CN100359908C - Privacy telephone - Google Patents

Privacy telephone Download PDF

Info

Publication number
CN100359908C
CN100359908C CNB2004100137068A CN200410013706A CN100359908C CN 100359908 C CN100359908 C CN 100359908C CN B2004100137068 A CNB2004100137068 A CN B2004100137068A CN 200410013706 A CN200410013706 A CN 200410013706A CN 100359908 C CN100359908 C CN 100359908C
Authority
CN
China
Prior art keywords
module
voice
input
signal
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100137068A
Other languages
Chinese (zh)
Other versions
CN1571444A (en
Inventor
陆哲明
刘忠仁
颜斌
孙震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CNB2004100137068A priority Critical patent/CN100359908C/en
Publication of CN1571444A publication Critical patent/CN1571444A/en
Application granted granted Critical
Publication of CN100359908C publication Critical patent/CN100359908C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a new secret telephone, namely a privacy telephone, based on the principle of voice encryption and hiding. The present invention is composed of voice transmitting device (20) and a voice receiving device (30), wherein the voice transmitting device (20) is composed of a secret voice input module (28), a voice storage and regeneration module (21), a voice signal compression module (24) at low bit rate, an encryption module (25), a secret information embedded module (22), a voice synthesis module (23) and a D/A converting module (26); a carrier voice signal (101) is input to one input end of the secret information embedded module (22), and the carrier voice signal (101) and encrypted secret information (105) are embedded in the secret information embedded module (22); the voice receiving device (30) is composed of an A/D converting module (31), a secret information detecting and extracting module (32), a secret voice decompression module (33) and a voice output module (34); secret information (303) is extracted from the secret information detecting and extracting module (32) and is input to the secret voice decompression module (33), and the secret information (303) is reduced to a secret voice signal (306). Because the secret information is embedded in a carrier signal for transmission after being encrypted, and the confidential performance of the secret information is enhanced.

Description

Privacy telephone
Technical field:
The present invention relates to a kind of novel code phone based on voice encryption and hiding notion.The technical field that relates to comprises the speech secure communication technology, audio digital signals treatment technology, encryption technology and Information Hiding Techniques.The present invention is a collection digital speech processing technology, and digital-scrambling techniques and Information Hiding Techniques are in the voice communication terminal of one.It reaches the purpose that improves the voice communication system fail safe by the duplicity of third party's interception facility is disturbed.
Background technology: communication is the nervous system of modern society.In the communication system of military commanding and secret department, the problem that people are concerned about is how to improve the confidentiality of communication, makes Content of Communication do not intercepted and not captured or crack.Traditional private communication technology is divided into two classes substantially: (1) transmission line secrecy technology its objective is Content of Communication is not is not intercepted and captured.(2) information encryption has been intercepted and captured signal of communication even its objective is the enemy, can not crack the content of communication.Simple by the link encryption technology, fail safe that can not guarantee information need combine with information encryption.In trade secret information and personal information exchange, the public information transmission systems that adopt more, for example public telephone network, the Internet, wireless communication system or the like are difficult to that in this case link encryption is had only the fail safe of the mode guarantee information that adopts information encryption.Voice encryption communication means commonly used is that voice signal is carried out time domain or frequency domain scrambling.The time domain scrambling method is divided into plurality of sections with time-domain signal, then according to the order exchange of key with each section.The frequency domain scrambling method is divided into plurality of sections with the frequency spectrum of signal, according to the order exchange of key with each section.The scramble mode can adopt analog form, also can adopt analog to digital-analog form.The principle of scramble is to reduce the intelligibility of scramble voice as far as possible, guarantees the intelligibility of reduction back voice signal simultaneously.Information hiding is a kind of new technology that development in recent years is got up.Information Hiding Techniques is that secret information is joined in the Digital Media, image for example, and video is in the audio signal.The secret information that embeds is had following basic demand: (1) is sentience not, and promptly primary signal is compared with the signal that has embedded secret information, and people's sense organ can not differentiated the difference of the two.(2) robustness, promptly the signal that has added secret information is carried out common signal processing operations after, still can extract secret information.Common signal processing operations comprises filtering, add certain distribute and the noise of power, sample rate conversion, Signal Compression, with the communication channel of signal by having certain distortion etc.(3) fail safe requires the Information hiding system can resist malicious attack.Information Hiding Techniques has been compared following advantage with secrecy technology: (1) if adopt encryption technology, the content of encryption is not in case after the deciphering, just have confidentiality fully.Adopt Information Hiding Techniques, secret information and carrier signal are combined closely, and revise or delete secret information by force and can cause degrading of primary signal.(2) signal of Jia Miing causes interceptor's attention easily, causes the hope that they crack.And adopt the time slot scrambling of Information Hiding Techniques can not cause interceptor's attention.Can adopt simultaneously to hide to combine, concealed information is encrypted again, make the interceptor extract false information with deception.
Summary of the invention:
For on the basis of existing cryptographic communication system, further improve the confidentiality of voice communication, the present invention has adopted the Information Hiding Techniques and the encryption technology of secret voice signal, in usual speech channel, conceal close communication, make after treatment voice signal and the difference between the primary speech signal very little, people's auditory system can not perception the two difference, Content of Communication can not cause interceptor's attention like this, thereby has further improved the fail safe of secure communication.The present invention realizes by following proposal: a kind of Privacy telephone, it is made up of speech transmitting apparatus 20 and speech receiving equipment 30, speech transmitting apparatus 20 is made up of secret voice input module 28, voice storing, regenerating module 21, low bit rate Speech Signal Compression module 24, encrypting module 25, secret information merge module 22, phonetic synthesis module 23 and D/A modular converter 26, and carrier voice signal 101 is stored in the voice storing, regenerating module 21.Carrier voice signal 101 is input to an input of secret information merge module 22, and the secret voice signal 102 that the caller sends is input in the secret voice input module 28, enters then in the low bit rate Speech Signal Compression module 24.Voice signal 104 after the compression is input in the encrypting module 25, the voice signal 104 of encrypting module 25 after according to the Speech Signal Compression of key after to compression encrypted and generated the secret information of encrypting 105, carrier voice signal 101 and the secret information of encrypting 105 are finished the information embedding operation in secret information merge module 22, generate the derived parameter  of linear forecasting parameter kWith predicted residual signal e (n), the derived parameter  of linear forecasting parameter kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module 23
Figure C20041001370600051
, latent cipher tone signal The latent cipher tone signal 108 that is converted to analog quantity behind the input D/A modular converter 26 enters in the channel of public switched telephone network (PSTN) 27, and speech receiving equipment 30 is made up of analog-to-digital converting module 31, secret information Detection and Extraction module 32, secret voice decompression module 33 and voice output module 34.In the public switched telephone network (PSTN) 27 in the respective channel the latent cipher tone signal 108 of analog quantity be input in the analog-to-digital converting module 31, analog-to-digital converting module 31 output digitized voice signals 302, digitized voice signal 302 is input in the secret information Detection and Extraction module 32, extracts secret information 303 in secret information Detection and Extraction module 32.Secret information 303 is input in the secret voice decompression module 33, is reduced into secure voice signal 306 in secret voice decompression module 33, and secure voice signal 306 input voice output modules 34 transform the voice signal that can understand for the people and spread out of.
Use communicating pair of the present invention to have the Privacy telephone that speech transmitting apparatus and speech receiving equipment are formed simultaneously, thereby can carry out two-way communication.The secret voice signal that transmit leg adopts Privacy telephone speech transmitting apparatus to send is embedded in the carrier voice signal, sends to then in the voice transfer channel.Transmit leg is selected employed carrier voice by telephone keyboard when the communication beginning, the carrier voice signal is stored in the voice storage chip.The carrier voice signal provides carrier for the transmission of secret voice signal, simultaneously the information that comprises of these voice signals be unessential, can not cause interceptor's attention, thereby played the purpose of covering and pretending.In the input carrier voice signal, secret voice input module 28 receives the secret voice signal of input in real time, adopt low bit rate Speech Signal Compression algorithm to secret Speech Signal Compression then, and secret information is encrypted by encrypting module, secret information after the encryption is input in the secret information merge module 22 simultaneously with the carrier voice signal of covering usefulness, in the secret information merge module, by the carrier voice signal is carried out linear prediction analysis, select voiced sound signal wherein to embed secret information, the embedding of secret information is to realize by the linear forecasting parameter of revising voice signal, uses voice signal to produce the model synthetic speech signal at last.Synthetic audio digital signals replaces primary speech signal to be input in the voice channel through digital-to-analog conversion back.The recipient, adopt Privacy telephone speech receiving equipment to come the Detection and Extraction secret information.The voice signal of input enters secret information Detection and Extraction module through after the analog/digital conversion, 32 pairs of input speech signals of secret information Detection and Extraction module carry out linear prediction analysis, extract the secret information that embeds, the bit stream that generates is reduced to secret voice signal through low bit rate voice decompression algorithm decompress(ion) and after deciphering, and spreads out of by the microphone of voice output module 34 from Privacy telephone.Adopt the method for the invention, secret voice can be hidden in the common voice communication signals and transmit,, also can not wake suspicion even intercepted and captured by the listener.Transmit owing to being embedded in the carrier signal again after secret information is encrypted simultaneously, improved the security performance of secret information.In addition, for resisting digital-to-analog conversion and transmission-channel distortion to synchronous influence in the information detection, when information embeds, selected the voiced sound signal in the voice signal as embedding the zone, in the test side input information is carried out synchronously, detect performance thereby improve, so the present invention is particularly useful for the bigger public switched telephone network (PSTN) of distortion.
Description of drawings:
Fig. 1 is a structural representation of the present invention, and Fig. 2 is the structural representation of embodiment of the present invention two, and Fig. 3 is the structural representation of embodiment of the present invention three, and Fig. 4 is the principle key diagram of execution mode three.
Embodiment:
Embodiment one: specify present embodiment below in conjunction with Fig. 1.Present embodiment is made up of speech transmitting apparatus 20 and speech receiving equipment 30, speech transmitting apparatus 20 is made up of secret voice input module 28, voice storing, regenerating module 21, low bit rate Speech Signal Compression module 24, encrypting module 25, secret information merge module 22, phonetic synthesis module 23 and D/A modular converter 26, carrier voice signal 101 is stored in the voice storing, regenerating module 21, stored the carrier voice signal 101 of frequent use in the voice storing, regenerating module 21, the user selects employed carrier voice signal 101 by the phone keyboard.Carrier voice signal 101 is input to an input of secret information merge module 22, the secret voice signal 102 that the caller sends is input in the secret voice input module 28, enter then in the low bit rate Speech Signal Compression module 24, it is the following standard-compression algorithm of 4kb/s, for example LPC10 or Multi-Band Excitation (MBE) that compression algorithm adopts bit rate commonly used.Voice signal 104 after the compression is input in the encrypting module 25, encrypting module 25 is encrypted the voice signal after compressing 104 according to key and is generated the secret information of encrypting 105, carrier voice signal 101 and the secret information of encrypting 105 are finished the information embedding operation in secret information merge module 22, generate the derived parameter  of linear forecasting parameter kWith predicted residual signal e (n), the derived parameter  of linear forecasting parameter kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module 23
Figure C20041001370600071
, latent cipher tone signal
Figure C20041001370600072
The latent cipher tone signal 108 that is converted to analog quantity behind the input D/A modular converter 26 enters in the channel of public switched telephone network (PSTN) 27, and speech receiving equipment 30 is made up of analog-to-digital converting module 31, secret information Detection and Extraction module 32, secret voice decompression module 33 and voice output module 34.In the public switched telephone network (PSTN) 27 in the respective channel the latent cipher tone signal 108 of analog quantity be input in the analog-to-digital converting module 31, analog-to-digital converting module 31 output digitized voice signals 302, digitized voice signal 302 is input in the secret information Detection and Extraction module 32, extracts secret information 303 in secret information Detection and Extraction module 32.Secret information 303 is input in the secret voice decompression module 33, is reduced into secure voice signal 306 in secret voice decompression module 33, and secure voice signal 306 input voice output modules 34 transform the voice signal that can understand for the people and spread out of.
Embodiment two: specify present embodiment below in conjunction with Fig. 2.The difference of present embodiment and execution mode one is, secret information merge module 22 is by linear prediction analysis unit 43, voiced sound signal extraction unit 49 and linear forecasting parameter are revised unit 45 and are formed, linear forecasting parameter is revised unit 45 by calculating linear prediction derived parameter part 45-1, revise linear prediction derived parameter part 45-2 and be transformed to linear forecasting parameter part 45-3 and form, carrier voice signal 101 is input to the input of voiced sound signal extraction unit 49 and an input of linear prediction analysis unit 43, the output of voiced sound signal extraction unit 49 connects another input of linear prediction analysis unit 43, and linear prediction analysis unit 43 calculates linear predictor coefficient a k, linear predictor coefficient a kThe derivation coefficient s that linear prediction derived parameter part 45-1 draws linear predictor coefficient is calculated in input i, s iInput is revised linear prediction derived parameter part 45-2 and is drawn amended linear prediction derived parameter
Figure C20041001370600081
Figure C20041001370600082
Input is transformed to the derived parameter  that linear forecasting parameter part 45-3 draws linear forecasting parameter kSecret information merge module 22 is mainly finished digitized secret information bit is embedded in the audio digital signals.Carrier voice signal 101 is divided into two-way and is input to respectively in the voiced sound signal extraction unit 49 to detect in voiced sound signal and the linear prediction analysis unit 43 and does linear prediction analysis.Adopt voiced sound signal extraction unit 49 to realize the synchronous of built-in end and test side in the present invention, improve the robustness of embedding information simultaneously.The voiced sound signal that voiced sound signal extraction unit 49 detects in the voice signal.The present invention embeds information spinner in the voiced sound signal will consider that (1) voiced sound signal energy is higher, thereby the energy of the information of embedding strengthens, improved the robustness of embedding information, the synchronous mark the when starting point of (2) voiced sound signal can be used as information extraction to channel distortions.The detection of voiced sound signal is handled in the document at voice signal detailed argumentation, has adopted the detection method based on short-time energy among the present invention.43 pairs of voiced sound signals of linear prediction analysis unit carry out linear prediction analysis.Linear prediction analysis adopts following all-pole modeling to come the sound channel system of modeling personification:
H ( z ) = G 1 - Σ k = 1 P a k z - k - - - ( 1 )
Wherein G is the gain of model, and P is the order of fallout predictor, a kIt is linear predictor coefficient.With a kFor parameter constitutes inverse filter the filtering of carrier voice signal is obtained predicted residual signal:
e ( n ) = x ( n ) - Σ k = 1 P a k x ( n - k ) , - - - ( 2 )
Wherein, x (n) is the sampled value of carrier audio signal.Predicted residual signal is used for driving follow-up voice signal synthetic model.Synthetic model has adopted the represented all-pole modeling of (1) formula.If in the parameter modification process, directly revise prediction multinomial coefficient a k, the limit that then is difficult to guarantee model all in unit circle, thereby can not guarantee the stability of synthesis system.For guaranteeing the stability of synthesis system, directly do not revise linear predictor coefficient a among the present invention k, but the derived parameter  of modification linear predictor coefficient k, for example log area ratio parameter and line spectrum pairs parameter.Wherein the variation of line spectrum pairs parameter only influences the speech manual at contiguous this parameter respective frequencies place, institute so that control watermark embedding to the influence of short-time spectrum.Through the linear predictor coefficient a that obtains after the linear prediction analysis kOutput to parameter modifying unit 45 with predicted residual signal e (n).In parameter modifying unit,, revise the derived parameter of linear predictor coefficient according to the information bit of input.The modification of linear forecasting parameter is adopted the method for quantification index modulation: get certain quantization step d, quantized interval is labeled as ' 0 ' ' 1 ' form of asking mutually, according to the information bit that will embed, respectively the linear predictor coefficient derived parameter is rounded in the interval of respective markers.If s iBe i linear forecasting parameter, to s iUse step-length d iCarry out the quantification index modulation.At s iIn the information bit that will embed be w i, and w i∈ 0,1}.The embedding algorithm is:
Work as w i=0 o'clock, with s iBe rounded on the even-multiple of quantization step, promptly
Figure C20041001370600091
Wherein,
Figure C20041001370600092
Expression rounds to negative infinity.
Work as w i=1 o'clock, with s iBe rounded on the odd-multiple of quantization step, promptly
Figure C20041001370600093
With amended linear prediction derived parameter
Figure C20041001370600094
Be converted into linear predictor coefficients  k, k=1 wherein, 2 ..., P.The predicted residual signal of using (2) formula to obtain in phonetic synthesis module 23 drives by amended predictive coefficient  kThe full poles track model that constitutes can be synthesized the latent cipher tone signal after the embedding information
Figure C20041001370600095
x ^ ( n ) = Σ k = 1 P a ^ k x ( n - k ) + e ( n )
Figure C20041001370600097
Through outputing in the channel after the digital-to-analog conversion.
Document about the voice signal processing: 1, Hu Guangrui, speech processes and identification, Shanghai scientific and technical literature publishing house, front page in 1994, Shanghai.2, T.W.Parrsons. speech processes. Wen Chengyi, Chang Guocen, Wang Huazhou, Lai Jinfu translate. the .1990 of National Defense Industry Press front page. Beijing.
Embodiment three: specify present embodiment below in conjunction with Fig. 3, Fig. 4.The difference of present embodiment and execution mode one is, secret information Detection and Extraction module 32 is by voiced sound detecting signal unit 71, linear prediction analysis unit 73, bit value detecting unit 75 is formed, the input of voiced sound detecting signal unit 71 connects the input of linear prediction analysis unit 73 and the output of analog-to-digital converting module 31, the output of voiced sound detecting signal unit 71 connects another input of linear prediction analysis unit 73, the output of linear prediction analysis unit 73 connects the input of bit value detecting unit 75, and the output of bit value detecting unit 75 connects the input of secret voice decompression module 33.Digitized voice signal 302 is input to voiced sound detecting signal unit 71 and linear prediction analysis unit 73 respectively.The voiced segments that voiced sound detecting signal unit 71 detects in the input speech signal finds the position that embeds secret information, and this process is called synchronizing process.Synchronizing process plays an important role in the present invention, because the influence of delay, distortion and Signal Compression effect in the channel can produce desynchronization.The present invention determines the starting point of secret information embedded location by detecting the voiced sound signal.Linear prediction analysis unit 73 is divided into the Frame of about 20 milliseconds of length with the voiced sound signal, adopts linear prediction analysis to obtain linear predictor coefficient and also derives used derived parameter: sound channel log area ratio coefficient or line spectrum pairs parameter
Figure C20041001370600101
Bit value detecting unit 75 receives the derived parameter of the linear predictor coefficient of linear prediction analysis unit 73 outputs, mark according to the interval at coefficient quantization value place is determined embedded bit value, for example, if the interval mark at coefficient place is ' 1 ', then the bit value of corresponding extraction is ' 1 '.Extraction algorithm is:
Figure C20041001370600102
D wherein iIt is the quantization step of i parameter.Information bit string after the extraction outputs to follow-up secret voice decompression module 33.Adopt above-mentioned Privacy telephone can realize two-way latent close communication, when using telephone channel transport vehicle voice signal, utilize the latent cipher of latent secret letter road real-time Transmission tone signal.Latent close communication channel adopts half-duplex mode, and after a side of communication was sent completely concealed information, the opposing party can use latent secret letter road to send concealed information.Compare with existing secure communication unit, the present invention has following technical characteristic: (1) is applicable to existing voice transfer channel, comprises public telephone network, wireless digital channel, internet voice transmission etc.(2) have covert property, communicating pair utilizes private communication channel to transmit security information, can not cause listener's attention.(3) confidentiality, the information via encryption in the latent secret letter road, the communicating pair that only has key can be understood, and has prevented that the third party who has this equipment from stealing.Encryption method can adopt symmetric cryptography or asymmetric cryptosystem.(4) have anti-tamper prompt facility, embed information specific as anti-tamper information in private communication channel, if communicating pair is found anti-tamper information dropout, promptly decidable carrier voice signal is distorted.Typical implementation of the present invention is that both call sides uses public switched telephone network (PSTN) to transmit secret voice messaging, as shown in Figure 4.The present invention can embed in the ordinary telephone set, and speech transmitting apparatus 20 adopts the plain old telephone microphone, encrypts and embeds algorithm and adopt the special digital signal processor to realize.Speech receiving equipment 30 adopts the ordinary telephone set receiver.In voice storing, regenerating module 21, stored carrier voice signal commonly used.Before the conversation beginning, a side of conversation at first chooses this employed carrier voice signal of conversing by telephone keyboard, and transmit leg is input to secret voice signal in the Privacy telephone speech transmitting apparatus 20 by telephone microphone, and is embedded in the carrier voice signal.The recipient uses Privacy telephone speech receiving equipment 30 to obtain voice signal from public switched telephone network (PSTN), extracts secret voice signal, is sent in listener's ear by telephone receiver.Certainly, according to thinking of the present invention and algorithm, can adopt other different implementations, each processing module can adopt software or hardware to realize.According to thinking of the present invention and technical descriptioon, one has voice signal and handles knowledge, and the technical staff of cryptographic algorithm knowledge and computer and electronic skill can dispose the specific implementation of each several part according to concrete application scenarios.

Claims (3)

1, a kind of Privacy telephone, it is made up of speech transmitting apparatus (20) and speech receiving equipment (30), it is characterized in that speech transmitting apparatus (20) is by secret voice input module (28), voice storing, regenerating module (21), low bit rate Speech Signal Compression module (24), encrypting module (25), secret information merge module (22), phonetic synthesis module (23) and D/A modular converter (26) are formed, carrier voice signal (101) is stored in the voice storing, regenerating module (21), carrier voice signal (101) is input to an input of secret information merge module (22), the secret voice signal (102) that the caller sends is input in the secret voice input module (28), enter then in the low bit rate Speech Signal Compression module (24), voice signal after the compression (104) is input in the encrypting module (25), encrypting module (25) is encrypted the voice signal (104) after compressing according to key and is generated the secret information of encrypting (105), carrier voice signal (101) and the secret information of encrypting (105) are finished the information embedding operation in secret information merge module (22), generate the derived parameter  of linear forecasting parameter kWith predicted residual signal e (n), the derived parameter  of linear forecasting parameter kGenerate latent cipher tone signal with predicted residual signal e (n) input phonetic synthesis module (23)
Figure C2004100137060002C1
Latent cipher tone signal
Figure C2004100137060002C2
The latent cipher tone signal (108) that is converted to analog quantity behind the input D/A modular converter (26) enters in the channel of public switched telephone network (PSTN) (27), speech receiving equipment (30) is by analog-to-digital converting module (31), secret information Detection and Extraction module (32), secret voice decompression modules (33) and voice output module (34) are formed, the latent cipher tone signal (108) of analog quantity is input in the analog-to-digital converting module (31) in the middle respective channel of public switched telephone network (PSTN) (27), analog-to-digital converting module (31) output digitized voice signal (302), digitized voice signal (302) is input in the secret information Detection and Extraction module (32), in secret information Detection and Extraction module (32), extract secret information (303), secret information (303) is input in the secret voice decompression module (33), be reduced into secure voice signal (306) in secret voice decompression module (33), secure voice signal (306) input voice output module (34) transforms the voice signal that can understand for the people and spreads out of.
2, Privacy telephone according to claim 1, it is characterized in that secret information merge module (22) is by linear prediction analysis unit (43), voiced sound signal extraction unit (49) and linear forecasting parameter are revised unit (45) and are formed, linear forecasting parameter is revised unit (45) by calculating linear prediction derived parameter part (45-1), revise linear prediction derived parameter part (45-2) and be transformed to linear forecasting parameter part (45-3) and form, carrier voice signal (101) is input to the input of voiced sound signal extraction unit (49) and an input of linear prediction analysis unit (43), the output of voiced sound signal extraction unit (49) connects another input of linear prediction analysis unit (43), and linear prediction analysis unit (43) calculates linear predictor coefficient (a k), linear predictor coefficient (a k) import and calculate the derivation coefficient (s that linear prediction derived parameter part (45-1) draws linear predictor coefficient i), (s i) input revises linear prediction derived parameter part (45-2) and draw amended linear prediction derived parameter ( i), ( i) input is transformed to the derived parameter ( that linear forecasting parameter part (45-3) draws linear forecasting parameter k).
3, Privacy telephone according to claim 1 and 2, it is characterized in that secret information Detection and Extraction module (32) is by voiced sound detecting signal unit (71), linear prediction analysis unit (73), bit value detecting unit (75) is formed, the input of voiced sound detecting signal unit (71) connects the input of linear prediction analysis unit (73) and the output of analog-to-digital converting module (31), the output of voiced sound detecting signal unit (71) connects another input of linear prediction analysis unit (73), the output of linear prediction analysis unit (73) connects the input of bit value detecting unit (75), and the output of bit value detecting unit (75) connects the input of secret voice decompression module (33).
CNB2004100137068A 2004-04-23 2004-04-23 Privacy telephone Expired - Fee Related CN100359908C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100137068A CN100359908C (en) 2004-04-23 2004-04-23 Privacy telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100137068A CN100359908C (en) 2004-04-23 2004-04-23 Privacy telephone

Publications (2)

Publication Number Publication Date
CN1571444A CN1571444A (en) 2005-01-26
CN100359908C true CN100359908C (en) 2008-01-02

Family

ID=34478262

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100137068A Expired - Fee Related CN100359908C (en) 2004-04-23 2004-04-23 Privacy telephone

Country Status (1)

Country Link
CN (1) CN100359908C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI556226B (en) * 2014-09-26 2016-11-01 威盛電子股份有限公司 Synthesis method of audio files and synthesis system of audio files using same
CN109347570B (en) * 2018-11-26 2020-09-18 电子科技大学 Hidden and safe communication method for hidden channel based on sound wave

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2138862Y (en) * 1992-10-29 1993-07-21 李伟 Enciphered telephone
CN1084687A (en) * 1992-09-23 1994-03-30 杨筑平 Telephone set
JPH09200367A (en) * 1996-01-12 1997-07-31 Meii Kyo Personal information system to be used for a lot of people
CN1267177A (en) * 1999-03-10 2000-09-20 金斗容 Digital portable mobile telephone set and method for voice data input/output and storage/regeneration
CN1347614A (en) * 1999-04-13 2002-05-01 诺基亚网络有限公司 Method and system in telephone exchange system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1084687A (en) * 1992-09-23 1994-03-30 杨筑平 Telephone set
CN2138862Y (en) * 1992-10-29 1993-07-21 李伟 Enciphered telephone
JPH09200367A (en) * 1996-01-12 1997-07-31 Meii Kyo Personal information system to be used for a lot of people
CN1267177A (en) * 1999-03-10 2000-09-20 金斗容 Digital portable mobile telephone set and method for voice data input/output and storage/regeneration
CN1347614A (en) * 1999-04-13 2002-05-01 诺基亚网络有限公司 Method and system in telephone exchange system

Also Published As

Publication number Publication date
CN1571444A (en) 2005-01-26

Similar Documents

Publication Publication Date Title
CN101271690B (en) Audio spread-spectrum watermark processing method for protecting audio data
CN100550723C (en) Camouflage communication method based on speech recognition
CN102624518B (en) Voice encryption and decryption method
CN108648761B (en) Method for embedding blockchain account book in audio digital watermark
CN102074238A (en) Linear interference cancellation-based speech secrete communication method
Tan et al. A simple review of audio steganography
KR100791485B1 (en) A Voice One Time Password Security Authentication System and Security Authentication Method Thereof
Faundez-Zanuy et al. Speaker identification security improvement by means of speech watermarking
CN101908203B (en) Image and audio recoding-based steganography prevention method
CN107689226A (en) A kind of low capacity Methods of Speech Information Hiding based on iLBC codings
CN100359908C (en) Privacy telephone
Sadkhan et al. The trade-off between security and quality using permutation and substitution techniques in speech scrambling system
Timothy et al. Embedding text in audio steganography system using advanced encryption standard, text compression and spread spectrum techniques in Mp3 and Mp4 file formats
Yuan et al. Audio watermarking algorithm for real-time speech integrity and authentication
CN102984122A (en) Internet protocol (IP) voice covert communication method based on adaptive multi-rate wideband (AMR-WB) code rate camouflage
Ambika et al. Secure Speech Communication–A Review
Qi et al. A speech privacy protection method based on sound masking and speech corpus
Chen et al. End-to-end speech encryption algorithm based on speech scrambling in frequency domain
CN107483194A (en) G.729 speech hiding algorithm based on non-zero pulses position and amplitude information
Shahadi et al. Real-time scheme for covert communication based VoIP
CN104994500A (en) Voice secrecy transmission method and device used for mobile phone
Huang et al. Design and implementation of synchronized audio-to-audio steganography scheme
Deng et al. A real-time secure voice communication system based on speech recognition
Khademi et al. Audio steganography by using of linear predictive coding analysis in the safe places of discrete wavelet transform domain
Al-Ghamdi et al. Improve the security for voice cryptography in the RSA algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080102