mid point in the another kind interval that approaches coefficient most.Wherein, in first FCT frame, embedded the length value of rMAC value and embedding data, after each FCT frame be embed data.
Then, all coefficients in FCT frame are carried out to inverse transformation, replace former audio sample.
Finally, judge whether Speex audio file has embedded total data, and if so, Information hiding handling process finishes, execution step 1.7; Otherwise continue to process next FCT frame.
Need statement, step 1.6 is preferably to carry out.If do not perform step 1.6, the still confidentiality and integrity of guarantee information content to a certain extent of the inventive method, but robustness is poor, and reliability is lower.
Step 1.7: the Speex audio file that has embedded secret voice is sent to recipient.Specifically can send or transmit by the Internet, cell phone network, USB flash disk and various exchange files method.
The Speex audio file that step 2, receiving terminal receiving end/sending end transmit is also processed, and extracts secret voice wherein.Flow process is as follows:
Step 2.1: the Speex audio file receiving is carried out to data extraction, specific as follows:
First, in Speex audio file, be designated as a FCT frame with every 1024 samples, each FCT frame is carried out respectively to Fourier transform (FCT) operation.
Then, front 256 coefficients that produce for FCT, carry out the operation identical with Information hiding in step 1.6, check the present interval of each coefficient, have embedded data 1 if coefficient in A interval, is thought in this coefficient, otherwise think and embedded data 0.Wherein, the length for rMAC value and embedding data extracting in first FCT frame it, below be embedded data.
Finally, judge whether to have proposed total data, if extracted total data, perform step 2.2; Otherwise continue to process next FCT frame.
Step 2.2: the Speex audio file obtaining through step 2.1 is decrypted.
In view of aforementioned ciphering process is that the binary stream producing with key carries out xor operation, therefore deciphering only needs to carry out same operation and just can realize, and deciphering is identical with the method for encryption.
Need statement, if do not have the key that this step needs or do not carry out this step, continue execution step 2.3 audio frequency that produce and will can not comprise any content, the rMAC value finally calculating approaches 0.5, causes audio extraction failed.
Step 2.3: the Speex audio file producing through step 2.2 coding is decoded.Its implementation is identical with step 1.3.
Step 2.4: to the Speex audio file producing through step 2.3 decoding, calculate rMAC.It is identical with step 2.4 that it realizes the method.
Step 2.5: calculate the matching degree of rMAC and judge accordingly secret voice content integrality degree.
First, the rMAC value step-by-step that the rMAC value that step 2.5 is extracted and step 2.4 calculate compares, and the position equal probabilities of two 128 bit data is the matching degree of rMAC.
Then, judge secret voice content integrality according to the matching degree of rMAC.In the time that rMAC value is more than or equal to 0.8, thinks that secret voice content possesses integrality, otherwise think that it does not meet integrality requirement.
For the attack that does not destroy secret voice content integrality, legal receiving party calculates rMAC value will be close to 1.For the attack that has destroyed secret voice content integrality, legal receiving party calculates rMAC value close to 0.5.RMAC value has reflected the integrality degree of secret voice content accurately.
Beneficial effect
The inventive method, by utilizing discrete cosine transform (DCT) transform domain based on coefficient quantization to embed algorithm, guarantees the disguise of communication.By using selectivity chaos encryption algorithm to be encrypted secret voice, when encryption, only close key mapping for the minority in audio frequency and be encrypted, not only significantly improve encryption efficiency, and guaranteed the confidentiality of secret voice content.Judge the integrality of secret voice content by calculating the robust message authentication code (rMAC) of more secret voice.In the concealed while that has guaranteed voice communication itself, guarantee the confidentiality and integrity of voice communication content, realize safe voice communication.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for the invention.
Embodiment
Below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.
Embodiment 1
A kind of voice messaging safety communicating method, comprises voice process of transmitting and phonetic incepting process two parts, and its implementation procedure as shown in Figure 1.In described method, if no special instructions, " n position " represents n 2 system positions.
Step 1, transmitting terminal obtain voice to be sent and its audio file are processed, and generate the speech audio file to be sent that has embedded secret voice.Specific as follows:
Step 1.1: gather voice
This step can be to obtain the existing speech audio file of system, can be also the speech audio of recording user, obtains the audio file of recording.The audio file obtaining is called secret voice s.For example we have gathered the WAV format audio file info.wav of 341KB.
Step 1.2: secret voice info.wav is encoded, for secret voice are compressed, save communication overhead below.The handling process of coding is as follows:
(1) step: for secret voice info.wav, read 160 audio sample from file.
(2) step: these 160 audio sample are encoded to Speex audio frame, directly call the coded frame function in the Speex code database of increasing income.Then the audio frame obtaining is written in new Speex audio file info.spx.
(3) step: if read all audio frequency sample, complete this step; Otherwise returning to (1) step continues to carry out.In the present embodiment, the info.spx audio file size producing is 40.5KB.
Step 1.3: the Speex audio file info.spx that step 1.2 coding is produced decodes again, for subsequent calculations rMAC.The handling process of decoding is as follows:
(1) step: read 1 Speex audio frame from Speex audio file info.spx, the Speex audio frame size that we read is 38 bytes.
(2) step: this 1 audio frame is decoded as to audio sample, and the decoded frame function directly calling in the Speex code database of increasing income is realized decode operation.The audio sample obtaining is written in new WAV audio file info_rMAC.wav.
(3) step: if read all audio frequency frame, perform step 1.4; Otherwise returning to (1) step continues to carry out.In the present embodiment, the info_rMAC.wav audio file size producing is for 341KB, identical with original WAV audio file info.wav, but content is slightly different.
Step 4: the audio file info_rMAC.wav that decoding produces to step 1.3, calculates rMAC.Handling process is as follows:
(1) step: in audio file info_rMAC.wav, every 1024 samples are designated as a FFT frame, is read in internal memory, and is called Fourier transform (FFT) function, and it is carried out to FFT operation.
(2) step: the scope 300Hz-3300Hz of the frequency sensitive of people's ear to sound, be divided into several frequency bands, then calculate the energy value of each frequency band.Here be a frequency band by every this scope 100Hz, is divided into 30 little frequency bands.
For FFT conversion, if N point sequence x (n) (n=0,1 ..., N-1) under sample frequency f, obtain.Its DFT result is also N point sequence,
Figure BDA00001883285300071
the corresponding actual frequency values of k point is f '=(k × f)/N.
Therefore if desired calculate the energy value of some frequency bands in FFT frame, first need to find frequency values to drop on several points of this frequency band, then these point values are carried out to square summation and just can obtain the energy value of this frequency band.
(3) step: read key file key.txt, key is that 4 integers are one group, altogether n group (corresponding to the situation of rMAC length n, n is value arbitrarily, be worth larger, more accurate to the integrality description of Content of Communication) data.In the present embodiment, n gets in 128, key.txt and comprises 512 integers, can produce 128 rMAC.
(4) step: the frequency band energy value that utilizes key and (2) step to obtain, calculates rMAC value.
Circular is shown in following formula:
H K pu ( m ) = 1 , if e ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) > 0 0 , if e ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) ≤ 0
Wherein k m, 1, k m, 2, t m, 1, t m, 2it is the coefficient of choosing at random that can be used as key.Function e (t, k) is energy function, k the energy summation that frequency band has in t DFT frame of expression audio frequency, and the energy value that (2) step is calculated,
Figure BDA00001883285300081
it is the m position that produces identification code.Result of calculation is: 39 83 6,8F3 57 34 F7 90 90 8D C1 70 6A FA E0 F7 56 87 B3 42 B5 C1 54 6F FC 4 C4 11 835F 3D 77
Step 1.5: the mixed degree of selectivity that the Speex audio file info.spx after step 1.2 coding is carried out is encrypted, and handling process is as follows.This process has higher computational accuracy requirement.Owing to adopting every 128 2 systems one to encrypt, therefore require in the situation that 2 systems calculate, computational accuracy can both reach after decimal point more than 128, could obtain so more outstanding cipher round results, the precision of the present embodiment use for decimal point after 160.
(1) step: read 4 Speex audio frames in info.spx, and get 7 to 38 of every frame, 32 altogether.4 audio frames obtain 128 bit data altogether.
(2) step: utilize formula x k+1=μ x k(1-x k), 0≤μ≤4, x k∈ (0,1), calculates next chaos data, wherein x 0for key, k-1 is the number of times of carrying out.If the x obtaining k+1be greater than 0.9 or be less than 0.1, repeat this operation
(3) step: by the x calculating k+1get 128 bit data after decimal point, carry out xor operation with 128 bit data that (1) step obtains.
(4) step: 128 bit data of obtaining are replaced to Speex audio frame Central Plains 128 bit data.
(5) step: if Speex audio file info.spx finishes dealing with, perform step 1.6; Otherwise return to (1) step and continue operation.This step can not change the size of Speex audio file.
Step 1.6: to carrying out Information hiding processing through step 1.5 Speex audio file after treatment.
(1) step: in the carrier audio file of the present embodiment, use be the WAV audio file base.wav that a size is 3.66MB.Its every 1024 samples are designated as to a FCT frame, read a FCT frame, then it is carried out to Fourier transform (FCT) operation.
(2) step: front 256 coefficients that produce for FCT, divided by some specific interval long, carry out quantization operation.If result is odd number, remember that this coefficient is in A interval, otherwise note is in B interval.Obviously, A, B interval are alternately to occur.
(3) step: check data to be embedded, if data to be embedded be 1 and coefficient in A interval, or data to be embedded be 0 and coefficient in B interval, be this interval mid point by coefficient modifying.Otherwise coefficient is changed into the mid point in the another kind interval that approaches former coefficient most.Wherein in first FCT frame, embedded the length of rMAC value and embedding data, i.e. the big or small 40.5KB of info.spx file, after each FCT frame be embed data.
(4) step: FCT coefficient is carried out to inverse transformation, replace former audio sample.
(5) step: if embedded total data, data are write back to complete step of carrier audio file base.wav; Otherwise return to (1) step and continue to process next FCT frame.Base.wav file size is constant after treatment.
Need statement, step 1.6 is preferably to carry out.If do not perform step 1.6, the still confidentiality and integrity of guarantee information content to a certain extent of the inventive method, but robustness is poor, and reliability is lower.
Step 1.7: the Speex audio file that has embedded secret voice s is sent to recipient.Specifically can send or transmit by the Internet, cell phone network, USB flash disk and various exchange files method.
The Speex audio file that step 2, receiving terminal receiving end/sending end transmit is also processed, and extracts secret voice wherein.Flow process is as follows:
Step 2.1: the Speex audio file base.wav receiving is carried out to data extraction, specific as follows:
That in the present embodiment, use is the WAV audio file base.wav that a size is 3.66MB.
First, in described Speex audio file, be designated as a FCT frame with every 1024 samples, each FCT frame is carried out respectively to Fourier transform (FCT) operation.
Then, front 256 coefficients that produce for FCT, carry out the operation identical with Information hiding in step 1.6, check the present interval of each coefficient, have embedded data 1 if coefficient in A interval, is thought in this coefficient, otherwise think and embedded data 0.Wherein, the length for rMAC value and embedding data extracting in first FCT frame it, below be embedded data.
To deposit to secret.spx file from the second frame and the data that extract later.
Finally, judge whether to have proposed total data, if extracted total data, perform step 2.2; Otherwise continue to process next FCT frame.
In the present embodiment, the secret.spx file size that step 2.1 obtains is 40.5KB, and the rMAC result extracting is: 39 83 68 F3 57 34 F7 90 90 8D C1 70 6A FA E0 F7 56 87 B3 42 B5 C1 546F FC 4 C4 11 83 5F 3D 77.
Step 2.2: the Speex audio file obtaining through step 2.1 is decrypted.
In view of aforementioned ciphering process is that the binary stream producing with key carries out xor operation, therefore deciphering only needs to carry out same operation and just can realize, and deciphering is identical with the method for encryption.
Need statement, if do not have the key that this step needs or do not carry out this step, continue execution step 2.3 audio frequency that produce and will can not comprise any content, the rMAC value finally calculating approaches 0.5, causes audio extraction failed.
Step 2.3: the Speex audio file producing through step 2.2 coding is decoded.Its implementation is identical with step 1.3.In the present embodiment, this step produces WAV audio file file secret.wav, and size is 341KB.
Step 2.4: to the Speex audio file producing through step 2.3 decoding, calculate rMAC.It is identical with step 2.4 that it realizes the method.Individual in the present embodiment, the rMAC result calculating is 39 83 68 F3 57 3,4F7 90 90 8D C1 70 6A FA E0 F7 56 87 B3 42 B5 C1 54 6F FC 4 C4 11 83 5F 3D 77.
Step 2.5: calculate the matching degree of rMAC and judge accordingly secret voice content integrality degree.
First, the rMAC value step-by-step that the rMAC value that step 2.5 is extracted and step 2.4 calculate compares, and the position equal probabilities of two 128 bit data is the matching degree of rMAC.
Then, judge secret voice content integrality according to the matching degree of rMAC.In the time that rMAC value is more than or equal to 0.8, thinks that secret voice content possesses integrality, otherwise think that it does not meet integrality requirement.
In the present embodiment, owing to not destroyed in communication process, therefore can find out that rMAC is just the same, matching degree is 1.
The above is only the preferred embodiment of the present invention; should be understood that; for those skilled in the art; under the premise without departing from the principles of the invention; can also make some improvement; or part technical characterictic is wherein equal to replacement, these improvement and replace and also should be considered as protection scope of the present invention.

Claims (2)

1. a voice messaging safety communicating method, comprises voice process of transmitting and phonetic incepting process two parts, it is characterized in that:
Step 1, transmitting terminal obtain voice to be sent and its audio file are processed, specific as follows:
Step 1.1: obtain voice, the audio file getting is called to secret voice;
Step 1.2: described secret voice are encoded, and flow process is as follows:
First, according to the complexity of coding, from described secret voice, read a certain amount of audio sample, wherein, the parameter that coding complexity provides for the Speex code database of increasing income;
Then, obtained audio sample is encoded to Speex audio frame, the Speex audio frame of generation is written in new Speex audio file;
Finally, judge whether to read all audio frequency sample in described secret voice, if all read, perform step 1.3; Otherwise continue to read the audio sample of next group equal number and repeat aforesaid operations; If in the time reading, audio sample deficiency, fails to read and the audio sample of aforementioned equivalent, operates according to the actual audio sample reading;
Step 1.3: the Speex audio file producing through step 1.2 coding is decoded, and flow process is as follows:
First, from described Speex audio file, read 1 Speex audio frame;
Afterwards, this 1 Speex audio frame is decoded as to Speex audio sample;
Then, the Speex audio sample getting is write in new Speex audio file;
Finally, judge whether to read whole Speex audio frames, if read whole Speex audio frames, perform step 1.4; Otherwise continue to read next Speex audio frame and carry out aforesaid operations;
Step 1.4: to the Speex audio file producing through step 1.3 decoding, calculate rMAC, flow process is as follows:
First,, in Speex audio file, be designated as a FFT frame with every 1024 audio sample, and each FFT frame is carried out respectively to Fourier transform operation;
Then, people's ear, in the frequency sensitive scope 300Hz-3300Hz of sound, as a frequency band, is divided into 30 small frequency sections according to every 100Hz altogether, and is calculated the energy value of each frequency band;
Afterwards, read key file, key is take 4 integers as one group, the data of totally 128 groups;
Then, utilize key and frequency band energy value to calculate rMAC value, specific as follows:
H ( m ) = 1 , ife ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) > 0 0 , ife ( t m , 1 , k m , 1 ) - e ( t m , 2 , k m , 2 ) ≤ 0 - - - ( 1 )
Wherein k m, 1, k m, 2, t m, 1, t m, 2be the coefficient of choosing at random as key, be nonnegative integer; Function e (t, k) is energy function, k the energy summation that frequency band has in t FFT frame of expression audio frequency, and the energy value calculating in step 1.4, t, k are real number; M represents the position of produced rMAC, is nonnegative integer, and H (m) represents to produce the m position of rMAC;
Step 1.5: the Speex audio file obtaining after step 1.2 coding is carried out to the mixed degree of selectivity and encrypt, flow process is as follows:
In this step, require each step calculating operation under 16 systems, computational accuracy requires to reach after decimal point 40;
First, read 4 Speex audio frames from Speex audio file, and get 7 to 38 of every frame, 32 altogether, 4 audio frames obtain 128 bit data altogether;
Then, utilize formula x k+1=μ x k(1-x k), 0≤μ≤4, x k∈ (0,1), calculates next chaos data; In formula, x kthe data of k that represent chaos sequence are real number; μ is self-defining coefficient, is real number; x 0for key, k-1 is the number of times of carrying out; If the x obtaining k+1be greater than 0.9 or be less than 0.1, repeat this operation;
Afterwards, by the x calculating k+1get 128 continuous bit data after decimal point, carry out xor operation with aforementioned 128 bit data that obtain;
Subsequently, replace Speex audio frame Central Plains 128 bit data by 128 bit data that get;
Finally, judge that whether Speex audio file audio frame is all disposed, if Speex audio file is finished dealing with, carries out subsequent step; Otherwise continue to read the Speex audio frame of Speex audio file;
Step 1.6: to carrying out Information hiding processing through step 1.5 Speex audio file after treatment, flow process is as follows:
First, in described Speex audio file, be designated as a FCT frame with every 1024 samples, each FCT frame is carried out respectively to Fourier transform operation;
Then,, for front 256 coefficients that produce through Fourier transform, divided by the length of selected quantized interval, carry out quantization operation; If result of calculation is odd number, this coefficient of mark is in A interval, otherwise mark its in B interval;
Afterwards, successively each coefficient in described 256 coefficients is carried out to following operation:
For each coefficient, first check the state of data to be embedded, if data to be embedded be 1 and coefficient in A interval, or data to be embedded be 0 and coefficient in B interval, be this interval mid point by coefficient modifying; Otherwise coefficient is changed into the mid point in the another kind interval that approaches coefficient most; Wherein, in first FCT frame, embedded the length value of rMAC value and embedding data, after each FCT frame be embed data;
Then, all coefficients in FCT frame are carried out to inverse transformation, replace former audio sample;
Finally, judge whether Speex audio file has embedded total data, and if so, Information hiding handling process finishes, and carries out next step; Otherwise continue to process next FCT frame;
Step 1.7: the Speex audio file that has embedded secret voice is sent to recipient;
The Speex audio file that step 2, receiving terminal receiving end/sending end transmit is also processed, and extracts secret voice wherein, and flow process is as follows:
Step 2.1: the Speex audio file receiving is carried out to data extraction, specific as follows:
First, in Speex audio file, be designated as a FCT frame with every 1024 samples, each FCT frame is carried out respectively to Fourier transform operation;
Then, front 256 coefficients that produce for Fourier transform, carry out the operation identical with Information hiding in step 1.6, check the present interval of each coefficient, embed data 1 if coefficient in A interval, is thought in this coefficient, otherwise thought and embedded data 0; Wherein, the length value for rMAC value and embedding data extracting in first FCT frame, below be embedded data;
Finally, judge whether to have proposed total data, if extracted total data, perform step 2.2; Otherwise continue to process next FCT frame;
Step 2.2: the Speex audio file obtaining through step 2.1 is decrypted;
Step 2.3: the Speex audio file after step 2.2 deciphering is decoded;
Step 2.4: to the Speex audio file producing through step 2.3 decoding, calculate rMAC;
Step 2.5: calculate the matching degree of rMAC and judge accordingly secret voice content integrality degree, process is as follows:
First, the rMAC value step-by-step that the rMAC value that step 2.1 is extracted and step 2.4 calculate compares, and the position equal probabilities of two 128 bit data is the matching degree of rMAC;
Then, judge secret voice content integrality according to the matching degree of rMAC, in the time that rMAC matching degree is more than or equal to 0.8, think that secret voice content possesses integrality, otherwise think that it does not meet integrality requirement.
2. a kind of voice messaging safety communicating method as claimed in claim 1, is characterized in that, the method for the energy value of described step 1.4 calculating frequency section is, first finds institute that frequency values drops on this frequency band a little, then these point values is carried out to a square summation.
CN201210243433.0A 2012-07-13 2012-07-13 Safety communication method for voice information Expired - Fee Related CN102737639B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210243433.0A CN102737639B (en) 2012-07-13 2012-07-13 Safety communication method for voice information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210243433.0A CN102737639B (en) 2012-07-13 2012-07-13 Safety communication method for voice information

Publications (2)

Publication Number Publication Date
CN102737639A CN102737639A (en) 2012-10-17
CN102737639B true CN102737639B (en) 2014-05-28

Family

ID=46993012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210243433.0A Expired - Fee Related CN102737639B (en) 2012-07-13 2012-07-13 Safety communication method for voice information

Country Status (1)

Country Link
CN (1) CN102737639B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106901B (en) * 2013-01-22 2015-05-20 宁波大学 Audio digital steganography and extraction method in compressed domain based on index values
CN104485109B (en) * 2013-01-22 2017-09-29 宁波大学 A kind of compressed domain audio digital extraction method based on index value
CN104123945B (en) * 2014-06-12 2017-01-18 华中科技大学 Embedding method and extracting method for wav-format audio information
CN106254345B (en) * 2016-08-04 2019-06-04 安徽大学 A kind of mobile terminal sound communication integrity authentication device and its method
CN116778936A (en) * 2023-08-17 2023-09-19 建朗电子(深圳)有限公司 Audio compression and recovery method based on chaotic mapping and human ear model

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7305084B2 (en) * 2002-07-24 2007-12-04 Qualcomm Incorporated Fast encryption and authentication for data processing systems
CN101287274B (en) * 2007-04-11 2012-07-04 深圳市维信联合科技有限公司 Voice encryption system for mobile communication and encryption method thereof
US8379854B2 (en) * 2007-10-09 2013-02-19 Alcatel Lucent Secure wireless communication
EP2267700B1 (en) * 2009-06-22 2011-12-21 APT Licensing Limited Apparatus and method for selecting quantisation bands in audio encoders

Also Published As

Publication number Publication date
CN102737639A (en) 2012-10-17

Similar Documents

Publication Publication Date Title
CN102737639B (en) Safety communication method for voice information
AU2008327506B2 (en) Method and system for encryption of data
CN101998390B (en) Method and device for ensuring communication security
CN107241188B (en) Quantum storage data encoding and decoding method, device and system
CN104052658A (en) Privacy protection system and method based on social network
Bhole et al. Steganography over video file using Random Byte Hiding and LSB technique
Manohar et al. Data encryption & decryption using steganography
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN105303075A (en) PDF format based adaptive text watermarking method
CN104036531A (en) Information hiding method based on vector quantization and bintree
Mahmoud et al. Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach
Tan et al. A simple review of audio steganography
Khedr A new efficient and configurable image encryption structure for secure transmission
WO2017161616A1 (en) Physical layer steganography method and system
CN115242369A (en) Multi-key homomorphic encryption-based federal learning privacy protection method and device
US10949392B2 (en) Steganography obsfucation
Mandal et al. An approach for enhancing message security in audio steganography
Khan et al. An optimized method for concealing data using audio steganography
Sobin et al. A secure audio steganography scheme using genetic algorithm
Moulin et al. A framework for the design of good watermark identification codes
Suresh et al. Separable reversible data hiding using Rc4 algorithm
CN102404730A (en) Bluetooth-protocol-based encryption device and encryption method for mobile phone communication
Waziri et al. Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach
Sarmah et al. A new horizon in data security by Cryptography & Steganography
Sangwan Combining Huffman text compression with new double encryption algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140528

Termination date: 20150713

EXPY Termination of patent right or utility model