CN104361886B - Speech ciphering method and device and voice decryption method and device - Google Patents

Speech ciphering method and device and voice decryption method and device Download PDF

Info

Publication number
CN104361886B
CN104361886B CN201410592233.5A CN201410592233A CN104361886B CN 104361886 B CN104361886 B CN 104361886B CN 201410592233 A CN201410592233 A CN 201410592233A CN 104361886 B CN104361886 B CN 104361886B
Authority
CN
China
Prior art keywords
voice
characteristic parameter
encrypted
decryption
decrypt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410592233.5A
Other languages
Chinese (zh)
Other versions
CN104361886A (en
Inventor
刘孟
李军
王道龙
李华明
袁艺
刘晓伟
燕宇飞
张钰
易敏文
吕文玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410592233.5A priority Critical patent/CN104361886B/en
Publication of CN104361886A publication Critical patent/CN104361886A/en
Application granted granted Critical
Publication of CN104361886B publication Critical patent/CN104361886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of speech ciphering method and device and voice decryption method and device.The speech ciphering method includes:The character in the voice for encryption is recognized, encrypted characters sequence is obtained;Extract the characteristic parameter of the voice for being used to encrypt;It is encrypted with the obtained encrypted characters sequence pair of identification information to be encrypted, and preserve the encrypted characters sequence and the characteristic parameter, for when decryption obtains described information, the characteristic parameter with decryption character string and for the voice of decryption is matched.Therefore decoding difficulty is added, improves the security of encryption information.

Description

Speech ciphering method and device and voice decryption method and device
Technical field
The present embodiments relate to field of information security technology, more particularly to a kind of speech ciphering method and device and language Sound decryption method and device.
Background technology
Voice encryption technology is a kind of conventional information encryption, mainly by speech recognition, from the voice of input In identify character, obtain encrypted characters sequence, then carried out by AES with encrypted characters sequence pair confidential information to be added Encryption, to ensure the safety of described information.Accordingly, when the information encrypted being decrypted, by speech recognition to for The voice of decryption carries out speech recognition, and character is identified from the voice for decryption, obtains decrypting character string.Afterwards, will Decryption character string is matched with encrypted characters sequence, if the match is successful, passes through solution corresponding with above-mentioned AES The information that close algorithm has been encrypted with decryption character string or encrypted characters sequence pair is decrypted, and obtains protected information.Can To find out, existing voice encryption and decryption technology cause encrypted information to be easier to be decrypted, and cause the security of information Reduction.
The content of the invention
The embodiment of the present invention provides a kind of speech ciphering method and device and voice decryption method and device, to increase brokenly Difficulty is translated, the security of information is improved.
In a first aspect, the embodiments of the invention provide a kind of speech ciphering method, including:
The character in the voice for encryption is recognized, encrypted characters sequence is obtained;
Extract the characteristic parameter of the voice for being used to encrypt;
It is encrypted with the obtained encrypted characters sequence pair of identification information to be encrypted, and preserves the encrypted characters Sequence and the characteristic parameter, for when decryption obtains described information, the voice with decryption character string and for decryption Characteristic parameter matched.
Second aspect, the embodiment of the present invention additionally provides a kind of voice encryption device, including:
Sound identification module, for recognizing the character in the voice for encryption, obtains encrypted characters sequence;
Characteristic extracting module, the characteristic parameter for extracting the voice for being used to encrypt;
Encrypting module, for recognizing obtained encrypted characters sequence pair letter to be encrypted with the sound identification module Breath is encrypted, and preserves the encrypted characters sequence and the characteristic parameter, for when decryption obtains described information, with Decryption character string and the characteristic parameter for the voice of decryption are matched.
Speech ciphering method and device provided in an embodiment of the present invention, by being extracted during voice encryption and preserving use In the characteristic parameter of the voice of encryption information, for when decryption obtains described information, with decryption character string and for solving The characteristic parameter of close voice is matched so that when the decryption person for having bad attempt attempts to decode encrypted information, no The character for only needing voice to carry is consistent, and voice feature also will the match is successful can be only achieved the purpose of decoding so that Decoding difficulty is added, the security of encryption information is improved.
The third aspect, the embodiment of the present invention additionally provides a kind of voice decryption method, including:
Recognize for being encrypted the voice that information is decrypted, obtaining decrypting character string;
Extract the characteristic parameter of the voice for being used to decrypt;
By the decryption character string and the characteristic parameter and the encrypted characters sequence of preservation of the voice for being used to decrypt Matched respectively with characteristic parameter, the encrypted characters sequence and characteristic parameter are the voice encrypted to the encrypted information Encrypted characters sequence and characteristic parameter;
After the match is successful, solved with information is encrypted described in the decryption character string or the encrypted characters sequence pair It is close.
Fourth aspect, the embodiment of the present invention additionally provides a kind of voice decryption device, including:
Sound identification module, is used to, to being encrypted the voice that information is decrypted, obtain decrypting character string for recognizing;
Characteristic extracting module, the characteristic parameter for extracting the voice for being used to decrypt;
Matching module, for by it is described decryption character string and it is described be used for decrypt voice characteristic parameter with preserve Encrypted characters sequence and characteristic parameter are matched respectively, and the encrypted characters sequence and characteristic parameter are to the encrypted letter The encrypted characters sequence and characteristic parameter of the voice of encryption for information;
Deciphering module, after the match is successful, with quilt described in the decryption character string or the encrypted characters sequence pair Encryption information is decrypted.
Voice decryption method provided in an embodiment of the present invention and device, by the feature that voice is extracted during decryption Parameter, and matched into respectively with the encrypted characters sequence and characteristic parameter preserved in decryption character string and the characteristic parameter of extraction In the case of work(, it is decrypted with decryption character string or the encrypted information of encrypted characters sequence pair, relative to prior art Matching only is carried out to decryption character string and encrypted characters sequence and adds decoding difficulty, the security of information is improved.
Brief description of the drawings
In order to illustrate more clearly of the present invention, one will be done to the required accompanying drawing used in the present invention below and be simply situated between Continue, it should be apparent that, drawings in the following description are some embodiments of the present invention, are come for those of ordinary skill in the art Say, without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 a are a kind of flow chart for speech ciphering method that the embodiment of the present invention one is provided;
Fig. 1 b are the waveform diagram of voice decibel value in speech ciphering method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart for speech ciphering method that the embodiment of the present invention two is provided;
Fig. 3 is a kind of structural representation for voice encryption device that the embodiment of the present invention three is provided;
Fig. 4 is a kind of flow chart for voice decryption method that the embodiment of the present invention four is provided;
Fig. 5 is the structural representation that a kind of voice that the embodiment of the present invention five is provided decrypts device.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the embodiment of the present invention In technical scheme be described in further detail, it is clear that described embodiment is a part of embodiment of the invention, rather than entirely The embodiment in portion.It is understood that specific embodiment described herein is only used for explaining the present invention, rather than to the present invention's Limit, based on the embodiment in the present invention, those of ordinary skill in the art are obtained under the premise of creative work is not made Every other embodiment, belong to the scope of protection of the invention.It also should be noted that, for the ease of description, accompanying drawing In illustrate only part related to the present invention rather than full content.
Embodiment one
Fig. 1 a are referred to, are a kind of flow chart for speech ciphering method that the embodiment of the present invention one is provided.The present invention is implemented The method of example can be performed by configuring with hardware and/or the voice encryption device of software realization, and this realizes that device is typically It is configured in the terminal that voice encryption service can be provided, for example, configuration is in the various mobile terminals such as smart mobile phone, tablet personal computer In.
This method includes:Operation 11~operation 13.
In operation 11, the character in the voice for encryption is recognized, encrypted characters sequence is obtained.
This operation is particular by speech recognition technology, and identification obtains encrypted characters sequence from the voice for encryption.
Wherein, the voice for encryption refers to the voice that information to be encrypted is encrypted, and both can be that user passes through The voice or the language of terminal local storage of microphone input in the terminal of voice encryption service can be provided Sound, can also be the sound bite downloaded obtain in real time.Preferably using user by the way that the end that voice encryption is serviced can be provided The voice of microphone input in end, for information to be encrypted, user can input suitable voice according to their needs, just In user's memory, and the content user of the voice of input can add flexibility with autonomous control.
The voice for being used to encrypt both can be the other forms such as Chinese form or English, the present embodiment pair This is not limited, as long as the terminal that can be provided voice encryption service is correctly recognized.
The encrypted characters sequence, refers to the character obtained by being recognized from the voice for encryption, according to for encrypting Voice in can recognize that phoneme sequencing, the character string of formation.For example, the voice for encryption is " enabling ", identification Character " kai " and character " men " are obtained, by character " kai " and character " men " according to recognizable phoneme in the voice for encryption Sequencing, formed encrypted characters sequence " kaimen ".
In operation 12, the characteristic parameter of the voice for being used to encrypt is extracted.
The feature of voice including the order of importance and emergency etc., as first speak it is generally overcast wait a moment, second is spoken, and generally fast and sound is very high, That is, different people has different phonetic features, if extracting these features and being preserved, and it is used in decryption The feature of voice with attempting to decrypt is matched, then can ensure that the people only encrypted could decrypt encrypted information, carry The security of high information.
Operate in 13, the encrypted characters sequence pair obtained with identification information to be encrypted is encrypted, and preserves institute Encrypted characters sequence and the characteristic parameter are stated, for when decryption obtains described information, with decrypting character string and being used for The characteristic parameter of the voice of decryption is matched.
This operation not only includes the behaviour that the encrypted characters sequence pair obtained with identification information to be encrypted is encrypted Make, and comprising the operation for preserving the encrypted characters sequence and the characteristic parameter, both limit without order, can also be simultaneously Row is performed.When being encrypted with the obtained encrypted characters sequence pair of identification information to be encrypted, the AES used It can be AES256 etc., not be limited here.
Wherein, the information to be encrypted can include:The all kinds such as document, video file, audio file or picture, It can also be the combination of foregoing several types.
Wherein, preserve the encrypted characters sequence and the characteristic parameter is particularly used for obtaining described information in decryption When, the characteristic parameter with decryption character string and for the voice of decryption is matched respectively, in other words, to being encrypted information When being decrypted, not only need to be matched the encrypted characters sequence for decrypting character string with preserving, in addition it is also necessary to will be used to solve The characteristic parameter of close voice is matched with the characteristic parameter of the voice for being used to encrypt preserved.
The technical scheme of the present embodiment, by the way that the voice for encryption information is extracted and preserved during voice encryption Characteristic parameter, for when decryption obtains described information, the characteristic parameter of the voice with decryption character string and for decryption Matched so that when the decryption person for having bad attempt attempts to decode encrypted information, the word for not only needing voice to carry Symbol is consistent, and voice feature also will the match is successful can be only achieved the purpose of decoding, so as to add decoding difficulty, improve The security of encryption information.
It should be noted that in the present embodiment, operation 11 and operation 12 are separate, are limited without inevitable order System, can be performed using the order opposite with the present embodiment, can also performed parallel.
It should also be noted that, being used for the characteristic parameter of the voice of encryption described in said extracted may include:Extract described use At least one in the duration of the voice of encryption, pace value and decibel value.
The decibel value of the voice for encryption is extracted, can obtain described be used for after the voice of encryption is identified Decibel value on each time point;Or can also be the decibel value for obtaining each character in the encrypted characters sequence.As schemed Shown in 1b, decibel value is curved on a timeline, and time point is different, and decibel value is also different.The waveform in Fig. 1 b Figure changes into data, and it is the decibel value on each time point that can preserve into an array.Such as say " z_h_i__m_ A_______k_a_i___m_e_n " (reference can be made to explanation in following embodiments two) time is 3 seconds, that is to say, that have 30 0.1 second, that decibel value was represented by array:[30,20,40,30,35,30,20,10,50,50,50,40,25,15,5,0,0, 0,0,30,35,35,35,25,15,35,35,35,35,35].Encrypted characters sequence, pace value and decibel value can be retained separately To a file.Even for identical encrypted characters sequence, due to the difference of encipherer's tongue, typically result in different The decibel value of the voice for being used to encrypt of encipherer's input is inconsistent, therefore preserves encrypted characters sequence and for adding in encryption The decibel value of close voice, during decryption, even if decryption character string and encrypted characters sequences match success, still can by for Difficulty is decoded in the decibel value increase of the voice of encryption, so as to improve the security of encryption information.
The characteristic parameter of extraction is more, time-consuming longer, but the difficulty decoded encrypted information is bigger, encryption letter The security of breath is higher;The characteristic parameter of extraction is fewer, time-consuming shorter, but the difficulty decoded encrypted information is got over Low, the security of encryption information is lower, therefore the suitable characteristic parameter of selective extraction, can take into account encryption efficiency and encryption information Security.
Illustrate the implementation of pace value for extracting the voice for being used to encrypt below by specific embodiment.
Embodiment two
Referring to Fig. 2, a kind of flow chart of the speech ciphering method provided for the embodiment of the present invention two.The present embodiment is upper State on the basis of embodiment that there is provided the preferred scheme for extracting the characteristic parameter of voice this operation for being used to encrypting, tool Body provides the preferred scheme for the pace value for extracting the voice for being used to encrypt.
The method for optimizing includes:Operation 21~operation 22.
In operation 21, the time interval between two neighboring character in the encrypted characters sequence is obtained.
In the present embodiment, by obtaining the time interval in the encrypted characters sequence between two neighboring character, will The time interval arrived is as described for the pace value for the voice encrypted.In other words, based in the encrypted characters sequence Pause between two neighboring character, characterizes the pace value of the voice for being used to encrypt.For example, someone will be added to information When close, virtual Mike's button on screen is pinned first, against speaking, for example, " open sesame " is said, words lift hand is finished, and end is said Words, the mode of wherein beginning and end is various, is not limited here.
Speech recognition can be carried out to " open sesame ", analyze the distribution of following character on a timeline in encryption device:
#______z_h_i__m_a_______k_a_i___m_e_n____#
Wherein, first " # " represents to start, and second " # " represents to terminate;Each " _ " or the time shared by letter It is 0.1 second.All it is to wait for the time, not considering before z and after n, only analyzes the part between z to n, obtain wherein adjacent two Time interval between individual letter, namely to the pause time of each two phoneme.
Due to the difference of encipherer's tongue, cause adjacent two in the voice for being used to encrypt that different encipherers input Pause between individual character is inconsistent, therefore, during decryption, even if decryption character string and the success of encrypted characters sequences match, still Decoding difficulty can be increased according to the matching result of two neighboring alphabetical time interval between encryption and decryption voice, so as to improve The security of encrypted information.
In operation 22, the duration of the voice for being used to encrypt is obtained, according to the duration and the encrypted characters sequence The quantity of middle character, obtains the pace value of the voice for being used to encrypt.
" #______z_h_i__m_a_______k_a_i___m_e_n____# " for example gone out by speech recognition, can be with Obtain voice duration, 40 × 0.1 seconds=4 seconds, have 11 characters, therefore pace value can be obtained for 4 ÷ 11 seconds.
Because encipherer speaks the difference of speed, typically result in different encipherers' inputs the voice for being used to encrypt when Length is inconsistent, therefore during decryption, still can be according to for adding solution even if decryption character string and the success of encrypted characters sequences match Difficulty is decoded in the matching result increase of pace value between close voice, so as to further improve the security of encryption information.
Difference with operation 21 is that operation 21 is based on stopping between two neighboring character in the encrypted characters sequence , characterize the pace value of the voice for being used to encrypt;And operate 22 durations based on the voice for being used to encrypt and described The quantity of character in encrypted characters sequence, by the time-consuming of each character, characterizes the pace value of the voice for being used to encrypt.
It should be noted that in the present embodiment, operation 21 and operation 22 are separate, are used for described in extraction The preferred embodiment of the pace value of the voice of encryption, in other words, extracting the pace value of the voice for being used to encrypt can wrap At least one in operation 21 and operation 22 is included, when performing multi-mode operation, its execution sequence is not limited.
When combine perform when, the characteristic parameter of extraction is more, take it is longer, but to difficulty that encrypted information is decoded Degree is bigger, and the security of encryption information is higher;When individually performing one of which, the characteristic parameter of extraction is fewer, time-consuming shorter, But the difficulty decoded encrypted information is lower, and the security of encryption information is lower, therefore selective extraction is suitably special Parameter is levied, the security of encryption efficiency and encryption information can be taken into account.
Embodiment three
Referring to Fig. 3, a kind of structural representation of the voice encryption device provided for the embodiment of the present invention three.The device bag Include:Sound identification module 31, characteristic extracting module 32 and encrypting module 33.
Wherein, identification module 31 is used to recognize the character in the voice for encryption, obtains encrypted characters sequence;Feature is carried Modulus block 32 is used for the characteristic parameter for extracting the voice for being used to encrypt;The sound identification module of encrypting module 33 Recognize that obtained encrypted characters sequence pair information to be encrypted is encrypted, and preserve the encrypted characters sequence and described Characteristic parameter, for when decryption obtains described information, the characteristic parameter of the voice with decryption character string and for decryption Matched.
The technical scheme of the present embodiment, by the way that the voice for encryption information is extracted and preserved during voice encryption Characteristic parameter, for when decryption obtains described information, the characteristic parameter of the voice with decryption character string and for decryption Matched so that when the decryption person for having bad attempt attempts to decode encrypted information, the word for not only needing voice to carry Symbol is consistent, and voice feature also will the match is successful can be only achieved the purpose of decoding, so as to add decoding difficulty, improve The security of encryption information.
In such scheme, characteristic extracting module 32 preferably includes time extracting sub-module, word speed extracting sub-module and divided At least one in shellfish extracting sub-module.
Wherein, time extracting sub-module is used for the duration for extracting the voice for being used to encrypt;Word speed extracting sub-module is used In the pace value for extracting the voice for being used to encrypt;Decibel extracting sub-module is used for point for extracting the voice for being used to encrypt Shellfish value.
The word speed extracting sub-module is at least one of following for performing:
Obtain the time interval between two neighboring character in the encrypted characters sequence;
The duration of the voice for being used to encrypt is obtained, according to the number of character in the duration and the encrypted characters sequence Amount, obtains the pace value of the voice for being used to encrypt.
The decibel extracting sub-module is used for:
Obtain the decibel value on each time point after the voice for being used to encrypt is identified;Or
Decibel value for obtaining each character in the encrypted characters sequence.
Voice encryption device provided in an embodiment of the present invention can perform the voice encryption that any embodiment of the present invention is provided Method, possesses the corresponding functional module of execution method and beneficial effect.
Example IV
Referring to Fig. 4, a kind of flow chart of the voice decryption method provided for the embodiment of the present invention four.The embodiment of the present invention Method device can be decrypted with the voice of hardware and/or software realization be performed by configuring, this realizes that device is typically and matches somebody with somebody It is placed in the terminal that voice decryption service can be provided, for example, configuration is in the various mobile terminals such as smart mobile phone, tablet personal computer In.
This method includes:Operation 41~operation 44.
In operation 41, recognize for being encrypted the voice that information is decrypted, obtaining decrypting character string.
This operation is particular by speech recognition technology, from for being recognized in being encrypted the voice that information is decrypted To decryption character string.
The decryption character string, refers to by recognizing obtained character from the voice that encrypted information is decrypted, According to for the sequencing to being encrypted can recognize that phoneme in the voice that information is decrypted, the character string of formation.
In operation 42, the characteristic parameter of the voice for being used to decrypt is extracted.
The extracting mode of characteristic parameter of this operation with extracting the voice for encryption in above-mentioned encryption embodiment is identical, this In do not repeat.
Operate in 43, by the characteristic parameter and the encryption of preservation of the decryption character string and the voice for being used to decrypt Character string and characteristic parameter are matched respectively, and the encrypted characters sequence and characteristic parameter are that the encrypted information is added The encrypted characters sequence and characteristic parameter of close voice.
Not only include the voice to the encrypted information encryption by the decryption character string and preservation in this operation Encrypted characters sequence matched, in addition to by it is described be used for decrypt voice characteristic parameter with preservation added to described The characteristic parameter of the voice of secret letter encryption for information is matched.
Wherein, the terminal can be stored in the encrypted characters sequence and characteristic parameter that are encrypted the voice that information is encrypted In.
Wherein, by the decryption character string and the encrypted characters sequence of the voice to the encrypted information encryption preserved Row are matched, and are preferably matched the decryption character string completely with the encrypted characters sequence, to increase decoding Difficulty, improves the security of encrypted information.
Wherein, the characteristic parameter of the voice for being used to decrypt is matched with the characteristic parameter preserved, preferably included: Judge the voice for being used to decrypt characteristic parameter value whether the preservation characteristic parameter value predetermined deviation model In enclosing, if the value of the characteristic parameter of the voice for being used to decrypt is in the range of the predetermined deviation, the match is successful.Change speech It, as long as by the characteristic parameter of the voice for being used to decrypt and the characteristic parameter progress fuzzy matching preserved, carrying out fuzzy With the reason for be, because identical encipherer says same sentence encryption voice every time, although encrypted characters sequence is consistent, but by Can not possibly be completely the same in each utterance, cause characteristic parameter completely the same, therefore in order to improve decryption effect Rate, need not be just the same as long as the characteristic parameter and the characteristic parameter of preservation for the voice of decryption are substantially the same.It is right The deviation range that the value of the characteristic parameter of the preservation can be preset in the similarity of fuzzy matching is realized.
Assuming that for being illustrated exemplified by the voice " open sesame " of encryption to matching duration.Obtained by speech recognition To " z_h_i__m_a_______k_a_i___m_e_n " (reference can be made to explanation in above-described embodiment two) and duration 3 seconds, so that Obtain encrypted characters sequence -- " zhimakaimen ", preserve " zhimakaimen " and duration 3 seconds.During decryption, speech recognition is obtained After the decryption character string arrived is " zhimakaimen ", also to judge voice for decryption duration whether 3 seconds ± 3 × In the range of 20%, wherein, ± 3 × 20% is predetermined deviation scope, depending on being visually actually needed, is not limited here.If with In decryption voice duration in the range of 3 seconds ± 3 × 20%, i.e., when between 2.4 seconds~3.6 seconds, then duration is matched into Work(.
Still solved for adding exemplified by the voice " open sesame " of encryption (referring to the explanation in above-described embodiment two) to matching Time interval in close character string between two neighboring character is illustrated., from the 1st character " z " to the 11st character " n ", Time interval between two neighboring character is respectively 0.1 second, 0.1 second, 0.2 second, 0.1 second, 0.7 second, 0.1 second, 0.1 second, 0.3 Second, 0.1 second and 0.1 second.It will again be assumed that predetermined deviation scope is time interval between two neighboring character in encrypted characters sequence ± 20%, then when decrypting character string with the success of encrypted characters sequences match, if per two neighboring word in decryption character string The difference between the time interval between time interval adjacent character corresponding with encrypted characters sequence between symbol, in encryption In the range of ± 20% of time interval in character string between corresponding adjacent character, per adjacent two in such as decryption character string Time interval between individual character by character string be arranged as 0.09 second, 0.11 second, 0.17 second, 0.1 second, 0.57 second, 0.09 Second, 0.1 second, 0.25 second, 0.11 second and 0.09 second, then the match is successful.
Similarly, the decibel value for the voice for encryption after identified at each time point, can also set corresponding Predetermined deviation scope, judge voice for decryption it is identified after each time point decibel value and the voice for encrypting In deviation between decibel value on corresponding each time point, if be that then the match is successful as crossed in the range of predetermined deviation.
Or, corresponding predetermined deviation model only can also be set to the corresponding decibel value of each character in encrypted characters sequence Enclose, judge in decryption character string between the decibel value of the decibel value character corresponding with encrypted characters sequence of each character Whether deviation is in the range of predetermined deviation, if so, then the match is successful.
Due to also needing to the characteristic parameter progress by the characteristic parameter of the voice for being used to decrypt and preservation when decrypting With fuzzy matching, so, even if encrypted characters sequence exposes, if it fails to match for characteristic parameter, it can not still decrypt and obtain being protected The information of shield, therefore, not only increases the security of information, and can disclose Chinese language word if encrypting as prompting, keeps away Exempt to forget Password by the user of voice encryption technical protection information.
In operation 44, after the match is successful, it is encrypted with described in the decryption character string or the encrypted characters sequence pair Information is decrypted.
The technical scheme of the present embodiment, by extracting the characteristic parameter of voice during decryption, and in decryption character Sequence and the characteristic parameter of extraction and the encrypted characters sequence and characteristic parameter that preserve are in the case that the match is successful respectively, with decryption The encrypted information of character string or encrypted characters sequence pair is decrypted, relative to prior art only to decryption character string and Encrypted characters sequence carries out matching and adds decoding difficulty, improves the security of information.
It should be noted that in the present embodiment, operation 41 and operation 42 are separate, are limited without inevitable order System, can be performed using the order opposite with the present embodiment, can also performed parallel.
By previous embodiment one and embodiment two, the characteristic parameter for extracting the voice for being used to encrypt preferably is wrapped Include:Extract at least one in duration, pace value and the decibel value of the voice for being used to encrypt.Correspondingly, described use is extracted In the characteristic parameter of the voice of decryption, preferably include:In the duration, pace value and the decibel value that extract the voice for being used to decrypt At least one.The specific which type of characteristic parameter for extracting the voice for being used to decrypt, depending on preservation to described The type of the characteristic parameter of the voice of encrypted information encryption.
Wherein, extracting the pace value of the voice for being used to decrypt can both include obtaining phase in the decryption character string Time interval between adjacent two characters;The duration for obtaining the voice for being used to decrypt can also be included, according to the duration And the quantity for decrypting character in character string, obtain the pace value of the voice for being used to decrypt.
Similar with previous embodiment two, here is omitted.
Wherein, the decibel value of the voice for being used to decrypt is extracted, can obtain the voice for being used to decrypt to be known Decibel value after not on each time point;Or can also be the decibel for obtaining each character in the decryption character string Value.
Embodiment five
Referring to Fig. 5, decrypting the structural representation of device for a kind of voice that the embodiment of the present invention five is provided.The device bag Include:Sound identification module 51, characteristic extracting module 52, matching module 53 and deciphering module 54.
Wherein, identification module 51, which is used to recognize, is used to, to being encrypted the voice that information is decrypted, obtain decrypting character sequence Row;Characteristic parameter extraction module 52 is used for the characteristic parameter for extracting the voice for being used to decrypt;Matching module 53 is used for institute State the characteristic parameter and the encrypted characters sequence and characteristic parameter point of preservation of decryption character string and the voice for being used to decrypt Do not matched, the encrypted characters sequence and the encrypted characters sequence that characteristic parameter is the voice to the encrypted information encryption Row and characteristic parameter;After deciphering module 54 is for the match is successful, with the decryption character string or the encrypted characters sequence pair The encrypted information is decrypted.
The technical scheme of the present embodiment, by extracting the characteristic parameter of voice during decryption, and in decryption character Sequence and the characteristic parameter of extraction and the encrypted characters sequence and characteristic parameter that preserve are in the case that the match is successful respectively, with decryption The encrypted information of character string or encrypted characters sequence pair is decrypted, relative to prior art only to decryption character string and Encrypted characters sequence carries out matching and adds decoding difficulty, improves the security of information.
In such scheme, characteristic extracting module 52 preferably includes time extracting sub-module, word speed extracting sub-module and divided At least one in shellfish extracting sub-module.
Wherein, time extracting sub-module is used for the duration for extracting the voice for being used to decrypt;Word speed extracting sub-module is used In the pace value for extracting the voice for being used to decrypt;Decibel extracting sub-module is used for point for extracting the voice for being used to decrypt Shellfish value.
The word speed extracting sub-module is preferred for performing at least one of following:
Obtain the time interval between two neighboring character in the decryption character string;
The duration of the voice for being used to decrypt is obtained, according to the number of character in the duration and the decryption character string Amount, obtains the pace value of the voice for being used to decrypt.
The decibel extracting sub-module is preferred for:Obtain after the voice for being used to decrypt is identified at each time point On decibel value;Or obtain the decibel value of each character in the decryption character string.
In such scheme, the matching module 53 specifically can be used for:Judge the feature of the voice for being used to decrypt Whether the value of parameter is in the range of the predetermined deviation of the value of the characteristic parameter of the preservation, if the spy of the voice for being used to decrypt The value of parameter is levied in the range of the predetermined deviation, then the match is successful.
Voice decryption device provided in an embodiment of the present invention can perform the voice decryption that any embodiment of the present invention is provided Method, possesses the corresponding functional module of execution method and beneficial effect.
Finally it should be noted that:Various embodiments above is merely to illustrate technical scheme, rather than it is limited System;In embodiment preferred embodiment, not it is limited, to those skilled in the art, the present invention can be with There are various changes and change.All any modification, equivalent substitution and improvements made within spirit and principles of the present invention etc., It should be included within protection scope of the present invention.

Claims (10)

1. a kind of speech ciphering method, it is characterised in that including:
The character in the voice for encryption is recognized, encrypted characters sequence is obtained;
Extract the characteristic parameter of the voice for being used to encrypt;
It is encrypted with the obtained encrypted characters sequence pair of identification information to be encrypted, and preserves the encrypted characters sequence And the characteristic parameter, for when decryption obtains described information, the spy of the voice with decryption character string and for decryption Parameter is levied to be matched;
Wherein, the characteristic parameter of voice encrypted is used for described in the extraction, including:
Extract at least one in duration, pace value and the decibel value of the voice for being used to encrypt;
At least one of wherein, for the pace value for the voice encrypted described in extracting, including following:
Obtain the time interval between two neighboring character in the encrypted characters sequence;
The duration of the voice for being used to encrypt is obtained, according to the quantity of character in the duration and the encrypted characters sequence, Obtain the pace value of the voice for being used to encrypt.
2. according to the method described in claim 1, it is characterised in that extract the decibel value of the voice for being used to encrypt, including:
Obtain the decibel value on each time point after the voice for being used to encrypt is identified;Or
Obtain the decibel value of each character in the encrypted characters sequence.
3. a kind of voice encryption device, it is characterised in that including:
Sound identification module, for recognizing the character in the voice for encryption, obtains encrypted characters sequence;
Characteristic extracting module, the characteristic parameter for extracting the voice for being used to encrypt;
Encrypting module, for recognizing that obtained encrypted characters sequence pair information to be encrypted is entered with the sound identification module Row encryption, and the encrypted characters sequence and the characteristic parameter are preserved, for when decryption obtains described information, with decryption Character string and characteristic parameter for the voice of decryption are matched;
Wherein, the characteristic extracting module includes at least one following submodule:
Time extracting sub-module, the duration for extracting the voice for being used to encrypt;
Word speed extracting sub-module, the pace value for extracting the voice for being used to encrypt;
Decibel extracting sub-module, the decibel value for extracting the voice for being used to encrypt;
Wherein, the word speed extracting sub-module is at least one of following for performing:
Obtain the time interval between two neighboring character in the encrypted characters sequence;
The duration of the voice for being used to encrypt is obtained, according to the quantity of character in the duration and the encrypted characters sequence, Obtain the pace value of the voice for being used to encrypt.
4. device according to claim 3, it is characterised in that the decibel extracting sub-module is used for:
Obtain the decibel value on each time point after the voice for being used to encrypt is identified;Or
Obtain the decibel value of each character in the encrypted characters sequence.
5. a kind of voice decryption method, it is characterised in that including:
Recognize for being encrypted the voice that information is decrypted, obtaining decrypting character string;
Extract the characteristic parameter of the voice for being used to decrypt;
By the characteristic parameter of the decryption character string and the voice for being used to decrypt and the encrypted characters sequence preserved and spy Levy parameter to be matched respectively, the encrypted characters sequence and characteristic parameter are adding to the voice of the encrypted information encryption Close character string and characteristic parameter;
After the match is successful, it is decrypted with information is encrypted described in the decryption character string or the encrypted characters sequence pair;
Wherein, the characteristic parameter of voice decrypted is used for described in the extraction, including:
Extract at least one in duration, pace value and the decibel value of the voice for being used to decrypt.
At least one of wherein, for the pace value for the voice decrypted described in extracting, including following:
Obtain the time interval between two neighboring character in the decryption character string;
The duration of the voice for being used to decrypt is obtained, according to the quantity of character in the duration and the decryption character string, Obtain the pace value of the voice for being used to decrypt.
6. method according to claim 5, it is characterised in that extract the decibel value of the voice for being used to decrypt, including:
Obtain the decibel value on each time point after the voice for being used to decrypt is identified;Or
Obtain the decibel value of each character in the decryption character string.
7. according to any described methods of claim 5-6, it is characterised in that by the characteristic parameter of the voice for being used to decrypt Matched with the characteristic parameter of preservation, including:
Judge the voice for being used to decrypt characteristic parameter value whether the preservation characteristic parameter value it is default partially In poor scope, if the value of the characteristic parameter of the voice for being used to decrypt is in the range of the predetermined deviation, the match is successful.
8. a kind of voice decrypts device, it is characterised in that including:
Sound identification module, is used to, to being encrypted the voice that information is decrypted, obtain decrypting character string for recognizing;
Characteristic extracting module, the characteristic parameter for extracting the voice for being used to decrypt;
Matching module, for by it is described decryption character string and it is described be used for decrypt voice characteristic parameter with preserve encryption Character string and characteristic parameter are matched respectively, and the encrypted characters sequence and characteristic parameter are that the encrypted information is added The encrypted characters sequence and characteristic parameter of close voice;
Deciphering module, after the match is successful, is encrypted with described in the decryption character string or the encrypted characters sequence pair Information is decrypted;
Wherein, the characteristic extracting module includes at least one following submodule:
Time extracting sub-module, the duration for extracting the voice for being used to decrypt;
Word speed extracting sub-module, the pace value for extracting the voice for being used to decrypt;
Decibel extracting sub-module, the decibel value for extracting the voice for being used to decrypt.
Wherein, the word speed extracting sub-module is at least one of following for performing:
Obtain the time interval between two neighboring character in the decryption character string;
The duration of the voice for being used to decrypt is obtained, according to the quantity of character in the duration and the decryption character string, Obtain the pace value of the voice for being used to decrypt.
9. device according to claim 8, it is characterised in that the decibel extracting sub-module is used for:
Obtain the decibel value on each time point after the voice for being used to decrypt is identified;Or
Obtain the decibel value of each character in the decryption character string.
10. according to any described devices of claim 8-9, it is characterised in that the matching module specifically for:
Judge the voice for being used to decrypt characteristic parameter value whether the preservation characteristic parameter value it is default partially In poor scope, if the value of the characteristic parameter of the voice for being used to decrypt is in the range of the predetermined deviation, the match is successful.
CN201410592233.5A 2014-10-29 2014-10-29 Speech ciphering method and device and voice decryption method and device Active CN104361886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410592233.5A CN104361886B (en) 2014-10-29 2014-10-29 Speech ciphering method and device and voice decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410592233.5A CN104361886B (en) 2014-10-29 2014-10-29 Speech ciphering method and device and voice decryption method and device

Publications (2)

Publication Number Publication Date
CN104361886A CN104361886A (en) 2015-02-18
CN104361886B true CN104361886B (en) 2017-11-03

Family

ID=52529142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410592233.5A Active CN104361886B (en) 2014-10-29 2014-10-29 Speech ciphering method and device and voice decryption method and device

Country Status (1)

Country Link
CN (1) CN104361886B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812573A (en) * 2016-04-28 2016-07-27 努比亚技术有限公司 Voice processing method and mobile terminal
CN116781417B (en) * 2023-08-15 2023-11-17 北京中电慧声科技有限公司 Anti-cracking voice interaction method and system based on voice recognition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000647A (en) * 2007-01-08 2007-07-18 北京飞天诚信科技有限公司 Method and device for raising safety of data input
CN101409819A (en) * 2008-11-27 2009-04-15 杭州电子科技大学 Method for encrypting and deciphering digital camera picture based on voiceprint
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102819702A (en) * 2012-07-19 2012-12-12 腾讯科技(深圳)有限公司 File encryption operation method and file encryption operation system
CN103118002A (en) * 2012-12-21 2013-05-22 北京飞漫软件技术有限公司 Method of speech sound used as secret key to achieve data resource cloud storage management
CN103699834A (en) * 2013-09-11 2014-04-02 李霆 Multifunctional virtual vault and data encrypting method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1908249B1 (en) * 2005-07-27 2012-08-15 International Business Machines Corporation Systems and method for secure delivery of files to authorized recipients

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101000647A (en) * 2007-01-08 2007-07-18 北京飞天诚信科技有限公司 Method and device for raising safety of data input
CN101409819A (en) * 2008-11-27 2009-04-15 杭州电子科技大学 Method for encrypting and deciphering digital camera picture based on voiceprint
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102819702A (en) * 2012-07-19 2012-12-12 腾讯科技(深圳)有限公司 File encryption operation method and file encryption operation system
CN103118002A (en) * 2012-12-21 2013-05-22 北京飞漫软件技术有限公司 Method of speech sound used as secret key to achieve data resource cloud storage management
CN103699834A (en) * 2013-09-11 2014-04-02 李霆 Multifunctional virtual vault and data encrypting method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
声音的特征;杨小锋;《教师发声训练教程》;北京师范大学出版社;20120630;第19-22页 *

Also Published As

Publication number Publication date
CN104361886A (en) 2015-02-18

Similar Documents

Publication Publication Date Title
US8862888B2 (en) Systems and methods for three-factor authentication
US8577684B2 (en) Selective security masking within recorded speech utilizing speech recognition techniques
CN107169374A (en) Encryption and decryption system and method based on vocal print and speech recognition technology
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
CN103294961A (en) Method and device for file encrypting/decrypting
CN107194268A (en) A kind of information processing method, device, computer installation and readable storage medium storing program for executing
CN104917603B (en) A kind of information security transfer method receives terminal and sends terminal
CN104393994B (en) Audio data secure transmission method, system and terminal
CN107533598B (en) Input method and device of login password of application program and terminal
CN103377347B (en) File encryption, decryption method and device
CN104361886B (en) Speech ciphering method and device and voice decryption method and device
WO2017215186A1 (en) Secure login method and device, and a storage medium
CN108667815A (en) Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN102333066A (en) Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game
CN102377729A (en) User registration and logon method by combining speaker speech identity authentication and account code protection in network games
CN102368850A (en) Method for carrying out encryption and decryption on video file on mobile phone
CN102647712A (en) Mobile phone data encryption method and decryption method
WO2015196642A1 (en) Data encryption method, decryption method and device
CN110380856A (en) Terminal device and its voice information processing method, device and storage medium
CN102902933B (en) Based on the file saving method of file fragmentation process
CN108052828B (en) Method and device for generating screen recording file, terminal and storage medium
CN106557708A (en) A kind of method for security protection and system
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device
CN109995526A (en) A kind of storage method of key and the call method and device of device, key
CN104580255B (en) Authentication method and system of the identification equipment based on recognizable code stream to terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant