CN112614498A - Method for modulating low-speed data into voice-like signal - Google Patents
Method for modulating low-speed data into voice-like signal Download PDFInfo
- Publication number
- CN112614498A CN112614498A CN202011482696.8A CN202011482696A CN112614498A CN 112614498 A CN112614498 A CN 112614498A CN 202011482696 A CN202011482696 A CN 202011482696A CN 112614498 A CN112614498 A CN 112614498A
- Authority
- CN
- China
- Prior art keywords
- voice
- signal
- key
- speed data
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000009432 framing Methods 0.000 claims abstract description 17
- 230000011218 segmentation Effects 0.000 claims abstract description 5
- 238000001514 detection method Methods 0.000 claims description 14
- 238000001228 spectrum Methods 0.000 claims description 8
- 230000001360 synchronised effect Effects 0.000 claims description 7
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 10
- 238000012545 processing Methods 0.000 abstract description 2
- 230000005284 excitation Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 7
- 230000006835 compression Effects 0.000 description 6
- 238000007906 compression Methods 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 206010071299 Slow speech Diseases 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/08—Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/16—Vocoder architecture
- G10L19/167—Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Acoustics & Sound (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
- Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)
Abstract
The invention discloses a method for modulating low-speed data into a voice-like signal, which comprises the steps of constructing a low-speed data flow and generating a model through an excitation-formant based on voice; generating a key stream by a regularly updated key through a stream cipher algorithm, carrying out encryption operation on the key stream and a low-speed data stream with a fixed length obtained by segmentation to obtain a segmented ciphertext data stream, carrying out framing operation to obtain a signal frame to be modulated, and carrying out voice-like modulation operation on the signal frame through a voice-like excitation-formant generation model based on voice to obtain a voice-like signal; and the low-speed data stream is obtained by processing the voice-like signal received at the demodulation end. The invention can modulate the low-speed data on the excitation signal and a plurality of formant frequencies to generate a similar voice signal, has the parameter characteristic of a common voice signal, can transmit through a voice channel with a vocoder, and further realizes the low-speed data transmission of the voice channel of the vocoder.
Description
Technical Field
The invention relates to the technical field of voice-like modulation, in particular to a method for modulating low-speed data into a voice-like signal.
Background
Voice communication is an indispensable mode for daily information communication, and eavesdropping on mobile phones and telephones sometimes occurs. After the Trojan horse is installed on the mobile phone, the call of a user is easy to eavesdrop through a wireless network; the monitoring of the telephone voice can be achieved by combining the telephone lines. If the analog voice can be directly encrypted, the voice information can be well protected before the voice is sent, and the voice is prevented from being intercepted in the subsequent processing and transmission processes. However, the encryption and decryption of analog voice has been one of the difficulties in information security research, and the difficulty is how to make the encrypted voice still able to be transmitted through a voice channel. Because, in general, the voice characteristics are lost after voice encryption. In most speech transmission systems, speech is typically compression encoded in order to reduce the channel bandwidth required for speech transmission, and the encrypted speech cannot be efficiently transmitted over such channels if the speech characteristics are lost.
The existing analog voice encryption technology mainly comprises a time domain scrambling method and a frequency domain scrambling method. The time domain scrambling method is to divide a section of voice signal into a plurality of segments and encrypt the voice of each segment by randomly scrambling the sequence of the voice. The method has the advantages of simple operation and high speech intelligibility after decryption. However, the security of this method is very low, and especially, the method cannot resist slow speech rate attacks; the delay of encryption and decryption is large, and the decrypted voice also contains periodic interference sound. The frequency domain scrambling method is to convert a frame of voice to the frequency domain, and then to directly scramble or scramble the molecular band in the frequency domain. The method has the advantages that the security intensity is higher than that of a time domain scrambling method, but the characteristics of the encrypted voice are lost to a certain extent, and the transmission through a voice compression coding channel is not facilitated.
Modulation techniques convert digital signals into a form to accommodate channel transmission. The general modulation method is to change a sinusoidal carrier signal, using the typical characteristics of the carrier: amplitude, frequency, phase, etc. to carry the digital data. However, such a data modem cannot be used for a system using a voice codec compression technique. The main purpose of speech coding is to reduce the bits needed to represent the speech while still maintaining an acceptable speech quality at the time of decoding recovery, so that the human ear sounds almost the same as the original speech. However, the hearing of the human ear is "thresholded" to mask differences in the sampled waveform of the signal. The sampled waveforms of the decoded and recovered speech signal and the original signal may be significantly different, which may cause a large distortion in the frequency, phase and amplitude characteristics of the data-bearing output of the modem. Therefore, most modems cannot operate on channels using a voice codec, and a modem scheme, i.e., a voice-like modem scheme, needs to be redesigned.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects in the prior art, the invention provides a method for modulating low-speed data into a voice-like signal, the invention constructs a voice-like signal modulated based on a voice excitation-formant model, has the parameter characteristics of general voice information, is favorable for storing the characteristics after being transmitted through a voice channel of a vocoder, and has good capability of resisting the nonlinear operation of voice compression and decompression.
The technical scheme is as follows: in order to achieve the above object, the present invention provides a method of modulating low-speed data into a voice-like signal, comprising the steps of,
step 1: constructing a low-speed data stream to pass through a voice-based excitation-formant generation model, and generating a voice-like signal capable of transmitting low-speed data in a vocoder channel by the low-speed data stream through the model, wherein the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
Further, in the present invention: the similar voice modulation operation adopts multi-frequency point amplitude modulation, selects the fundamental tone frequency, the initial frequency, the number and the position of the formant frequency points according to the vocoder channel, and carries out amplitude modulation based on the formant frequency points in the frequency spectrum according to the frame structure of the signal frame to obtain the similar voice signal with the parameter characteristics of the general voice signal.
Further, in the present invention: the frame structure of the signal frame comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for detecting the word interval and the frequency point amplitude reference of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition.
Further, in the present invention: the frame structure of the signal frame comprises a blank frame, a channel detection frame and a plurality of data frames, the bit number carried by each data frame is the number of formants multiplied by the modulated bit number of each formant, and the same signal frame comprises the key sequence number of the corresponding data segment.
Further, in the present invention: the key sequence number is used for updating a key used by the segmented ciphertext data stream.
Further, in the present invention: the bit rate carried by the voice-like signal is more than or equal to 2.4 Kb/s.
Further, in the present invention: the encryption and decryption operations may further include,
generating a corresponding sub-key group sequence at a sending end through a key distributed at an upper layer, sequencing according to a serial number, generating a random key stream with the same bit as data by each segment according to the sub-key of the serial number corresponding to the key group, and performing exclusive-or operation on the random key stream and low-speed data to obtain an encrypted data stream;
and obtaining the encrypted data stream and the corresponding key group serial number at a receiving end, obtaining a corresponding sub-key according to the serial number, generating a key stream for decryption, and obtaining the transmitted low-speed data.
Has the advantages that: compared with the prior art, the invention has the beneficial effects that:
(1) the voice-like signal modulated based on the voice excitation-formant model has the parameter characteristics of general voice information, is beneficial to storing the characteristics after being transmitted through a voice channel of a vocoder, and has good capability of resisting the voice compression and decompression nonlinear operation;
(2) the stream cipher algorithm does not introduce extra bit error rate, errors cannot be spread, and the strength meets the requirement;
(3) the encryption and decryption delay is small, the framing and de-framing speed is high, and the transmission of low-speed data is not influenced.
The method for modulating low-speed data into a voice-like signal provided by the invention changes intelligible voice into unintelligible voice and simultaneously keeps the voice characteristic, so that the encrypted voice can be smoothly transmitted through a voice compression coding channel.
Drawings
FIG. 1 is a flow chart illustrating a method for modulating low-speed data into a speech-like signal according to the present invention;
FIG. 2 is a diagram illustrating a frame structure format of a signal frame according to the present invention;
FIG. 3 is a schematic diagram of a frequency spectrum of a channel sounding frame according to the present invention;
fig. 4 is a schematic diagram of a spectrum of a single data frame in the present invention.
