CN108616313A - A kind of bypass message based on ultrasound transfer approach safe and out of sight - Google Patents
A kind of bypass message based on ultrasound transfer approach safe and out of sight Download PDFInfo
- Publication number
- CN108616313A CN108616313A CN201810311166.3A CN201810311166A CN108616313A CN 108616313 A CN108616313 A CN 108616313A CN 201810311166 A CN201810311166 A CN 201810311166A CN 108616313 A CN108616313 A CN 108616313A
- Authority
- CN
- China
- Prior art keywords
- bypass message
- bypass
- message
- original
- audio signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/16—Vocoder architecture
- G10L19/18—Vocoders using multiple modes
- G10L19/20—Vocoders using multiple modes using sound class specific coding, hybrid encoders or object based coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
Abstract
The present invention discloses a kind of bypass message based on ultrasound transfer approach safe and out of sight, is related to information dissemination technology field, and original bypass message is generated the mixed audio transmission being mixed to get with original audio signal after ultrasound information by sender in the method;Recipient carries out it separation and Extraction and restores to obtain bypass message after receiving mixed audio signal.The present invention solves Quick Response Code propagation bypass message method in the prior art and blocks the parts of images on screen to hinder main road information to propagate, and the problem of bypass message method can reduce original audio fidelity is propagated in audio insertion.
Description
Technical field
The present invention relates to information dissemination technology field more particularly to a kind of bypass message based on ultrasound biographies safe and out of sight
Delivery method.
Background technology
People can be encountered in TV and need to transmit the information in addition to program video and sound when TV is seen in parlor indoors
Situation.When such as watching NBA live streamings, people can be frequently seen below screen side there are one Quick Response Code, be supported using wechat etc. two-dimentional
Code mobile terminal APP barcode scannings after, live streaming side appointed website can be entered, present some as player information, compete history say, the racing season it is pre-
The information such as announcement, basketball periphery, program commercial are exactly bypass message.This information and the live video and sound as main road information
Comparison can be described as bypass message, independently of main road information, as the supplement of main road information, there is abundant programme content, advertisement to launch,
The multiple functions such as electric business popularization, message push, can promote multimedia application user experience, create additional commercial value, have wide
Application prospect.Traditional bypass message transmission method carries out Information hiding using Quick Response Code or directly using the sound in video
And the transmission of bypass message.
But when being transmitted using Quick Response Code, user is by supporting the cell phone application of Quick Response Code to scan in tv screen image
Quick Response Code identifies bypass message, but identifies that distance has higher requirements to mobile phone and video screen spacing, can influence user experience,
And equipment for identification has the convenience that identification can be reduced when barrier with two-dimentional intersymbol.When using audio embedding inlay technique, user
The bypass message being embedded in television audio is captured by mobile microphone, point of audio signal is then carried out by subsequent module
From, but the hiding transmission method of such information can reduce original audio fidelity to a certain degree, and suppressible information content is by main road
Information audio signal limitation is larger, and it is limited to be applicable in scene in this approach, and confidentiality is unable to get guarantee.
Invention content
It is an object of the invention to:The part on screen is blocked to solve Quick Response Code propagation bypass message method in the prior art
For image to hinder main road information to propagate, the problem of bypass message method can reduce original audio fidelity is propagated in audio insertion, this
Invention provides a kind of bypass message transfer approach safe and out of sight based on ultrasound.
The concrete scheme of the present invention is as follows:
A kind of bypass message based on ultrasound transfer approach safe and out of sight, sender believes original bypass in the method
Breath transmits after generating ultrasound information with the mixed audio that original audio signal is mixed to get;Recipient receives mixed audio signal
Separation and Extraction is carried out to it afterwards and is restored to obtain bypass message;Wherein, the format of original bypass message is any literal code
Information format or file format.
Specifically, following steps are carried out successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections.
S2:Each bypass message section is encoded.
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent.
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal.
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence.
S6:Bypass message section sequence is exported, and original bypass message is obtained.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
Further, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:It is each can bypass message section be added error correcting code obtain can error correction bypass message section.
Preferably, the S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
Specifically, the S6 the specific steps are:
S6.1:Bypass message section sequence is authenticated.
S6.2:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for
It retransmits.
Further, the S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence.
S6.2:Bypass message after error detection, error correction is exported, original bypass message is obtained.
Further, the S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence.
S6.2:Bypass message section sequence after error detection, error correction is authenticated.
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for
It retransmits.
Specifically, in the S2, the method for coding uses width maps mutually method;In the S5, decoded method uses width phase
Reflection method.
After adopting the above scheme, beneficial effects of the present invention are as follows:
(1) main road information audio frequency range is identical with the human ear range of audibility, the nearly ultrasonic frequency used in the present invention
With main road audio frequency without intersecting, can accomplish horizontal infection, not interfere with each other, thus ultrasonic transmission scheme to main road audio without
Damage is, it can be achieved that its fidelity.
(2) most sound devices (mobile phone, TV, notebook, studio broadcast system etc.) support the same people of frequency range
The ear range of audibility is identical, so this scheme, which fine can obtain, is suitable for existing audio infrastructure.
(3) of the invention to add authentication code, safety ensures to disappear using HMAC (i.e. the message authentication code with key)
Integrality during breath, by the way that the key appointed in advance is added during message authentication code generates, transmitted disappears
If breath is maliciously tampered, but since attacker does not hold key, so effective message authentication code can not be generated, to receive
End can find and handle in time.
(4) ensure transmission process just using error correcting code (such as RS codes, cyclic redundancy check, Polar codes etc.) in the present invention
True property, by specific rule settings enable generate a string of specific lengths code word to original message carry out error detection with
Error correction, to ensure the correctness of message.
Description of the drawings
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.Shown in attached drawing, above and other purpose of the invention, feature and advantage will be more clear.In whole
Identical reference numeral indicates identical part in attached drawing.Actual size equal proportion scaling is not pressed deliberately draws attached drawing, emphasis
It is that the purport of the present invention is shown.
Fig. 1 is the flow diagram of the present invention;
Fig. 2 is the bandpass filtering figure that main road audio signal filtering is carried out to original audio signal of the present invention;
Fig. 3 is the bandpass filtering figure that nearly ultrasonic wave bypass audio signal filtering is carried out to original audio signal of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
A kind of bypass message transfer approach safe and out of sight based on ultrasound of the present invention, human ear audible frequency range are
20Hz-20KHz, experiments have shown that 17KHz or more, most people can not hear.Therefore this programme is closely super using 17KHz-20KHz
The nearly ultrasonic waves of 18.5KHz within the scope of frequency of sound wave are transmitted into row information, can either accomplish hidden easily transmission by-pass information,
Are realized by information and propagates non-audible property and biological safety without any injury by infant and pet etc. again.
It needs to carry out in sender and recipient, specifically, carries out following steps successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message HMAC message authentication codes are added to each bypass message section and generate identifiable bypass message section;
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
S2:Width maps mutually method coding is carried out to each bypass message section;
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal;Bandpass filtering purpose is will be original
It is that may be present in audio to be deleted with bypass message propagation carrier frequency same audio signal, assigned frequency channel is vacated, is avoided
Cause frequency interferences.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent;
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal, nearly ultrasonic wave wave band herein
Frequency range be 18.5kHz-20KHz;On the one hand, carrier frequency is excessively high, and wave energy is excessive may to influence bio-safety.Another party
Face, carrier frequency cannot cross the audible influence main road information of as low as human ear and propagate.Most people's human ear audible frequency is below
17KHz, still select frequency of use be higher than this value, but less than 20KHz nearly ultrasonic wave.Therefore, the bypass audio letter of capture
Number it is nearly ultrasonic wave bypass audio signal.
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and original bypass message is obtained.The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:HMAC certifications are carried out to the bypass message section sequence after error detection, error correction;
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for
It retransmits, in specific application, " authentification failure " printed words can be sent to client or carry out voice prompt.
Embodiment 1
The present invention a kind of bypass message transfer approach safe and out of sight based on ultrasound, specifically, in sender according to
Secondary carry out following steps:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;Specifically, to TXT text formattings
(plaintext) be added before original bypass message 3 starting characters " Str " afterwards generates one newly containing sequence starting character
The initial bypass message sequence of UTF-8 codes.Such as original bypass message " https://en.wikipedia.org/wiki/Text_
Initial bypass message is " Strhttps after starting character is added in file "://en.wikipedia.org/wiki/Text_file ",
Front three " Str " is starting character.
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;By initial bypass message sequence
Result segmentation is exported, every 68 TXT characters are divided into a unit (unit), and the UTF-8 codes less than 68 characters (are used herein
One character 8bit) it is partially filled with the 0x00 of UTF-8 character lengths, finally fill the end mark 0xF of half of UTF-8 character length
Generate bypass message section.Such as initial bypass message section " Strhttps://en.wikipedia.org/wiki/Text_file " is altogether
42 characters are discontented with 68.It is converted to 53 74 72 68 74 74 70 73 3A 2F 2F of UTF-8 codes 0x, 65 6E 2E
77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69
Totally 84 16 systems of 6C 65, fill 0x00 behind, and it is bypass message section 0x 53 74 72 68 74 finally to fill 0xF results
74 70 73 3A 2F 2F 65 6E 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B
69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00F。
S1.3:Message HMAC message authentication codes are added to each bypass message section and generate identifiable bypass message section;Tool
Body, it calculates the HMAC-SHA1 message authentication codes of bypass message section and is attached to tail portion, generate identifiable bypass message section.Such as
53 74 72 68 74 74 70 73 65 6E 2E of 3A 2F 2F of bypass message section 0x, 77 69 6B 69 70 65 64
69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00F are with " ultrasonic "
Key generates identifiable bypass message section 0x 53 74 72 68 after the HMAC-SHA1 message authentication codes after calculating are added
74 74 70 73 3A 2F 2F 65 6E 2E 77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69
6B 69 2F 54 65 78 74 5F 66 69 6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00F3 96 43 76 63 46 63 03 56 63 13 06 46 13
73 83 63 86 53 66 63 93 03 46 23 16 43 13 83 26 63 23 16 36 53 13 96 23 03 33
8。
S1.4:RS error correcting codes are added to each identifiable bypass message section and are attached to each initial bypass message segment trailer
Obtain the identifiable bypass message section with error correction.32 bit trial positions of RS check codes verify the data bit of front 223.It should
The RS error correction methods of system are (255,223) code on the domain GF (2^8), i.e. code length n=255, symbol long k=223, code distance d
=33, maximum error correcting capability t=16 are 8bits per character
Identifiable 74 72 68 74 74 70 73 3A 2F 2F of bypass message section 0x53, the 65 6E 2E with error correction
77 69 6B 69 70 65 64 69 61 2E 6F 72 67 2F 77 69 6B 69 2F 54 65 78 74 5F 66 69
6C 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00F3 96 43 76 63 46 63 03 56 63 13 06 46 13 73 83 63 86 53 66 63 93 03 46
23 16 43 13 83 26 63 23 16 36 53 13 96 23 03 33 8XXX XX XX XX XX XX XX XX XX
XX XX XX XX XX XX X.The identifiable bypass message paragraph format with error correction is after supplement is complete:
S2:Width maps mutually method coding is carried out to each bypass message section;Generate bypass message signal.Width maps mutually method uses
The method that amplitude modulation is combined with phase modulation distinguishes the additional breath and the main information that are transmitted, and frequency is fixed as 18.5KHz, just
6 kinds of phase point, oftenIt is to be spaced amplitude as unit of 1, amounts to 6 units, every 1 unit is interval.Using such method of salary distribution
It can indicate to amount to 36 different characters, number, capitalization can be covered, there was only number and letter in being encoded due to UTF-8,
And the capital and small letter of letter has no effect on represented character, it can complete representation information to be sent, specific method of salary distribution table 1 and table
2:
The correspondence of numerical portion and amplitude and phase in table 1-UTF-8 codings
The correspondence of capitalization part and amplitude and phase in table 2-UTF-8 codings
While carrying out S1 and S2, following steps are carried out:
S1-1:As shown in Fig. 2, carrying out bandpass filtering to original audio signal obtains main road audio signal;By the original of video
Beginning audio signal carries out bandpass filtering, sorts out 20Hz-20000Hz signals, generates main road audio signal.The purpose of bandpass filtering is
It is deleted that may be present in original audio with bypass message propagation carrier frequency same audio signal, vacates assigned frequency letter
Road avoids causing frequency interferences.
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, sent using stereo set.
Then following steps are carried out in recipient:
S4:Composite signal is transferred to recipient, microphone prison via there are the channels of electromagnetic interference and noise from sender
Audio signal that may be present in channel is listened, the original input audio signal that signal capture arrives is carried out;As shown in figure 3, will catch again
The original input audio signal caught carries out bandpass filtering, sorts out the nearly ultrasonic wave bypass audio signal of frequency 18.5KHz;
S5:Width maps mutually method is carried out to nearly ultrasonic wave bypass audio signal to decode to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and is searched in bypass message section sequence and is identified all 3 starting characters
" Str ", after extracting each adjacent starting character first character generates bypass letter one by one to information between next starting character
Cease section.
The S6 the specific steps are:
S6.1:32 RS check codes carry out error checking and correction (ECC) after being extracted to each bypass message section, then remove 32 thereafter,
Generate the bypass message section of error correction, three steps of error correction process point of RS codes:
(1) syndrome (syndrome) is calculated:
Assuming that the data received for one group:
68 31 00 31 00 68 4b 05 35 01 00 b7 2a 55 dc
Fen Liang groups:08 06 01 03 00 00 01 03 00 00 08 07 0b 0a 02(I-1)
06 0b 04 05 00 05 03 01 00 00 00 05 05 0c 0d(I-2)
Corresponding r14……r0, substitute into above formula and find out s1,s2,s3,s4(Sj);
(2) errors present is calculated:If judging Sj(j=1,2,3,4) is 0, then error-free;Otherwise execute following step with
Ask error-value and position:
Find out dislocation polynomial d (x)=dz2x2+dz0x+dz1=0 root, as wrong value position, wherein:
If dz2=0, then only there are one roots
Otherwise x is found out with substitution method1,x2All 15 probable values of x are substituted into dislocation polynomial, if result is 0,
It is a root.
(3) error value is calculated:Seek error-value ew1,ew2;
If dz2=0,Otherwise:
In corresponding x=a when error correctiony, at r (14-y), in addition error correction can be completed in corresponding mistake value.If root is x1=a3, x2
=a8, ew1=a4, ew2=a7, then add ew on r (14-3)=r (11)1That is a4, ew is added on r (14-8)=r (6)2That is a7Afterwards
The data of gained are exactly the data after error correction.
S6.2:HMAC information authentications are carried out to 40 hexadecimals after the bypass message section extraction of error correction, confirm that its is complete
Whole property.The bypass message section of error correction and certification is generated if by certification, prepares output.
S6.3:To being exported by the bypass message of certification, complete original bypass message TXT is obtained, otherwise directly
It abandons and waits for re-transmission.
Claims (10)
1. a kind of bypass message based on ultrasound transfer approach safe and out of sight, which is characterized in that sender will in the method
Original bypass message transmits after generating ultrasound information with the mixed audio that original audio signal is mixed to get;Recipient receives mixed
It carries out separation and Extraction to it and restores to obtain bypass message after closing audio signal;Wherein, the format of original bypass message is any
The information format or file format of literal code.
2. a kind of bypass message transfer approach safe and out of sight based on ultrasound according to claim 1, which is characterized in that
Specifically, following steps are carried out successively in sender:
S1:Original bypass message is pre-processed to obtain multiple bypass message sections;
S2:Each bypass message section is encoded;
While carrying out S1 and S2, following steps are carried out:
S1-1:Bandpass filtering is carried out to original audio signal and obtains main road audio signal;
S1, S2 and S1-1 after the completion of, carry out following steps:
S3:Bypass audio signal and main road audio signal are synthesized into Composite tone signal, and sent;
Then following steps are carried out in recipient:
S4:It captures and extracts the bypass audio signal of the nearly ultrasonic wave in Composite tone signal;
S5:Nearly ultrasonic wave bypass audio signal is decoded to obtain bypass message section sequence;
S6:Bypass message section sequence is exported, and original bypass message is obtained.
3. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that
The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections.
4. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that
The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section.
5. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that
The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:It is each can bypass message section be added error correcting code obtain can error correction bypass message section.
6. a kind of bypass message security mask transfer approach based on ultrasound according to claim 2, which is characterized in that
The S1 includes the following steps:
S1.1:Starting character is added to original bypass message and obtains initial bypass message;
S1.2:Segment processing is carried out to initial bypass message and obtains multiple bypass message sections;
S1.3:Message authentication code is added to each bypass message section and generates identifiable bypass message section;
S1.4:Error correcting code is added to each identifiable bypass message section and obtains the identifiable bypass message section with error correction.
7. a kind of bypass message security mask transfer approach based on ultrasound according to claim 4, which is characterized in that
The S6 the specific steps are:
S6.1:Bypass message section sequence is authenticated;
S6.2:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for weight
It passes.
8. a kind of bypass message security mask transfer approach based on ultrasound according to claim 5, which is characterized in that
The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:Bypass message after error detection, error correction is exported, original bypass message is obtained.
9. a kind of bypass message security mask transfer approach based on ultrasound according to claim 6, which is characterized in that
The S6 the specific steps are:
S6.1:Error detection, error correction are carried out to bypass message section sequence;
S6.2:Bypass message section sequence after error detection, error correction is authenticated;
S6.3:To being exported by the bypass message of certification, original bypass message is obtained, otherwise directly abandons and waits for weight
It passes.
10. a kind of bypass message sender safe and out of sight based on ultrasound according to any one of claim 2-9
Method, which is characterized in that in the S2, the method for coding uses width maps mutually method;In the S5, decoded method is set each other off using width
Penetrate method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810311166.3A CN108616313A (en) | 2018-04-09 | 2018-04-09 | A kind of bypass message based on ultrasound transfer approach safe and out of sight |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810311166.3A CN108616313A (en) | 2018-04-09 | 2018-04-09 | A kind of bypass message based on ultrasound transfer approach safe and out of sight |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108616313A true CN108616313A (en) | 2018-10-02 |
Family
ID=63659970
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810311166.3A Pending CN108616313A (en) | 2018-04-09 | 2018-04-09 | A kind of bypass message based on ultrasound transfer approach safe and out of sight |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108616313A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445777A (en) * | 2019-07-31 | 2019-11-12 | 华中科技大学 | A kind of hidden speech signal transmission method and relevant device and storage medium |
CN110535479A (en) * | 2019-09-04 | 2019-12-03 | 北京新时大众网络科技有限公司 | A kind of system by broadcast identification information |
CN110619081A (en) * | 2019-09-20 | 2019-12-27 | 苏州市职业大学 | News pushing method based on interactive graph neural network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101803334A (en) * | 2007-07-23 | 2010-08-11 | Savi技术公司 | The method and apparatus of fail safe is provided in radio-frequency recognition system |
CN101959044A (en) * | 2009-07-20 | 2011-01-26 | 谢正旭 | Broadcast television audio/video program odour exciting system |
CN102172433A (en) * | 2011-02-24 | 2011-09-07 | 颉羽玩具(深圳)有限公司 | Electric toy controlled by ultrasonic waves and control method thereof |
CN102664710A (en) * | 2012-05-17 | 2012-09-12 | 北京航空航天大学 | Data integrity protection method for wireless channel |
CN104995677A (en) * | 2013-06-19 | 2015-10-21 | 杜比实验室特许公司 | Audio encoder and decoder with program information or substream structure metadata |
-
2018
- 2018-04-09 CN CN201810311166.3A patent/CN108616313A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101803334A (en) * | 2007-07-23 | 2010-08-11 | Savi技术公司 | The method and apparatus of fail safe is provided in radio-frequency recognition system |
CN101959044A (en) * | 2009-07-20 | 2011-01-26 | 谢正旭 | Broadcast television audio/video program odour exciting system |
CN102172433A (en) * | 2011-02-24 | 2011-09-07 | 颉羽玩具(深圳)有限公司 | Electric toy controlled by ultrasonic waves and control method thereof |
CN102664710A (en) * | 2012-05-17 | 2012-09-12 | 北京航空航天大学 | Data integrity protection method for wireless channel |
CN104995677A (en) * | 2013-06-19 | 2015-10-21 | 杜比实验室特许公司 | Audio encoder and decoder with program information or substream structure metadata |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445777A (en) * | 2019-07-31 | 2019-11-12 | 华中科技大学 | A kind of hidden speech signal transmission method and relevant device and storage medium |
CN110445777B (en) * | 2019-07-31 | 2020-07-10 | 华中科技大学 | Concealed voice signal transmission method, related equipment and storage medium |
CN110535479A (en) * | 2019-09-04 | 2019-12-03 | 北京新时大众网络科技有限公司 | A kind of system by broadcast identification information |
CN110535479B (en) * | 2019-09-04 | 2021-11-09 | 北京新时大众网络科技有限公司 | System for identifying information through broadcasting |
CN110619081A (en) * | 2019-09-20 | 2019-12-27 | 苏州市职业大学 | News pushing method based on interactive graph neural network |
CN110619081B (en) * | 2019-09-20 | 2022-05-17 | 苏州市职业大学 | News pushing method based on interactive graph neural network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103117836B (en) | Method and apparatus for equipment association | |
CN108616313A (en) | A kind of bypass message based on ultrasound transfer approach safe and out of sight | |
KR101850727B1 (en) | Apparatus for transmitting broadcast signals, apparatus for receiving broadcast signals, method for transmitting broadcast signals and method for receiving broadcast signals | |
CN104144058B (en) | A kind of Information Authentication method matched based on sound wave | |
CN110753330A (en) | Bluetooth pairing method and Bluetooth headset | |
CN106504745A (en) | A kind of speech verification code system and its implementation method | |
CN104281427A (en) | Video data processing method and system in interactive application | |
CN108989864B (en) | Wheat connecting method, device, equipment and storage medium | |
WO2009038439A2 (en) | Digital broadcasting receiver and method for controlling the same | |
JP4938409B2 (en) | Digital broadcast content distribution apparatus, digital broadcast content authentication system, digital broadcast content authentication method and program | |
CN107707529A (en) | A kind of client validation method for realizing limitation identifying code transmission times | |
SE0002798D0 (en) | Method and apparatus for communication | |
CN109547119B (en) | Anti-interference information transmission method based on inaudible audio hidden channel | |
KR102153991B1 (en) | Ddetecting apparatus for monitoring emergency broadcasting message frame, emergency wake-up alert service transmitter and receiver | |
KR20180032559A (en) | Authentication of digital broadcast data | |
CN104135668A (en) | Methods and devices for providing and acquiring digital information | |
TW201820837A (en) | Reception device, reception method, transmission device, and transmission method | |
CN105335767A (en) | Data transmission method | |
US6937870B2 (en) | Wireless interactive transaction system | |
CN108182039B (en) | Voice transmission method and system | |
CN111756741A (en) | Data transmission method, device, equipment and storage medium | |
CN106534137B (en) | Media stream transmission method and device | |
CN105323012A (en) | Sound data transmission system and sound data transmission method | |
CN104125481A (en) | Multi-screen interaction method, device and system based on cloaking communication technology | |
CN111199744A (en) | Advertisement identification method, equipment, media platform, terminal, server and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181002 |
|
RJ01 | Rejection of invention patent application after publication |