CN103023630B - Method for hiding information of speech stream on basis of speech coding by pulse code modulation - Google Patents

Method for hiding information of speech stream on basis of speech coding by pulse code modulation Download PDF

Info

Publication number
CN103023630B
CN103023630B CN201310010004.3A CN201310010004A CN103023630B CN 103023630 B CN103023630 B CN 103023630B CN 201310010004 A CN201310010004 A CN 201310010004A CN 103023630 B CN103023630 B CN 103023630B
Authority
CN
China
Prior art keywords
information
frame
receiving terminal
numbered
voice flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310010004.3A
Other languages
Chinese (zh)
Other versions
CN103023630A (en
Inventor
徐利洋
魏子令
徐尔茨
刘博�
赵宝康
苏金树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201310010004.3A priority Critical patent/CN103023630B/en
Publication of CN103023630A publication Critical patent/CN103023630A/en
Application granted granted Critical
Publication of CN103023630B publication Critical patent/CN103023630B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method for hiding information of a speech stream on the basis of speech coding by pulse code modulation, and aims to provide a method for hiding information of a speech stream on the basis of a G.711mu-law. By the method, the hidden information transmission safety is improved, and the channel utilization rate is increased. The technical scheme includes that the method comprises steps of constructing a communication system comprising double speed communication parties; constructing four information transmission channels by available insertion positions of modes with the serial numbers from 0 to 3 in the G.711mu-law; designing an information package format; enabling a transmitting end and a receiving end to transmit and receive the information in parallel; preprocessing the information when the transmitting end is about to transmit the information, inserting the hidden information in the speech stream L, dynamically compensating for the tone quality of the speech stream and upwardly or downwardly adjusting the channels according to smoothness conditions of the channels; and enabling the receiving end to synthesize and restore the received information. The method has the advantages that a dynamic channel adjusting mechanism is constructed, the information transmission safety can be improved, bandwidth resources of the channels are sufficiently utilized, and the quality of speech can be improved.

Description

A kind of information concealing method of the voice flow based on pulse code modulation speech coding
Technical field
The present invention is mainly concerned with based on G.711 μ-law (μ pulse code modulation speech coding, a kind of voice compression coding that International Telecommunication Union works out) information communication field, refer in particular to a kind of information concealing method based on G.711 μ-law voice flow.
Background technology
At present, the safeguard protection for internet information transmission is mainly encrypted content, and the key cryptosystem of employing has DES (Data Encryption System, data encryption standard) etc.Although key cryptosystem can be protected content; even if but make potential assailant to decode transferring content owing to lacking to the appropriate protection of delivering path, also can by destroying delivering path, as being mixed into error message; interception channel etc., makes information cannot Successful transmissions.
Therefore, study under current internet condition and how to protect internet transmission approach to have very strong realistic meaning.At present, the protection way for delivering path mainly adopts the Information Hiding Techniques based on file steganography, and its principle is that the secret information by transmitting is divided into less unit, by these comparatively subsection dispersion insertion vector files.In general; bearer documents selects audio frequency, picture; utilize the insensitivity for faint change of the sense of hearing of people, vision; bearer documents after insertion information is sounded or seem with insertion information before audio file or picture almost as broad as long; potential assailant also just cannot find the approach that secret information transmits, and is come content and the approach of protection information transmission by the method for Information hiding.
But based on the protecting information safety of static file steganography while the approach for information transmission provides protection; there is a series of shortcoming; steganography information capacity is subject to file size restriction; after there is source file and steganography, file comparison causes the hidden danger of information leakage; static state causes information transmission poor real; communicating pair cannot feed back in time, and communication mode is difficult to change and also reduces flexibility.
Current the Internet develops rapidly, and the application of Streaming Media constantly expands, and due to Streaming Media, to have real-time good, and without advantages such as source files, the research emphasis of Information hiding has turned to Streaming Media in the world at present.The networking telephone of encoding based on G.711 μ-law is one of typical Streaming Media, and meanwhile, iphone user's quantity is many, easy to connect, good concealment, is desirable information steganography carrier.
When using stream media information concealing technology, need to determine the potential insertion position in bearer documents, bearer documents, information to be concealed and information dividing method etc.As shown in Figure 1, potential information insertion location is defined as HS, and bearer documents is defined as C, and secret information to be concealed is defined as S.In Information hiding process, S is divided into multiple less block of information S', and these S' is replaced respectively the corresponding contents of HS in bearer documents, generate and carry ciphertext part C'.When the information of transmission, only need send and carry the secret transmissions that ciphertext part C' can realize information.If assailant has intercepted and captured year ciphertext part C' on network, only this file can be regarded as common file.
Table 1G.711 μ-law speech coding
MODE NUMBER Linearly coded value (L) Encoded radio (C) after compression The position power of z position in L
0 s00000001wxyza… s000wxyz 2 3
1 s0000001wxyzab... s001wxyz 2 4
2 s000001wxyzabc... s010wxyz 2 5
3 s00001wxyzabcd... s011wxyz 2 6
4 s0001wxyzabcde... s100wxyz 2 7
5 s001wxyzabcdef... s101wxyz 2 8
6 s01wxyzabcdefg... s110wxyz 2 9
7 s1wxyzabcdefgh... s111wxyz 2 10
G.711 the coded system of μ-law is as shown in table 1 (draws from http://zh.wikipedia.org/zh/G.711, obtain by simplifying in " ITU-T Recommendation G.711 "), can see and have 8 kinds of different patterns, here be numbered 0 ~ 7 respectively, take any pattern to carry out compressing and determined by its encoded radio for a certain specific linearly coded value L.Belong to the linearly coded value of different mode, position power (size represented when this is 1) in its z position (lowest order of the encoded radio after compression) linearly coded value L is before compression different, and the z position power of the coding that MODE NUMBER is little is less.So, if change a certain position of wxyz in the rear encoded radio of compression, the encoded radio adopting less numbering scheme to carry out compressing will be subject to less change, thus in voice quality, be subject to less impact, otherwise the encoded radio adopting larger numbering scheme to carry out compressing can produce larger change because this position power is comparatively large, and then has influence on voice quality larger.
The information concealing method major part of current voice flow of encoding based on G.711 μ-law secret information is replaced regularly or several in four potential insertion positions (i.e. w, x, y, z position).In the communication engineering Master's thesis " Study of security mechanisms of G.711 encoding with instant messages concealing technology improvement Internet phone-calling " that National Chi Nan University Wang Zhong escapes, describe the lowest order z of encoded radio after secret information replacement compression to carry out the method for Information hiding.Transmit leg is first by encrypted for information S to be concealed, then little block message S' is divided into, afterwards S' and its check value, packet mark are packaged into packets of information S "; S " replace the lowest order z of voice flow encoded radio by turn, recipient carries out inverse process to obtain secret information, achieves the secret transmissions of information like this.The band of this method information transmission is roomy, but because the change of lowest order can not cause large impact to voice, potential attacker can carry out random disturbances to the lowest order of voice flow on network, disturbs the transmission of secret information while not affecting normal voice traffic.ErchiXu, Bo Liu etc. is published in the paper " the self adaptation steganography based on VoIP that network audio stream information is hidden " in NBIS meeting and proposes a kind of method by the relatively high position of Information hiding at encoded radio, such as wxy instead of z, encode by studying G.711 μ-law, draw in guarantee voice quality in the scope that International Telecommunication Union (ITU-T) specifies, available information insertion location under different mode, as shown in the table:
The utilized insertion position that form 2 different mode numbering is corresponding
MODE NUMBER k 0 1 2 3
Insertion position can be utilized w、x、y、z x、y、z y、z z
Belong to the encoded radio of different mode, available insertion position is different, and the encoded radio that MODE NUMBER is greater than 3 does not have available insertion position, and information is inserted into a relatively high position and ensure that voice quality simultaneously by this method.Although Information hiding improves fail safe in high bit, but for when which using, insertion position can be utilized to be manual configuration in paper " the self adaptation steganography based on VoIP that network audio stream information is hidden ", fixing pattern can not regulate the insertion position of information according to the change of network environment, reduce channel utilization.
Summary of the invention
The technical problem to be solved in the present invention is: for prior art Problems existing, proposes the information concealing method based on G.711 μ-law voice flow, improves the fail safe of secret information transmission, channel utilization.
For solving the problems of the technologies described above, the present invention by the following technical solutions:
The first step, builds communication system.Communication system is made up of the both sides carrying out voice call, secret information is hidden in voice flow and completes information transmission by the both sides of communication, the both sides of communication are by transmitting terminal and receiving terminal two fatware module composition, the information that transmitting terminal will send is inserted into and sends in the voice flow of the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, secret information is extracted, as shown in Figure 2 from voice flow.
The set of table 3 passage and insertion position relation
Channel number 0 1 2 3
Set of modes M 0,1,2,3 0,1,2 0,1 0
Insertion position P z y x w
Second step, builds 4 information transfer channels.The utilized insertion position being numbered the pattern of 0 ~ 3 in G.711 μ-law is utilized to build multiple information transfer channel, be numbered the utilized insertion position of the pattern of 0 for wxyz, be numbered the utilized insertion position of the pattern of 1 for xyz, be numbered the utilized insertion position of the pattern of 2 for yz, be numbered the utilized insertion position of the pattern of 3 for z.Build information transfer channel to need to determine the set of modes M of information transmission (set of modes refers to the subclass of MODE NUMBER 0 ~ 3 in G.711 μ-law, the pattern of being inserted into belongs in the voice coder code value of M by information) and insertion position P, concrete grammar is as table 1, the z position of pattern 0 ~ 3 (being namely numbered the pattern of 0 ~ 3) encoded radio forms No. 0 information transfer channel, the y position of pattern 0 ~ 2 (being namely numbered the pattern of 0 ~ 2) encoded radio forms No. 1 information transfer channel, the x position of pattern 0 ~ 1 (being namely numbered the pattern of 0 ~ 1) encoded radio forms No. 2 information transfer channels, the w position of pattern 0 (being namely numbered the pattern of 0) encoded radio forms No. 3 information transfer channels.Owing to only using the high bit (namely only having w position) of the pattern of 0 that is numbered as information insertion location, No. 3 information transfer channels are relative to No. 0 information transfer channel, and communication bandwidth is little, but has higher fail safe.
3rd step, design information encapsulation format.The design of Information encapsulation form is in order to after making transmit leg information be sent, and recipient correctly can extract and reduce secret information.Information encapsulation form is made up of secret information, frame head mark, frame length, numbering, check code, specifically as shown in table 4:
Table 4 data frame format
Frame head mark Frame length Numbering Secret information …… Check code
The frame format that frame head attribute field communicates by both party determines, indicates the beginning of a new frame; Frame length field represents the bit number of whole information frame; Number field is the mark of Frame, for the data recombination after segmentation is provided order by recipient, provide the foundation distinguishing different types of data frame simultaneously, concrete, be numbered the data validation frame that 0 representative information correctly receives, be numbered-1 and represent Air conduct measurement frame when passage leaves unused; Secret information field is the secret information that will transmit; Check code field is result frame length, numbering and secret information three parts calculated according to certain method of calibration (as CRC cyclic redundancy check (CRC), parity check, ECC verification, MD5 verification etc.).
4th step, transmitting terminal and receiving terminal walk abreast the transmission of the information of carrying out and reception, describedly parallelly refer to that transmitting terminal and receiving terminal do simultaneously, and namely 4.1 steps and 4.2 steps do not exist precedence relationship.
4.1 transmitting terminals carry out the transmission of information according to the following steps:
4.1.1 preliminary treatment is carried out to secret information S, obtain the packets of information S ' after encapsulating 1, S ' 2s ' ks ' n(1≤k≤n), method is: first encrypted by S, is then divided into length to be the n block message S of PP (unit is bit) S after encryption 1, S 2s ks n, then according to the Information encapsulation form in the 3rd step, by little block message S k(i.e. secret information) and its frame head mark, frame length, numbering, check code are packaged into packets of information S ' k.
4.1.2 initialization is carried out to variable: by information transfer channel sequence number C nOW(0≤C nOW≤ 3) be initialized as 3, represent that passage is from the highest; Variable k (1≤k≤n) is initialized as 1, unwraps to start from first data and send.
4.1.3 by packets of information S ' kbe inserted in voice flow L.From VoIP converses software (such as Linphone), take out the voice flow L that will send to recipient, according to the channel number determined in second step and the relation that can utilize insertion position, find the information transfer channel C of current use nOWutilized insertion position corresponding in L, then by S ' kreplace these by bit and can utilize insertion position, the inserted position be replaced is called that information inserts position, obtains L ', as shown in Figure 3 after this step.
4.1.4 carry out tonequality to L ' dynamically to make up, voice flow L after dynamically being made up ".Method is the adjacent bit that changed information inserts position, to make up because secret information inserts the loss brought voice quality, is specially:
4.1.4.1 determine to make up position.From coding rule G.711, four in a voice coder code value outside w, x, y, z represent symbol and position power respectively, their change causes very large change by encoded radio, so be not suitable for audio compensation, therefore make up position and select inserting from information in the adjacent w of position, x, y, z.It is y that No. 0 information transfer channel makes up position, and it is x and z that No. 1 information transfer channel makes up position, and it is w and y that No. 2 information transfer channels make up position, and it is x that No. 3 information transfer channels make up position.
Dynamically make up 4.1.4.2 carry out.Make up a possible values and have two, be respectively 0 or 1, make up the compound mode that there is multiple change position like this, as following table:
What the different channel number of form 5 was corresponding makes up bit combination
For each combination making up position of the information transfer channel of current use, change the position that makes up of the voice coder code value after insertion information into this combination respectively, then with insertion information before voice coder code value make comparisons, select the combination that difference (having carried out the absolute value of the difference of the encoded radio before and after making up) is minimum, finally change the position that makes up of the voice coder code value after insertion information into this combination.Such as, for raw tone encoded radio 00101001, and suppose that current system is utilizing the 1st transmission channel to carry out information transmission, there is secret information bit 1 to need to send simultaneously, so secret information bit 1 will replace the y position of voice coder code value, obtain the encoded radio 00101011 after insertion information, what adopt passage 1 makes up method, x and the z position changing encoded radio respectively can obtain 4 combinations, be respectively 00101010, 00101011, 00101110, 00101111, wherein the difference making up result and raw tone encoded radio 00101001 of first combination is minimum, so adopt the first to make up scheme, change the encoded radio after inserting secret information into 00101010.Adopt and in this way tonequality is carried out to L ' and dynamically make up, voice flow L after dynamically being made up ".Do not insert position to information in said process to change, so tonequality dynamically makes up ensure that reducing information while information is correctly transmitted inserts change to voice.
By L, " voice flow submits to VoIP (networking telephone, Voice over IP) software (such as Linphone) to the transmitting terminal of 4.1.5 transmit leg, is sent to the receiving terminal of recipient by network.
4.1.6 reply is waited for.The receiving terminal of transmit leg detects the confirmation packet that the transmitting terminal that whether receives recipient sends over.If at T r(determine according to concrete network delay, suggestion is arranged to 3 times of the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to recipient) does not receive confirmation packet in the time, then illustrate that this information sends unsuccessfully, turn 4.1.7; If the receiving terminal of transmit leg detects successfully receive confirmation packet, then illustrate that this information sends successfully, k=k+1, turns 4.1.8.
4.1.7 passage is adjusted upward.If the receiving terminal N continuous of transmit leg danger(N dangerfor positive integer and N danger>=2) secondaryly do not receive the confirmation packet, illustrate that current network condition is bad, need to be switched to the larger passage of numbering to ensure fail safe, if C nOW<3, so C nOW=C nOW+ 1, turn 4.1.10.
4.1.8 adjust passage downwards.If transmit leg N continuous safe(N safefor positive integer and N safe>=10) secondary successfully send information and time-out do not occur retransmit, so illustrate that current network condition is good, the less passage of numbering can be switched to make full use of bandwidth resources, if C nOW>0, C nOW=C nOW-1.
4.1.9 single sends and terminates, and whether transmit leg detects has data validation bag to need to send, if had, puts S k' for confirming packet, turn 4.1.3; If k=0, new transmission task is described, turns 4.1.1, restart initialization and transmission task; If 0<k<n, so illustrate and also have packet not send, put k=k+1, turn 4.1.3; If duration T test(determine according to propagation delay time, be generally set between 5 seconds to 30 seconds) does not send task, and k>=n, then by S k' be set to Air conduct measurement packet, forward 4.1.3 to; All the other situations perform 4.1.9 in time delay after 1 second again.
The receiving terminal of 4.2 recipients carries out the reception of information according to the following steps:
4.2.1 receiving terminal obtain from VoIP software voice flow L that the other side sends over ", then according to the reverse procedure that four different passage secret informations insert, extract the data of the insertion position in four transmission channels simultaneously.If secret information correctly transmits, receiving terminal some transmission channels can receive secret information wherein, specific practice is, frame head mark is searched in the data received, if the match is successful, then illustrate that this passage in this section of voice flow comprises secret information, according to Information encapsulation form, the reverse procedure inserted according to information extracts secret information.Described reverse procedure refers to according to the channel number determined in second step and the relation that can utilize insertion position, and " then the utilized insertion position of middle correspondence extracts merging on relevant position also, obtain the information on this passage at L to find each passage.
4.2.2 receiving terminal is verified information.According to check code field method of calibration used, receiving terminal calculates the identifying code of the frame length of the information received, numbering and secret information three partial contents, and compare with the identifying code part of the information received, if both are consistent, verification is passed through, illustrate that secret information correctly transmits, turn 4.2.3; Otherwise illustrate that the prime information that the information that receives and the other side send is inconsistent, there is mistake in transmitting procedure, turns 4.2.1.
4.2.3 receiving terminal processes secret information.Information frame is distinguished into different types by the vehicle indicator section according to the information received, thus takes different process.If numbering is not 0, then this frame is secret information frame or Air conduct measurement frame, needs to send data validation frame to the other side, and specific practice sends order to one's own side's transmitting terminal, require that the transmitting terminal of one's own side sends one with the confirmation Frame being numbered parameter received, turn 4.2.4; If be numbered 0, then this frame is data validation frame, sends with the message being numbered parameter received so to the transmitting terminal of one's own side, and the information frame Successful transmissions of this numbering of notice transmitting terminal, turns 4.2.1.
4.2.4 information is merged reduction by receiving terminal.For the information newly received, the information before received connects, if have received once communication in last packet (concrete determination methods is determined by user, by special numbering or mark can be added in the information content, do not relate in this method), so information is decrypted after connecting, and just can restore the secret information that the other side sends over, turn 4.2.1 according to the inverse process of the other side's transmitting terminal cryptographic operation.
Transmitting terminal and the receiving terminal of communicating pair operate simultaneously, and a side can receive the information that the other side sends while sending, and adds flexibility and the reliability of communication.System just will be run after start-up always, constantly can send information continuously.
Compared with prior art, the present invention is adopted can to reach following technique effect:
1. the first step of the present invention builds 4 information transfer channels, utilize intercommunication to construct passage dynamic mechanism simultaneously, the interference to information transmission of potential attacker can be reduced, increase the fail safe of information transmission, the bandwidth resources of channel can be made full use of simultaneously.
2. utilize the method dynamically made up in secret information process of transmitting of the present invention, reduce owing to inserting the impact brought in a high position, improve the quality of voice.
Accompanying drawing explanation
Fig. 1 is the Information hiding and extracting procedure chart announced in list of references [2];
Fig. 2 is the communication system architecture figure that the first step of the present invention builds;
Fig. 3 is that 4.1.3 of the present invention walks the diagram of being carried out secret information insertion by passage 1;
Fig. 4 is overview flow chart of the present invention;
Fig. 5 is the diagram that 4.2.1 of the present invention walks that receiving terminal receives information.
Embodiment
Fig. 2 is the communication system architecture figure that in the present invention, the first step builds.
Communication system is made up of the both sides carrying out voice call, secret information is hidden in voice flow and completes information transmission by the both sides of communication, the both sides of communication are by transmitting terminal and receiving terminal two fatware module composition, the information that transmitting terminal will send is inserted into and sends in the voice flow of the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, from voice flow, extract secret information.
Fig. 3 is that 4.1.3 of the present invention walks the diagram of being carried out secret information insertion by passage 1.
Transmitting terminal takes out the voice flow L that will send to recipient from VoIP converses software (such as Linphone), according to second step in the summary of the invention channel number determined and the relation that can utilize insertion position, find the utilized insertion position that passage 1 is corresponding in L, then by S ' kreplace these by bit and can utilize insertion position, the inserted position be replaced is called that information inserts position, obtains L ' after this step.
Fig. 4 is overview flow chart of the present invention.
The first step, builds communication system.
Second step, builds 4 information transfer channels.The z position of pattern 0 ~ 3 (being namely numbered the pattern of 0 ~ 3) encoded radio forms No. 0 information transfer channel, the y position of pattern 0 ~ 2 (being namely numbered the pattern of 0 ~ 2) encoded radio forms No. 1 information transfer channel, the x position of pattern 0 ~ 1 (being namely numbered the pattern of 0 ~ 1) encoded radio forms No. 2 information transfer channels, and the w position of pattern 0 (being namely numbered the pattern of 0) encoded radio forms No. 3 information transfer channels.
3rd step, design information encapsulation format.The design of Information encapsulation form is in order to after making transmit leg information be sent, and recipient correctly can extract and reduce secret information.Information encapsulation form is made up of secret information, frame head mark, frame length, numbering, check code.
4th step, transmitting terminal and receiving terminal walk abreast the transmission of the information of carrying out and reception, describedly parallelly refer to that transmitting terminal and receiving terminal do simultaneously, and namely 4.1 steps and 4.2 steps do not exist precedence relationship.
4.1 transmitting terminals carry out the transmission of information according to the following steps:
4.1.1 preliminary treatment is carried out to secret information S, obtain the packets of information S ' after encapsulating 1, S ' 2s ' ks ' n(1≤k≤n), method is: first encrypted by S, is then divided into length to be the n block message S of PP (unit is bit) S after encryption 1, S 2s ks n, then according to the Information encapsulation form in the 3rd step, by little block message S k(i.e. secret information) and its frame head mark, frame length, numbering, check code are packaged into packets of information S ' k.
4.1.2 initialization is carried out to variable: by information transfer channel sequence number C nOW(0≤C nOW≤ 3) be initialized as 3, represent that passage is from the highest; Variable k (1≤k≤n) is initialized as 1, unwraps to start from first data and send.
4.1.3 by S ' kbe inserted in voice flow L.From VoIP converses software (such as Linphone), take out the voice flow L that will send to recipient, according to the channel number determined in second step and the relation that can utilize insertion position, find the information transfer channel C of current use nOWutilized insertion position corresponding in L, then by S ' kreplace these by bit and can utilize insertion position, the inserted position be replaced is called that information inserts position, obtains L ', as shown in Figure 3 after this step.
4.1.4 carry out tonequality to L ' dynamically to make up, voice flow L after dynamically being made up ".Method is the adjacent bit that changed information inserts position, to make up because secret information inserts the loss brought voice quality, is specially:
4.1.4.1 determine to make up position.From coding rule G.711, four in a voice coder code value outside w, x, y, z represent symbol and position power respectively, their change causes very large change by encoded radio, so be not suitable for audio compensation, therefore make up position and select inserting from information in the adjacent w of position, x, y, z.It is y that No. 0 information transfer channel makes up position, and it is x and z that No. 1 information transfer channel makes up position, and it is w and y that No. 2 information transfer channels make up position, and it is x that No. 3 information transfer channels make up position.
Dynamically make up 4.1.4.2 carry out.Make up a possible values and have two, be respectively 0 or 1, make up the compound mode that there is multiple change position like this, for each combination making up position of the information transfer channel of current use, change the position that makes up of the voice coder code value after insertion information into this combination respectively, then with insertion information before voice coder code value make comparisons, select the combination that difference (having carried out the absolute value of the difference of the encoded radio before and after making up) is minimum, finally change the position that makes up of the voice coder code value after insertion information into this combination.
By L, " voice flow submits to VoIP (networking telephone, Voice over IP) software (such as Linphone) to the transmitting terminal of 4.1.5 transmit leg, is sent to the receiving terminal of recipient by network.
4.1.6 reply is waited for.The receiving terminal of transmit leg detects the confirmation packet that the transmitting terminal that whether receives recipient sends over.If at T r(determine according to concrete network delay, suggestion is arranged to 3 times of the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to recipient) does not receive confirmation packet in the time, then illustrate that this information sends unsuccessfully, turn 4.1.7; If the receiving terminal of transmit leg detects successfully receive confirmation packet, then illustrate that this information sends successfully, k=k+1, turns 4.1.8.
4.1.7 passage is adjusted upward.If the receiving terminal N continuous of transmit leg danger(N dangerfor positive integer and N danger>=2) secondaryly do not receive the confirmation packet, illustrate that current network condition is bad, need to be switched to the larger passage of numbering to ensure fail safe, if C nOW<3, so C nOW=C nOW+ 1, turn 4.1.10.
4.1.8 adjust passage downwards.If transmit leg N continuous safe(N safefor positive integer and N safe>=10) secondary successfully send information and time-out do not occur retransmit, so illustrate that current network condition is good, the less passage of numbering can be switched to make full use of bandwidth resources, if C nOW>0, C nOW=C nOW-1.
4.1.9 single sends and terminates, and whether transmit leg detects has data validation bag to need to send, if had, puts S k' for confirming packet, turn 4.1.3; If k=0, new transmission task is described, turns 4.1.1, restart initialization and transmission task; If 0<k<n, so illustrate and also have packet not send, put k=k+1, turn 4.1.3; If duration T test(determine according to propagation delay time, be generally set between 5 seconds to 30 seconds) does not send task, and k>=n, then by S k' be set to Air conduct measurement packet, forward 4.1.3 to; All the other situations perform 4.1.9 in time delay after 1 second again.
The receiving terminal of 4.2 recipients carries out the reception of information according to the following steps:
4.2.1 receiving terminal obtain from VoIP software voice flow L that the other side sends over ", then according to the reverse procedure that four different passage secret informations insert, extract the data of the insertion position in four transmission channels simultaneously.If secret information correctly transmits, receiving terminal some transmission channels can receive secret information wherein, specific practice is, frame head mark is searched in the data received, if the match is successful, then illustrate that this passage in this section of voice flow comprises secret information, according to Information encapsulation form, the reverse procedure inserted according to information extracts secret information.
4.2.2 according to method of calibration, receiving terminal calculates the identifying code of the frame length of the information received, numbering and secret information three partial contents, and and the identifying code part of the information received compare, if both are consistent, verification is passed through, illustrate that secret information correctly transmits, turn 4.2.3; Otherwise illustrate that the prime information that the information that receives and the other side send is inconsistent, there is mistake in transmitting procedure, turns 4.2.1.
4.2.3 receiving terminal processes secret information.Information frame is distinguished into different types by the vehicle indicator section according to the information received, thus takes different process.If numbering is not 0, then this frame is secret information frame or Air conduct measurement frame, needs to send data validation frame to the other side, and specific practice sends order to one's own side's transmitting terminal, require that the transmitting terminal of one's own side sends one with the confirmation Frame being numbered parameter received, turn 4.2.4; If be numbered 0, then this frame is data validation frame, sends with the message being numbered parameter received so to the transmitting terminal of one's own side, and the information frame Successful transmissions of this numbering of notice transmitting terminal, turns 4.2.1.
4.2.4 information is merged reduction by receiving terminal.For the information newly received, the information before received connects, if having received last packet in once communication, so information is decrypted after connecting, just can restore according to the inverse process of the other side's transmitting terminal cryptographic operation the secret information that the other side sends over, turn 4.2.1.
Fig. 5 is the diagram that receiving terminal of the present invention receives information.
Receiving terminal obtain from VoIP software voice flow L that the other side sends over ", then according to the reverse procedure that four different passage secret informations insert, extract the data of the insertion position in four transmission channels simultaneously.If secret information correctly transmits, receiving terminal some transmission channels can receive secret information wherein, specific practice is, frame head mark is searched in the data received, if the match is successful, then illustrate that this passage in this section of voice flow comprises secret information, according to Information encapsulation form, the reverse procedure inserted according to information extracts secret information.

Claims (7)

1., based on an information concealing method for the voice flow of pulse code modulation speech coding, it is characterized in that comprising the following steps:
The first step, build communication system, communication system is made up of the both sides carrying out voice call, secret information is hidden in voice flow and completes information transmission by the both sides of communication, the both sides of communication are by transmitting terminal and receiving terminal two fatware module composition, the information that transmitting terminal will send is inserted into and sends in the voice flow of the other side, and receiving terminal receives voice flow from the other side's transmitting terminal, from voice flow, extract secret information;
Second step, build 4 information transfer channels, the utilized insertion position being numbered the pattern of 0 ~ 3 in G.711 μ-law i.e. μ pulse code modulation speech coding is utilized to build multiple information transfer channel, be numbered the utilized insertion position of the pattern of 0 for wxyz, be numbered the utilized insertion position of the pattern of 1 for xyz, be numbered the utilized insertion position of the pattern of 2 for yz, be numbered the utilized insertion position of the pattern of 3 for z, build information transfer channel and need the set of modes M and the insertion position P that determine information transmission, concrete grammar is: the z position that namely pattern 0 ~ 3 is numbered the pattern-coding value of 0 ~ 3 forms No. 0 information transfer channel, the y position that namely pattern 0 ~ 2 is numbered the pattern-coding value of 0 ~ 2 forms No. 1 information transfer channel, the x position that namely pattern 0 ~ 1 is numbered the pattern-coding value of 0 ~ 1 forms No. 2 information transfer channels, the w position that namely pattern 0 is numbered the pattern-coding value of 0 forms No. 3 information transfer channels,
3rd step, design information encapsulation format, Information encapsulation form is made up of secret information, frame head mark, frame length, numbering, check code, and the frame format that frame head attribute field communicates by both party determines, indicates the beginning of a new frame; Frame length field represents the bit number of whole information frame; Number field is the mark of Frame, for the data recombination after segmentation is provided order by recipient, the foundation distinguishing different types of data frame is provided simultaneously, is numbered the data validation frame that 0 representative information correctly receives, be numbered-1 and represent Air conduct measurement frame when passage leaves unused; Secret information field is the secret information that will transmit; Check code field is result frame length, numbering and secret information three parts calculated according to method of calibration;
4th step, transmitting terminal and receiving terminal walk abreast the transmission of the information of carrying out and reception:
The transmitting terminal of 4.1 transmit legs carries out the transmission of information according to the following steps:
4.1.1 preliminary treatment is carried out to secret information S, obtain the packets of information S ' after encapsulating 1, S ' 2s ' ks ' n, method is: first encrypted by S, then the S after encryption is divided into the n block message S that length is PP, unit is bit 1, S 2s ks n, then according to Information encapsulation form, by little block message S knamely secret information and its frame head mark, frame length, numbering, check code are packaged into packets of information S ' k, 1≤k≤n;
4.1.2 initialization is carried out to variable: by information transfer channel sequence number C nOWbe initialized as 3, variable k is initialized as 1;
4.1.3 by packets of information S ' kbe inserted in voice flow L: from VoIP converses software and Voice over IP software, take out the voice flow L that will send to recipient, according to the channel number determined in second step and the relation that can utilize insertion position, find the information transfer channel C of current use nOWutilized insertion position corresponding in L, then by S ' kreplacing these by bit can utilize insertion position and information to insert position, obtains L ';
4.1.4 carry out tonequality to L ' dynamically to make up, voice flow L after dynamically being made up ", method is:
4.1.4.1 insert the adjacent w of position, x, y, z from information and select to make up position: it is y that No. 0 information transfer channel makes up position, and it is x and z that No. 1 information transfer channel makes up position, and it is w and y that No. 2 information transfer channels make up position, and it is x that No. 3 information transfer channels make up position;
4.1.4.2 carry out and dynamically make up, making up a possible values has two, is respectively 0 or 1, and making to make up position has multiple combination mode, as following table:
For each combination making up position of the information transfer channel of current use, change the position that makes up of the voice coder code value after insertion information into this combination respectively, then with insertion information before voice coder code value make comparisons, select the combination that difference is minimum, by the voice coder code value after insertion information make up position change into this combination dynamically made up after voice flow L ", described difference is minimum refers to that the absolute value of the difference of the encoded radio before and after having carried out making up is minimum;
4.1.5 L " is submitted to VoIP software, is sent to the receiving terminal of recipient by network by the transmitting terminal of transmit leg;
4.1.6 reply is waited for: the receiving terminal of transmit leg detects the confirmation packet that the transmitting terminal that whether receives recipient sends over, if at T rdo not receive confirmation packet in time, turn 4.1.7; If the receiving terminal of transmit leg detects successfully receive confirmation packet, then k=k+1, turn 4.1.8; Described T rdetermine according to concrete network delay;
4.1.7 passage is adjusted upward: if the receiving terminal N continuous of transmit leg dangersecondaryly do not receive the confirmation packet, and if C nOW<3, then C nOW=C nOW+ 1, turn 4.1.9; N dangerfor positive integer;
4.1.8 passage is adjusted downwards: if transmit leg N continuous safesecondary successfully send information and do not occur time-out retransmit, and if C nOW>0, C nOW=C nOW-1; N safefor positive integer;
4.1.9 single sends and terminates, and whether transmit leg detects has data validation bag to need to send, if had, puts S k' for confirming packet, turn 4.1.3; If k=0, turn 4.1.1; If 0<k<n, put k=k+1, turn 4.1.3; If duration T testdo not send task, and k>=n, then by S k' be set to Air conduct measurement packet, turn 4.1.3; All the other situations perform 4.1.9 in time delay after 1 second again; T testdetermine according to transmission delay;
The receiving terminal of 4.2 recipients carries out the reception of information according to the following steps:
4.2.1 receiving terminal obtain from VoIP software voice flow L that the other side sends over ", then according to the reverse procedure that four different passage secret informations insert, extract the data of the insertion position in four transmission channels simultaneously;
4.2.2 receiving terminal is verified information: according to check code field method of calibration used, receiving terminal calculates the identifying code of the frame length of the information received, numbering and secret information three partial contents, and compare, if both unanimously, turn 4.2.3 with the identifying code part of the information received; Otherwise turn 4.2.1;
4.2.3 receiving terminal processes secret information: if numbering is not 0, then send order to one's own side's transmitting terminal, require that the transmitting terminal of one's own side sends one with the confirmation Frame being numbered parameter received, turn 4.2.4; If be numbered 0, then this frame is data validation frame, sends to the transmitting terminal of one's own side with the message being numbered parameter received, and the information frame Successful transmissions of this numbering of notice transmitting terminal, turns 4.2.1;
4.2.4 information is merged reduction by receiving terminal: for the information newly received, the information before received connects, if have received last packet in once communication, so information is decrypted after connecting, restore according to the inverse process of the other side's transmitting terminal cryptographic operation the secret information that the other side sends over, turn 4.2.1.
2. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, is characterized in that described T r3 times that are arranged to the receiving terminal transmission round-trip delay of data from the transmitting terminal of transmit leg to recipient.
3. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, is characterized in that described N danger>=2, N safe>=10.
4. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, is characterized in that T testbe set between 5 seconds to 30 seconds.
5. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, it is characterized in that the specific practice that receiving terminal extracts the data of the insertion position in four transmission channels is, frame head mark is searched in the information received, if the match is successful, then illustrate in this section of voice flow and comprise secret information, according to Information encapsulation form, the reverse procedure inserted according to information extracts information.
6. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, is characterized in that described method of calibration refers to CRC cyclic redundancy check (CRC), parity check, ECC verification, MD5 verification.
7. the information concealing method of a kind of voice flow based on pulse code modulation speech coding as claimed in claim 1, it is characterized in that described reverse procedure refers to according to the channel number determined in second step and the relation that can utilize insertion position, find each passage in L " the utilized insertion position of middle correspondence; then extract merging on relevant position also, obtain the information on this passage.
CN201310010004.3A 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation Expired - Fee Related CN103023630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310010004.3A CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310010004.3A CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Publications (2)

Publication Number Publication Date
CN103023630A CN103023630A (en) 2013-04-03
CN103023630B true CN103023630B (en) 2015-01-21

Family

ID=47971795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310010004.3A Expired - Fee Related CN103023630B (en) 2013-01-11 2013-01-11 Method for hiding information of speech stream on basis of speech coding by pulse code modulation

Country Status (1)

Country Link
CN (1) CN103023630B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104269175B (en) * 2014-08-28 2017-04-05 华侨大学 A kind of ip voice steganography method matched based on Best similarity degree
CN109257325A (en) * 2017-07-13 2019-01-22 北京陌陌信息技术有限公司 Transmit the method, apparatus and computer readable storage medium of private information
CN107947898B (en) * 2017-11-15 2020-08-07 深圳大学 Information detection method and device based on optimized grouping variance and receiving equipment
CN110166491A (en) * 2019-06-26 2019-08-23 深圳市速普瑞科技有限公司 Transmission system and transmission method between railway intranet server and external network server
CN111816209A (en) * 2020-06-19 2020-10-23 天通畅达(深圳)科技有限公司 Voice switching method and device based on voice quality evaluation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604527A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Under the VoIP environment based on the method for the hidden transferring of wideband voice of G.711 encoding
CN101604523A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 In voice coding G.711, hide the method for redundant information
CN102522092A (en) * 2011-12-16 2012-06-27 大连理工大学 Device and method for expanding speech bandwidth based on G.711.1

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604527A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Under the VoIP environment based on the method for the hidden transferring of wideband voice of G.711 encoding
CN101604523A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 In voice coding G.711, hide the method for redundant information
CN102522092A (en) * 2011-12-16 2012-06-27 大连理工大学 Device and method for expanding speech bandwidth based on G.711.1

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
A Technique of Lossless Steganography for G.711 Telephony Speech;Aoki, N.;《Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP "08 International Conference on 》;20080817;第608-611页 *
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams;Erchi Xu, et al.;《Network-Based Information Systems (NBiS), 2011 14th International Conference on》;20110909;第612-617页 *
Building Practical Self Organization Networks on Heterogeneous Wireless Modems;Zhu Tang, et al.;《Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on 》;20110602;第388-393页 *
Information Hiding in Real-Time VoIP Streams;Chungyi Wang, et al.;《ultimedia, 2007. ISM 2007. Ninth IEEE International Symposium on》;20071212;第255-262页 *
Thwarting audio steganography attacks in cloud storage systems;Bo Liu, et al.;《Cloud and Service Computing (CSC), 2011 International Conference on》;20111214;第259-265页 *
VISOR:A Pratical VoIP Steganography Platform;Ziling Wei, et al.;《Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on》;20111218;第370-372页 *

Also Published As

Publication number Publication date
CN103023630A (en) 2013-04-03

Similar Documents

Publication Publication Date Title
CN103841118B (en) Method for constructing reliable two-way covert channel based on TCP effective loads
Zhou et al. Joint physical-application layer security for wireless multimedia delivery
CN103023630B (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN103684794B (en) A kind of communication data encipher-decipher method based on the AES of DES, RSA, SHA 1
CN103402198B (en) A kind of method that radio communication terminal encryption parameter transmits
CN101478391B (en) IP voice hidden communication method based on stream encryption
CN103414686B (en) A kind of view data secure transmission system supporting transparent transcoding
US20070237144A1 (en) Transporting authentication information in RTP
CN101394273A (en) Multichannel ciphered information transmission method
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN207234973U (en) Video conferencing system based on quantum cryptography
CN106921485A (en) Encrypting and decrypting method based on matrix operation
WO2014094227A1 (en) Communication method, system and device for optical network system
CN103002406B (en) A kind of voice encryption method being applied to arrowband radio digital communication system
CN103096304A (en) Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal
CN103945371A (en) End to end encryption synchronization method
CN107154855A (en) The anti-omnipotent attack secure network coding method signed based on homomorphism linear subspaces
CN102611557A (en) Safe network coding data transmission method based on knapsack cryptosystem
CN108540287A (en) Internet of Things safety management encryption method
CN102984122A (en) Internet protocol (IP) voice covert communication method based on adaptive multi-rate wideband (AMR-WB) code rate camouflage
Grabska et al. Steganography in WiMAX networks
US7774677B2 (en) Method and device for transmitting information with verification of unintentional and intentional transmission errors
CN111641500A (en) Encryption and decryption method for unmanned aerial vehicle wireless video transmission safety
Zaidi et al. Coding schemes for relay-assisted information embedding
CN108111515A (en) A kind of End-to-End Security communication encrypting method suitable for satellite communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150121

Termination date: 20210111

CF01 Termination of patent right due to non-payment of annual fee