Detailed Description
The technical scheme of the invention is further explained in detail by combining the attached drawings:
the present invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
As shown in fig. 1, an overall flow chart of a method for modulating low-speed data into a speech-like signal according to the present invention is shown, the method specifically includes the following steps,
step 1: the low-speed data flow generates a voice-like signal which can transmit low-speed data in a vocoder channel through a voice-based excitation-formant generation model, and the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
specifically, the encryption and decryption operation is used for realizing the secret transmission of low-speed data, a stream cipher algorithm is adopted, the encryption and decryption operation also comprises the following steps,
generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a key sequence number frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
In particular, the key k distributed at the transmitting end through the upper layersGenerating a corresponding key group sequence, sequencing according to the serial number, and generating a random key stream k with the same bits as the data by each segment according to the sub-keys of the serial number corresponding to the key groupiAnd carrying out XOR operation with the low-speed data to obtain the encrypted data stream.
Obtaining the encrypted segmented data stream and the corresponding key group serial number at the receiving end, and obtaining the corresponding sub-key according to the serial number,generating a keystream kiAnd decrypting to obtain the transmitted low-speed data. The key sequence number is used for updating a key used by the segmented ciphertext data stream.
Setting M bits transmitted by each frame and M data to be encrypted at a transmitting endi(i 1.. said., m), the encrypted data is Ci(i ═ 1.. multidata., m), the receiving end receives the encrypted data as C'i(i ═ 1.. multidata., M), the decrypted data is M'i(i ═ 1.. multidot.m), M 'should be obtainable'i=MiAnd then:
the framing and deframing operation is used for framing and integrating data, and comprises the steps of adding a blank frame and a channel detection frame at a sending end, framing the data and adding a generated key sequence number for the voice-like modulation operation; and providing a channel detection result and generating a key sequence number for decryption operation at a receiving end, and integrating the data frames.
The method comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for referencing the word interval and the frequency point amplitude of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition. Referring to the schematic diagram of fig. 2, a frame structure format of each signal frame is shown, which is composed of a blank frame of T milliseconds, a channel sounding frame and n data frames, each signal frame contains n +2 frame data, and each frame time is T × n +2 milliseconds.
Specifically, the blank frame is used for energy detection of a synchronous channel vocoder, the channel sounding frame is used for a receiving end to detect the distortion condition of each formant frequency point of a channel, and each frame of the data frame comprises NfEach formant frequency point contains kbit data, and a single data frame contains NfK bits data, where mbit is the serial number of the transmission key, then each signal frame is transmittedTotal data amount s (t) ═ NfK-m) nbit, and therefore its transmission rate v (t) is:
v(t)=S(t)/Tall=(Nf*k-m)*n/T*(n+2)(bit/ms)
further, the voice-like modem operation is used to ensure efficient transmission of signals in the vocoder channel. Carrying out voice-like modulation of multi-frequency point amplitude Modulation (MFAK) of a voice-based excitation-formant generation model on the framed data at a sending end, and modulating low-speed data into voice-like data; the voice-like signal transmitted through the vocoder channel is demodulated into framed data at the receiving end. In this embodiment, the quasi-speech modulation operation adopts multi-frequency amplitude modulation, selects the pitch frequency, the initial frequency, the number of formant frequency points, and the position according to the vocoder channel, and performs amplitude modulation based on the formant frequency points in the spectrum according to the frame structure of the signal frame to obtain a quasi-speech signal having general speech signal parameter characteristics.
Further, the bit rate carried by the voice-like signal is greater than or equal to 2.4 Kb/s.
The similar voice modulation of the voice-based excitation-formant generation model comprises a channel detection frame, and the distortion condition of each formant frequency point is detected at a receiving end to be used as the reference of data demodulation. Referring to fig. 3, a schematic diagram of a frequency spectrum of a channel sounding frame is shown, where a difference value of formant frequencies is a pitch frequency, and a magnitude of the pitch frequency is determined according to a sampling rate and a length of a signal frame, and the pitch frequency should be greater than 60Hz and less than 600 Hz.
Let fundamental frequency be Δ f and initial frequency be f0The number of formant frequency points is NfThen each formant frequency is f (i):
f(i)=f0+i*Δf,i=0,1,2,...,Nf-1
the channel detection frame comprises the sum of unit sine waves of each formant frequency during the voice-like modulation, and the number of formant frequency points is NfAnd (4) respectively.
Referring to the schematic diagram of fig. 4, which is a schematic diagram of a frequency spectrum of a single data frame, data in the data frame is amplitude-modulated at a modulation end based on formant frequency points in the frequency spectrum, and each frame packet of the data frameContaining NfEach frequency point contains kbit data, and the gain modulation range is-2k-1~2k-1dB。
Let X (f)i) Is a frequency point fiThe data is subjected to amplitude modulation in a frequency domain to obtain a data frame frequency point fiSpectral amplitude E (f) ofi):
E(fi)=H(fi)*10^(X(fi)/20)
Wherein, H (f)i) In channel sounding frame f for transmitting endiThe spectral amplitude of (d).
The frequency domain signal e (f) of a single data frame is:
the corresponding demodulation end demodulates the data according to the unit formant amplitude in the received channel detection frame:
X′(fi)=20*log10(E′(fi)/H′(fi))
wherein, H' (f)i) Detecting f in frame for receiving end channeliThe spectral amplitude of (d).
Step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
It should be noted that the above-mentioned examples only represent some embodiments of the present invention, and the description thereof should not be construed as limiting the scope of the present invention. It should be noted that, for those skilled in the art, various modifications can be made without departing from the spirit of the present invention, and these modifications should fall within the scope of the present invention.
Claims (7)
1. A method of modulating low speed data into a speech-like signal, characterized by: comprises the following steps of (a) carrying out,
step 1: constructing a low-speed data stream to pass through a voice-based excitation-formant generation model, and generating a voice-like signal capable of transmitting low-speed data in a vocoder channel by the low-speed data stream through the model, wherein the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
2. The method of modulating low speed data into a speech-like signal as claimed in claim 1, wherein: the similar voice modulation operation adopts multi-frequency point amplitude modulation, selects the fundamental tone frequency, the initial frequency, the number and the position of the formant frequency points according to the vocoder channel, and carries out amplitude modulation based on the formant frequency points in the frequency spectrum according to the frame structure of the signal frame to obtain the similar voice signal with the parameter characteristics of the general voice signal.
3. The method of modulating low speed data into a speech-like signal as claimed in claim 2, wherein: the frame structure of the signal frame comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for detecting the word interval and the frequency point amplitude reference of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition.
4. A method of modulating low speed data into a speech like signal as claimed in claim 3, characterized by: the frame structure of the signal frame comprises a blank frame, a channel detection frame and a plurality of data frames, the bit number carried by each data frame is the number of formants multiplied by the modulated bit number of each formant, and the same signal frame comprises the key sequence number of the corresponding data segment.
5. The method of modulating low speed data into a speech-like signal according to claim 4, wherein: the key sequence number is used for updating a key used by the segmented ciphertext data stream.
6. The method of modulating low speed data into a speech-like signal according to claim 5, wherein: the bit rate carried by the voice-like signal is more than or equal to 2.4 Kb/s.
7. The method of modulating low speed data into a speech-like signal according to claim 6, wherein: the encryption and decryption operations may further include,
generating a corresponding sub-key group sequence at a sending end through a key distributed at an upper layer, sequencing according to a serial number, generating a random key stream with the same bit as data by each segment according to the sub-key of the serial number corresponding to the key group, and performing exclusive-or operation on the random key stream and low-speed data to obtain an encrypted data stream;
and obtaining the encrypted data stream and the corresponding key group serial number at a receiving end, obtaining a corresponding sub-key according to the serial number, generating a key stream for decryption, and obtaining the transmitted low-speed data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482696.8A CN112614498B (en) | 2020-12-16 | 2020-12-16 | Method for modulating low-speed data into voice-like signal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482696.8A CN112614498B (en) | 2020-12-16 | 2020-12-16 | Method for modulating low-speed data into voice-like signal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112614498A true CN112614498A (en) | 2021-04-06 |
CN112614498B CN112614498B (en) | 2024-02-06 |
Family
ID=75239603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011482696.8A Active CN112614498B (en) | 2020-12-16 | 2020-12-16 | Method for modulating low-speed data into voice-like signal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112614498B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113270105A (en) * | 2021-05-20 | 2021-08-17 | 东南大学 | Voice-like data transmission method based on hybrid modulation |
CN116366169A (en) * | 2023-06-01 | 2023-06-30 | 浙江大学 | Ultrasonic channel modeling method, electronic device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020094081A1 (en) * | 2001-01-16 | 2002-07-18 | Alexander Medvinsky | System for securely communicating information packets |
KR20030083101A (en) * | 2002-04-19 | 2003-10-30 | 한국전자통신연구원 | Real time voice packet encryption/decryption system and encrypting/decrypting method using the same |
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN102006593A (en) * | 2010-10-29 | 2011-04-06 | 公安部第一研究所 | End-to-end voice encrypting method for low-speed narrowband wireless digital communication |
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
-
2020
- 2020-12-16 CN CN202011482696.8A patent/CN112614498B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020094081A1 (en) * | 2001-01-16 | 2002-07-18 | Alexander Medvinsky | System for securely communicating information packets |
KR20030083101A (en) * | 2002-04-19 | 2003-10-30 | 한국전자통신연구원 | Real time voice packet encryption/decryption system and encrypting/decrypting method using the same |
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN102006593A (en) * | 2010-10-29 | 2011-04-06 | 公安部第一研究所 | End-to-end voice encrypting method for low-speed narrowband wireless digital communication |
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
Non-Patent Citations (1)
Title |
---|
刘影彤: "关于移动通信端到端语音加解密方案研究", 《中国优秀硕士学位论文全文数据库(信息科技辑)》, pages 136 - 729 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113270105A (en) * | 2021-05-20 | 2021-08-17 | 东南大学 | Voice-like data transmission method based on hybrid modulation |
CN113270105B (en) * | 2021-05-20 | 2022-05-10 | 东南大学 | Voice-like data transmission method based on hybrid modulation |
CN116366169A (en) * | 2023-06-01 | 2023-06-30 | 浙江大学 | Ultrasonic channel modeling method, electronic device and storage medium |
CN116366169B (en) * | 2023-06-01 | 2023-10-24 | 浙江大学 | Ultrasonic channel modeling method, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112614498B (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112614498B (en) | Method for modulating low-speed data into voice-like signal | |
JPH06501139A (en) | Cryptographic system resynchronization during handoff | |
US4179586A (en) | System of encoded speech transmission and reception | |
CN109346092A (en) | The system and method for voice encryption communication is carried out between a kind of communication terminal | |
KR960008031B1 (en) | Encryption system for digital cellular communications | |
Raheema et al. | Performance Comparison of Hybrid Chaotic Maps Based on Speech Scrambling for OFDM Techniques | |
Ryan et al. | Communications and information systems | |
Krasnowski et al. | Introducing a novel data over voice technique for secure voice communication | |
Biancucci et al. | Secure data and voice transmission over GSM voice channel: Applications for secure communications | |
CN111818522A (en) | Voice call encryption method and device | |
CN115694990A (en) | Voice transmission system based on network encryption | |
JPH09214636A (en) | Method and device for voice communication imbedded with data | |
JP3459074B2 (en) | Method and apparatus for enhanced security enhancement of a private key to a lookup table to improve security of wireless telephone messages | |
Chen et al. | End-to-end speech encryption algorithm based on speech scrambling in frequency domain | |
CN113270105B (en) | Voice-like data transmission method based on hybrid modulation | |
EP0377687A1 (en) | Spectrally efficient method for communicating an information signal | |
CN109346090A (en) | A method of penetrating vocoder | |
WO2009074711A1 (en) | Speech data encryption and decryption | |
Čubrilović et al. | Evaluation of improved classification of speech-like waveforms used for secure voice transmission | |
CN113645613B (en) | Cellular mobile network real-time voice encryption equipment and method | |
JPH04304727A (en) | Data ciphering device, data decoder and data ciphering decoder | |
KR100634495B1 (en) | Wireless communication terminal having information secure function and method therefor | |
KR100408516B1 (en) | Terminal for secure communication in CDMA system and methods for transmitting information using encryption and receiving information using decryption | |
Chen et al. | A r-ask ofdm modulation and demodulation scheme against vocoder compression | |
JP2003032382A (en) | Voice communication device with caption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |