CN104994500B - A kind of speech security transmission method and device for mobile phone - Google Patents
A kind of speech security transmission method and device for mobile phone Download PDFInfo
- Publication number
- CN104994500B CN104994500B CN201510266496.1A CN201510266496A CN104994500B CN 104994500 B CN104994500 B CN 104994500B CN 201510266496 A CN201510266496 A CN 201510266496A CN 104994500 B CN104994500 B CN 104994500B
- Authority
- CN
- China
- Prior art keywords
- voice
- ciphertext
- line spectral
- spectral frequencies
- plaintext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000001228 spectrum Methods 0.000 claims abstract description 75
- 230000005284 excitation Effects 0.000 claims abstract description 48
- 206010038743 Restlessness Diseases 0.000 claims abstract description 8
- 230000003595 spectral effect Effects 0.000 claims description 107
- 239000013598 vector Substances 0.000 claims description 36
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 230000015572 biosynthetic process Effects 0.000 abstract description 14
- 238000003786 synthesis reaction Methods 0.000 abstract description 14
- 238000004891 communication Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/08—Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters
- G10L19/12—Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters the excitation function being a code excitation, e.g. in code excited linear prediction [CELP] vocoders
- G10L19/135—Vector sum excited linear prediction [VSELP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L13/00—Speech synthesis; Text to speech systems
- G10L13/02—Methods for producing synthetic speech; Speech synthesisers
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/063—Training
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of speech security transmission methods and device for mobile phone, including an encryption device and a decryption device, the voice ciphertext that encryption device can not acoustically be understood voice plaintext scramble, generation using secret key.Voice ciphertext is inverted unrest by decryption device using identical secret key, recovers raw tone in plain text.Encryption device includes voice analyzing unit, encryption secret key, excitation scramble unit, spectrum envelope replacement unit and phonetic synthesis unit.Decryption device inverts the anti-replacement unit of random unit, spectrum envelope and phonetic synthesis unit including voice analyzing unit, decryption secret key, excitation.Voice data can be encrypted and decrypted by this method and device, prevent voice messaging from being discovered in transmission process by third party;And the speech security transmitting device can also specify the key of encryption and decryption, it is ensured that even if the device is obtained by third party also can not obtain primary voice data without permission.
Description
Technical field
The present invention relates to a kind of voice communication technology, more particularly to a kind of speech security transmission method and device.
Background technology
At present, voice communication apparatus, which achieves, is widely applied.The transmission process of traditional voice equipment is:Voice transmission is set
It is standby directly to acquire voice signal from microphone, after analog input signal is converted into digital signal, pass through wired or wireless network
It sends;Phonetic incepting equipment converts digital signals into analog output signal, passes through loudspeaker, loud speaker, receiver or earphone
Play voice signal.But if digitlization voice is not encrypted in transmission process, then after being obtained by third party, easily
Raw tone is recovered, i.e., can not ensure the safety of voice transfer.Therefore, stringent unit or individual are required for information security
For, it is badly in need of ensureing that the transmission of voice is safe.
Has several years history for the research of voice communication privacy device both at home and abroad.As application No. is 86209022.9
Audio digital signals are directly carried out time domain scrambling by patent, but this mode easily causes bandwidth expansion so that encrypted
Voice sounds unnatural.Patent application No. is CN201320162194.6 will re-encrypt after voice progress compressed encoding, so
Ciphertext is sent by way of modulation afterwards.But had significantly compared with voice signal by encrypted signal
Hearing difference, therefore be also easy to stolen hearer and perceive.
Invention content
Goal of the invention:For the above-mentioned prior art, a kind of speech security transmission method and dress for mobile phone is proposed
It puts, existing voice transfer encryption device is overcome to be difficult to generate the shortcomings that being not easy secure voice that the side of being ravesdropping perceives.
Technical solution:A kind of speech security transmission method for mobile phone is solved including an encryption device and one
Close device, encryption device are used to obtain voice ciphertext after carrying out voice in plain text voice encryption, and decryption device is used for institute's predicate
Sound ciphertext recovers voice in plain text after carrying out voice decryption;The speech ciphering method includes the following steps:
(1a) by analyzing voice in plain text, obtains voice excitation and voice plaintext line spectral frequencies call number in plain text;
The voice is encouraged scramble, obtains the excitation of voice ciphertext by (1b) in plain text;
(1c) encrypts the voice plaintext line spectral frequencies call number, obtains voice ciphertext line spectral frequencies, then to institute's predicate
Sound ciphertext line spectral frequencies are converted, and obtain voice ciphertext spectrum envelope;
(1d) is synthesized using voice ciphertext excitation and voice ciphertext spectrum envelope, obtains voice ciphertext;
The voice decryption method includes the following steps:
(2a) by analyzing voice ciphertext, obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;
Voice ciphertext excitation is carried out inverting unrest, obtains voice and encourage in plain text by (2b);
(2c) decrypts the voice ciphertext line spectral frequencies call number, obtains voice plaintext line spectral frequencies, then to institute's predicate
Sound plaintext line spectral frequencies are converted, and obtain voice plaintext spectrum envelope;
(2d), using the voice, excitation and voice plaintext spectrum envelope are synthesized in plain text, recover voice in plain text.
As the preferred embodiment of the present invention, in the step (1a), linear prediction analysis is made in plain text to voice, obtains one
Represent the spectrum envelope of voice plaintext sound channel;The voice is filtered in plain text by one by the full zero that the spectrum envelope is formed
Device obtains voice and encourages in plain text;By the spectrum envelope by a line spectral frequencies converter, a line spectral frequencies vector is obtained;
Then, by each codebook vectors in the line spectral frequencies vector and a voice plaintext line spectral frequencies code library into row distance ratio
Compared with the voice plaintext line spectral frequencies call number corresponding to the output codebook vectors minimum with line spectral frequencies distance.
As the preferred embodiment of the present invention, in the step (1b), will after encryption secret key input pseudo-random sequence generator,
Generate a pseudo-random sequence;According to the pseudo-random sequence, to the voice, disorder processing is made in excitation in plain text, and it is close to obtain voice
Text excitation.
As the preferred embodiment of the present invention, in the step (1c), the voice plaintext line spectral frequencies call number and encryption
After secret key input encryption equipment, voice ciphertext line spectral frequencies call number is obtained;According to the voice ciphertext line spectral frequencies call number, from
A corresponding voice ciphertext line spectral frequencies vector is selected in voice ciphertext line spectral frequencies code library;By the voice ciphertext line spectrum
Frequency vector obtains a voice ciphertext spectrum envelope by line spectral frequencies inverse transformer.
As the preferred embodiment of the present invention, in the step (1d), using the voice ciphertext spectrum envelope build one it is complete
Pole filter, the voice ciphertext excitation is by after the all-pole filter, obtaining voice ciphertext.
As the preferred embodiment of the present invention, in the step (2a), linear prediction analysis is made to the voice ciphertext, is obtained
One spectrum envelope for representing voice ciphertext sound channel;By voice ciphertext by one by the spectrum envelope for representing voice ciphertext sound channel
The full zero filter formed obtains the excitation of voice ciphertext;By the spectrum envelope for representing voice ciphertext sound channel by one
Line spectral frequencies converter obtains a line spectral frequencies vector;By the line spectral frequencies and a voice ciphertext line spectral frequencies code book
Each codebook vectors in library compare into row distance, the language corresponding to the output codebook vectors minimum with line spectral frequencies distance
Sound ciphertext line spectral frequencies call number.
As the preferred embodiment of the present invention, in the step (2b), will after decryption secret key input pseudo-random sequence generator,
Generate a pseudo-random sequence;Anti- disorder processing is encouraged to the voice ciphertext according to the pseudo-random sequence, it is bright to obtain voice
Text excitation.
As the preferred embodiment of the present invention, in the step (2c), the voice ciphertext line spectral frequencies call number and decryption
After secret key input decipher, voice plaintext line spectral frequencies call number is obtained;According to the voice plaintext line spectral frequencies call number, from
A corresponding voice plaintext line spectral frequencies vector is selected in voice plaintext line spectral frequencies code library;By the voice plaintext line spectrum
Frequency vector obtains a voice plaintext spectrum envelope by a line spectral frequencies inverse transformer.
As the preferred embodiment of the present invention, in the step (2d), using the voice plaintext spectrum envelope build one it is complete
Pole filter, the voice are encouraged in plain text by after the all-pole filter, recovering voice in plain text.
A kind of speech security transmitting device for mobile phone, including encryption device and decryption device;The encryption dress
It puts and scramble unit, voice plaintext spectrum envelope is encouraged to replace list in plain text including voice plaintext analytic unit, encryption secret key unit, voice
Member and voice ciphertext synthesis unit;Wherein, the voice plaintext analytic unit is used to analyze the voice of input in plain text,
Obtain voice excitation and voice plaintext line spectral frequencies call number in plain text;Excitation scramble unit is used for input the voice in plain text
The voice after excitation scramble, obtains the excitation of voice ciphertext in plain text;The voice plaintext spectrum envelope replacement unit is used for described
Voice plaintext line spectral frequencies call number is encrypted, and obtains voice ciphertext spectrum envelope;The voice ciphertext synthesis unit is used to utilize institute
Predicate sound ciphertext encourages and voice ciphertext spectrum envelope is synthesized, and obtains voice ciphertext;
The decryption device includes voice ciphertext analysis unit, decryption secret key unit, the excitation of voice ciphertext invert random unit,
Voice ciphertext spectrum envelope replacement unit and voice plaintext synthesis unit;Wherein, the voice ciphertext analysis unit is used for defeated
The voice ciphertext entered is analyzed, and obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;The voice is close
After text excitation inverts random unit for inverting unrest to the excitation of the voice ciphertext of input, obtain voice and encourage in plain text;Institute's predicate
Sound ciphertext spectrum envelope replacement unit is used to decrypt the voice ciphertext line spectral frequencies call number, obtains voice plaintext spectrum envelope;
The voice plaintext synthesis unit is used to encourage in plain text using the voice and voice plaintext spectrum envelope is synthesized, and obtains voice
In plain text.
Advantageous effect:A kind of speech security transmission method and device for mobile phone of the present invention adds including one
Close device and a decryption device, for encryption device using secret key by voice plaintext scramble, the voice that generation can not semantically be understood is close
Text.Voice ciphertext is inverted unrest by decryption device using identical secret key, recovers raw tone in plain text.Encryption device includes voice
Analytic unit, encryption secret key, excitation scramble unit, spectrum envelope replacement unit and phonetic synthesis unit.It decrypts device and includes voice
Analytic unit, decryption secret key, excitation invert the anti-replacement unit of random unit, spectrum envelope and phonetic synthesis unit.By this method and
Voice data can be encrypted and decrypted in device, and advantage is as follows.First, during encryption and decryption, line spectrum frequency is used
The mode of rate displacement replaces spectrum envelope, it is ensured that the stability of filtering system ensures the pole of spectrum envelope by displacement
Afterwards, also in unit circle, as shown in Figure 2.Second, the dynamic range of line spectral frequencies is small compared with the dynamic range of spectrum envelope coefficient, because
This, to line spectral frequencies as code library that code book is trained is more representative, distribution is more concentrated, as shown in Figure 3.Third,
The acoustic feature of voice ciphertext is remained, i.e., encrypted voice is still approximately voice on auditory effect, only semantic quilt
It destroys, can prevent voice messaging from being discovered in transmission process by third party in this way, as shown in Figure 4.Finally, which passes
Defeated device can also specify the key of encryption and decryption, it is ensured that can not also be obtained without permission even if the device is obtained by third party
Take primary voice data.
Description of the drawings
Fig. 1 is the speech security transmitting device structure diagram of the present invention
The distribution map of Fig. 2 line spectral frequencies zero and sound channel spectrum envelope pole, the wherein exponent number of linear prediction are 12;
Fig. 3 be each frequency point frequency of occurrence of line spectral frequencies distribution map, wherein sample rate be 8000Hz, the exponent number of linear prediction
It is 12;
Fig. 4 is voice plaintext and the sound spectrograph of voice ciphertext, and wherein voice plaintext line spectral frequencies code library is by Chinese male voice
Voice training obtains, and voice ciphertext line spectral frequencies code library is obtained by English female voice voice training, sample rate 8000Hz, linearly
The exponent number of prediction is 12.
Specific embodiment
Further explanation is done to the present invention below in conjunction with the accompanying drawings.
As shown in Figure 1, a kind of speech security transmitting device for mobile phone, including an encryption device 1 and one
Decrypt device 2.Encryption device 1 includes voice plaintext analytic unit 11, encryption secret key unit 12, voice excitation scramble unit in plain text
13rd, voice plaintext spectrum envelope replacement unit 14 and voice ciphertext synthesis unit 15.Wherein, voice plaintext analytic unit 11 is used for
The voice of input is analyzed in plain text, obtains voice excitation and voice plaintext line spectral frequencies call number in plain text.Encrypt secret key list
Member 12 is for the scramble of voice plaintext excitation and the encryption of voice plaintext line spectral frequencies call number.Voice encourages scramble unit in plain text
13 are used for after encouraging scramble in plain text to the voice of input, obtain the excitation of voice ciphertext.Voice plaintext spectrum envelope replacement unit 14 is used
In to voice excitation call number encryption in plain text, voice ciphertext spectrum envelope is obtained.Voice ciphertext synthesis unit 15 is used to utilize voice
Ciphertext encourages and voice ciphertext spectrum envelope is synthesized, and obtains voice ciphertext.
Specifically, voice plaintext analytic unit 11 is bright including linear prediction analysis 111, line spectral frequencies converter 112, voice
Literary line spectral frequencies code library 113 and full zero filter 114.Linear prediction analysis 111 is to the voice plaintext x of inputmThe property made is pre-
Analysis is surveyed, the linear prediction analysis of the present embodiment obtains one using Levinson-Durbin algorithm solution Yule-Walker equations
A spectrum envelope A (z)=1+a1z-1+a2z-2+...+apz-p, p is positive integer;Wherein, aiFor voice plaintext linear predictor coefficient, z-i
For time delay, i=1.2.3...p.By voice in plain text by the full zero filter 114 being made of the spectrum envelope, it is bright to obtain voice
Text excitation cm.And the spectrum envelope A (z) is obtained into a line spectral frequencies vector by line spectral frequencies converter 112.By the line spectrum
Frequency vector is compared with each codebook vectors in voice plaintext line spectral frequencies code library 113 are into row distance, output and the line spectrum
Voice plaintext line spectral frequencies call number i corresponding to the minimum codebook vectors of frequency vector distancem。
For encryption secret key unit 12 for providing the required secret key of user, the input mode of secret key includes but not limited to key
The approach such as disk, touch screen, speech recognition.
Excitation scramble unit 13 includes pseudo-random sequence generator 131 and Scrambler 132 to voice in plain text.It is defeated secret key will to be encrypted
After entering pseudo-random sequence generator 131, pseudo-random sequence generator 131 generates pseudo-random sequence according to encryption secret key.Scrambler
132 encourage c in plain text according to pseudo-random sequence to voicemMake disorder processing, obtain voice ciphertext excitation em.Wherein, disorder processing
Mode includes but not limited to time domain scrambling, frequency domain scrambling and transform domain scramble.
Voice plaintext spectrum envelope replacement unit 14 includes encryption equipment 141, voice ciphertext line spectral frequencies code library 142, line spectrum
Inverse frequency transformer 143.By voice plaintext line spectral frequencies call number imAfter encryption secret key input encryption equipment 141, voice is obtained
Ciphertext line spectral frequencies call number jm;Then according to voice ciphertext line spectral frequencies call number jm, from voice ciphertext line spectral frequencies code book
A corresponding voice ciphertext line spectral frequencies vector is selected in library 142.The voice ciphertext line spectral frequencies vector is passed through into line spectrum frequency
Rate inverse transformer 143 obtains voice ciphertext spectrum envelope B (z)=1+b1z-1+b2z-2+...+bpz-p;Wherein, biFor voice
Ciphertext linear predictor coefficient, z-iFor time delay, i=1.2.3...p.
The all-pole filter of voice ciphertext synthesis unit 15 is obtained using voice ciphertext spectrum envelope B (z) structures, voice is close
Text excitation emAfter the all-pole filter, voice ciphertext y is obtainedm。
Decryption device 2 includes voice ciphertext analysis unit 21, decryption secret key unit 22, voice ciphertext and encourages and invert random unit
23rd, voice ciphertext spectrum envelope replacement unit 24 and voice plaintext synthesis unit 25.Wherein, voice ciphertext analysis unit 21 is used for
The voice ciphertext of input is analyzed, obtains the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number.Decrypt secret key list
Member 22 inverts unrest and the decryption of voice ciphertext line spectral frequencies call number for the excitation of voice ciphertext.The excitation of voice ciphertext inverts unrest
Unit 23 is used for after inverting unrest to the voice ciphertext excitation of input, is obtained voice and is encouraged in plain text.Voice ciphertext spectrum envelope is replaced single
Member 24 is used to decrypt voice ciphertext line spectral frequencies call number, obtains voice plaintext spectrum envelope.Voice plaintext synthesis unit 25 is used
It is synthesized in being encouraged in plain text using voice with voice plaintext spectrum envelope, obtains voice in plain text.
Specifically, voice ciphertext analysis unit 21 is close including linear prediction analysis 211, line spectral frequencies converter 212, voice
Literary line spectral frequencies code library 213 and full zero filter 214.Linear prediction analysis 211 is to the voice ciphertext y of inputmMake linear
Forecast analysis, in the present embodiment linear prediction analysis obtained using Levinson-Durbin algorithm solution Yule-Walker equations
One spectrum envelope B ' (z)=1+b for representing voice ciphertext sound channel1z-1+b2z-2+...+bpz-p, p is positive integer.By voice ciphertext
By the full zero filter 214 being made of spectrum envelope B ' (z), voice ciphertext excitation e is obtainedm’.By spectrum envelope B ' (z)
By line spectral frequencies converter 212, a line spectral frequencies vector is obtained.By the line spectral frequencies vector and voice ciphertext line spectral frequencies
Each codebook vectors in code library 213 compare into row distance, output and the codebook vectors of the line spectral frequencies vector distance minimum
Corresponding voice ciphertext line spectral frequencies call number jm’。
For decryption secret key unit 22 for providing the required secret key of user, the input mode of secret key includes but not limited to key
The approach such as disk, touch screen, speech recognition.
The excitation of voice ciphertext inverts random unit 23 and includes pseudo-random sequence generator 231 and anti-Scrambler 232.It will decrypt secret
After key input pseudo-random sequence generator 231, a pseudo-random sequence is generated.Anti- Scrambler 232 is according to the pseudo-random sequence pair
Voice ciphertext encourages em' anti-disorder processing, obtain voice excitation c in plain textm’。
Voice ciphertext spectrum envelope replacement unit 24 includes decipher 241, voice plaintext line spectral frequencies code library 242, line spectrum
Inverse frequency transformer 143.Voice ciphertext line spectral frequencies call number jm' and decryption secret key input decipher 241 after, it is bright to obtain voice
Literary line spectral frequencies call number im’.According to voice plaintext line spectral frequencies call number im', from voice plaintext line spectral frequencies code library
A corresponding voice plaintext line spectral frequencies vector is selected in 242;Then the voice plaintext line spectral frequencies vector is passed through into line spectrum
Inverse frequency transformer 243 obtains voice ciphertext spectrum envelope A ' (z)=1+a1z-1+a2z-2+...+apz-p。
The all-pole filter of voice plaintext synthesis unit 25, language are obtained using voice plaintext spectrum envelope A ' (z) structure
Sound encourages c in plain textm' by the all-pole filter after, recover voice plaintext xm。
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (8)
1. a kind of speech security transmission method for mobile phone, including an encryption device and a decryption device, encryption
Device is used to obtain voice ciphertext after carrying out voice in plain text voice encryption, and decryption device is used to carry out language to the voice ciphertext
Voice is recovered after sound decryption in plain text;It is characterized in that:The speech ciphering method includes the following steps:
(1a), by analyzing voice in plain text, obtain voice excitation and voice plaintext line spectral frequencies call number in plain text;
(1b), the voice is encouraged into scramble in plain text, obtains the excitation of voice ciphertext;
(1c), the voice plaintext line spectral frequencies call number is encrypted, obtains voice ciphertext line spectral frequencies, then close to the voice
Literary line spectral frequencies are converted, and obtain voice ciphertext spectrum envelope;
(1d), synthesized using voice ciphertext excitation and voice ciphertext spectrum envelope, obtain voice ciphertext;
The voice decryption method includes the following steps:
(2a), by analyzing voice ciphertext, obtain the excitation of voice ciphertext and voice ciphertext line spectral frequencies call number;
(2b), voice ciphertext excitation is carried out inverting unrest, voice is obtained and encourages in plain text;
(2c), the voice ciphertext line spectral frequencies call number is decrypted, obtains voice plaintext line spectral frequencies, then bright to the voice
Literary line spectral frequencies are converted, and obtain voice plaintext spectrum envelope;
(2d), using the voice, excitation and voice plaintext spectrum envelope are synthesized in plain text, recover voice in plain text;
The step(1a)In, linear prediction analysis is made in plain text to voice, obtains a spectrum envelope for representing voice plaintext sound channel;
The full zero filter that the voice is made of in plain text by one spectrum envelope obtains voice and encourages in plain text;By described in
Spectrum envelope obtains a line spectral frequencies vector by a line spectral frequencies converter;Then, by the line spectral frequencies vector and one
Each codebook vectors in a voice plaintext line spectral frequencies code library compare into row distance, and output is with the line spectral frequencies apart from most
Voice plaintext line spectral frequencies call number corresponding to small codebook vectors.
2. a kind of speech security transmission method for mobile phone according to claim 1, it is characterised in that:The step
Suddenly(1b)In, after encryption secret key input pseudo-random sequence generator, generate a pseudo-random sequence;According to the pseudorandom sequence
To the voice, disorder processing is made in excitation to row in plain text, obtains the excitation of voice ciphertext.
3. a kind of speech security transmission method for mobile phone according to claim 2, it is characterised in that:The step
Suddenly(1c)In, after the voice plaintext line spectral frequencies call number and encryption secret key input encryption equipment, obtain voice ciphertext line spectrum frequency
Rate call number;According to the voice ciphertext line spectral frequencies call number, selection one is right from voice ciphertext line spectral frequencies code library
The voice ciphertext line spectral frequencies vector answered;By the voice ciphertext line spectral frequencies vector by line spectral frequencies inverse transformer, obtain
One voice ciphertext spectrum envelope.
4. a kind of speech security transmission method for mobile phone according to claim 3, it is characterised in that:The step
Suddenly(1d)In, an all-pole filter is built using the voice ciphertext spectrum envelope, the voice ciphertext excitation passes through described
After all-pole filter, voice ciphertext is obtained.
5. a kind of speech security transmission method for mobile phone according to claim 1, it is characterised in that:The step
Suddenly(2a)In, linear prediction analysis is made to the voice ciphertext, obtains a spectrum envelope for representing voice ciphertext sound channel;By voice
The full zero filter that ciphertext is made of by one spectrum envelope for representing voice ciphertext sound channel, obtains voice ciphertext and swashs
It encourages;By the spectrum envelope for representing voice ciphertext sound channel by a line spectral frequencies converter, a line spectral frequencies vector is obtained;
By the line spectral frequencies compared with each codebook vectors in a voice ciphertext line spectral frequencies code library are into row distance, output with
Voice ciphertext line spectral frequencies call number corresponding to the minimum codebook vectors of the line spectral frequencies distance.
6. a kind of speech security transmission method for mobile phone according to claim 5, it is characterised in that:The step
Suddenly(2b)In, after decryption secret key input pseudo-random sequence generator, generate a pseudo-random sequence;According to the pseudorandom sequence
Row encourage anti-disorder processing to the voice ciphertext, obtain voice and encourage in plain text.
7. a kind of speech security transmission method for mobile phone according to claim 6, it is characterised in that:The step
Suddenly(2c)In, after the voice ciphertext line spectral frequencies call number and decryption secret key input decipher, obtain voice plaintext line spectrum frequency
Rate call number;According to the voice plaintext line spectral frequencies call number, selection one is right from voice plaintext line spectral frequencies code library
The voice plaintext line spectral frequencies vector answered;By the voice plaintext line spectral frequencies vector by a line spectral frequencies inverse transformer,
Obtain a voice plaintext spectrum envelope.
8. a kind of speech security transmission method for mobile phone according to claim 7, it is characterised in that:The step
Suddenly(2d)In, an all-pole filter is built using the voice plaintext spectrum envelope, the voice is encouraged in plain text by described
After all-pole filter, voice is recovered in plain text.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510266496.1A CN104994500B (en) | 2015-05-22 | 2015-05-22 | A kind of speech security transmission method and device for mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510266496.1A CN104994500B (en) | 2015-05-22 | 2015-05-22 | A kind of speech security transmission method and device for mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104994500A CN104994500A (en) | 2015-10-21 |
CN104994500B true CN104994500B (en) | 2018-07-06 |
Family
ID=54306234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510266496.1A Active CN104994500B (en) | 2015-05-22 | 2015-05-22 | A kind of speech security transmission method and device for mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104994500B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105743912B (en) * | 2016-03-31 | 2020-04-07 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption method and voice sending terminal |
CN107071118A (en) * | 2017-01-03 | 2017-08-18 | 中国农业大学 | A kind of structure and its method of mobile phone speech encryption |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101014060A (en) * | 2007-02-02 | 2007-08-08 | 东南大学 | Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding |
CN101059957A (en) * | 2007-05-24 | 2007-10-24 | 华中科技大学 | An audio coding selective cryptographic method |
CN101577605A (en) * | 2008-05-08 | 2009-11-11 | 吴志军 | Speech LPC hiding and extraction algorithm based on filter similarity |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7047188B2 (en) * | 2002-11-08 | 2006-05-16 | Motorola, Inc. | Method and apparatus for improvement coding of the subframe gain in a speech coding system |
-
2015
- 2015-05-22 CN CN201510266496.1A patent/CN104994500B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101014060A (en) * | 2007-02-02 | 2007-08-08 | 东南大学 | Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding |
CN101059957A (en) * | 2007-05-24 | 2007-10-24 | 华中科技大学 | An audio coding selective cryptographic method |
CN101577605A (en) * | 2008-05-08 | 2009-11-11 | 吴志军 | Speech LPC hiding and extraction algorithm based on filter similarity |
Also Published As
Publication number | Publication date |
---|---|
CN104994500A (en) | 2015-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8855303B1 (en) | Cryptography using a symmetric frequency-based encryption algorithm | |
TW201342873A (en) | Speech scrambling method, encryption/decryption method and scrambling equipment | |
CN102624518B (en) | Voice encryption and decryption method | |
CN105338475A (en) | Bluetooth-based safety conversation system and method | |
CN104994500B (en) | A kind of speech security transmission method and device for mobile phone | |
KR100836942B1 (en) | Encryption /Decryption Method for Voice Signal and Apparatus for the Same | |
CN112182624A (en) | Encryption method, encryption device, storage medium and electronic equipment | |
JP2008160839A (en) | Computer control method for protecting human-to-human communication over network | |
US20160173456A1 (en) | Dynamic Spectrum Audio Encryption and Decryption Device | |
Ridha et al. | Modified blind source separation for securing end-to-end mobile voice calls | |
Sadkhan et al. | The trade-off between security and quality using permutation and substitution techniques in speech scrambling system | |
JPH0449818B2 (en) | ||
CN111818522A (en) | Voice call encryption method and device | |
JP2013098869A (en) | Voice system | |
EP4109811A1 (en) | Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same | |
CN109036439A (en) | A kind of perceptual hash feature extraction method and system encrypting voice signal | |
CN103986711A (en) | Data processing method for voice communication | |
Krasnowski et al. | A novel distortion-tolerant speech encryption scheme for secure voice communication | |
WO2009074711A1 (en) | Speech data encryption and decryption | |
JP2013070202A (en) | Voice transmitting and receiving system, and voice transmitting and receiving method | |
CN105788602A (en) | Voice encryption method and device for voice band compression system | |
EP2178235B1 (en) | Encryption of information signals | |
KR20210104337A (en) | Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same | |
Pekerti et al. | Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques | |
CN100359908C (en) | Privacy telephone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |