CN104994500B - A kind of speech security transmission method and device for mobile phone - Google Patents

A kind of speech security transmission method and device for mobile phone Download PDF

Info

Publication number
CN104994500B
CN104994500B CN201510266496.1A CN201510266496A CN104994500B CN 104994500 B CN104994500 B CN 104994500B CN 201510266496 A CN201510266496 A CN 201510266496A CN 104994500 B CN104994500 B CN 104994500B
Authority
CN
China
Prior art keywords
voice
ciphertext
line spectral
spectral frequencies
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510266496.1A
Other languages
Chinese (zh)
Other versions
CN104994500A (en
Inventor
刘威
唐晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Keshuo Zhinuo Information Technology Co Ltd
Original Assignee
Nanjing Keshuo Zhinuo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Keshuo Zhinuo Information Technology Co Ltd filed Critical Nanjing Keshuo Zhinuo Information Technology Co Ltd
Priority to CN201510266496.1A priority Critical patent/CN104994500B/en
Publication of CN104994500A publication Critical patent/CN104994500A/en
Application granted granted Critical
Publication of CN104994500B publication Critical patent/CN104994500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/08Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters
    • G10L19/12Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters the excitation function being a code excitation, e.g. in code excited linear prediction [CELP] vocoders
    • G10L19/135Vector sum excited linear prediction [VSELP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L13/00Speech synthesis; Text to speech systems
    • G10L13/02Methods for producing synthetic speech; Speech synthesisers
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/063Training

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of speech security transmission methods and device for mobile phone, including an encryption device and a decryption device, the voice ciphertext that encryption device can not acoustically be understood voice plaintext scramble, generation using secret key.Voice ciphertext is inverted unrest by decryption device using identical secret key, recovers raw tone in plain text.Encryption device includes voice analyzing unit, encryption secret key, excitation scramble unit, spectrum envelope replacement unit and phonetic synthesis unit.Decryption device inverts the anti-replacement unit of random unit, spectrum envelope and phonetic synthesis unit including voice analyzing unit, decryption secret key, excitation.Voice data can be encrypted and decrypted by this method and device, prevent voice messaging from being discovered in transmission process by third party;And the speech security transmitting device can also specify the key of encryption and decryption, it is ensured that even if the device is obtained by third party also can not obtain primary voice data without permission.

Description

A kind of speech security transmission method and device for mobile phone
Technical field
The present invention relates to a kind of voice communication technology, more particularly to a kind of speech security transmission method and device.
Background technology
At present, voice communication apparatus, which achieves, is widely applied.The transmission process of traditional voice equipment is:Voice transmission is set It is standby directly to acquire voice signal from microphone, after analog input signal is converted into digital signal, pass through wired or wireless network It sends;Phonetic incepting equipment converts digital signals into analog output signal, passes through loudspeaker, loud speaker, receiver or earphone Play voice signal.But if digitlization voice is not encrypted in transmission process, then after being obtained by third party, easily Raw tone is recovered, i.e., can not ensure the safety of voice transfer.Therefore, stringent unit or individual are required for information security For, it is badly in need of ensureing that the transmission of voice is safe.
Has several years history for the research of voice communication privacy device both at home and abroad.As application No. is 86209022.9 Audio digital signals are directly carried out time domain scrambling by patent, but this mode easily causes bandwidth expansion so that encrypted Voice sounds unnatural.Patent application No. is CN201320162194.6 will re-encrypt after voice progress compressed encoding, so Ciphertext is sent by way of modulation afterwards.But had significantly compared with voice signal by encrypted signal Hearing difference, therefore be also easy to stolen hearer and perceive.
Invention content
Goal of the invention:For the above-mentioned prior art, a kind of speech security transmission method and dress for mobile phone is proposed It puts, existing voice transfer encryption device is overcome to be difficult to generate the shortcomings that being not easy secure voice that the side of being ravesdropping perceives.
Technical solution:A kind of speech security transmission method for mobile phone is solved including an encryption device and one Close device, encryption device are used to obtain voice ciphertext after carrying out voice in plain text voice encryption, and decryption device is used for institute's predicate Sound ciphertext recovers voice in plain text after carrying out voice decryption;The speech ciphering method includes the following steps:
(1a) by analyzing voice in plain text, obtains voice excitation and voice plaintext line spectral frequencies call number in plain text;
The voice is encouraged scramble, obtains the excitation of voice ciphertext by (1b) in plain text;
(1c) encrypts the voice plaintext line spectral frequencies call number, obtains voice ciphertext line spectral frequencies, then to institute's predicate Sound ciphertext line spectral frequencies are converted, and obtain voice ciphertext spectrum envelope;
(1d) is synthesized using voice ciphertext excitation and voice ciphertext spectrum envelope, obtains voice ciphertext;
The voice decryption method includes the following steps:
(2a) by analyzing voice ciphertext, obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;
Voice ciphertext excitation is carried out inverting unrest, obtains voice and encourage in plain text by (2b);
(2c) decrypts the voice ciphertext line spectral frequencies call number, obtains voice plaintext line spectral frequencies, then to institute's predicate Sound plaintext line spectral frequencies are converted, and obtain voice plaintext spectrum envelope;
(2d), using the voice, excitation and voice plaintext spectrum envelope are synthesized in plain text, recover voice in plain text.
As the preferred embodiment of the present invention, in the step (1a), linear prediction analysis is made in plain text to voice, obtains one Represent the spectrum envelope of voice plaintext sound channel;The voice is filtered in plain text by one by the full zero that the spectrum envelope is formed Device obtains voice and encourages in plain text;By the spectrum envelope by a line spectral frequencies converter, a line spectral frequencies vector is obtained; Then, by each codebook vectors in the line spectral frequencies vector and a voice plaintext line spectral frequencies code library into row distance ratio Compared with the voice plaintext line spectral frequencies call number corresponding to the output codebook vectors minimum with line spectral frequencies distance.
As the preferred embodiment of the present invention, in the step (1b), will after encryption secret key input pseudo-random sequence generator, Generate a pseudo-random sequence;According to the pseudo-random sequence, to the voice, disorder processing is made in excitation in plain text, and it is close to obtain voice Text excitation.
As the preferred embodiment of the present invention, in the step (1c), the voice plaintext line spectral frequencies call number and encryption After secret key input encryption equipment, voice ciphertext line spectral frequencies call number is obtained;According to the voice ciphertext line spectral frequencies call number, from A corresponding voice ciphertext line spectral frequencies vector is selected in voice ciphertext line spectral frequencies code library;By the voice ciphertext line spectrum Frequency vector obtains a voice ciphertext spectrum envelope by line spectral frequencies inverse transformer.
As the preferred embodiment of the present invention, in the step (1d), using the voice ciphertext spectrum envelope build one it is complete Pole filter, the voice ciphertext excitation is by after the all-pole filter, obtaining voice ciphertext.
As the preferred embodiment of the present invention, in the step (2a), linear prediction analysis is made to the voice ciphertext, is obtained One spectrum envelope for representing voice ciphertext sound channel;By voice ciphertext by one by the spectrum envelope for representing voice ciphertext sound channel The full zero filter formed obtains the excitation of voice ciphertext;By the spectrum envelope for representing voice ciphertext sound channel by one Line spectral frequencies converter obtains a line spectral frequencies vector;By the line spectral frequencies and a voice ciphertext line spectral frequencies code book Each codebook vectors in library compare into row distance, the language corresponding to the output codebook vectors minimum with line spectral frequencies distance Sound ciphertext line spectral frequencies call number.
As the preferred embodiment of the present invention, in the step (2b), will after decryption secret key input pseudo-random sequence generator, Generate a pseudo-random sequence;Anti- disorder processing is encouraged to the voice ciphertext according to the pseudo-random sequence, it is bright to obtain voice Text excitation.
As the preferred embodiment of the present invention, in the step (2c), the voice ciphertext line spectral frequencies call number and decryption After secret key input decipher, voice plaintext line spectral frequencies call number is obtained;According to the voice plaintext line spectral frequencies call number, from A corresponding voice plaintext line spectral frequencies vector is selected in voice plaintext line spectral frequencies code library;By the voice plaintext line spectrum Frequency vector obtains a voice plaintext spectrum envelope by a line spectral frequencies inverse transformer.
As the preferred embodiment of the present invention, in the step (2d), using the voice plaintext spectrum envelope build one it is complete Pole filter, the voice are encouraged in plain text by after the all-pole filter, recovering voice in plain text.
A kind of speech security transmitting device for mobile phone, including encryption device and decryption device;The encryption dress It puts and scramble unit, voice plaintext spectrum envelope is encouraged to replace list in plain text including voice plaintext analytic unit, encryption secret key unit, voice Member and voice ciphertext synthesis unit;Wherein, the voice plaintext analytic unit is used to analyze the voice of input in plain text, Obtain voice excitation and voice plaintext line spectral frequencies call number in plain text;Excitation scramble unit is used for input the voice in plain text The voice after excitation scramble, obtains the excitation of voice ciphertext in plain text;The voice plaintext spectrum envelope replacement unit is used for described Voice plaintext line spectral frequencies call number is encrypted, and obtains voice ciphertext spectrum envelope;The voice ciphertext synthesis unit is used to utilize institute Predicate sound ciphertext encourages and voice ciphertext spectrum envelope is synthesized, and obtains voice ciphertext;
The decryption device includes voice ciphertext analysis unit, decryption secret key unit, the excitation of voice ciphertext invert random unit, Voice ciphertext spectrum envelope replacement unit and voice plaintext synthesis unit;Wherein, the voice ciphertext analysis unit is used for defeated The voice ciphertext entered is analyzed, and obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;The voice is close After text excitation inverts random unit for inverting unrest to the excitation of the voice ciphertext of input, obtain voice and encourage in plain text;Institute's predicate Sound ciphertext spectrum envelope replacement unit is used to decrypt the voice ciphertext line spectral frequencies call number, obtains voice plaintext spectrum envelope; The voice plaintext synthesis unit is used to encourage in plain text using the voice and voice plaintext spectrum envelope is synthesized, and obtains voice In plain text.
Advantageous effect:A kind of speech security transmission method and device for mobile phone of the present invention adds including one Close device and a decryption device, for encryption device using secret key by voice plaintext scramble, the voice that generation can not semantically be understood is close Text.Voice ciphertext is inverted unrest by decryption device using identical secret key, recovers raw tone in plain text.Encryption device includes voice Analytic unit, encryption secret key, excitation scramble unit, spectrum envelope replacement unit and phonetic synthesis unit.It decrypts device and includes voice Analytic unit, decryption secret key, excitation invert the anti-replacement unit of random unit, spectrum envelope and phonetic synthesis unit.By this method and Voice data can be encrypted and decrypted in device, and advantage is as follows.First, during encryption and decryption, line spectrum frequency is used The mode of rate displacement replaces spectrum envelope, it is ensured that the stability of filtering system ensures the pole of spectrum envelope by displacement Afterwards, also in unit circle, as shown in Figure 2.Second, the dynamic range of line spectral frequencies is small compared with the dynamic range of spectrum envelope coefficient, because This, to line spectral frequencies as code library that code book is trained is more representative, distribution is more concentrated, as shown in Figure 3.Third, The acoustic feature of voice ciphertext is remained, i.e., encrypted voice is still approximately voice on auditory effect, only semantic quilt It destroys, can prevent voice messaging from being discovered in transmission process by third party in this way, as shown in Figure 4.Finally, which passes Defeated device can also specify the key of encryption and decryption, it is ensured that can not also be obtained without permission even if the device is obtained by third party Take primary voice data.
Description of the drawings
Fig. 1 is the speech security transmitting device structure diagram of the present invention
The distribution map of Fig. 2 line spectral frequencies zero and sound channel spectrum envelope pole, the wherein exponent number of linear prediction are 12;
Fig. 3 be each frequency point frequency of occurrence of line spectral frequencies distribution map, wherein sample rate be 8000Hz, the exponent number of linear prediction It is 12;
Fig. 4 is voice plaintext and the sound spectrograph of voice ciphertext, and wherein voice plaintext line spectral frequencies code library is by Chinese male voice Voice training obtains, and voice ciphertext line spectral frequencies code library is obtained by English female voice voice training, sample rate 8000Hz, linearly The exponent number of prediction is 12.
Specific embodiment
Further explanation is done to the present invention below in conjunction with the accompanying drawings.
As shown in Figure 1, a kind of speech security transmitting device for mobile phone, including an encryption device 1 and one Decrypt device 2.Encryption device 1 includes voice plaintext analytic unit 11, encryption secret key unit 12, voice excitation scramble unit in plain text 13rd, voice plaintext spectrum envelope replacement unit 14 and voice ciphertext synthesis unit 15.Wherein, voice plaintext analytic unit 11 is used for The voice of input is analyzed in plain text, obtains voice excitation and voice plaintext line spectral frequencies call number in plain text.Encrypt secret key list Member 12 is for the scramble of voice plaintext excitation and the encryption of voice plaintext line spectral frequencies call number.Voice encourages scramble unit in plain text 13 are used for after encouraging scramble in plain text to the voice of input, obtain the excitation of voice ciphertext.Voice plaintext spectrum envelope replacement unit 14 is used In to voice excitation call number encryption in plain text, voice ciphertext spectrum envelope is obtained.Voice ciphertext synthesis unit 15 is used to utilize voice Ciphertext encourages and voice ciphertext spectrum envelope is synthesized, and obtains voice ciphertext.
Specifically, voice plaintext analytic unit 11 is bright including linear prediction analysis 111, line spectral frequencies converter 112, voice Literary line spectral frequencies code library 113 and full zero filter 114.Linear prediction analysis 111 is to the voice plaintext x of inputmThe property made is pre- Analysis is surveyed, the linear prediction analysis of the present embodiment obtains one using Levinson-Durbin algorithm solution Yule-Walker equations A spectrum envelope A (z)=1+a1z-1+a2z-2+...+apz-p, p is positive integer;Wherein, aiFor voice plaintext linear predictor coefficient, z-i For time delay, i=1.2.3...p.By voice in plain text by the full zero filter 114 being made of the spectrum envelope, it is bright to obtain voice Text excitation cm.And the spectrum envelope A (z) is obtained into a line spectral frequencies vector by line spectral frequencies converter 112.By the line spectrum Frequency vector is compared with each codebook vectors in voice plaintext line spectral frequencies code library 113 are into row distance, output and the line spectrum Voice plaintext line spectral frequencies call number i corresponding to the minimum codebook vectors of frequency vector distancem
For encryption secret key unit 12 for providing the required secret key of user, the input mode of secret key includes but not limited to key The approach such as disk, touch screen, speech recognition.
Excitation scramble unit 13 includes pseudo-random sequence generator 131 and Scrambler 132 to voice in plain text.It is defeated secret key will to be encrypted After entering pseudo-random sequence generator 131, pseudo-random sequence generator 131 generates pseudo-random sequence according to encryption secret key.Scrambler 132 encourage c in plain text according to pseudo-random sequence to voicemMake disorder processing, obtain voice ciphertext excitation em.Wherein, disorder processing Mode includes but not limited to time domain scrambling, frequency domain scrambling and transform domain scramble.
Voice plaintext spectrum envelope replacement unit 14 includes encryption equipment 141, voice ciphertext line spectral frequencies code library 142, line spectrum Inverse frequency transformer 143.By voice plaintext line spectral frequencies call number imAfter encryption secret key input encryption equipment 141, voice is obtained Ciphertext line spectral frequencies call number jm;Then according to voice ciphertext line spectral frequencies call number jm, from voice ciphertext line spectral frequencies code book A corresponding voice ciphertext line spectral frequencies vector is selected in library 142.The voice ciphertext line spectral frequencies vector is passed through into line spectrum frequency Rate inverse transformer 143 obtains voice ciphertext spectrum envelope B (z)=1+b1z-1+b2z-2+...+bpz-p;Wherein, biFor voice Ciphertext linear predictor coefficient, z-iFor time delay, i=1.2.3...p.
The all-pole filter of voice ciphertext synthesis unit 15 is obtained using voice ciphertext spectrum envelope B (z) structures, voice is close Text excitation emAfter the all-pole filter, voice ciphertext y is obtainedm
Decryption device 2 includes voice ciphertext analysis unit 21, decryption secret key unit 22, voice ciphertext and encourages and invert random unit 23rd, voice ciphertext spectrum envelope replacement unit 24 and voice plaintext synthesis unit 25.Wherein, voice ciphertext analysis unit 21 is used for The voice ciphertext of input is analyzed, obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number.Decrypt secret key list Member 22 inverts unrest and the decryption of voice ciphertext line spectral frequencies call number for the excitation of voice ciphertext.The excitation of voice ciphertext inverts unrest Unit 23 is used for after inverting unrest to the voice ciphertext excitation of input, is obtained voice and is encouraged in plain text.Voice ciphertext spectrum envelope is replaced single Member 24 is used to decrypt voice ciphertext line spectral frequencies call number, obtains voice plaintext spectrum envelope.Voice plaintext synthesis unit 25 is used It is synthesized in being encouraged in plain text using voice with voice plaintext spectrum envelope, obtains voice in plain text.
Specifically, voice ciphertext analysis unit 21 is close including linear prediction analysis 211, line spectral frequencies converter 212, voice Literary line spectral frequencies code library 213 and full zero filter 214.Linear prediction analysis 211 is to the voice ciphertext y of inputmMake linear Forecast analysis, in the present embodiment linear prediction analysis obtained using Levinson-Durbin algorithm solution Yule-Walker equations One spectrum envelope B ' (z)=1+b for representing voice ciphertext sound channel1z-1+b2z-2+...+bpz-p, p is positive integer.By voice ciphertext By the full zero filter 214 being made of spectrum envelope B ' (z), voice ciphertext excitation e is obtainedm’.By spectrum envelope B ' (z) By line spectral frequencies converter 212, a line spectral frequencies vector is obtained.By the line spectral frequencies vector and voice ciphertext line spectral frequencies Each codebook vectors in code library 213 compare into row distance, output and the codebook vectors of the line spectral frequencies vector distance minimum Corresponding voice ciphertext line spectral frequencies call number jm’。
For decryption secret key unit 22 for providing the required secret key of user, the input mode of secret key includes but not limited to key The approach such as disk, touch screen, speech recognition.
The excitation of voice ciphertext inverts random unit 23 and includes pseudo-random sequence generator 231 and anti-Scrambler 232.It will decrypt secret After key input pseudo-random sequence generator 231, a pseudo-random sequence is generated.Anti- Scrambler 232 is according to the pseudo-random sequence pair Voice ciphertext encourages em' anti-disorder processing, obtain voice excitation c in plain textm’。
Voice ciphertext spectrum envelope replacement unit 24 includes decipher 241, voice plaintext line spectral frequencies code library 242, line spectrum Inverse frequency transformer 143.Voice ciphertext line spectral frequencies call number jm' and decryption secret key input decipher 241 after, it is bright to obtain voice Literary line spectral frequencies call number im’.According to voice plaintext line spectral frequencies call number im', from voice plaintext line spectral frequencies code library A corresponding voice plaintext line spectral frequencies vector is selected in 242;Then the voice plaintext line spectral frequencies vector is passed through into line spectrum Inverse frequency transformer 243 obtains voice ciphertext spectrum envelope A ' (z)=1+a1z-1+a2z-2+...+apz-p
The all-pole filter of voice plaintext synthesis unit 25, language are obtained using voice plaintext spectrum envelope A ' (z) structure Sound encourages c in plain textm' by the all-pole filter after, recover voice plaintext xm
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (8)

1. a kind of speech security transmission method for mobile phone, including an encryption device and a decryption device, encryption Device is used to obtain voice ciphertext after carrying out voice in plain text voice encryption, and decryption device is used to carry out language to the voice ciphertext Voice is recovered after sound decryption in plain text;It is characterized in that:The speech ciphering method includes the following steps:
(1a), by analyzing voice in plain text, obtain voice excitation and voice plaintext line spectral frequencies call number in plain text;
(1b), the voice is encouraged into scramble in plain text, obtains the excitation of voice ciphertext;
(1c), the voice plaintext line spectral frequencies call number is encrypted, obtains voice ciphertext line spectral frequencies, then close to the voice Literary line spectral frequencies are converted, and obtain voice ciphertext spectrum envelope;
(1d), synthesized using voice ciphertext excitation and voice ciphertext spectrum envelope, obtain voice ciphertext;
The voice decryption method includes the following steps:
(2a), by analyzing voice ciphertext, obtain the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;
(2b), voice ciphertext excitation is carried out inverting unrest, voice is obtained and encourages in plain text;
(2c), the voice ciphertext line spectral frequencies call number is decrypted, obtains voice plaintext line spectral frequencies, then bright to the voice Literary line spectral frequencies are converted, and obtain voice plaintext spectrum envelope;
(2d), using the voice, excitation and voice plaintext spectrum envelope are synthesized in plain text, recover voice in plain text;
The step(1a)In, linear prediction analysis is made in plain text to voice, obtains a spectrum envelope for representing voice plaintext sound channel; The full zero filter that the voice is made of in plain text by one spectrum envelope obtains voice and encourages in plain text;By described in Spectrum envelope obtains a line spectral frequencies vector by a line spectral frequencies converter;Then, by the line spectral frequencies vector and one Each codebook vectors in a voice plaintext line spectral frequencies code library compare into row distance, and output is with the line spectral frequencies apart from most Voice plaintext line spectral frequencies call number corresponding to small codebook vectors.
2. a kind of speech security transmission method for mobile phone according to claim 1, it is characterised in that:The step Suddenly(1b)In, after encryption secret key input pseudo-random sequence generator, generate a pseudo-random sequence;According to the pseudorandom sequence To the voice, disorder processing is made in excitation to row in plain text, obtains the excitation of voice ciphertext.
3. a kind of speech security transmission method for mobile phone according to claim 2, it is characterised in that:The step Suddenly(1c)In, after the voice plaintext line spectral frequencies call number and encryption secret key input encryption equipment, obtain voice ciphertext line spectrum frequency Rate call number;According to the voice ciphertext line spectral frequencies call number, selection one is right from voice ciphertext line spectral frequencies code library The voice ciphertext line spectral frequencies vector answered;By the voice ciphertext line spectral frequencies vector by line spectral frequencies inverse transformer, obtain One voice ciphertext spectrum envelope.
4. a kind of speech security transmission method for mobile phone according to claim 3, it is characterised in that:The step Suddenly(1d)In, an all-pole filter is built using the voice ciphertext spectrum envelope, the voice ciphertext excitation passes through described After all-pole filter, voice ciphertext is obtained.
5. a kind of speech security transmission method for mobile phone according to claim 1, it is characterised in that:The step Suddenly(2a)In, linear prediction analysis is made to the voice ciphertext, obtains a spectrum envelope for representing voice ciphertext sound channel;By voice The full zero filter that ciphertext is made of by one spectrum envelope for representing voice ciphertext sound channel, obtains voice ciphertext and swashs It encourages;By the spectrum envelope for representing voice ciphertext sound channel by a line spectral frequencies converter, a line spectral frequencies vector is obtained; By the line spectral frequencies compared with each codebook vectors in a voice ciphertext line spectral frequencies code library are into row distance, output with Voice ciphertext line spectral frequencies call number corresponding to the minimum codebook vectors of the line spectral frequencies distance.
6. a kind of speech security transmission method for mobile phone according to claim 5, it is characterised in that:The step Suddenly(2b)In, after decryption secret key input pseudo-random sequence generator, generate a pseudo-random sequence;According to the pseudorandom sequence Row encourage anti-disorder processing to the voice ciphertext, obtain voice and encourage in plain text.
7. a kind of speech security transmission method for mobile phone according to claim 6, it is characterised in that:The step Suddenly(2c)In, after the voice ciphertext line spectral frequencies call number and decryption secret key input decipher, obtain voice plaintext line spectrum frequency Rate call number;According to the voice plaintext line spectral frequencies call number, selection one is right from voice plaintext line spectral frequencies code library The voice plaintext line spectral frequencies vector answered;By the voice plaintext line spectral frequencies vector by a line spectral frequencies inverse transformer, Obtain a voice plaintext spectrum envelope.
8. a kind of speech security transmission method for mobile phone according to claim 7, it is characterised in that:The step Suddenly(2d)In, an all-pole filter is built using the voice plaintext spectrum envelope, the voice is encouraged in plain text by described After all-pole filter, voice is recovered in plain text.
CN201510266496.1A 2015-05-22 2015-05-22 A kind of speech security transmission method and device for mobile phone Active CN104994500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510266496.1A CN104994500B (en) 2015-05-22 2015-05-22 A kind of speech security transmission method and device for mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510266496.1A CN104994500B (en) 2015-05-22 2015-05-22 A kind of speech security transmission method and device for mobile phone

Publications (2)

Publication Number Publication Date
CN104994500A CN104994500A (en) 2015-10-21
CN104994500B true CN104994500B (en) 2018-07-06

Family

ID=54306234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510266496.1A Active CN104994500B (en) 2015-05-22 2015-05-22 A kind of speech security transmission method and device for mobile phone

Country Status (1)

Country Link
CN (1) CN104994500B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743912B (en) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice sending terminal
CN107071118A (en) * 2017-01-03 2017-08-18 中国农业大学 A kind of structure and its method of mobile phone speech encryption

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
CN101577605A (en) * 2008-05-08 2009-11-11 吴志军 Speech LPC hiding and extraction algorithm based on filter similarity

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7047188B2 (en) * 2002-11-08 2006-05-16 Motorola, Inc. Method and apparatus for improvement coding of the subframe gain in a speech coding system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
CN101577605A (en) * 2008-05-08 2009-11-11 吴志军 Speech LPC hiding and extraction algorithm based on filter similarity

Also Published As

Publication number Publication date
CN104994500A (en) 2015-10-21

Similar Documents

Publication Publication Date Title
US8855303B1 (en) Cryptography using a symmetric frequency-based encryption algorithm
TW201342873A (en) Speech scrambling method, encryption/decryption method and scrambling equipment
CN102624518B (en) Voice encryption and decryption method
CN105338475A (en) Bluetooth-based safety conversation system and method
CN104994500B (en) A kind of speech security transmission method and device for mobile phone
KR100836942B1 (en) Encryption /Decryption Method for Voice Signal and Apparatus for the Same
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
JP2008160839A (en) Computer control method for protecting human-to-human communication over network
US20160173456A1 (en) Dynamic Spectrum Audio Encryption and Decryption Device
Ridha et al. Modified blind source separation for securing end-to-end mobile voice calls
Sadkhan et al. The trade-off between security and quality using permutation and substitution techniques in speech scrambling system
JPH0449818B2 (en)
CN111818522A (en) Voice call encryption method and device
JP2013098869A (en) Voice system
EP4109811A1 (en) Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
CN109036439A (en) A kind of perceptual hash feature extraction method and system encrypting voice signal
CN103986711A (en) Data processing method for voice communication
Krasnowski et al. A novel distortion-tolerant speech encryption scheme for secure voice communication
WO2009074711A1 (en) Speech data encryption and decryption
JP2013070202A (en) Voice transmitting and receiving system, and voice transmitting and receiving method
CN105788602A (en) Voice encryption method and device for voice band compression system
EP2178235B1 (en) Encryption of information signals
KR20210104337A (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
Pekerti et al. Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques
CN100359908C (en) Privacy telephone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant