CN106878299A - A kind of voice encryption, decryption method and equipment - Google Patents

A kind of voice encryption, decryption method and equipment Download PDF

Info

Publication number
CN106878299A
CN106878299A CN201710069844.5A CN201710069844A CN106878299A CN 106878299 A CN106878299 A CN 106878299A CN 201710069844 A CN201710069844 A CN 201710069844A CN 106878299 A CN106878299 A CN 106878299A
Authority
CN
China
Prior art keywords
frame
encryption
speech frame
speech
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710069844.5A
Other languages
Chinese (zh)
Other versions
CN106878299B (en
Inventor
丁琦
徐金甫
南龙梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201710069844.5A priority Critical patent/CN106878299B/en
Publication of CN106878299A publication Critical patent/CN106878299A/en
Application granted granted Critical
Publication of CN106878299B publication Critical patent/CN106878299B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

This application discloses a kind of voice encryption, decryption method and equipment, the speech ciphering method includes:Obtain speech frame to be encrypted;According to the pitch parameter of the speech frame to be encrypted, the encryption speech frame with the pitch parameter is searched from speech database;According to preset rules, at least one is selected to encrypt speech frame from the encryption speech frame for finding;According at least one encryption speech frame of selection, the speech frame to be encrypted is encrypted, the speech frame after being encrypted.The embodiment of the present application to speech frame to be encrypted when being encrypted, pitch parameter Choice encryption speech frame according to the speech frame to be encrypted is encrypted, the integrality of the speech frame voice messaging after compressed encoding after encryption can be effectively ensured in terms of existing technologies so that recipient can obtain the speech frame that sender sends according to the speech frame after the encryption for receiving.

Description

A kind of voice encryption, decryption method and equipment
Technical field
The application is related to voice communication technology field, more particularly to a kind of voice encryption, decryption method and equipment.
Background technology
With developing rapidly for mobile communication and network technology, voice communication has become a kind of very important communication party Formula.In voice communication, voice signal is generally sent to recipient, voice communication system by voice communication system by sender When by the transmitting voice signal to recipient, the voice signal can be compressed coding, and by the language after compressed encoding Message number is transmitted, and to improve the utilization rate of channel, recipient, can be with after voice communication system receives voice signal To the voice signal decompression processing for receiving, and the voice signal that sender sends is obtained, realized and the language between sender Sound communicates.
In order to ensure the security of voice signal, generally, sender, can be to the voice before voice signal is sent Signal is encrypted, and the voice signal after encryption is sent into recipient by voice communication system, now, uses voice pressure The voice communication system of code is reduced the staff, the voice signal after encryption coding can be compressed, and is sent to recipient, recipient exists After receiving the voice signal, decompression processing is carried out to the voice signal, and the voice signal after decompression is decrypted, obtained Voice signal after decryption, realizes and the voice communication between sender.So, it is encrypted by voice signal, can be with Improve the security of voice communication.
However, sender to voice signal when being encrypted, voice signal is carried out usually using digital encryption method Encryption, so, when the voice signal after to encryption is compressed and transmits, due to using digital encryption method to voice signal It is encrypted so that when the voice signal after to encryption is compressed, be easily lost the voice messaging of voice signal, cause to connect Debit cannot obtain the voice signal that sender sends according to the voice signal for receiving.
The content of the invention
The embodiment of the present application provides a kind of voice encryption, decryption method and equipment, for solving in the prior art to sending Side send voice signal carry out digital encryption and compress, be easily lost the voice messaging in voice signal, cause recipient without Method obtains the problem of the voice signal that sender sends.
The embodiment of the present application provides a kind of speech ciphering method, including:
Obtain speech frame to be encrypted;
According to the pitch parameter of the speech frame to be encrypted, searched with the pitch parameter from speech database Encryption speech frame, includes different pitch parameter and the encryption voice with the pitch parameter in the speech database Frame;
According to preset rules, at least one is selected to encrypt speech frame from the encryption speech frame for finding;
According at least one encryption speech frame of selection, the speech frame to be encrypted is encrypted, is added Speech frame after close.
The embodiment of the present application also provides a kind of voice decryption method, including:
Receive the speech frame after the encryption that sender sends;
According to the pitch parameter of the speech frame after the encryption, searched with the pitch parameter from speech database Decrypted voice frame, includes different pitch parameter and the decrypted voice with the pitch parameter in the speech database Frame;
According to preset rules, at least one decrypted voice frame is selected from the decrypted voice frame for finding;
According at least one decrypted voice frame of selection, the speech frame after the encryption is decrypted, is solved Speech frame after close.
The embodiment of the present application provides a kind of voice encryption equipment, including:
Acquiring unit, obtains speech frame to be encrypted;
Searching unit, according to the pitch parameter of the speech frame to be encrypted, searches described in having from speech database The encryption speech frame of pitch parameter, comprising different pitch parameter and with the pitch parameter in the speech database Encryption speech frame;
Select unit, according to preset rules, selects at least from the encryption speech frame that the searching unit finds One encryption speech frame;
Ciphering unit, according at least one encryption speech frame that the select unit is selected, to described to be encrypted Speech frame is encrypted, the speech frame after being encrypted.
The embodiment of the present application also provides a kind of voice decryption device, including:
Receiving unit, receives the speech frame after the encryption that sender sends;
Searching unit, according to the pitch parameter of the speech frame after the encryption, searches described in having from speech database The decrypted voice frame of pitch parameter, comprising different pitch parameter and with the pitch parameter in the speech database Decrypted voice frame;
Select unit, according to preset rules, selects at least from the decrypted voice frame that the searching unit finds One decrypted voice frame;
Decryption unit, according at least one decrypted voice frame that the select unit is selected, after the encryption Speech frame is decrypted, the speech frame after being decrypted.
Above-mentioned at least one technical scheme that the embodiment of the present application is used can reach following beneficial effect:
The technical scheme that the embodiment of the present application is provided, when being encrypted to speech frame to be encrypted, according to be encrypted The pitch parameter of speech frame, determines the encryption speech frame with identical pitch parameter, according to preset rules from speech database Selection wherein at least one encryption speech frame, and speech frame to be encrypted is encrypted according to the encryption speech frame of selection.This Sample, because the embodiment of the present application to speech frame to be encrypted when being encrypted, the fundamental tone ginseng according to the speech frame to be encrypted Number Choice encryption speech frame is encrypted, and the speech frame after encryption can be effectively ensured in terms of existing technologies and compiled in compression The integrality of voice messaging after code so that recipient can obtain what sender sent according to the speech frame after the encryption for receiving Speech frame.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please does not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
A kind of schematic flow sheet of speech ciphering method that Fig. 1 is provided for the embodiment of the present application;
A kind of schematic flow sheet of voice decryption method that Fig. 2 is provided for the embodiment of the present application;
A kind of voice encryption and the schematic flow sheet of decryption method that Fig. 3 is provided for the embodiment of the present application;
A kind of structural representation of voice encryption equipment that Fig. 4 is provided for the embodiment of the present application;
A kind of structural representation of voice decryption device that Fig. 5 is provided for the embodiment of the present application.
Specific embodiment
In voice communication, when the voice signal of sender is sent into recipient, first, sender can be to needing The voice signal of transmission is encrypted, the voice signal after being encrypted;Secondly, voice communication system is believed the voice after encryption Number it is compressed coding;Finally, the voice signal after compressed encoding is sent to recipient by voice communication system, realizes sender Voice communication between recipient.But, if be encrypted using digital encryption method in said process, because numeral adds Decryption method cannot keep the phonetic feature of voice signal, can cause to lose voice messaging in the voice signal after compressed encoding, make Obtaining recipient cannot obtain complete voice signal.
In the prior art, can be solved the above problems using following two methods, specifically included:
First method:First, coding is compressed to the voice signal that sender sends;Secondly, digital encryption is used Method is encrypted to the voice signal after compression, and the voice signal after being encrypted;Finally, will be encrypted using data channel To recipient, the data channel can be 3G/4G networks to transmitting voice signal afterwards, or other IP networks;
Second method:First, voice communication system is changed;Secondly, based on amended voice communication system, will send The ciphering process and compression encoding process of the voice signal that side sends are combined with each other, i.e., encryption is combined in compression encoding process In;Finally, using amended voice communication system by transmitting voice signal to recipient.
Above two method is being encrypted transmission to voice signal, or voice signal is encrypted and compressed encoding When, can be with manual control so that the phonetic feature of voice signal can be kept, so, can be made using above two method Must be sent in the voice signal of recipient information of not losing, so solve the recipient of above-mentioned record cannot receive it is complete The problem of voice signal.
But, it has been investigated that, at least there is problems with above two method:
For first method, the voice signal after encryption is transmitted using data channel, it is excessive to there is data channel time delay, And the problem of network adaptability difference;
For second method, the ciphering process and compression encoding process of voice signal are combined, so, in transmission , it is necessary to customized communication terminal and change communication service flow process during voice signal.
And the speech ciphering method that the embodiment of the present application is provided, needing the voice signal for sending to get according to sender After speech frame to be encrypted, according to the pitch parameter of the speech frame, searched with phase from speech database according to preset rules Speech frame is encrypted with an at least frame of pitch parameter, and the speech frame to be encrypted is carried out using the encryption speech frame for finding Encryption, this way it is not necessary to extra algorithm time delay, complexity is relatively low, and flexibility preferably, can not only solve to deposit in the prior art Voice signal is encrypted after recompress coding when the problem lost of caused voice messaging, above-mentioned two can also be avoided Plant problem present in solution.
Technical scheme is clearly and completely retouched with reference to the application specific embodiment and corresponding accompanying drawing State.Obviously, described embodiment is only some embodiments of the present application, rather than whole embodiments.Based in the application Embodiment, the every other embodiment that those of ordinary skill in the art are obtained under the premise of creative work is not made, Belong to the scope of the application protection.
It should be noted that in the embodiment of the present application, the voice communication system can use voice compression coding Digital voice communication system.After the speech frame after being encrypted, the voice communication system is to encryption for the embodiment of the present application When speech frame afterwards is compressed coding, it is possible to use waveform coding voice compression algorithm, it is also possible to use parameter coding voice Compression algorithm, can also use hybrid coding voice compression algorithm.As a kind of preferably mode, can be in the voice communication Coding is compressed to the speech frame after encryption using the waveform coding voice compression algorithm in system.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
Embodiment 1
A kind of schematic flow sheet of speech ciphering method that Fig. 1 is provided for the embodiment of the present application, methods described is as described below. The executive agent of the embodiment of the present application can be voice sender (hereinafter referred to as sender).
Step 101:Obtain speech frame to be encrypted.
In a step 101, sender is when needing for voice signal to be sent to recipient, the language that can be sent as needed Message number acquires speech frame to be encrypted.
Specifically, sender, can be to the voice signal of needs transmission when needing for voice signal to be sent to recipient Sub-frame processing is carried out, to obtain at least one speech frame to be encrypted.
It should be noted that in the embodiment of the present application, sender carries out sub-frame processing in the voice signal to needing to send When, sub-frame processing can be carried out according to default frame length, with obtain frame length all same at least one speech frame to be encrypted.Its In, the default frame length can determine according to actual conditions, be not specifically limited here.
In the embodiment of the present application, sender, can be according to the frame of default frame length one when speech frame to be encrypted is obtained Obtained in real time one frame, wherein, the speech frame to be encrypted that sender obtains can be one, or multiple, sheet Illustrated as a example by one of them speech frame to be encrypted for obtaining encryption in application embodiment.
Step 102:According to the pitch parameter of the speech frame to be encrypted, being searched from speech database has the base The encryption speech frame of sound parameter.
In a step 102, sender is after the speech frame to be encrypted is obtained, it may be determined that the voice to be encrypted The pitch parameter of frame, it is determined that after the pitch parameter of the speech frame to be encrypted, can be according to the pitch parameter, from voice The encryption speech frame with the pitch parameter is searched in database, in order to use the encryption speech frame to described to be encrypted Speech frame be encrypted.
In the embodiment of the present application, sender can carry out pitch Detection to the speech frame to be encrypted, be examined by fundamental tone Survey the pitch parameter for determining the speech frame to be encrypted.Wherein, the pitch parameter can be the fundamental frequency of speech frame, Can be the pitch period of speech frame, be not specifically limited.The embodiment of the present application can be with the pitch parameter as pitch period As a example by illustrate.
It should be noted that the embodiment of the present application can be predefined obtains the speech database, and by the voice Database purchase to described sender (speech database in actual applications, being stored between different senders can with identical, Can be with difference), different pitch parameter and the encryption language with the pitch parameter can be included in the speech database Sound frame.
Specifically, the embodiment of the present application can in the following manner be predefined and obtain the speech database, including:
Various different types of speech frames are obtained in advance, and polytype speech frame here can be from different type The speech frame of speaker, wherein, the purpose for obtaining different types of speech frame is to obtain the language with different pitch parameters Sound frame.
After various types of speech frames are obtained, pitch Detection can be carried out to each speech frame, determine each language The pitch parameter of sound frame, and the speech frame with identical pitch parameter is divided into a class, so, multiple fundamental tone ginsengs can be obtained Number and corresponding one or more speech frames of each pitch parameter.
At this point it is possible to by one or more speech frames with identical pitch parameter and the pitch parameter correspondence store to In the speech database.The speech frame stored in the speech database is the encryption speech frame.
So, sender is getting speech frame to be encrypted, and determines the pitch parameter of the speech frame to be encrypted Afterwards, the encryption speech frame with the pitch parameter can be searched from the speech database according to the pitch parameter.
Specifically, sender will can deposit in the pitch parameter of the speech frame to be encrypted, with the speech database The pitch parameter of storage is matched, and when the match is successful, can obtain the encryption speech frame with the pitch parameter.
In actual applications, the encryption speech frame that sender finds from the speech database can be one, Can be multiple, be not specifically limited, the embodiment of the present application is illustrated so that the encryption speech frame for finding is multiple as an example.
Step 103:According to preset rules, at least one is selected to encrypt voice from the encryption speech frame for finding Frame.
In step 103, sender obtains being encrypted with the pitch parameter identical of the speech frame to be encrypted in lookup After speech frame, one or more encryption voices can be selected in the encryption speech frame obtained from lookup according to preset rules Frame, in order to be encrypted to the speech frame to be encrypted using the encryption speech frame of selection.
In the embodiment of the present application, the preset rules are made an appointment for voice sender with phonetic incepting side, described default Rule is used for the selection at least one from the encryption speech frame with identical pitch parameter in the speech database and encrypts language Sound frame.The embodiment of the present application is not specifically limited to the concrete form of the preset rules.
It should be noted that in the embodiment of the present application, sender according to the preset rules Choice encryption speech frame mesh , it is that the speech frame after the encryption sent to sender for the ease of recipient is decrypted.Specifically, sender is from institute's predicate Searched in sound database after obtaining the encryption speech frame, wherein one or more encryption voices can be selected according to preset rules Frame, so, the recipient, can be according to identical preset rules, it is determined that for solving after the speech frame after receiving encryption Close speech frame, and then realize the decryption to the speech frame after encryption.
In actual applications, if the encryption speech frame for finding is one, the encryption language can be directly selected Sound frame;If the encryption speech frame for finding is multiple, wherein at least one can be selected according to the preset rules Encryption speech frame, in order to be encrypted to speech frame to be encrypted according to the encryption speech frame of selection.
Sender selects at least one to encrypt speech frame according to preset rules from the encryption speech frame for finding, Including:
It is determined that the encryption speech frame with the pitch parameter found from the speech database;
According to preset rules, it is determined that treating the mark of the encryption speech frame of selection;
According to the mark, encryption voice corresponding with the mark is selected from the encryption speech frame for finding Frame.
That is, sender according to preset rules selection at least one when speech frame is encrypted:
It is possible, firstly, to determine the encryption speech frame found from the speech database, specific method may refer to State the content described in step 102;
Secondly, determined to treat the mark of the encryption speech frame of selection according to preset rules, wherein, the mark can be described Speech database to identical pitch parameter one or more encryption speech frames numbering, or other be used for distinguish The information of one or more the encryption speech frames with identical pitch parameter, is not specifically limited, the mark that sender determines here Knowledge can be one, or multiple, also be not specifically limited here;
Finally, according to the mark, encryption voice corresponding with the mark is selected from the encryption speech frame for finding Frame.
Used as a kind of alternatively mode, sender is described pre- when the mark of encryption speech frame is determined according to preset rules If rule can be preset-key, and according to the preset-key, the mark of encryption speech frame be determined according to preset algorithm, send Side from the encryption speech frame for finding according to the mark it is determined that after mark, can select corresponding with the mark Encryption speech frame.
For example, for speech frame a to be encrypted, sender according to its pitch parameter, from the speech database Lookup obtains encryption speech frame b, c, d, e and f with the pitch parameter, wherein, the speech database is to encryption voice The numbering of frame b, c, d, e and f is respectively 1,2,3,4 and 5, and now, sender is calculated according to preset-key needs selection The numbering for encrypting speech frame is 2 and 3, then, sender with Choice encryption speech frame c and d, and encryption speech frame c and d can be made It is the encryption speech frame being encrypted to speech frame a to be encrypted.
It should be noted that sender according to preset algorithm according to preset-key when the mark is determined, can be to institute Preset algorithm is stated to be configured so that it is determined that the mark within a preset range, in the preset range include the voice number According to the mark of the encryption speech frame in storehouse.
For example, when the numbering for being designated encryption speech frame, the numbering of the encryption speech frame in the speech database When scope is 1-10, the preset algorithm can be configured so that according to the preset-key, according to the preset algorithm The scope of the mark for determining is between 1-10.
Step 104:According at least one encryption speech frame of selection, the speech frame to be encrypted is added It is close, the speech frame after being encrypted.
At step 104, sender, can be according to the institute of selection after selection obtains at least one encryption speech frame At least one encryption speech frame is stated, the speech frame to be encrypted is encrypted, and the speech frame after being encrypted.
In the embodiment of the present application, sender encrypts speech frame according to described at least one of selection, to described to be encrypted Speech frame is encrypted, including:
Linear operation is carried out with the speech frame to be encrypted by least one encryption speech frame that will be selected, it is right The speech frame to be encrypted is encrypted.
Wherein, the linear operation can enter described at least one encryption speech frame with the speech frame to be encrypted Row linear superposition.
It should be noted that for the ease of described at least one encryption speech frame is carried out with the speech frame to be encrypted Linear superposition, in the embodiment of the present application, the frame length of the speech frame to be encrypted needs the frame with the encryption speech frame for finding Length is identical.Specifically, sender is described default when the voice signal for needing to send is carried out into sub-frame processing according to default frame length Frame length need it is identical with the frame length of the encryption speech frame included in the speech database, in this manner it is achieved that by the encryption The linear superposition of speech frame and the speech frame to be encrypted.
If for example, the frame length of the encryption speech frame stored in the speech database is 10ms, then, sender needs to press Sub-frame processing is carried out to the voice signal for needing to send according to default frame length 10ms, and obtains at least one frame length to be treating for 10ms The speech frame of encryption;If the frame length of the encryption speech frame stored in the speech database is 20ms, then, sender needs to press Sub-frame processing is carried out to the speech frame for needing to send according to default frame length 20ms, and obtains at least one frame length to be the to be added of 20ms Close speech frame.
So, sender is to the speech frame to be encrypted after being encrypted, the speech frame after being encrypted.This When, the speech frame after encrypting can be compressed coded treatment by the voice communication system, as a kind of preferably mode, Coding can be compressed using waveform coding voice compression algorithm, after the speech frame after obtaining compressed encoding, will can be somebody's turn to do Speech frame is sent to the recipient, with the voice communication between realization and recipient.
Research has shown that, the speech frame after the speech ciphering method provided using the embodiment of the present application is encrypted, by non- After formal audition test, the content of the speech frame after encryption cannot be identified, in addition, the speech frame after to encryption Signal quality when carrying out objective evaluation, the evaluation result that signal quality drops significantly to elusive degree can be obtained. As can be seen here, the speech ciphering method that the embodiment of the present application is provided has preferable cipher round results.
It should be noted that in the embodiment of the present application, when the voice communication system is calculated using waveform coding compress speech During method, the waveform of voice can be well kept due to waveform encoding algorithm, and the voice encryption that the embodiment of the present application is provided is calculated Method is also to carry out linear operation to the waveform of speech frame, therefore, the speech ciphering method that the embodiment of the present application is provided is not easily susceptible to The influence of waveform encoding algorithm.
When the voice communication system uses parameter coding or hybrid coding voice compression algorithm, because speech waveform exists Occur than larger change before and after coding and decoding, therefore, the Voice Encryption algorithm that the embodiment of the present application is provided is vulnerable to volume The influence of code algorithm, now, the voice communication system can be right before recipient is decrypted to the speech frame after encryption Speech frame after encryption is further processed, to reduce influence of the encryption algorithm to voice.
The technical scheme that the embodiment of the present application is provided, when being encrypted to speech frame to be encrypted, according to be encrypted The pitch parameter of speech frame, determines the encryption speech frame with identical pitch parameter, according to preset rules from speech database Selection wherein at least one encryption speech frame, and speech frame to be encrypted is encrypted according to the encryption speech frame of selection.This Sample, because the embodiment of the present application to speech frame to be encrypted when being encrypted, according to the pitch parameter of speech frame to be encrypted Choice encryption speech frame is encrypted, and the speech frame after encryption can be effectively ensured in terms of existing technologies in compressed encoding The integrality of voice messaging afterwards so that recipient can obtain the language that sender sends according to the speech frame after the encryption for receiving Sound frame.
Embodiment 2
A kind of schematic flow sheet of voice decryption method that Fig. 2 is provided for the embodiment of the present application, methods described is as described below. The executive agent of the embodiment of the present application can be phonetic incepting side (hereinafter referred to as recipient).
Step 201:Receive the speech frame after the encryption that sender sends.
In step 201, after the speech frame after sender is encrypted, can be by the voice communication system to reception Side sends the speech frame after the encryption, and now, recipient can receive the speech frame after the encryption of described sender transmission.
Wherein, the recipient can receive the speech frame after multiple encryptions of sender's transmission, implement in the application In example, illustrated by taking the speech frame decryption after being encrypted to one of them as an example.
Step 202:According to the pitch parameter of the speech frame after the encryption, being searched from speech database has the base The decrypted voice frame of sound parameter.
In step 202., recipient is after the speech frame after receiving the encryption, it may be determined that the language after the encryption The pitch parameter of sound frame, it is determined that after the pitch parameter of speech frame after the encryption, can be according to the pitch parameter, from language The decrypted voice frame with the speech parameter is searched in sound database, in order to use the decrypted voice frame to the encryption Speech frame afterwards is decrypted.
Specifically, recipient can enter after the speech frame after receiving the encryption to the speech frame after the encryption Row pitch Detection, and determine the pitch parameter of the speech frame after the encryption, the pitch parameter can be fundamental frequency, also may be used To be pitch period, this is not specifically limited.The embodiment of the present application can be carried out so that the pitch parameter is as pitch period as an example Explanation.
It should be noted that the method that the embodiment of the present application can be recorded by above-described embodiment 1 determines to obtain institute's predicate Sound database, and the speech data library storage to the recipient (in actual applications, is stored between different recipients Speech database can be with identical, it is also possible to different), comprising different pitch parameter and with described in the speech database The decrypted voice frame of pitch parameter.
Recipient described in the embodiment of the present application storage the speech database with it is described described in above-described embodiment 1 The speech database of sender's storage is identical, and the speech frame after the encryption that receives is solved in order to recipient It is close, wherein, the encryption speech frame described in embodiment 1 can be considered as decrypted voice frame for recipient.
So, recipient, can be from the speech database it is determined that after the pitch parameter of speech frame after the encryption Middle lookup obtains the decrypted voice frame with the pitch parameter.
Specifically, recipient it is determined that encryption after speech frame pitch parameter after, can be by the pitch parameter and institute State the pitch parameter stored in speech database to be matched, after the match is successful, it may be determined that with the language after the encryption The decrypted voice frame of the pitch parameter of sound frame.
Step 203:According to preset rules, at least one decrypted voice is selected from the decrypted voice frame for finding Frame.
In step 203, sender obtains being decrypted with the pitch parameter identical of the speech frame after the encryption in lookup After speech frame, one or more decrypted voices can be selected in the decrypted voice frame obtained from lookup according to preset rules Frame, in order to be decrypted to the speech frame after the encryption using the decrypted voice frame of selection.
Preset rules in the embodiment of the present application are made an appointment for voice sender with phonetic incepting side, its specific shape Formula is equal to the preset rules described in above-described embodiment 1, in addition, the preset rules of the embodiment of the present application be used for from In the speech database at least one decrypted voice frame is selected in the decrypted voice frame with identical pitch parameter.
So, the content recorded based on above-described embodiment 1, described sender is added to the speech frame to be encrypted When close, it is encrypted according to preset rules Choice encryption speech frame, speech frame of the recipient after to the encryption is decrypted When, the decrypted voice frame that decryption needs can be determined according to identical preset rules, due to described sender and the recipient Using identical preset rules, therefore, the recipient can search the solution obtained for decrypting from the speech database Close speech frame.
For example, the encryption speech frame that described sender determines to be encrypted speech frame a to be encrypted according to preset-key Numbering be 2 and 3, and using in the speech database with identical pitch parameter numbering be 2 encryption speech frame c, with And the encryption speech frame d that numbering is 3 is encrypted to speech frame a to be encrypted, then, the recipient is after encryption is received Speech frame a1, and determine the speech frame a after encryption1Pitch parameter after, according to identical preset-key can determine solution cipher The numbering of sound frame is 2 and 3, and now, recipient can search the decryption with identical pitch parameter from the speech database There is the decrypted voice frame of numbering 2 and numbering 3 in speech frame, i.e. decrypted voice frame c and decrypted voice frame d, and by decrypted voice Frame c and decrypted voice frame d is used as to the speech frame a after encryption1The decrypted voice frame of decryption.
Step 204:According at least one decrypted voice frame of selection, the speech frame after the encryption is solved It is close, the speech frame after being decrypted.
In step 204, recipient, can be according to the institute of selection after selection obtains at least one decrypted voice frame At least one decrypted voice frame is stated, the speech frame after the encryption is decrypted.
Specifically, sender enters according at least one decrypted voice frame of selection to the speech frame after the encryption Row decryption, including:
By the way that at least one decrypted voice frame for selecting is carried out into linear inverse operation with the speech frame after the encryption, Voice after the encryption is decrypted.
The linear operation inverse operation each other that the linear inverse operation is recorded with above-described embodiment, so, recipient can The original speech frame that sender needs to send is obtained to decrypt.
It should be noted that speech frame of the recipient after to encryption is decrypted the speech frame after obtaining multiple decryption Afterwards, the speech frame after the multiple decryption can be carried out postpositive disposal, it is prominent with eliminate that individual voice frame fundamental tone error causes Hair noise frame, improves the signal quality of the speech frame after decryption.
The technical scheme that the embodiment of the present application is provided, recipient enters according to the pitch parameter of speech frame receiving sender After speech frame after the encryption that row encryption is obtained, according to the pitch parameter of the speech frame after encryption, determine from speech database Decrypted voice frame with identical pitch parameter, according to the preset rules predetermined in advance with sender, selects the frame of wherein at least one Decrypted voice frame, and the speech frame after encryption is decrypted according to the decrypted voice frame of selection.So, due to sender according to The pitch parameter Choice encryption speech frame of speech frame is encrypted, it is ensured that speech frame after the encryption voice letter after compressed encoding The integrality of breath, therefore, recipient can decrypt and obtain the complete of sender's transmission according to the speech frame after the encryption for receiving Speech frame.
Embodiment 3
A kind of voice encryption and the schematic flow sheet of decryption method that Fig. 3 is provided for the embodiment of the present application, methods described is such as It is lower described.The embodiment of the present application is illustrated so that sender sends a speech frame to be encrypted to recipient as an example.
Step 301:Sender obtains speech frame to be encrypted.
Step 302:Sender determines the pitch parameter of the speech frame to be encrypted.
Step 303:Sender searches adding for the pitch parameter with the speech frame to be encrypted from speech database Close speech frame.
Step 304:Sender determines the first mark according to preset-key, and from the encryption speech frame for finding selection with Described first identifies corresponding encryption speech frame.
Step 305:Sender is encrypted according to the encryption speech frame of selection to the speech frame to be encrypted, Speech frame after being encrypted.
Step 306:Speech frame after encryption is sent to recipient by sender.
Step 307:Recipient receives the speech frame after the encryption that sender sends.
Step 308:Recipient determines the pitch parameter of the speech frame after the encryption.
Step 309:Recipient searches the pitch parameter with the speech frame after the encryption from the speech database Decrypted voice frame.
Step 310:Recipient determines first mark according to the preset-key, and decrypts frame from the voice for finding It is middle to select decrypted voice frame corresponding with the described first mark.
Step 311:Recipient is decrypted according to the decrypted voice frame of selection to the speech frame after the encryption, Speech frame after being decrypted.
The technical scheme that the embodiment of the present application is provided, the pitch parameter Choice encryption speech frame according to speech frame to be encrypted It is encrypted, the integrality of the speech frame voice messaging after compressed encoding after encryption can be effectively ensured so that recipient can The speech frame that sender sends is obtained with according to the speech frame after the encryption for receiving.
Embodiment 4
A kind of structural representation of voice encryption equipment that Fig. 4 is provided for the embodiment of the present application, the voice encryption equipment Including:Acquiring unit 41, searching unit 42, select unit 43 and ciphering unit 44, wherein:
Acquiring unit 41, obtains speech frame to be encrypted;
Searching unit 42, according to the pitch parameter of the speech frame to be encrypted, being searched from speech database has institute The encryption speech frame of pitch parameter is stated, comprising different pitch parameter and with the pitch parameter in the speech database Encryption speech frame;
Select unit 43, according to preset rules, selects from the encryption speech frame that the searching unit 42 finds At least one encryption speech frame;
Ciphering unit 44, according at least one encryption speech frame that the select unit 43 is selected, to described to be added Close speech frame is encrypted, the speech frame after being encrypted.
In the embodiment of the present application, the preset rules are made an appointment for voice sender with phonetic incepting side, described default Rule is used for the selection at least one from the encryption speech frame with identical pitch parameter in the speech database and encrypts Speech frame.
The select unit 43 is selected according to preset rules from the encryption speech frame that the searching unit 42 finds At least one encryption speech frame is selected, including:
It is determined that the encryption speech frame with the pitch parameter found from the speech database;
According to preset rules, it is determined that treating the mark of the encryption speech frame of selection;
According to the mark, encryption voice corresponding with the mark is selected from the encryption speech frame for finding Frame.
At least one encryption speech frame that the ciphering unit 44 is selected according to the select unit 43, treats to described The speech frame of encryption is encrypted, including:
Linear operation is carried out with the speech frame to be encrypted by least one encryption speech frame that will be selected, it is right The speech frame to be encrypted is encrypted.
It should be noted that the voice encryption equipment that the embodiment of the present application is provided can be realized by hardware mode, also may be used Realized with by software mode, do not limited here.
Embodiment 5
A kind of structural representation of voice decryption device that Fig. 5 is provided for the embodiment of the present application, the voice decryption device Including:Receiving unit 51, searching unit 52, select unit 53 and decryption unit 54, wherein:
Receiving unit 51, receives the speech frame after the encryption that sender sends;
Searching unit 52, according to the pitch parameter of the speech frame after the encryption, being searched from speech database has institute The decrypted voice frame of pitch parameter is stated, comprising different pitch parameter and with the pitch parameter in the speech database Decrypted voice frame;
Select unit 53, according to preset rules, selects from the decrypted voice frame that the searching unit 52 finds At least one decrypted voice frame;
Decryption unit 54, according at least one decrypted voice frame that the select unit 53 is selected, to the encryption Speech frame afterwards is decrypted, the speech frame after being decrypted.
In the embodiment of the present application, the preset rules are made an appointment for voice sender with phonetic incepting side, described default Rule is used for the solution of selection at least one cipher from the decrypted voice frame with identical pitch parameter in the speech database Sound frame.
The select unit 53 is selected according to preset rules from the decrypted voice frame that the searching unit 52 finds At least one decrypted voice frame is selected, including:
It is determined that the decrypted voice frame with the pitch parameter found from the speech database;
According to preset rules, it is determined that treating the mark of the decrypted voice frame of selection;
According to the mark, selected from the decrypted voice frame for finding and the corresponding decrypted voice of the mark Frame.
At least one decrypted voice frame that the decryption unit 54 is selected according to the select unit 53, adds to described Speech frame after close is decrypted, including:
By the way that at least one decrypted voice frame for selecting is carried out into linear inverse operation with the speech frame after the encryption, Voice after the encryption is decrypted.
It should be noted that the voice decryption device that the embodiment of the present application is provided can be realized by hardware mode, also may be used Realized with by software mode, do not limited here.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.And, the application can be used and wherein include the computer of computer usable program code at one or more The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) is produced The form of product.
The application is the flow with reference to method, equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram are described.It should be understood that every first-class during flow chart and/or block diagram can be realized by computer program instructions The combination of flow and/or square frame in journey and/or square frame and flow chart and/or block diagram.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices The device of the function of being specified in present one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information Store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, can be used to store the information that can be accessed by a computing device.Defined according to herein, calculated Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements not only include those key elements, but also wrapping Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment is intrinsic wants Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.And, the application can be used to be can use in one or more computers for wherein including computer usable program code and deposited The shape of the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., within the scope of should be included in claims hereof.

Claims (10)

1. a kind of speech ciphering method, it is characterised in that including:
Obtain speech frame to be encrypted;
According to the pitch parameter of the speech frame to be encrypted, the encryption with the pitch parameter is searched from speech database Speech frame, includes different pitch parameter and the encryption speech frame with the pitch parameter in the speech database;
According to preset rules, at least one is selected to encrypt speech frame from the encryption speech frame for finding;
According at least one encryption speech frame of selection, the speech frame to be encrypted is encrypted, after being encrypted Speech frame.
2. speech ciphering method as claimed in claim 1, it is characterised in that
The preset rules are made an appointment for voice sender with phonetic incepting side, and the preset rules are used for from the voice number Speech frame is encrypted according to selection at least one in the encryption speech frame with identical pitch parameter in storehouse.
3. speech ciphering method as claimed in claim 2, it is characterised in that according to preset rules, described in find plus Speech frame is encrypted in selection at least one in close speech frame, including:
It is determined that the encryption speech frame with the pitch parameter found from the speech database;
According to preset rules, it is determined that treating the mark of the encryption speech frame of selection;
According to the mark, encryption speech frame corresponding with the mark is selected from the encryption speech frame for finding.
4. the speech ciphering method as described in any one of claims 1 to 3, it is characterised in that at least according to selection Individual encryption speech frame, is encrypted to the speech frame to be encrypted, including:
Linear operation is carried out with the speech frame to be encrypted by least one encryption speech frame that will be selected, to described Speech frame to be encrypted is encrypted.
5. a kind of voice decryption method, it is characterised in that including:
Receive the speech frame after the encryption that sender sends;
According to the pitch parameter of the speech frame after the encryption, the decryption with the pitch parameter is searched from speech database Speech frame, includes different pitch parameter and the decrypted voice frame with the pitch parameter in the speech database;
According to preset rules, at least one decrypted voice frame is selected from the decrypted voice frame for finding;
According at least one decrypted voice frame of selection, the speech frame after the encryption is decrypted, after being decrypted Speech frame.
6. voice decryption method as claimed in claim 5, it is characterised in that
The preset rules are made an appointment for voice sender with phonetic incepting side, and the preset rules are used for from the voice number According to selecting at least one decrypted voice frame in the decrypted voice frame with identical pitch parameter in storehouse.
7. voice decryption method as claimed in claim 6, it is characterised in that according to preset rules, from the solution for finding At least one decrypted voice frame is selected in close speech frame, including:
It is determined that the decrypted voice frame with the pitch parameter found from the speech database;
According to preset rules, it is determined that treating the mark of the decrypted voice frame of selection;
According to the mark, decrypted voice frame corresponding with the mark is selected from the decrypted voice frame for finding.
8. the voice decryption method as described in any one of claim 5 to 7, it is characterised in that at least according to selection Individual decrypted voice frame, is decrypted to the speech frame after the encryption, including:
By the way that at least one decrypted voice frame for selecting is carried out into linear inverse operation with the speech frame after the encryption, to institute The voice after encryption is stated to be decrypted.
9. a kind of voice encryption equipment, it is characterised in that including:
Acquiring unit, obtains speech frame to be encrypted;
Searching unit, according to the pitch parameter of the speech frame to be encrypted, being searched from speech database has the fundamental tone The encryption speech frame of parameter, includes different pitch parameters and the encryption with the pitch parameter in the speech database Speech frame;
Select unit, according to preset rules, at least one is selected from the encryption speech frame that the searching unit finds Encryption speech frame;
Ciphering unit, according at least one encryption speech frame that the select unit is selected, to the voice to be encrypted Frame is encrypted, the speech frame after being encrypted.
10. a kind of voice decryption device, it is characterised in that including:
Receiving unit, receives the speech frame after the encryption that sender sends;
Searching unit, according to the pitch parameter of the speech frame after the encryption, being searched from speech database has the fundamental tone The decrypted voice frame of parameter, includes different pitch parameters and the decryption with the pitch parameter in the speech database Speech frame;
Select unit, according to preset rules, at least one is selected from the decrypted voice frame that the searching unit finds Decrypted voice frame;
Decryption unit, according at least one decrypted voice frame that the select unit is selected, to the voice after the encryption Frame is decrypted, the speech frame after being decrypted.
CN201710069844.5A 2017-02-08 2017-02-08 A kind of voice encryption, decryption method and equipment Active CN106878299B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710069844.5A CN106878299B (en) 2017-02-08 2017-02-08 A kind of voice encryption, decryption method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710069844.5A CN106878299B (en) 2017-02-08 2017-02-08 A kind of voice encryption, decryption method and equipment

Publications (2)

Publication Number Publication Date
CN106878299A true CN106878299A (en) 2017-06-20
CN106878299B CN106878299B (en) 2019-06-11

Family

ID=59165977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710069844.5A Active CN106878299B (en) 2017-02-08 2017-02-08 A kind of voice encryption, decryption method and equipment

Country Status (1)

Country Link
CN (1) CN106878299B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614693A (en) * 2020-05-28 2020-09-01 中国石油天然气集团有限公司 Method and system for transmitting same-class confidential data
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765106A (en) * 2009-12-24 2010-06-30 成都三零瑞通移动通信有限公司 Method for encrypting voice based on GSM voice channel transmission
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
US20160119303A1 (en) * 2013-05-27 2016-04-28 Electronics And Telecommunications Research Institute Information security attachment device for voice communication and information security method for voice communication using the same
CN105788602A (en) * 2016-03-28 2016-07-20 北京密耳科技有限公司 Voice encryption method and device for voice band compression system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765106A (en) * 2009-12-24 2010-06-30 成都三零瑞通移动通信有限公司 Method for encrypting voice based on GSM voice channel transmission
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
US20160119303A1 (en) * 2013-05-27 2016-04-28 Electronics And Telecommunications Research Institute Information security attachment device for voice communication and information security method for voice communication using the same
CN105788602A (en) * 2016-03-28 2016-07-20 北京密耳科技有限公司 Voice encryption method and device for voice band compression system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614693A (en) * 2020-05-28 2020-09-01 中国石油天然气集团有限公司 Method and system for transmitting same-class confidential data
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system
CN111818519B (en) * 2020-07-16 2022-02-11 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Also Published As

Publication number Publication date
CN106878299B (en) 2019-06-11

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
US11652603B2 (en) Homomorphic encryption
Bourse et al. FHE circuit privacy almost for free
US11394525B2 (en) Cryptography device having secure provision of random number sequences
CN110868287B (en) Authentication encryption ciphertext coding method, system, device and storage medium
WO2006012363A1 (en) Stream cipher combining system and method
CN105162588B (en) A kind of media file encipher-decipher method and device
CN109687952A (en) Data processing method and its device, electronic device and storage medium
JP2023549929A (en) Secure reencryption of homomorphically encrypted data
CN114327261B (en) Data file storage method and data security agent
CN109462475B (en) Data encryption method, data decryption method and related devices
CN113949552A (en) Large file encryption and decryption system, method, storage medium and equipment
CN106446697A (en) Method and device for saving private data
CN106878299A (en) A kind of voice encryption, decryption method and equipment
US11829476B2 (en) Computing device and model parameters security protection method
EP2673774B1 (en) Audio watermarking
CN112528309A (en) Data storage encryption and decryption method and device
CN116455555A (en) Data encryption method and device and electronic equipment
Devi et al. Two fish Algorithm Implementation for lab to provide data security with predictive analysis
CN109995526A (en) A kind of storage method of key and the call method and device of device, key
Behera et al. Preserving the Privacy of Medical Data using Homomorphic Encryption and Prediction of Heart Disease using K-Nearest Neighbor
CN115292726A (en) Semantic communication method and device, electronic equipment and storage medium
CN114611129A (en) Data privacy protection method and system
CN112242970B (en) Data segmentation encryption security reinforcing method and device
CN111639349B (en) Data encryption processing method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant