CN100359908C - Privacy telephone - Google Patents
Privacy telephone Download PDFInfo
- Publication number
- CN100359908C CN100359908C CNB2004100137068A CN200410013706A CN100359908C CN 100359908 C CN100359908 C CN 100359908C CN B2004100137068 A CNB2004100137068 A CN B2004100137068A CN 200410013706 A CN200410013706 A CN 200410013706A CN 100359908 C CN100359908 C CN 100359908C
- Authority
- CN
- China
- Prior art keywords
- module
- voice
- input
- signal
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The present invention discloses a new secret telephone, namely a privacy telephone, based on the principle of voice encryption and hiding. The present invention is composed of voice transmitting device (20) and a voice receiving device (30), wherein the voice transmitting device (20) is composed of a secret voice input module (28), a voice storage and regeneration module (21), a voice signal compression module (24) at low bit rate, an encryption module (25), a secret information embedded module (22), a voice synthesis module (23) and a D/A converting module (26); a carrier voice signal (101) is input to one input end of the secret information embedded module (22), and the carrier voice signal (101) and encrypted secret information (105) are embedded in the secret information embedded module (22); the voice receiving device (30) is composed of an A/D converting module (31), a secret information detecting and extracting module (32), a secret voice decompression module (33) and a voice output module (34); secret information (303) is extracted from the secret information detecting and extracting module (32) and is input to the secret voice decompression module (33), and the secret information (303) is reduced to a secret voice signal (306). Because the secret information is embedded in a carrier signal for transmission after being encrypted, and the confidential performance of the secret information is enhanced.
Description
Technical field:
The present invention relates to a kind of novel code phone based on voice encryption and hiding notion.The technical field that relates to comprises the speech secure communication technology, audio digital signals treatment technology, encryption technology and Information Hiding Techniques.The present invention is a collection digital speech processing technology, and digital-scrambling techniques and Information Hiding Techniques are in the voice communication terminal of one.It reaches the purpose that improves the voice communication system fail safe by the duplicity of third party's interception facility is disturbed.
Background technology: communication is the nervous system of modern society.In the communication system of military commanding and secret department, the problem that people are concerned about is how to improve the confidentiality of communication, makes Content of Communication do not intercepted and not captured or crack.Traditional private communication technology is divided into two classes substantially: (1) transmission line secrecy technology its objective is Content of Communication is not is not intercepted and captured.(2) information encryption has been intercepted and captured signal of communication even its objective is the enemy, can not crack the content of communication.Simple by the link encryption technology, fail safe that can not guarantee information need combine with information encryption.In trade secret information and personal information exchange, the public information transmission systems that adopt more, for example public telephone network, the Internet, wireless communication system or the like are difficult to that in this case link encryption is had only the fail safe of the mode guarantee information that adopts information encryption.Voice encryption communication means commonly used is that voice signal is carried out time domain or frequency domain scrambling.The time domain scrambling method is divided into plurality of sections with time-domain signal, then according to the order exchange of key with each section.The frequency domain scrambling method is divided into plurality of sections with the frequency spectrum of signal, according to the order exchange of key with each section.The scramble mode can adopt analog form, also can adopt analog to digital-analog form.The principle of scramble is to reduce the intelligibility of scramble voice as far as possible, guarantees the intelligibility of reduction back voice signal simultaneously.Information hiding is a kind of new technology that development in recent years is got up.Information Hiding Techniques is that secret information is joined in the Digital Media, image for example, and video is in the audio signal.The secret information that embeds is had following basic demand: (1) is sentience not, and promptly primary signal is compared with the signal that has embedded secret information, and people's sense organ can not differentiated the difference of the two.(2) robustness, promptly the signal that has added secret information is carried out common signal processing operations after, still can extract secret information.Common signal processing operations comprises filtering, add certain distribute and the noise of power, sample rate conversion, Signal Compression, with the communication channel of signal by having certain distortion etc.(3) fail safe requires the Information hiding system can resist malicious attack.Information Hiding Techniques has been compared following advantage with secrecy technology: (1) if adopt encryption technology, the content of encryption is not in case after the deciphering, just have confidentiality fully.Adopt Information Hiding Techniques, secret information and carrier signal are combined closely, and revise or delete secret information by force and can cause degrading of primary signal.(2) signal of Jia Miing causes interceptor's attention easily, causes the hope that they crack.And adopt the time slot scrambling of Information Hiding Techniques can not cause interceptor's attention.Can adopt simultaneously to hide to combine, concealed information is encrypted again, make the interceptor extract false information with deception.
Summary of the invention:
For on the basis of existing cryptographic communication system, further improve the confidentiality of voice communication, the present invention has adopted the Information Hiding Techniques and the encryption technology of secret voice signal, in usual speech channel, conceal close communication, make after treatment voice signal and the difference between the primary speech signal very little, people's auditory system can not perception the two difference, Content of Communication can not cause interceptor's attention like this, thereby has further improved the fail safe of secure communication.The present invention realizes by following proposal: a kind of Privacy telephone, it is made up of speech transmitting apparatus 20 and speech receiving equipment 30, speech transmitting apparatus 20 is made up of secret voice input module 28, voice storing, regenerating module 21, low bit rate Speech Signal Compression module 24, encrypting module 25, secret information merge module 22, phonetic synthesis module 23 and D/A modular converter 26, and carrier voice signal 101 is stored in the voice storing, regenerating module 21.Carrier voice signal 101 is input to an input of secret information merge module 22, and the secret voice signal 102 that the caller sends is input in the secret voice input module 28, enters then in the low bit rate Speech Signal Compression module 24.Voice signal 104 after the compression is input in the encrypting module 25, the voice signal 104 of encrypting module 25 after according to the Speech Signal Compression of key after to compression encrypted and generated the secret information of encrypting 105, carrier voice signal 101 and the secret information of encrypting 105 are finished the information embedding operation in secret information merge module 22, generate the derived parameter of linear forecasting parameter
kWith predicted residual signal e (n), the derived parameter of linear forecasting parameter
kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module 23
, latent cipher tone signal
The latent cipher tone signal 108 that is converted to analog quantity behind the input D/A modular converter 26 enters in the channel of public switched telephone network (PSTN) 27, and speech receiving equipment 30 is made up of analog-to-digital converting module 31, secret information Detection and Extraction module 32, secret voice decompression module 33 and voice output module 34.In the public switched telephone network (PSTN) 27 in the respective channel the latent cipher tone signal 108 of analog quantity be input in the analog-to-digital converting module 31, analog-to-digital converting module 31 output digitized voice signals 302, digitized voice signal 302 is input in the secret information Detection and Extraction module 32, extracts secret information 303 in secret information Detection and Extraction module 32.Secret information 303 is input in the secret voice decompression module 33, is reduced into secure voice signal 306 in secret voice decompression module 33, and secure voice signal 306 input voice output modules 34 transform the voice signal that can understand for the people and spread out of.
Use communicating pair of the present invention to have the Privacy telephone that speech transmitting apparatus and speech receiving equipment are formed simultaneously, thereby can carry out two-way communication.The secret voice signal that transmit leg adopts Privacy telephone speech transmitting apparatus to send is embedded in the carrier voice signal, sends to then in the voice transfer channel.Transmit leg is selected employed carrier voice by telephone keyboard when the communication beginning, the carrier voice signal is stored in the voice storage chip.The carrier voice signal provides carrier for the transmission of secret voice signal, simultaneously the information that comprises of these voice signals be unessential, can not cause interceptor's attention, thereby played the purpose of covering and pretending.In the input carrier voice signal, secret voice input module 28 receives the secret voice signal of input in real time, adopt low bit rate Speech Signal Compression algorithm to secret Speech Signal Compression then, and secret information is encrypted by encrypting module, secret information after the encryption is input in the secret information merge module 22 simultaneously with the carrier voice signal of covering usefulness, in the secret information merge module, by the carrier voice signal is carried out linear prediction analysis, select voiced sound signal wherein to embed secret information, the embedding of secret information is to realize by the linear forecasting parameter of revising voice signal, uses voice signal to produce the model synthetic speech signal at last.Synthetic audio digital signals replaces primary speech signal to be input in the voice channel through digital-to-analog conversion back.The recipient, adopt Privacy telephone speech receiving equipment to come the Detection and Extraction secret information.The voice signal of input enters secret information Detection and Extraction module through after the analog/digital conversion, 32 pairs of input speech signals of secret information Detection and Extraction module carry out linear prediction analysis, extract the secret information that embeds, the bit stream that generates is reduced to secret voice signal through low bit rate voice decompression algorithm decompress(ion) and after deciphering, and spreads out of by the microphone of voice output module 34 from Privacy telephone.Adopt the method for the invention, secret voice can be hidden in the common voice communication signals and transmit,, also can not wake suspicion even intercepted and captured by the listener.Transmit owing to being embedded in the carrier signal again after secret information is encrypted simultaneously, improved the security performance of secret information.In addition, for resisting digital-to-analog conversion and transmission-channel distortion to synchronous influence in the information detection, when information embeds, selected the voiced sound signal in the voice signal as embedding the zone, in the test side input information is carried out synchronously, detect performance thereby improve, so the present invention is particularly useful for the bigger public switched telephone network (PSTN) of distortion.
Description of drawings:
Fig. 1 is a structural representation of the present invention, and Fig. 2 is the structural representation of embodiment of the present invention two, and Fig. 3 is the structural representation of embodiment of the present invention three, and Fig. 4 is the principle key diagram of execution mode three.
Embodiment:
Embodiment one: specify present embodiment below in conjunction with Fig. 1.Present embodiment is made up of speech transmitting apparatus 20 and speech receiving equipment 30, speech transmitting apparatus 20 is made up of secret voice input module 28, voice storing, regenerating module 21, low bit rate Speech Signal Compression module 24, encrypting module 25, secret information merge module 22, phonetic synthesis module 23 and D/A modular converter 26, carrier voice signal 101 is stored in the voice storing, regenerating module 21, stored the carrier voice signal 101 of frequent use in the voice storing, regenerating module 21, the user selects employed carrier voice signal 101 by the phone keyboard.Carrier voice signal 101 is input to an input of secret information merge module 22, the secret voice signal 102 that the caller sends is input in the secret voice input module 28, enter then in the low bit rate Speech Signal Compression module 24, it is the following standard-compression algorithm of 4kb/s, for example LPC10 or Multi-Band Excitation (MBE) that compression algorithm adopts bit rate commonly used.Voice signal 104 after the compression is input in the encrypting module 25, encrypting module 25 is encrypted the voice signal after compressing 104 according to key and is generated the secret information of encrypting 105, carrier voice signal 101 and the secret information of encrypting 105 are finished the information embedding operation in secret information merge module 22, generate the derived parameter of linear forecasting parameter
kWith predicted residual signal e (n), the derived parameter of linear forecasting parameter
kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module 23
, latent cipher tone signal
The latent cipher tone signal 108 that is converted to analog quantity behind the input D/A modular converter 26 enters in the channel of public switched telephone network (PSTN) 27, and speech receiving equipment 30 is made up of analog-to-digital converting module 31, secret information Detection and Extraction module 32, secret voice decompression module 33 and voice output module 34.In the public switched telephone network (PSTN) 27 in the respective channel the latent cipher tone signal 108 of analog quantity be input in the analog-to-digital converting module 31, analog-to-digital converting module 31 output digitized voice signals 302, digitized voice signal 302 is input in the secret information Detection and Extraction module 32, extracts secret information 303 in secret information Detection and Extraction module 32.Secret information 303 is input in the secret voice decompression module 33, is reduced into secure voice signal 306 in secret voice decompression module 33, and secure voice signal 306 input voice output modules 34 transform the voice signal that can understand for the people and spread out of.
Embodiment two: specify present embodiment below in conjunction with Fig. 2.The difference of present embodiment and execution mode one is, secret information merge module 22 is by linear prediction analysis unit 43, voiced sound signal extraction unit 49 and linear forecasting parameter are revised unit 45 and are formed, linear forecasting parameter is revised unit 45 by calculating linear prediction derived parameter part 45-1, revise linear prediction derived parameter part 45-2 and be transformed to linear forecasting parameter part 45-3 and form, carrier voice signal 101 is input to the input of voiced sound signal extraction unit 49 and an input of linear prediction analysis unit 43, the output of voiced sound signal extraction unit 49 connects another input of linear prediction analysis unit 43, and linear prediction analysis unit 43 calculates linear predictor coefficient a
k, linear predictor coefficient a
kThe derivation coefficient s that linear prediction derived parameter part 45-1 draws linear predictor coefficient is calculated in input
i, s
iInput is revised linear prediction derived parameter part 45-2 and is drawn amended linear prediction derived parameter
Input is transformed to the derived parameter that linear forecasting parameter part 45-3 draws linear forecasting parameter
kSecret information merge module 22 is mainly finished digitized secret information bit is embedded in the audio digital signals.Carrier voice signal 101 is divided into two-way and is input to respectively in the voiced sound signal extraction unit 49 to detect in voiced sound signal and the linear prediction analysis unit 43 and does linear prediction analysis.Adopt voiced sound signal extraction unit 49 to realize the synchronous of built-in end and test side in the present invention, improve the robustness of embedding information simultaneously.The voiced sound signal that voiced sound signal extraction unit 49 detects in the voice signal.The present invention embeds information spinner in the voiced sound signal will consider that (1) voiced sound signal energy is higher, thereby the energy of the information of embedding strengthens, improved the robustness of embedding information, the synchronous mark the when starting point of (2) voiced sound signal can be used as information extraction to channel distortions.The detection of voiced sound signal is handled in the document at voice signal detailed argumentation, has adopted the detection method based on short-time energy among the present invention.43 pairs of voiced sound signals of linear prediction analysis unit carry out linear prediction analysis.Linear prediction analysis adopts following all-pole modeling to come the sound channel system of modeling personification:
Wherein G is the gain of model, and P is the order of fallout predictor, a
kIt is linear predictor coefficient.With a
kFor parameter constitutes inverse filter the filtering of carrier voice signal is obtained predicted residual signal:
Wherein, x (n) is the sampled value of carrier audio signal.Predicted residual signal is used for driving follow-up voice signal synthetic model.Synthetic model has adopted the represented all-pole modeling of (1) formula.If in the parameter modification process, directly revise prediction multinomial coefficient a
k, the limit that then is difficult to guarantee model all in unit circle, thereby can not guarantee the stability of synthesis system.For guaranteeing the stability of synthesis system, directly do not revise linear predictor coefficient a among the present invention
k, but the derived parameter of modification linear predictor coefficient
k, for example log area ratio parameter and line spectrum pairs parameter.Wherein the variation of line spectrum pairs parameter only influences the speech manual at contiguous this parameter respective frequencies place, institute so that control watermark embedding to the influence of short-time spectrum.Through the linear predictor coefficient a that obtains after the linear prediction analysis
kOutput to parameter modifying unit 45 with predicted residual signal e (n).In parameter modifying unit,, revise the derived parameter of linear predictor coefficient according to the information bit of input.The modification of linear forecasting parameter is adopted the method for quantification index modulation: get certain quantization step d, quantized interval is labeled as ' 0 ' ' 1 ' form of asking mutually, according to the information bit that will embed, respectively the linear predictor coefficient derived parameter is rounded in the interval of respective markers.If s
iBe i linear forecasting parameter, to s
iUse step-length d
iCarry out the quantification index modulation.At s
iIn the information bit that will embed be w
i, and w
i∈ 0,1}.The embedding algorithm is:
Work as w
i=0 o'clock, with s
iBe rounded on the even-multiple of quantization step, promptly
Work as w
i=1 o'clock, with s
iBe rounded on the odd-multiple of quantization step, promptly
With amended linear prediction derived parameter
Be converted into linear predictor coefficients
k, k=1 wherein, 2 ..., P.The predicted residual signal of using (2) formula to obtain in phonetic synthesis module 23 drives by amended predictive coefficient
kThe full poles track model that constitutes can be synthesized the latent cipher tone signal after the embedding information
Document about the voice signal processing: 1, Hu Guangrui, speech processes and identification, Shanghai scientific and technical literature publishing house, front page in 1994, Shanghai.2, T.W.Parrsons. speech processes. Wen Chengyi, Chang Guocen, Wang Huazhou, Lai Jinfu translate. the .1990 of National Defense Industry Press front page. Beijing.
Embodiment three: specify present embodiment below in conjunction with Fig. 3, Fig. 4.The difference of present embodiment and execution mode one is, secret information Detection and Extraction module 32 is by voiced sound detecting signal unit 71, linear prediction analysis unit 73, bit value detecting unit 75 is formed, the input of voiced sound detecting signal unit 71 connects the input of linear prediction analysis unit 73 and the output of analog-to-digital converting module 31, the output of voiced sound detecting signal unit 71 connects another input of linear prediction analysis unit 73, the output of linear prediction analysis unit 73 connects the input of bit value detecting unit 75, and the output of bit value detecting unit 75 connects the input of secret voice decompression module 33.Digitized voice signal 302 is input to voiced sound detecting signal unit 71 and linear prediction analysis unit 73 respectively.The voiced segments that voiced sound detecting signal unit 71 detects in the input speech signal finds the position that embeds secret information, and this process is called synchronizing process.Synchronizing process plays an important role in the present invention, because the influence of delay, distortion and Signal Compression effect in the channel can produce desynchronization.The present invention determines the starting point of secret information embedded location by detecting the voiced sound signal.Linear prediction analysis unit 73 is divided into the Frame of about 20 milliseconds of length with the voiced sound signal, adopts linear prediction analysis to obtain linear predictor coefficient and also derives used derived parameter: sound channel log area ratio coefficient or line spectrum pairs parameter
Bit value detecting unit 75 receives the derived parameter of the linear predictor coefficient of linear prediction analysis unit 73 outputs, mark according to the interval at coefficient quantization value place is determined embedded bit value, for example, if the interval mark at coefficient place is ' 1 ', then the bit value of corresponding extraction is ' 1 '.Extraction algorithm is:
D wherein
iIt is the quantization step of i parameter.Information bit string after the extraction outputs to follow-up secret voice decompression module 33.Adopt above-mentioned Privacy telephone can realize two-way latent close communication, when using telephone channel transport vehicle voice signal, utilize the latent cipher of latent secret letter road real-time Transmission tone signal.Latent close communication channel adopts half-duplex mode, and after a side of communication was sent completely concealed information, the opposing party can use latent secret letter road to send concealed information.Compare with existing secure communication unit, the present invention has following technical characteristic: (1) is applicable to existing voice transfer channel, comprises public telephone network, wireless digital channel, internet voice transmission etc.(2) have covert property, communicating pair utilizes private communication channel to transmit security information, can not cause listener's attention.(3) confidentiality, the information via encryption in the latent secret letter road, the communicating pair that only has key can be understood, and has prevented that the third party who has this equipment from stealing.Encryption method can adopt symmetric cryptography or asymmetric cryptosystem.(4) have anti-tamper prompt facility, embed information specific as anti-tamper information in private communication channel, if communicating pair is found anti-tamper information dropout, promptly decidable carrier voice signal is distorted.Typical implementation of the present invention is that both call sides uses public switched telephone network (PSTN) to transmit secret voice messaging, as shown in Figure 4.The present invention can embed in the ordinary telephone set, and speech transmitting apparatus 20 adopts the plain old telephone microphone, encrypts and embeds algorithm and adopt the special digital signal processor to realize.Speech receiving equipment 30 adopts the ordinary telephone set receiver.In voice storing, regenerating module 21, stored carrier voice signal commonly used.Before the conversation beginning, a side of conversation at first chooses this employed carrier voice signal of conversing by telephone keyboard, and transmit leg is input to secret voice signal in the Privacy telephone speech transmitting apparatus 20 by telephone microphone, and is embedded in the carrier voice signal.The recipient uses Privacy telephone speech receiving equipment 30 to obtain voice signal from public switched telephone network (PSTN), extracts secret voice signal, is sent in listener's ear by telephone receiver.Certainly, according to thinking of the present invention and algorithm, can adopt other different implementations, each processing module can adopt software or hardware to realize.According to thinking of the present invention and technical descriptioon, one has voice signal and handles knowledge, and the technical staff of cryptographic algorithm knowledge and computer and electronic skill can dispose the specific implementation of each several part according to concrete application scenarios.
Claims (3)
1, a kind of Privacy telephone, it is made up of speech transmitting apparatus (20) and speech receiving equipment (30), it is characterized in that speech transmitting apparatus (20) is by secret voice input module (28), voice storing, regenerating module (21), low bit rate Speech Signal Compression module (24), encrypting module (25), secret information merge module (22), phonetic synthesis module (23) and D/A modular converter (26) are formed, carrier voice signal (101) is stored in the voice storing, regenerating module (21), carrier voice signal (101) is input to an input of secret information merge module (22), the secret voice signal (102) that the caller sends is input in the secret voice input module (28), enter then in the low bit rate Speech Signal Compression module (24), voice signal after the compression (104) is input in the encrypting module (25), encrypting module (25) is encrypted the voice signal (104) after compressing according to key and is generated the secret information of encrypting (105), carrier voice signal (101) and the secret information of encrypting (105) are finished the information embedding operation in secret information merge module (22), generate the derived parameter of linear forecasting parameter
kWith predicted residual signal e (n), the derived parameter of linear forecasting parameter
kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module (23)
Latent cipher tone signal
The latent cipher tone signal (108) that is converted to analog quantity behind the input D/A modular converter (26) enters in the channel of public switched telephone network (PSTN) (27), speech receiving equipment (30) is by analog-to-digital converting module (31), secret information Detection and Extraction module (32), secret voice decompression modules (33) and voice output module (34) are formed, the latent cipher tone signal (108) of analog quantity is input in the analog-to-digital converting module (31) in the middle respective channel of public switched telephone network (PSTN) (27), analog-to-digital converting module (31) output digitized voice signal (302), digitized voice signal (302) is input in the secret information Detection and Extraction module (32), in secret information Detection and Extraction module (32), extract secret information (303), secret information (303) is input in the secret voice decompression module (33), be reduced into secure voice signal (306) in secret voice decompression module (33), secure voice signal (306) input voice output module (34) transforms the voice signal that can understand for the people and spreads out of.
2, Privacy telephone according to claim 1, it is characterized in that secret information merge module (22) is by linear prediction analysis unit (43), voiced sound signal extraction unit (49) and linear forecasting parameter are revised unit (45) and are formed, linear forecasting parameter is revised unit (45) by calculating linear prediction derived parameter part (45-1), revise linear prediction derived parameter part (45-2) and be transformed to linear forecasting parameter part (45-3) and form, carrier voice signal (101) is input to the input of voiced sound signal extraction unit (49) and an input of linear prediction analysis unit (43), the output of voiced sound signal extraction unit (49) connects another input of linear prediction analysis unit (43), and linear prediction analysis unit (43) calculates linear predictor coefficient (a
k), linear predictor coefficient (a
k) import and calculate the derivation coefficient (s that linear prediction derived parameter part (45-1) draws linear predictor coefficient
i), (s
i) input revises linear prediction derived parameter part (45-2) and draw amended linear prediction derived parameter (
i), (
i) input is transformed to the derived parameter ( that linear forecasting parameter part (45-3) draws linear forecasting parameter
k).
3, Privacy telephone according to claim 1 and 2, it is characterized in that secret information Detection and Extraction module (32) is by voiced sound detecting signal unit (71), linear prediction analysis unit (73), bit value detecting unit (75) is formed, the input of voiced sound detecting signal unit (71) connects the input of linear prediction analysis unit (73) and the output of analog-to-digital converting module (31), the output of voiced sound detecting signal unit (71) connects another input of linear prediction analysis unit (73), the output of linear prediction analysis unit (73) connects the input of bit value detecting unit (75), and the output of bit value detecting unit (75) connects the input of secret voice decompression module (33).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100137068A CN100359908C (en) | 2004-04-23 | 2004-04-23 | Privacy telephone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100137068A CN100359908C (en) | 2004-04-23 | 2004-04-23 | Privacy telephone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1571444A CN1571444A (en) | 2005-01-26 |
CN100359908C true CN100359908C (en) | 2008-01-02 |
Family
ID=34478262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100137068A Expired - Fee Related CN100359908C (en) | 2004-04-23 | 2004-04-23 | Privacy telephone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100359908C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI556226B (en) * | 2014-09-26 | 2016-11-01 | 威盛電子股份有限公司 | Synthesis method of audio files and synthesis system of audio files using same |
CN109347570B (en) * | 2018-11-26 | 2020-09-18 | 电子科技大学 | Hidden and safe communication method for hidden channel based on sound wave |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2138862Y (en) * | 1992-10-29 | 1993-07-21 | 李伟 | Enciphered telephone |
CN1084687A (en) * | 1992-09-23 | 1994-03-30 | 杨筑平 | Telephone set |
JPH09200367A (en) * | 1996-01-12 | 1997-07-31 | Meii Kyo | Personal information system to be used for a lot of people |
CN1267177A (en) * | 1999-03-10 | 2000-09-20 | 金斗容 | Digital portable mobile telephone set and method for voice data input/output and storage/regeneration |
CN1347614A (en) * | 1999-04-13 | 2002-05-01 | 诺基亚网络有限公司 | Method and system in telephone exchange system |
-
2004
- 2004-04-23 CN CNB2004100137068A patent/CN100359908C/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1084687A (en) * | 1992-09-23 | 1994-03-30 | 杨筑平 | Telephone set |
CN2138862Y (en) * | 1992-10-29 | 1993-07-21 | 李伟 | Enciphered telephone |
JPH09200367A (en) * | 1996-01-12 | 1997-07-31 | Meii Kyo | Personal information system to be used for a lot of people |
CN1267177A (en) * | 1999-03-10 | 2000-09-20 | 金斗容 | Digital portable mobile telephone set and method for voice data input/output and storage/regeneration |
CN1347614A (en) * | 1999-04-13 | 2002-05-01 | 诺基亚网络有限公司 | Method and system in telephone exchange system |
Also Published As
Publication number | Publication date |
---|---|
CN1571444A (en) | 2005-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101271690B (en) | Audio spread-spectrum watermark processing method for protecting audio data | |
CN100550723C (en) | Camouflage communication method based on speech recognition | |
CN102624518B (en) | Voice encryption and decryption method | |
CN108648761B (en) | Method for embedding blockchain account book in audio digital watermark | |
CN102074238A (en) | Linear interference cancellation-based speech secrete communication method | |
Tan et al. | A simple review of audio steganography | |
KR100791485B1 (en) | A Voice One Time Password Security Authentication System and Security Authentication Method Thereof | |
Faundez-Zanuy et al. | Speaker identification security improvement by means of speech watermarking | |
CN101908203B (en) | Image and audio recoding-based steganography prevention method | |
CN107689226A (en) | A kind of low capacity Methods of Speech Information Hiding based on iLBC codings | |
CN100359908C (en) | Privacy telephone | |
Sadkhan et al. | The trade-off between security and quality using permutation and substitution techniques in speech scrambling system | |
Timothy et al. | Embedding text in audio steganography system using advanced encryption standard, text compression and spread spectrum techniques in Mp3 and Mp4 file formats | |
Yuan et al. | Audio watermarking algorithm for real-time speech integrity and authentication | |
CN102984122A (en) | Internet protocol (IP) voice covert communication method based on adaptive multi-rate wideband (AMR-WB) code rate camouflage | |
Ambika et al. | Secure Speech Communication–A Review | |
Qi et al. | A speech privacy protection method based on sound masking and speech corpus | |
Chen et al. | End-to-end speech encryption algorithm based on speech scrambling in frequency domain | |
CN107483194A (en) | G.729 speech hiding algorithm based on non-zero pulses position and amplitude information | |
Shahadi et al. | Real-time scheme for covert communication based VoIP | |
CN104994500A (en) | Voice secrecy transmission method and device used for mobile phone | |
Huang et al. | Design and implementation of synchronized audio-to-audio steganography scheme | |
Deng et al. | A real-time secure voice communication system based on speech recognition | |
Khademi et al. | Audio steganography by using of linear predictive coding analysis in the safe places of discrete wavelet transform domain | |
Al-Ghamdi et al. | Improve the security for voice cryptography in the RSA algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080102 |