CN103023630A - Method for hiding information of speech stream on basis of speech coding by pulse code modulation - Google Patents

Method for hiding information of speech stream on basis of speech coding by pulse code modulation Download PDF

Info

Publication number
CN103023630A
CN103023630A CN2013100100043A CN201310010004A CN103023630A CN 103023630 A CN103023630 A CN 103023630A CN 2013100100043 A CN2013100100043 A CN 2013100100043A CN 201310010004 A CN201310010004 A CN 201310010004A CN 103023630 A CN103023630 A CN 103023630A
Authority
CN
China
Prior art keywords
information
frame
numbered
receiving terminal
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100100043A
Other languages
Chinese (zh)
Other versions
CN103023630B (en
Inventor
徐利洋
魏子令
徐尔茨
刘博�
赵宝康
苏金树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201310010004.3A priority Critical patent/CN103023630B/en
Publication of CN103023630A publication Critical patent/CN103023630A/en
Application granted granted Critical
Publication of CN103023630B publication Critical patent/CN103023630B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for hiding information of a speech stream on the basis of speech coding by pulse code modulation, and aims to provide a method for hiding information of a speech stream on the basis of a G.711mu-law. By the method, the hidden information transmission safety is improved, and the channel utilization rate is increased. The technical scheme includes that the method comprises steps of constructing a communication system comprising double speed communication parties; constructing four information transmission channels by available insertion positions of modes with the serial numbers from 0 to 3 in the G.711mu-law; designing an information package format; enabling a transmitting end and a receiving end to transmit and receive the information in parallel; preprocessing the information when the transmitting end is about to transmit the information, inserting the hidden information in the speech stream L, dynamically compensating for the tone quality of the speech stream and upwardly or downwardly adjusting the channels according to smoothness conditions of the channels; and enabling the receiving end to synthesize and restore the received information. The method has the advantages that a dynamic channel adjusting mechanism is constructed, the information transmission safety can be improved, bandwidth resources of the channels are sufficiently utilized, and the quality of speech can be improved.

Description

A kind of information concealing method of the voice flow based on the pulse code modulation speech coding
Technical field
The present invention is mainly concerned with based on μ-law(μ pulse code modulation speech coding processed G.711, is a kind of voice compression coding that International Telecommunications Union works out) the information communication field, refer in particular to a kind of based on the information concealing method of μ-law voice flow G.711.
Background technology
At present, the safeguard protection of transmitting for internet information mainly is that content is encrypted, and the key cryptosystem of employing has DES(Data Encryption System, data encryption standard) etc.Although key cryptosystem can be protected content; but owing to lacking appropriate protection to delivering path so that even if potential assailant can't decode transferring content, also can be by delivering path be destroyed, as sneak into error message; interception channels etc. are so that information can't successfully be transmitted.
Therefore, how research protects the internet transmission approach to have very strong realistic meaning under the current internet condition.At present, mainly be to adopt based on the hidden Information Hiding Techniques of writing of file for the protection way of delivering path, its principle is to be divided into less unit by the secret information that will transmit, with these than subsection dispersion insertion vector file.In general; the carrier file is selected audio frequency, picture; utilize people's the sense of hearing, the insensitivity for faint variation of vision; so that the carrier file after the insertion information sound or seem with insertion information before audio file or picture almost as broad as long; potential assailant also just can't find the approach of secret information transmission, comes content and the approach of protection information transmission by the method for Information hiding.
Yet based on the hidden protecting information safety of writing of static file when the approach for the information transmission provides protection; exist a series of shortcoming; hidden write information capacity is subject to file size limitation; there is source file and hiddenly writes rear file and compare the hidden danger that causes information leakage; static state causes the communication real-time poor; communicating pair can't in time feed back, and communication mode is difficult to variation and has also reduced flexibility.
At present the Internet develops rapidly, and the application of Streaming Media constantly enlarges, because that Streaming Media has real-time is good, without advantages such as source files, the research emphasis of Information hiding has turned to Streaming Media in the world at present.The networking telephone based on μ G.711-law coding is one of typical Streaming Media, and simultaneously, iphone user's quantity is many, and is easy to connect, and good concealment is desirable information steganography carrier.
When using the stream media information concealing technology, need to determine in carrier file, the carrier file potential insertion position, wait to hide Info and information dividing method etc.As shown in Figure 1, potential information insertion position is defined as HS, and the carrier document definition is C, waits to hide secret information and is defined as S.In the Information hiding process, S is divided into a plurality of less block of information S ', and these S ' is replaced respectively the corresponding contents of HS in the carrier file, generate and carry ciphertext part C'.When the information of transmission, only need to send and carry the secret transmissions that ciphertext part C' can realize information.If the assailant has intercepted and captured a year ciphertext part C' at network, only this document can be regarded as common file.
Table 1G.711 μ-law speech coding
The pattern numbering Uniform enconding value (L) Encoded radio (C) after the compression The position power of z position in L
0 s00000001wxyza… s000wxyz 2 3
1 s0000001wxyzab... s001wxyz 2 4
2 s000001wxyzabc... s010wxyz 2 5
3 s00001wxyzabcd... s011wxyz 2 6
4 s0001wxyzabcde... s100wxyz 2 7
5 s001wxyzabcdef... s101wxyz 2 8
6 s01wxyzabcdefg... s110wxyz 2 9
7 s1wxyzabcdefgh... s111wxyz 2 10
The coded system of G711 μ-law is as shown in table 1 (draws from http://zh.wikipedia.org/zh/G.711, obtain by simplifying in " ITU-T Recommendation G.711 "), can see the 8 kinds of different patterns that have, here be numbered respectively 0 ~ 7, take any pattern to compress by its encoded radio for a certain specific uniform enconding value L and determine.The uniform enconding value that belongs to different mode, position power (this is 1 o'clock size that the represents) difference among its z position (lowest order of the encoded radio after the compression) uniform enconding value L before compression, the z position power of the coding that the pattern numbering is little is less.So, if change a certain position of wxyz in the rear encoded radio of compression, the encoded radio that adopts less numbering scheme to compress will be subject to less change, thereby be subject to less impact in voice quality, otherwise the encoded radio that adopts larger numbering scheme to compress can produce larger variation greatly because of this position power, and then more earth effect arrives voice quality.
Present is that secret information is replaced four potential or several of inserting in the position (being w, x, y, z position) regularly based on the information concealing method major part of the voice flow of μ-law coding G.711.The communication engineering Master's thesis of the Wang Zhong of National Chi Nan University ease has been described secret information has been replaced the method that the lowest order z that compresses rear encoded radio carries out Information hiding in " improving the Study of security mechanisms that G.711 Internet phone-calling encodes with the instant messages concealing technology ".It is encrypted that transmit leg at first will S be hidden Info, then be divided into fritter information S ', afterwards S ' and its check value, packet sign are packaged into packets of information S "; S " replace by turn the lowest order z of voice flow encoded radio, the recipient carries out inverse process and obtains secret information, has realized like this secret transmissions of information.Being with of this method communication is roomy, but because the change of lowest order can not cause large impact to voice, the potential attacker can carry out random disturbances to the lowest order of voice flow on the network, disturbs the transmission of secret information when not affecting the normal voice business.ErchiXu, Bo Liu etc. are published in and have proposed a kind of method in the paper in the NBIS meeting " the self adaptation steganography based on VoIP that the network audio stream information is hidden " with relatively high-order at encoded radio of Information hiding, such as wxy rather than z, by studying G.711 μ-law coding, drawn and guaranteed that voice quality is in the scope of International Telecommunications Union (ITU-T) regulation, available information insertion position under the different mode, as shown in the table:
Utilized insertion position corresponding to form 2 different modes numbering
Pattern numbering k 0 1 2 3
Can utilize the insertion position w、x、y、z x、y、z y、z z
The encoded radio that belongs to different mode, available insertion position is different, and the pattern numbering does not have available insertion position greater than 3 encoded radio, and this method is inserted into information relatively that a high position has guaranteed voice quality simultaneously.Although Information hiding has improved fail safe in high bit, but be manual configuration for when which using can utilize the insertion position in the paper " network audio stream information hide the self adaptation steganography based on VoIP ", fixing pattern can not be regulated according to the variation of network environment the insertion position of information, has reduced channel utilization.
Summary of the invention
The technical problem to be solved in the present invention is: for the problem that prior art exists, propose to improve fail safe, the channel utilization of secret information transmission based on the information concealing method of μ-law voice flow G.711.
For solving the problems of the technologies described above, the present invention by the following technical solutions:
The first step makes up communication system.Communication system is made of the both sides that carry out voice call, the both sides of communication are hidden in secret information and finish communication in the voice flow, the both sides of communication form by transmitting terminal and receiving terminal two fatware modules, the information that transmitting terminal will send is inserted in the voice flow that sends to the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, from voice flow, extract secret information, as shown in Figure 2.
Table 3 passage set and insertion position relation
Channel number 0 1 2 3
Set of modes M 0,1,2,3 0,1,2 0,1 0
Insertion position P z y x w
Second step makes up 4 information transfer channels.Utilize the utilized insertion position that is numbered 0 ~ 3 pattern among μ-law G.711 to make up a plurality of information transfer channels, the utilized insertion position that is numbered 0 pattern is wxyz, the utilized insertion position that is numbered 1 pattern is xyz, the utilized insertion position that is numbered 2 pattern is yz, and the utilized insertion position that is numbered 3 pattern is z.Make up the subclass that set of modes M(set of modes that information transfer channel need to be identified for communication refers to pattern numbering 0 ~ 3 among μ-law G.711, information will be inserted in the voice coder code value that pattern belongs to M) and insertion position P, concrete grammar such as table 1, pattern 0 ~ 3(namely is numbered 0 ~ 3 pattern) the z position of encoded radio consists of No. 0 information transfer channel, pattern 0 ~ 2(namely is numbered 0 ~ 2 pattern) the y position of encoded radio consists of No. 1 information transfer channel, pattern 0 ~ 1(namely is numbered 0 ~ 1 pattern) the x position of encoded radio consists of No. 2 information transfer channels, pattern 0(namely is numbered 0 pattern) the w position of encoded radio consists of No. 3 information transfer channels.Because only use the high bit (namely only having the w position) of 0 the pattern of being numbered as the information insertion position, No. 3 information transfer channels are with respect to No. 0 information transfer channel, communication bandwidth is little, but has higher fail safe.
The 3rd step, the design information encapsulation format.The design of Information encapsulation form is for after transmit leg is sent information, and the recipient can correctly extract and reduce secret information.The Information encapsulation form is comprised of secret information, frame head sign, frame length, numbering, check code, and is specifically as shown in table 4:
Table 4 data frame format
The frame head sign Frame length Numbering Secret information …… Check code
The frame format that the frame head attribute field is communicated by letter by both party determines, indicates the beginning of a new frame; Frame length field represents the bit number of whole information frame; Number field is the sign of Frame, for the data recombination of recipient after will cutting apart provides order, the foundation of distinguishing the different types of data frame is provided simultaneously, concrete, be numbered the correct data validation frame that receives of 0 representative information, be numbered-1 and represent the passage detection frame of passage when idle; The secret information field is the secret information that will transmit; The check code field is the result that frame length, numbering and three parts of secret information are calculated according to certain method of calibration (such as CRC cyclic redundancy check (CRC), parity check, ECC verification, MD5 verification etc.).
The 4th step, the parallel sending and receiving that carries out information of transmitting terminal and receiving terminal, described parallel transmitting terminal and the receiving terminal of referring to done simultaneously, and namely there are not precedence relationship in 4.1 steps and 4.2 steps.
4.1 transmitting terminal carries out the transmission of information according to the following steps:
4.1.1 secret information S is carried out preliminary treatment, the packets of information S ' after obtaining encapsulating 1, S ' 2S ' kS ' nThe n block message S of (1≤k≤n), method is: at first S is encrypted, then the S after encrypting being divided into length is that P(unit is bit) 1, S 2S kS n, again according to the Information encapsulation form in the 3rd step, with fritter information S k(being secret information) and its frame head sign, frame length, numbering, check code are packaged into packets of information S ' k
4.1.2 variable is carried out initialization: with information transfer channel sequence number C NOW(0≤C NOW≤ 3) be initialized as 3, the expression passage is from the highest; (1≤k≤n) be initialized as 1 begins to send from first packet with variable k.
4.1.3 with packets of information S ' kBe inserted among the voice flow L.Taking-up will send to recipient's voice flow L from VoIP conversation software (such as Linphone), according to the channel number of determining in the second step and the relation that can utilize the insertion position, finds the information transfer channel C of current use NOWThe utilized insertion position of correspondence in L is then with S ' kReplace these by bit and can utilize the insertion position, the inserted position that is replaced is called information and inserts the position, obtains L ' after this step, as shown in Figure 3.
4.1.4 being carried out tonequality, L ' dynamically remedies, the voice flow L after dynamically being remedied ".Method is the phase ortho position that changed information is inserted the position,, is specially because secret information inserts the loss that voice quality is brought to remedy:
4.1.4.1 determine to remedy the position.By G.711 coding rule as can be known, four in voice coder code value outside w, x, y, the z represent respectively symbol and position power, their change will cause very large variation to encoded radio, therefore so be not suitable for audio compensation, remedy adjacent w, the x that will insert from information the position, y, the z and select.No. 0 information transfer channel remedies the position and is y, and No. 1 information transfer channel remedies the position and is x and z, and No. 2 information transfer channels remedy the position and are w and y, and No. 3 information transfer channels remedy the position and are x.
Dynamically remedy 4.1.4.2 carry out.Remedying a possible values has two, is respectively 0 or 1, and remedying like this position has the compound mode of multiple change, such as following table:
Form 5 different channel number are corresponding remedies bit combination
Figure BDA00002726262800051
Each combination that remedies the position for the information transfer channel of current use, the position that remedies with the voice coder code value after the insertion information changes this combination into respectively, then with insertion information before the voice coder code value make comparisons, select and differ (absolute value of the difference of the encoded radio before and after having carried out remedying) minimum combination, the position that remedies with the voice coder code value after the insertion information changes this combination at last.For example, for raw tone encoded radio 00101001, and the hypothesis current system is utilizing the 1st transmission channel to carry out communication, there is simultaneously secret information bit 1 to need to send, secret information bit 1 will be replaced the y position of voice coder code value so, obtain the encoded radio 00101011 after the insertion information, adopt the method that remedies of passage 1, the x and the z position that change respectively encoded radio can obtain 4 combinations, be respectively 00101010,00101011,00101110,00101111, wherein the difference that remedies result and raw tone encoded radio 00101001 of first combination is minimum, so adopt the first to remedy scheme, changes the encoded radio behind the insertion secret information into 00101010.Adopt this method that L ' is carried out tonequality and dynamically remedy, the voice flow L after dynamically being remedied ".Information is not inserted the position in the said process and change, when having guaranteed the correct transmission of information, reduced the change of information insertion to voice so tonequality dynamically remedies.
4.1.5 the transmitting terminal of transmit leg with L " voice flow is submitted to the VoIP(networking telephone, Voice over IP) software (such as Linphone), send to recipient's receiving terminal by network.
4.1.6 wait for and replying.Whether the receiving terminal detection of transmit leg receives the affirmation packet that recipient's transmitting terminal sends over.If at T R(determine according to concrete network delay, 3 times of the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to the recipient are arranged in suggestion) do not receive the affirmation packet in the time, illustrates that then this information sends unsuccessfully, turns 4.1.7; If the receiving terminal of transmit leg detects and successfully receives the affirmation packet, illustrate that then this information sends successfully, k=k+1 turns 4.1.8.
4.1.7 adjust upward passage.If the receiving terminal N continuous of transmit leg Danger(N DaNgerBe positive integer and N Danger〉=2) the inferior packet that do not receive the confirmation illustrates that current network condition is bad, need to switch to the larger passage of numbering to guarantee fail safe, if C NOW<3, C so NOW=C NOW+ 1, turn 4.1.10.
4.1.8 adjust passage downwards.If transmit leg N continuous Safe(N SafeBe positive integer and N Safe〉=10) inferiorly successfully send information and overtime repeating transmission does not occur, illustrate that so current network condition is good, can switch to the less passage of numbering to take full advantage of bandwidth resources, if C NOW0, C NOW=C NOW-1.
4.1.9 single send to finish, whether transmit leg detects has the data validation bag to need to send, if having then put S k' for confirming packet, turn 4.1.3; If k=0 illustrates new transmission task, turn 4.1.1, restart initialization and transmission task; If 0<k<n, explanation also has packet not send so, puts k=k+1, turns 4.1.3; If duration T Test(decide according to propagation delay time, generally be made as between 5 seconds to 30 seconds) do not send task, and k 〉=n, then with S k' be set to passage detection packet, forward 4.1.3 to; All the other situations are carried out 4.1.9 in time-delay after 1 second again.
4.2 recipient's receiving terminal carries out the reception of information according to the following steps:
4.2.1 receiving terminal from VoIP software, obtain the voice flow L that the other side sends over ", the reverse procedure that then inserts according to four different passage secret informations extracts the data of four insertion positions on the transmission channel simultaneously.If secret information correctly transmits, receiving terminal can receive secret information on some transmission channels therein, specific practice is, in the data that receive, search the frame head sign, if the match is successful, illustrate that then this passage in this section voice flow comprises secret information, according to the Information encapsulation form, the reverse procedure that inserts according to information extracts secret information.Described reverse procedure refers to according to the channel number of determining in the second step and the relation that can utilize the insertion position, find each passage L " the utilized insertion position of middle correspondence, then extract on the relevant position merging also, obtain the information on this passage.
4.2.2 receiving terminal is verified information.According to the used method of calibration of check code field, receiving terminal calculates the identifying code of frame length, numbering and three partial contents of secret information of the information that receives, and and the identifying code of the information that receives partly compare, if both unanimously verification pass through, illustrate that secret information correctly transmits, and turns 4.2.3; Otherwise illustrate that the prime information that the information that receives and the other side sends is inconsistent, mistake appears in transmission course, turns 4.2.1.
4.2.3 receiving terminal is processed secret information.Vehicle indicator section according to the information that receives is distinguished into different types with information frame, thereby takes different processing.If numbering is not 0, then this frame is that secret information frame or passage detect frame, need to send the data validation frame to the other side, and specific practice is to send order to one's own side's transmitting terminal, require one's own side's transmitting terminal to send the affirmation Frame that is numbered parameter to receive, turn 4.2.4; If be numbered 0, then this frame is the data validation frame, the message that is numbered parameter of sending to receive for so one's own side's transmitting terminal, and the information frame of this numbering of notice transmitting terminal successfully transmits, and turns 4.2.1.
4.2.4 receiving terminal merges reduction with information.For the information of newly receiving, the information of before receiving connects, if received that (concrete determination methods is determined by the user for last packet in the once communication, can add by special numbering or in the information content sign, do not relate in this method), information connects and to be decrypted after complete so, just can restore the secret information that the other side sends over according to the inverse process of the other side's transmitting terminal cryptographic operation, turns 4.2.1.
Transmitting terminal and the receiving terminal of communicating pair operate simultaneously, and a side can receive the information that the other side sends when sending, and have increased flexibility and the reliability of communication.System just will move after starting always, can constantly send continuously information.
Compared with prior art, adopt the present invention can reach following technique effect:
1. the first step of the present invention makes up 4 information transfer channels, utilize simultaneously intercommunication to make up the passage dynamic mechanism, can reduce potential attacker's the interference to communication, increase the fail safe of communication, can take full advantage of the bandwidth resources of channel simultaneously.
2. utilize the method that dynamically remedies in the secret information process of transmitting of the present invention, reduced to have improved the quality of voice owing to inserting the impact that brings in a high position.
Description of drawings
Fig. 1 is the Information hiding and extracting procedure chart of announcing in the list of references [2];
Fig. 2 is the communication system architecture figure that the first step of the present invention makes up;
Fig. 3 carries out the diagram that secret information inserts by passage 1 in the 4.1.3 step of the present invention;
Fig. 4 is overview flow chart of the present invention;
Fig. 5 is the diagram that 4.2.1 step receiving terminal of the present invention receives information.
Embodiment
Fig. 2 is the communication system architecture figure that the first step makes up among the present invention.
Communication system is made of the both sides that carry out voice call, the both sides of communication are hidden in secret information and finish communication in the voice flow, the both sides of communication form by transmitting terminal and receiving terminal two fatware modules, the information that transmitting terminal will send is inserted in the voice flow that sends to the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, extracts secret information from voice flow.
Fig. 3 carries out the diagram that secret information inserts by passage 1 in the 4.1.3 step of the present invention.
Transmitting terminal will send to recipient's voice flow L from converse taking-up the software (such as Linphone) of VoIP, according to second step in the summary of the invention channel number of determining and the relation that can utilize the insertion position, find the utilized insertion position of passage 1 correspondence in L, then with S ' kReplace these by bit and can utilize the insertion position, the inserted position that is replaced is called information and inserts the position, obtains L ' after this step.
Fig. 4 is overview flow chart of the present invention.
The first step makes up communication system.
Second step makes up 4 information transfer channels.Pattern 0 ~ 3(namely is numbered 0 ~ 3 pattern) the z position of encoded radio consists of No. 0 information transfer channel, pattern 0 ~ 2(namely is numbered 0 ~ 2 pattern) the y position of encoded radio consists of No. 1 information transfer channel, pattern 0 ~ 1(namely is numbered 0 ~ 1 pattern) the x position of encoded radio consists of No. 2 information transfer channels, pattern 0(namely is numbered 0 pattern) the w position of encoded radio consists of No. 3 information transfer channels.
The 3rd step, the design information encapsulation format.The design of Information encapsulation form is for after transmit leg is sent information, and the recipient can correctly extract and reduce secret information.The Information encapsulation form is comprised of secret information, frame head sign, frame length, numbering, check code.
The 4th step, the parallel sending and receiving that carries out information of transmitting terminal and receiving terminal, described parallel transmitting terminal and the receiving terminal of referring to done simultaneously, and namely there are not precedence relationship in 4.1 steps and 4.2 steps.
4.1 transmitting terminal carries out the transmission of information according to the following steps:
4.1.1 secret information S is carried out preliminary treatment, the packets of information S ' after obtaining encapsulating 1, S ' 2S ' kS ' nThe n block message S of (1≤k≤n), method is: at first S is encrypted, then the S after encrypting being divided into length is that P(unit is bit) 1, S 2S kS n, again according to the Information encapsulation form in the 3rd step, with fritter information S k(being secret information) and its frame head sign, frame length, numbering, check code are packaged into packets of information S ' k
4.1.2 variable is carried out initialization: with information transfer channel sequence number C NOW(0≤C NOW≤ 3) be initialized as 3, the expression passage is from the highest; (1≤k≤n) be initialized as 1 begins to send from first packet with variable k.
4.1.3 with S ' kBe inserted among the voice flow L.Taking-up will send to recipient's voice flow L from VoIP conversation software (such as Linphone), according to the channel number of determining in the second step and the relation that can utilize the insertion position, finds the information transfer channel C of current use NOWThe utilized insertion position of correspondence in L is then with S ' kReplace these by bit and can utilize the insertion position, the inserted position that is replaced is called information and inserts the position, obtains L ' after this step, as shown in Figure 3.
4.1.4 being carried out tonequality, L ' dynamically remedies, the voice flow L after dynamically being remedied ".Method is the phase ortho position that changed information is inserted the position,, is specially because secret information inserts the loss that voice quality is brought to remedy:
4.1.4.1 determine to remedy the position.By G.711 coding rule as can be known, four in voice coder code value outside w, x, y, the z represent respectively symbol and position power, their change will cause very large variation to encoded radio, therefore so be not suitable for audio compensation, remedy adjacent w, the x that will insert from information the position, y, the z and select.No. 0 information transfer channel remedies the position and is y, and No. 1 information transfer channel remedies the position and is x and z, and No. 2 information transfer channels remedy the position and are w and y, and No. 3 information transfer channels remedy the position and are x.
Dynamically remedy 4.1.4.2 carry out.Remedy a possible values and have two, be respectively 0 or 1, remedying like this position has the compound mode of multiple change, each combination that remedies the position for the information transfer channel of current use, the position that remedies with the voice coder code value after the insertion information changes this combination into respectively, then with insertion information before the voice coder code value make comparisons, select and differ (absolute value of the difference of the encoded radio before and after having carried out remedying) minimum combination, the position that remedies with the voice coder code value after the insertion information changes this combination at last.
4.1.5 the transmitting terminal of transmit leg with L " voice flow is submitted to the VoIP(networking telephone, Voice over IP) software (such as Linphone), send to recipient's receiving terminal by network.
4.1.6 wait for and replying.Whether the receiving terminal detection of transmit leg receives the affirmation packet that recipient's transmitting terminal sends over.If at T R(determine according to concrete network delay, 3 times of the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to the recipient are arranged in suggestion) do not receive the affirmation packet in the time, illustrates that then this information sends unsuccessfully, turns 4.1.7; If the receiving terminal of transmit leg detects and successfully receives the affirmation packet, illustrate that then this information sends successfully, k=k+1 turns 4.1.8.
4.1.7 adjust upward passage.If the receiving terminal N continuous of transmit leg Danger(N DangerBe positive integer and N Danger〉=2) the inferior packet that do not receive the confirmation illustrates that current network condition is bad, need to switch to the larger passage of numbering to guarantee fail safe, if C NOW<3, C so NOW=C NOW+ 1, turn 4.1.10.
4.1.8 adjust passage downwards.If transmit leg N continuous Safe(N SafeBe positive integer and N Safe〉=10) inferiorly successfully send information and overtime repeating transmission does not occur, illustrate that so current network condition is good, can switch to the less passage of numbering to take full advantage of bandwidth resources, if C NOW0, C NOW=C NOW-1.
4.1.9 single send to finish, whether transmit leg detects has the data validation bag to need to send, if having then put S k' for confirming packet, turn 4.1.3; If k=0 illustrates new transmission task, turn 4.1.1, restart initialization and transmission task; If 0<k<n, explanation also has packet not send so, puts k=k+1, turns 4.1.3; If duration T Test(decide according to propagation delay time, generally be made as between 5 seconds to 30 seconds) do not send task, and k 〉=n, then with S k' be set to passage detection packet, forward 4.1.3 to; All the other situations are carried out 4.1.9 in time-delay after 1 second again.
4.2 recipient's receiving terminal carries out the reception of information according to the following steps:
4.2.1 receiving terminal from VoIP software, obtain the voice flow L that the other side sends over ", the reverse procedure that then inserts according to four different passage secret informations extracts the data of four insertion positions on the transmission channel simultaneously.If secret information correctly transmits, receiving terminal can receive secret information on some transmission channels therein, specific practice is, in the data that receive, search the frame head sign, if the match is successful, illustrate that then this passage in this section voice flow comprises secret information, according to the Information encapsulation form, the reverse procedure that inserts according to information extracts secret information.
4.2.2 according to method of calibration, receiving terminal calculates the identifying code of frame length, numbering and three partial contents of secret information of the information receive, and and the identifying code of the information that receives partly compare, if both unanimously verification pass through, illustrate that secret information correctly transmits, and turns 4.2.3; Otherwise illustrate that the prime information that the information that receives and the other side sends is inconsistent, mistake appears in transmission course, turns 4.2.1.
4.2.3 receiving terminal is processed secret information.Vehicle indicator section according to the information that receives is distinguished into different types with information frame, thereby takes different processing.If numbering is not 0, then this frame is that secret information frame or passage detect frame, need to send the data validation frame to the other side, and specific practice is to send order to one's own side's transmitting terminal, require one's own side's transmitting terminal to send the affirmation Frame that is numbered parameter to receive, turn 4.2.4; If be numbered 0, then this frame is the data validation frame, the message that is numbered parameter of sending to receive for so one's own side's transmitting terminal, and the information frame of this numbering of notice transmitting terminal successfully transmits, and turns 4.2.1.
4.2.4 receiving terminal merges reduction with information.For the information of newly receiving, the information before received connects, if received last packet in the once communication, information connects and to be decrypted after complete so, inverse process according to the other side's transmitting terminal cryptographic operation just can restore the secret information that the other side sends over, and turns 4.2.1.
Fig. 5 is the diagram that receiving terminal of the present invention receives information.
Receiving terminal from VoIP software, obtain the voice flow L that the other side sends over ", the reverse procedure that then inserts according to four different passage secret informations extracts the data of four insertion positions on the transmission channel simultaneously.If secret information correctly transmits, receiving terminal can receive secret information on some transmission channels therein, specific practice is, in the data that receive, search the frame head sign, if the match is successful, illustrate that then this passage in this section voice flow comprises secret information, according to the Information encapsulation form, the reverse procedure that inserts according to information extracts secret information.

Claims (7)

1. information concealing method based on the voice flow of pulse code modulation speech coding is characterized in that may further comprise the steps:
The first step, make up communication system, communication system is made of the both sides that carry out voice call, the both sides of communication are hidden in secret information and finish communication in the voice flow, the both sides of communication form by transmitting terminal and receiving terminal two fatware modules, the information that transmitting terminal will send is inserted in the voice flow that sends to the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, extracts secret information from voice flow;
Second step, make up 4 information transfer channels, utilizing μ-law G.711 is that the utilized insertion position that is numbered 0 ~ 3 pattern in the μ pulse code modulation speech coding processed makes up a plurality of information transfer channels, the utilized insertion position that is numbered 0 pattern is wxyz, the utilized insertion position that is numbered 1 pattern is xyz, the utilized insertion position that is numbered 2 pattern is yz, the utilized insertion position that is numbered 3 pattern is z, make up set of modes M and insertion position P that information transfer channel need to be identified for communication, concrete grammar is: the z position that pattern 0 ~ 3 namely is numbered 0 ~ 3 pattern-coding value consists of No. 0 information transfer channel, the y position that pattern 0 ~ 2 namely is numbered 0 ~ 2 pattern-coding value consists of No. 1 information transfer channel, the x position that pattern 0 ~ 1 namely is numbered 0 ~ 1 pattern-coding value consists of No. 2 information transfer channels, and the w position that pattern 0 namely is numbered 0 pattern-coding value consists of No. 3 information transfer channels;
The 3rd step, the design information encapsulation format, the Information encapsulation form is comprised of secret information, frame head sign, frame length, numbering, check code, and the frame format that the frame head attribute field is communicated by letter by both party determines, indicates the beginning of a new frame; Frame length field represents the bit number of whole information frame; Number field is the sign of Frame, for the data recombination of recipient after will cutting apart provides order, the foundation of distinguishing the different types of data frame is provided simultaneously, is numbered the correct data validation frame that receives of 0 representative information, be numbered-1 and represent the passage detection frame of passage when idle; The secret information field is the secret information that will transmit; The check code field is the result that frame length, numbering and three parts of secret information are calculated according to method of calibration;
The 4th step, the parallel sending and receiving that carries out information of transmitting terminal and receiving terminal:
4.1 the transmitting terminal of transmit leg carries out the transmission of information according to the following steps:
4.1.1 secret information S is carried out preliminary treatment, the packets of information S ' after obtaining encapsulating 1, S ' 2S ' kS ' n, method is: at first S is encrypted, then the S after encrypting being divided into length is that P, unit are the n block message S of bit 1, S 2S kS n, again according to the Information encapsulation form, with fritter information S kBe that secret information and its frame head sign, frame length, numbering, check code are packaged into packets of information S ' k, 1≤k≤n;
4.1.2 variable is carried out initialization: with information transfer channel sequence number C NOWBe initialized as 3, variable k is initialized as 1;
4.1.3 with packets of information S ' kBe inserted among the voice flow L: be to take out the voice flow L that will send to the recipient the Voice over IP software from VoIP conversation software, according to the channel number of determining in the second step and the relation that can utilize the insertion position, find the information transfer channel C of current use NOWThe utilized insertion position of correspondence in L is then with S ' kReplacing these by bit, can to utilize the insertion position be that information is inserted the position, obtains L ';
4.1.4 being carried out tonequality, L ' dynamically remedies, the voice flow L after dynamically being remedied ", method is:
4.1.4.1 select to remedy the position from information is inserted adjacent w, x, y, the z of position: No. 0 information transfer channel remedies the position and is y, and No. 1 information transfer channel remedies the position and is x and z, and No. 2 information transfer channels remedy the position and are w and y, and No. 3 information transfer channels remedy the position and are x;
4.1.4.2 carry out dynamically to remedy, remedying a possible values has two, is respectively 0 or 1, so that remedy the position multiple combination mode is arranged, such as following table:
Each combination that remedies the position for the information transfer channel of current use, the position that remedies with the voice coder code value after the insertion information changes this combination into respectively, then with insertion information before the voice coder code value make comparisons, select the combination that differs minimum, with the voice coder code value after the insertion information remedy voice flow L after the position changes this combination into and dynamically remedied ", the absolute value of the described difference that differs the encoded radio of minimum before and after referring to carry out remedying is minimum;
4.1.5 the transmitting terminal of transmit leg " is submitted to L VoIP software, is sent to recipient's receiving terminal by network;
4.1.6 wait for and replying: whether the receiving terminal detection of transmit leg receives the affirmation packet that recipient's transmitting terminal sends over, if at T RDo not receive the affirmation packet in time, turn 4.1.7; If the receiving terminal of transmit leg detects and successfully receives the affirmation packet, then k=k+1 turns 4.1.8; Described T RDetermine according to concrete network delay;
4.1.7 adjust upward passage: if the receiving terminal N continuous of transmit leg DangerIf the inferior packet that do not receive the confirmation is and C NOW<3, C then NOW=C NOW+ 1, turn 4.1.9; N DangerBe positive integer;
4.1.8 adjust passage downwards: if the transmit leg N continuous SafeInferiorly successfully send information and overtime repeating transmission does not occur, and if C NOW0, C NOW=C NOW-1; N SafeBe positive integer;
4.1.9 single send to finish, whether transmit leg detects has the data validation bag to need to send, if having then put S k' for confirming packet, turn 4.1.3; If k=0 turns 4.1.1; If 0<k<n puts k=k+1, turn 4.1.3; If duration T TestDo not send task, and k 〉=n, then with S k' be set to passage detection packet, turn 4.1.3; All the other situations are carried out 4.1.9 in time-delay after 1 second again; T TestDecide according to transmission delay;
4.2 recipient's receiving terminal carries out the reception of information according to the following steps:
4.2.1 receiving terminal from VoIP software, obtain the voice flow L that the other side sends over ", the reverse procedure that then inserts according to four different passage secret informations extracts the data of four insertion positions on the transmission channel simultaneously;
4.2.2 receiving terminal is verified information: according to the used method of calibration of check code field, receiving terminal calculates the identifying code of frame length, numbering and three partial contents of secret information of the information that receives, and and the identifying code of the information that receives partly compare, if both are unanimously then turn 4.2.3; Otherwise turn 4.2.1.
4.2.3 receiving terminal is processed secret information: if numbering is not 0, send order then for one's own side's transmitting terminal, require one's own side's transmitting terminal to send the affirmation Frame that is numbered parameter to receive, turn 4.2.4; If be numbered 0, then this frame is the data validation frame, the message that is numbered parameter of sending to receive for one's own side's transmitting terminal, and the information frame of this numbering of notice transmitting terminal successfully transmits, and turns 4.2.1;
4.2.4 receiving terminal merges reduction with information: for the information of newly receiving, the information of before receiving connects, if received last packet in once communicating by letter, information connects and to be decrypted after complete so, inverse process according to the other side's transmitting terminal cryptographic operation restores the secret information that the other side sends over, and turns 4.2.1.
2. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1 is characterized in that described T RBe arranged to the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to the recipient 3 times.
3. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1 is characterized in that described N Danger〉=2, N Safe〉=10.
4. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1 is characterized in that T TestBe made as between 5 seconds to 30 seconds.
5. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1, the specific practice that it is characterized in that the data of the insertion position on four transmission channels of receiving terminal extraction is, in the information that receives, search the frame head sign, if the match is successful, then illustrate in this section voice flow and comprise secret information, according to the Information encapsulation form, the reverse procedure that inserts according to information extracts information.
6. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1 is characterized in that described method of calibration refers to CRC cyclic redundancy check (CRC), parity check, ECC verification, MD5 verification.
7. the information concealing method of a kind of voice flow based on the pulse code modulation speech coding as claimed in claim 1, it is characterized in that described reverse procedure refers to according to the channel number of determining in the second step and the relation that can utilize the insertion position, find each passage L " the utilized insertion position of middle correspondence; then extract on the relevant position merging also, obtain the information on this passage.
CN201310010004.3A 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation Expired - Fee Related CN103023630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310010004.3A CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310010004.3A CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Publications (2)

Publication Number Publication Date
CN103023630A true CN103023630A (en) 2013-04-03
CN103023630B CN103023630B (en) 2015-01-21

Family

ID=47971795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310010004.3A Expired - Fee Related CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Country Status (1)

Country Link
CN (1) CN103023630B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104269175A (en) * 2014-08-28 2015-01-07 华侨大学 VoIP steganography method based on optimum similarity matching
CN107947898A (en) * 2017-11-15 2018-04-20 深圳大学 Information detecting method, device and receiving device based on optimization packet variance
CN109257325A (en) * 2017-07-13 2019-01-22 北京陌陌信息技术有限公司 Transmit the method, apparatus and computer readable storage medium of private information
CN110166491A (en) * 2019-06-26 2019-08-23 深圳市速普瑞科技有限公司 Transmission system and transmission method between railway intranet server and external network server
CN111816209A (en) * 2020-06-19 2020-10-23 天通畅达(深圳)科技有限公司 Voice switching method and device based on voice quality evaluation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604523A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 In voice coding G.711, hide the method for redundant information
CN101604527A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Under the VoIP environment based on the method for the hidden transferring of wideband voice of G.711 encoding
CN102522092A (en) * 2011-12-16 2012-06-27 大连理工大学 Device and method for expanding speech bandwidth based on G.711.1

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604523A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 In voice coding G.711, hide the method for redundant information
CN101604527A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Under the VoIP environment based on the method for the hidden transferring of wideband voice of G.711 encoding
CN102522092A (en) * 2011-12-16 2012-06-27 大连理工大学 Device and method for expanding speech bandwidth based on G.711.1

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
AOKI, N.: "A Technique of Lossless Steganography for G.711 Telephony Speech", 《INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, 2008. IIHMSP "08 INTERNATIONAL CONFERENCE ON 》, 17 August 2008 (2008-08-17), pages 608 - 611 *
BO LIU, ET AL.: "Thwarting audio steganography attacks in cloud storage systems", 《CLOUD AND SERVICE COMPUTING (CSC), 2011 INTERNATIONAL CONFERENCE ON》, 14 December 2011 (2011-12-14), pages 259 - 265 *
CHUNGYI WANG, ET AL.: "Information Hiding in Real-Time VoIP Streams", 《ULTIMEDIA, 2007. ISM 2007. NINTH IEEE INTERNATIONAL SYMPOSIUM ON》, 12 December 2007 (2007-12-12), pages 255 - 262 *
ERCHI XU, ET AL.: "Adaptive VoIP Steganography for Information Hiding within Network Audio Streams", 《NETWORK-BASED INFORMATION SYSTEMS (NBIS), 2011 14TH INTERNATIONAL CONFERENCE ON》, 9 September 2011 (2011-09-09), pages 612 - 617 *
ZHU TANG, ET AL.: "Building Practical Self Organization Networks on Heterogeneous Wireless Modems", 《INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2011 FIFTH INTERNATIONAL CONFERENCE ON 》, 2 June 2011 (2011-06-02), pages 388 - 393 *
ZILING WEI, ET AL.: "VISOR:A Pratical VoIP Steganography Platform", 《MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2011 SEVENTH INTERNATIONAL CONFERENCE ON》, 18 December 2011 (2011-12-18), pages 370 - 372 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104269175A (en) * 2014-08-28 2015-01-07 华侨大学 VoIP steganography method based on optimum similarity matching
CN104269175B (en) * 2014-08-28 2017-04-05 华侨大学 A kind of ip voice steganography method matched based on Best similarity degree
CN109257325A (en) * 2017-07-13 2019-01-22 北京陌陌信息技术有限公司 Transmit the method, apparatus and computer readable storage medium of private information
CN107947898A (en) * 2017-11-15 2018-04-20 深圳大学 Information detecting method, device and receiving device based on optimization packet variance
CN107947898B (en) * 2017-11-15 2020-08-07 深圳大学 Information detection method and device based on optimized grouping variance and receiving equipment
CN110166491A (en) * 2019-06-26 2019-08-23 深圳市速普瑞科技有限公司 Transmission system and transmission method between railway intranet server and external network server
CN111816209A (en) * 2020-06-19 2020-10-23 天通畅达(深圳)科技有限公司 Voice switching method and device based on voice quality evaluation

Also Published As

Publication number Publication date
CN103023630B (en) 2015-01-21

Similar Documents

Publication Publication Date Title
CN103841118B (en) Method for constructing reliable two-way covert channel based on TCP effective loads
CN101197674B (en) Encrypted communication method, server and encrypted communication system
US8687800B2 (en) Encryption method for message authentication
CN101478391B (en) IP voice hidden communication method based on stream encryption
Mare et al. Secret data communication system using Steganography, AES and RSA
JP4094216B2 (en) Automatic resynchronization of cryptographic synchronization information
US20070237144A1 (en) Transporting authentication information in RTP
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN103023630B (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN103402198B (en) A kind of method that radio communication terminal encryption parameter transmits
Bhole et al. Steganography over video file using Random Byte Hiding and LSB technique
CN110392050B (en) Method for constructing hidden storage channel based on timestamp
CN106921485A (en) Encrypting and decrypting method based on matrix operation
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
CN101262418A (en) Transmission of a digital message interspersed throughout a compressed information signal
Nain et al. A reliable covert channel over IEEE 802.15. 4 using steganography
CN103002406B (en) A kind of voice encryption method being applied to arrowband radio digital communication system
CN113923312B (en) Robust reversible watermarking method of digital image coding layer based on wireless communication
CN103004177B (en) Data transmission security is improved
CN102984122A (en) Internet protocol (IP) voice covert communication method based on adaptive multi-rate wideband (AMR-WB) code rate camouflage
CN103138913A (en) Optical fiber web encryption communication system based on time hidden signal channel
US7774677B2 (en) Method and device for transmitting information with verification of unintentional and intentional transmission errors
CN111327631A (en) Secret information transmission method and system based on TCP and UDP
CN102938888A (en) Secret document steganography and extraction method suitable for wireless communication environment
CN102857341A (en) Communication method for encrypted call

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150121

Termination date: 20210111