CN108616313A - A kind of bypass message based on ultrasound transfer approach safe and out of sight - Google Patents

A kind of bypass message based on ultrasound transfer approach safe and out of sight Download PDF

Info

Publication number
CN108616313A
CN108616313A CN201810311166.3A CN201810311166A CN108616313A CN 108616313 A CN108616313 A CN 108616313A CN 201810311166 A CN201810311166 A CN 201810311166A CN 108616313 A CN108616313 A CN 108616313A
Authority
CN
China
Prior art keywords
bypass message
bypass
message
original
audio signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810311166.3A
Other languages
Chinese (zh)
Inventor
杨浩淼
张可
高哲
何伟超
从鑫
王文雅
吴新沿
李洪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810311166.3A priority Critical patent/CN108616313A/en
Publication of CN108616313A publication Critical patent/CN108616313A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B11/00Transmission systems employing sonic, ultrasonic or infrasonic waves
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/16Vocoder architecture
    • G10L19/18Vocoders using multiple modes
    • G10L19/20Vocoders using multiple modes using sound class specific coding, hybrid encoders or object based coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control

Abstract

The present invention discloses a kind of bypass message based on ultrasound transfer approach safe and out of sight, is related to information dissemination technology field, and original bypass message is generated the mixed audio transmission being mixed to get with original audio signal after ultrasound information by sender in the method;Recipient carries out it separation and Extraction and restores to obtain bypass message after receiving mixed audio signal.The present invention solves Quick Response Code propagation bypass message method in the prior art and blocks the parts of images on screen to hinder main road information to propagate, and the problem of bypass message method can reduce original audio fidelity is propagated in audio insertion.

Description

A kind of bypass message based on ultrasound transfer approach safe and out of sight
Technical field
The present invention relates to information dissemination technology field more particularly to a kind of bypass message based on ultrasound biographies safe and out of sight Delivery method.
Background technology
People can be encountered in TV and need to transmit the information in addition to program video and sound when TV is seen in parlor indoors Situation.When such as watching NBA live streamings, people can be frequently seen below screen side there are one Quick Response Code, be supported using wechat etc. two-dimentional Code mobile terminal APP barcode scannings after, live streaming side appointed website can be entered, present some as player information, compete history say, the racing season it is pre- The information such as announcement, basketball periphery, program commercial are exactly bypass message.This information and the live video and sound as main road information Comparison can be described as bypass message, independently of main road information, as the supplement of main road information, there is abundant programme content, advertisement to launch, The multiple functions such as electric business popularization, message push, can promote multimedia application user experience, create additional commercial value, have wide Application prospect.Traditional bypass message transmission method carries out Information hiding using Quick Response Code or directly using the sound in video And the transmission of bypass message.
But when being transmitted using Quick Response Code, user is by supporting the cell phone application of Quick Response Code to scan in tv screen image Quick Response Code identifies bypass message, but identifies that distance has higher requirements to mobile phone and video screen spacing, can influence user experience, And equipment for identification has the convenience that identification can be reduced when barrier with two-dimentional intersymbol.When using audio embedding inlay technique, user The bypass message being embedded in television audio is captured by mobile microphone, point of audio signal is then carried out by subsequent module From, but the hiding transmission method of such information can reduce original audio fidelity to a certain degree, and suppressible information content is by main road Information audio signal limitation is larger, and it is limited to be applicable in scene in this approach, and confidentiality is unable to get guarantee.
Invention content
It is an object of the invention to:The part on screen is blocked to solve Quick Response Code propagation bypass message method in the prior art For image to hinder main road information to propagate, the problem of bypass message method can reduce original audio fidelity is propagated in audio insertion, this Invention provides a kind of bypass message transfer approach safe and out of sight based on ultrasound.
The concrete scheme of the present invention is as follows:
A kind of bypass message based on ultrasound transfer approach safe and out of sight, sender believes original bypass in the method Breath transmits after generating ultrasound information with the mixed audio that original audio signal is mixed to get;Recipient receives mixed audio signal Separation and Extraction is carried out to it afterwards and is restored to obtain bypass message;Wherein, the format of original bypass message is any literal code Information format or file format.
Specifically, following steps are carried out successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections.
S2:Each bypass message section is encoded.
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent.
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal.
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence.
S6:Bypass message section sequence is exported, and original bypass message is obtained.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:It is each can bypass message section be added error correcting code obtain can error correction bypass message section.
Preferably, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
Specifically, the S6 the specific steps are:
S6.1:Bypass message section sequence is authenticated.
S6.2:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for It retransmits.
Further, the S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence.
S6.2:Bypass message after error detection, error correction is exported, original bypass message is obtained.
Further, the S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence.
S6.2:Bypass message section sequence after error detection, error correction is authenticated.
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for It retransmits.
Specifically, in the S2, the method for coding uses width maps mutually method;In the S5, decoded method uses width phase Reflection method.
After adopting the above scheme, beneficial effects of the present invention are as follows:
(1) main road information audio frequency range is identical with the human ear range of audibility, the nearly ultrasonic frequency used in the present invention With main road audio frequency without intersecting, can accomplish horizontal infection, not interfere with each other, thus ultrasonic transmission scheme to main road audio without Damage is, it can be achieved that its fidelity.
(2) most sound devices (mobile phone, TV, notebook, studio broadcast system etc.) support the same people of frequency range The ear range of audibility is identical, so this scheme, which fine can obtain, is suitable for existing audio infrastructure.
(3) of the invention to add authentication code, safety ensures to disappear using HMAC (i.e. the message authentication code with key) Integrality during breath, by the way that the key appointed in advance is added during message authentication code generates, transmitted disappears If breath is maliciously tampered, but since attacker does not hold key, so effective message authentication code can not be generated, to receive End can find and handle in time.
(4) ensure transmission process just using error correcting code (such as RS codes, cyclic redundancy check, Polar codes etc.) in the present invention True property, by specific rule settings enable generate a string of specific lengths code word to original message carry out error detection with Error correction, to ensure the correctness of message.
Description of the drawings
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.Shown in attached drawing, above and other purpose of the invention, feature and advantage will be more clear.In whole Identical reference numeral indicates identical part in attached drawing.Actual size equal proportion scaling is not pressed deliberately draws attached drawing, emphasis It is that the purport of the present invention is shown.
Fig. 1 is the flow diagram of the present invention;
Fig. 2 is the bandpass filtering figure that main road audio signal filtering is carried out to original audio signal of the present invention;
Fig. 3 is the bandpass filtering figure that nearly ultrasonic wave bypass audio signal filtering is carried out to original audio signal of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
A kind of bypass message transfer approach safe and out of sight based on ultrasound of the present invention, human ear audible frequency range are 20Hz-20KHz, experiments have shown that 17KHz or more, most people can not hear.Therefore this programme is closely super using 17KHz-20KHz The nearly ultrasonic waves of 18.5KHz within the scope of frequency of sound wave are transmitted into row information, can either accomplish hidden easily transmission by-pass information, Are realized by information and propagates non-audible property and biological safety without any injury by infant and pet etc. again.
It needs to carry out in sender and recipient, specifically, carries out following steps successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message HMAC message authentication codes are added to each bypass message section and generate identifiable bypass message section;
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
S2:Width maps mutually method coding is carried out to each bypass message section;
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal;Bandpass filtering purpose is will be original It is that may be present in audio to be deleted with bypass message propagation carrier frequency same audio signal, assigned frequency channel is vacated, is avoided Cause frequency interferences.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent;
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal, nearly ultrasonic wave wave band herein Frequency range be 18.5kHz-20KHz;On the one hand, carrier frequency is excessively high, and wave energy is excessive may to influence bio-safety.Another party Face, carrier frequency cannot cross the audible influence main road information of as low as human ear and propagate.Most people's human ear audible frequency is below 17KHz, still select frequency of use be higher than this value, but less than 20KHz nearly ultrasonic wave.Therefore, the bypass audio letter of capture Number it is nearly ultrasonic wave bypass audio signal.
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and original bypass message is obtained.The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:HMAC certifications are carried out to the bypass message section sequence after error detection, error correction;
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for It retransmits, in specific application, " authentification failure " printed words can be sent to client or carry out voice prompt.
Embodiment 1
The present invention a kind of bypass message transfer approach safe and out of sight based on ultrasound, specifically, in sender according to Secondary carry out following steps:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;Specifically, to TXT text formattings (plaintext) be added before original bypass message 3 starting characters " Str " afterwards generates one newly containing sequence starting character The initial bypass message sequence of UTF-8 codes.Such as original bypass message " https://en.wikipedia.org/wiki/Text_ Initial bypass message is " Strhttps after starting character is added in file "://en.wikipedia.org/wiki/Text_file ", Front three " Str " is starting character.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;By initial bypass message sequence Result segmentation is exported, every 68 TXT characters are divided into a unit (unit), and the UTF-8 codes less than 68 characters (are used herein One character 8bit) it is partially filled with the 0x00 of UTF-8 character lengths, finally fill the end mark 0xF of half of UTF-8 character length Generate bypass message section.Such as initial bypass message section " Strhttps://en.wikipedia.org/wiki/Text_file " is altogether 42 characters are discontented with 68.It is converted to 53 74 72 68 74 74 70 73 3A 2F 2F of UTF-8 codes 0x, 65 6E 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 Totally 84 16 systems of 6C 65, fill 0x00 behind, and it is bypass message section 0x 53 74 72 68 74 finally to fill 0xF results 74 70 73 3A 2F 2F 65 6E 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00F。
S1.3:Message HMAC message authentication codes are added to each bypass message section and generate identifiable bypass message section;Tool Body, it calculates the HMAC-SHA1 message authentication codes of bypass message section and is attached to tail portion, generate identifiable bypass message section.Such as 53 74 72 68 74 74 70 73 65 6E 2E of 3A 2F 2F of bypass message section 0x, 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00F are with " ultrasonic " Key generates identifiable bypass message section 0x 53 74 72 68 after the HMAC-SHA1 message authentication codes after calculating are added 74 74 70 73 3A 2F 2F 65 6E 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00F3 96 43 76 63 46 63 03 56 63 13 06 46 13 73 83 63 86 53 66 63 93 03 46 23 16 43 13 83 26 63 23 16 36 53 13 96 23 03 33 8。
S1.4:RS error correcting codes are added to each identifiable bypass message section and are attached to each initial bypass message segment trailer Obtain the identifiable bypass message section with error correction.32 bit trial positions of RS check codes verify the data bit of front 223.It should The RS error correction methods of system are (255,223) code on the domain GF (2^8), i.e. code length n=255, symbol long k=223, code distance d =33, maximum error correcting capability t=16 are 8bits per character
Identifiable 74 72 68 74 74 70 73 3A 2F 2F of bypass message section 0x53, the 65 6E 2E with error correction 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00F3 96 43 76 63 46 63 03 56 63 13 06 46 13 73 83 63 86 53 66 63 93 03 46 23 16 43 13 83 26 63 23 16 36 53 13 96 23 03 33 8XXX XX XX XX XX XX XX XX XX XX XX XX XX XX XX X.The identifiable bypass message paragraph format with error correction is after supplement is complete:
S2:Width maps mutually method coding is carried out to each bypass message section;Generate bypass message signal.Width maps mutually method uses The method that amplitude modulation is combined with phase modulation distinguishes the additional breath and the main information that are transmitted, and frequency is fixed as 18.5KHz, just 6 kinds of phase point, oftenIt is to be spaced amplitude as unit of 1, amounts to 6 units, every 1 unit is interval.Using such method of salary distribution It can indicate to amount to 36 different characters, number, capitalization can be covered, there was only number and letter in being encoded due to UTF-8, And the capital and small letter of letter has no effect on represented character, it can complete representation information to be sent, specific method of salary distribution table 1 and table 2:
The correspondence of numerical portion and amplitude and phase in table 1-UTF-8 codings
The correspondence of capitalization part and amplitude and phase in table 2-UTF-8 codings
While carrying out S1 and S2, following steps are carried out:
S1-1:As shown in Fig. 2, carrying out bandpass filtering to original audio signal obtains main road audio signal;By the original of video Beginning audio signal carries out bandpass filtering, sorts out 20Hz-20000Hz signals, generates main road audio signal.The purpose of bandpass filtering is It is deleted that may be present in original audio with bypass message propagation carrier frequency same audio signal, vacates assigned frequency letter Road avoids causing frequency interferences.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, sent using stereo set.
Then following steps are carried out in recipient:
S4:Composite signal is transferred to recipient, microphone prison via there are the channels of electromagnetic interference and noise from sender Audio signal that may be present in channel is listened, the original input audio signal that signal capture arrives is carried out;As shown in figure 3, will catch again The original input audio signal caught carries out bandpass filtering, sorts out the nearly ultrasonic wave bypass audio signal of frequency 18.5KHz;
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and is searched in bypass message section sequence and is identified all 3 starting characters " Str ", after extracting each adjacent starting character first character generates bypass letter one by one to information between next starting character Cease section.
The S6 the specific steps are:
S6.1:32 RS check codes carry out error checking and correction (ECC) after being extracted to each bypass message section, then remove 32 thereafter, Generate the bypass message section of error correction, three steps of error correction process point of RS codes:
(1) syndrome (syndrome) is calculated:
Assuming that the data received for one group:
68 31 00 31 00 68 4b 05 35 01 00 b7 2a 55 dc
Fen Liang groups:08 06 01 03 00 00 01 03 00 00 08 07 0b 0a 02(I-1)
06 0b 04 05 00 05 03 01 00 00 00 05 05 0c 0d(I-2)
Corresponding r14……r0, substitute into above formula and find out s1,s2,s3,s4(Sj);
(2) errors present is calculated:If judging Sj(j=1,2,3,4) is 0, then error-free;Otherwise execute following step with Ask error-value and position:
Find out dislocation polynomial d (x)=dz2x2+dz0x+dz1=0 root, as wrong value position, wherein:
If dz2=0, then only there are one roots
Otherwise x is found out with substitution method1,x2All 15 probable values of x are substituted into dislocation polynomial, if result is 0, It is a root.
(3) error value is calculated:Seek error-value ew1,ew2
If dz2=0,Otherwise:
In corresponding x=a when error correctiony, at r (14-y), in addition error correction can be completed in corresponding mistake value.If root is x1=a3, x2 =a8, ew1=a4, ew2=a7, then add ew on r (14-3)=r (11)1That is a4, ew is added on r (14-8)=r (6)2That is a7Afterwards The data of gained are exactly the data after error correction.
S6.2:HMAC information authentications are carried out to 40 hexadecimals after the bypass message section extraction of error correction, confirm that its is complete Whole property.The bypass message section of error correction and certification is generated if by certification, prepares output.
S6.3:To being exported by the bypass message of certification, complete original bypass message TXT is obtained, otherwise directly It abandons and waits for re-transmission.

Claims (10)

1. a kind of bypass message based on ultrasound transfer approach safe and out of sight, which is characterized in that sender will in the method Original bypass message transmits after generating ultrasound information with the mixed audio that original audio signal is mixed to get;Recipient receives mixed It carries out separation and Extraction to it and restores to obtain bypass message after closing audio signal;Wherein, the format of original bypass message is any The information format or file format of literal code.
2. a kind of bypass message transfer approach safe and out of sight based on ultrasound according to claim 1, which is characterized in that Specifically, following steps are carried out successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;
S2:Each bypass message section is encoded;
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal;
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent;
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal;
S5:Nearly ultrasonic wave bypass audio signal is decoded to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and original bypass message is obtained.
3. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
4. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
5. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:It is each can bypass message section be added error correcting code obtain can error correction bypass message section.
6. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section;
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
7. a kind of bypass message security mask transfer approach based on ultrasound according to claim 4, which is characterized in that The S6 the specific steps are:
S6.1:Bypass message section sequence is authenticated;
S6.2:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for weight It passes.
8. a kind of bypass message security mask transfer approach based on ultrasound according to claim 5, which is characterized in that The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:Bypass message after error detection, error correction is exported, original bypass message is obtained.
9. a kind of bypass message security mask transfer approach based on ultrasound according to claim 6, which is characterized in that The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:Bypass message section sequence after error detection, error correction is authenticated;
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for weight It passes.
10. a kind of bypass message sender safe and out of sight based on ultrasound according to any one of claim 2-9 Method, which is characterized in that in the S2, the method for coding uses width maps mutually method;In the S5, decoded method is set each other off using width Penetrate method.
CN201810311166.3A 2018-04-09 2018-04-09 A kind of bypass message based on ultrasound transfer approach safe and out of sight Pending CN108616313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810311166.3A CN108616313A (en) 2018-04-09 2018-04-09 A kind of bypass message based on ultrasound transfer approach safe and out of sight

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810311166.3A CN108616313A (en) 2018-04-09 2018-04-09 A kind of bypass message based on ultrasound transfer approach safe and out of sight

Publications (1)

Publication Number Publication Date
CN108616313A true CN108616313A (en) 2018-10-02

Family

ID=63659970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810311166.3A Pending CN108616313A (en) 2018-04-09 2018-04-09 A kind of bypass message based on ultrasound transfer approach safe and out of sight

Country Status (1)

Country Link
CN (1) CN108616313A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445777A (en) * 2019-07-31 2019-11-12 华中科技大学 A kind of hidden speech signal transmission method and relevant device and storage medium
CN110535479A (en) * 2019-09-04 2019-12-03 北京新时大众网络科技有限公司 A kind of system by broadcast identification information
CN110619081A (en) * 2019-09-20 2019-12-27 苏州市职业大学 News pushing method based on interactive graph neural network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101803334A (en) * 2007-07-23 2010-08-11 Savi技术公司 The method and apparatus of fail safe is provided in radio-frequency recognition system
CN101959044A (en) * 2009-07-20 2011-01-26 谢正旭 Broadcast television audio/video program odour exciting system
CN102172433A (en) * 2011-02-24 2011-09-07 颉羽玩具(深圳)有限公司 Electric toy controlled by ultrasonic waves and control method thereof
CN102664710A (en) * 2012-05-17 2012-09-12 北京航空航天大学 Data integrity protection method for wireless channel
CN104995677A (en) * 2013-06-19 2015-10-21 杜比实验室特许公司 Audio encoder and decoder with program information or substream structure metadata

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101803334A (en) * 2007-07-23 2010-08-11 Savi技术公司 The method and apparatus of fail safe is provided in radio-frequency recognition system
CN101959044A (en) * 2009-07-20 2011-01-26 谢正旭 Broadcast television audio/video program odour exciting system
CN102172433A (en) * 2011-02-24 2011-09-07 颉羽玩具(深圳)有限公司 Electric toy controlled by ultrasonic waves and control method thereof
CN102664710A (en) * 2012-05-17 2012-09-12 北京航空航天大学 Data integrity protection method for wireless channel
CN104995677A (en) * 2013-06-19 2015-10-21 杜比实验室特许公司 Audio encoder and decoder with program information or substream structure metadata

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445777A (en) * 2019-07-31 2019-11-12 华中科技大学 A kind of hidden speech signal transmission method and relevant device and storage medium
CN110445777B (en) * 2019-07-31 2020-07-10 华中科技大学 Concealed voice signal transmission method, related equipment and storage medium
CN110535479A (en) * 2019-09-04 2019-12-03 北京新时大众网络科技有限公司 A kind of system by broadcast identification information
CN110535479B (en) * 2019-09-04 2021-11-09 北京新时大众网络科技有限公司 System for identifying information through broadcasting
CN110619081A (en) * 2019-09-20 2019-12-27 苏州市职业大学 News pushing method based on interactive graph neural network
CN110619081B (en) * 2019-09-20 2022-05-17 苏州市职业大学 News pushing method based on interactive graph neural network

Similar Documents

Publication Publication Date Title
CN103117836B (en) Method and apparatus for equipment association
CN108616313A (en) A kind of bypass message based on ultrasound transfer approach safe and out of sight
KR101850727B1 (en) Apparatus for transmitting broadcast signals, apparatus for receiving broadcast signals, method for transmitting broadcast signals and method for receiving broadcast signals
CN104144058B (en) A kind of Information Authentication method matched based on sound wave
CN110753330A (en) Bluetooth pairing method and Bluetooth headset
CN106504745A (en) A kind of speech verification code system and its implementation method
CN104281427A (en) Video data processing method and system in interactive application
CN108989864B (en) Wheat connecting method, device, equipment and storage medium
WO2009038439A2 (en) Digital broadcasting receiver and method for controlling the same
JP4938409B2 (en) Digital broadcast content distribution apparatus, digital broadcast content authentication system, digital broadcast content authentication method and program
CN107707529A (en) A kind of client validation method for realizing limitation identifying code transmission times
SE0002798D0 (en) Method and apparatus for communication
CN109547119B (en) Anti-interference information transmission method based on inaudible audio hidden channel
KR102153991B1 (en) Ddetecting apparatus for monitoring emergency broadcasting message frame, emergency wake-up alert service transmitter and receiver
KR20180032559A (en) Authentication of digital broadcast data
CN104135668A (en) Methods and devices for providing and acquiring digital information
TW201820837A (en) Reception device, reception method, transmission device, and transmission method
CN105335767A (en) Data transmission method
US6937870B2 (en) Wireless interactive transaction system
CN108182039B (en) Voice transmission method and system
CN111756741A (en) Data transmission method, device, equipment and storage medium
CN106534137B (en) Media stream transmission method and device
CN105323012A (en) Sound data transmission system and sound data transmission method
CN104125481A (en) Multi-screen interaction method, device and system based on cloaking communication technology
CN111199744A (en) Advertisement identification method, equipment, media platform, terminal, server and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181002

RJ01 Rejection of invention patent application after publication