CN112614498A - Method for modulating low-speed data into voice-like signal - Google Patents

Method for modulating low-speed data into voice-like signal Download PDF

Info

Publication number
CN112614498A
CN112614498A CN202011482696.8A CN202011482696A CN112614498A CN 112614498 A CN112614498 A CN 112614498A CN 202011482696 A CN202011482696 A CN 202011482696A CN 112614498 A CN112614498 A CN 112614498A
Authority
CN
China
Prior art keywords
voice
signal
key
speed data
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011482696.8A
Other languages
Chinese (zh)
Other versions
CN112614498B (en
Inventor
胡爱群
张镇
董冰书
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Network Communication and Security Zijinshan Laboratory
Original Assignee
Southeast University
Network Communication and Security Zijinshan Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University, Network Communication and Security Zijinshan Laboratory filed Critical Southeast University
Priority to CN202011482696.8A priority Critical patent/CN112614498B/en
Publication of CN112614498A publication Critical patent/CN112614498A/en
Application granted granted Critical
Publication of CN112614498B publication Critical patent/CN112614498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/08Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/16Vocoder architecture
    • G10L19/167Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Acoustics & Sound (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)

Abstract

The invention discloses a method for modulating low-speed data into a voice-like signal, which comprises the steps of constructing a low-speed data flow and generating a model through an excitation-formant based on voice; generating a key stream by a regularly updated key through a stream cipher algorithm, carrying out encryption operation on the key stream and a low-speed data stream with a fixed length obtained by segmentation to obtain a segmented ciphertext data stream, carrying out framing operation to obtain a signal frame to be modulated, and carrying out voice-like modulation operation on the signal frame through a voice-like excitation-formant generation model based on voice to obtain a voice-like signal; and the low-speed data stream is obtained by processing the voice-like signal received at the demodulation end. The invention can modulate the low-speed data on the excitation signal and a plurality of formant frequencies to generate a similar voice signal, has the parameter characteristic of a common voice signal, can transmit through a voice channel with a vocoder, and further realizes the low-speed data transmission of the voice channel of the vocoder.

Description

Method for modulating low-speed data into voice-like signal
Technical Field
The invention relates to the technical field of voice-like modulation, in particular to a method for modulating low-speed data into a voice-like signal.
Background
Voice communication is an indispensable mode for daily information communication, and eavesdropping on mobile phones and telephones sometimes occurs. After the Trojan horse is installed on the mobile phone, the call of a user is easy to eavesdrop through a wireless network; the monitoring of the telephone voice can be achieved by combining the telephone lines. If the analog voice can be directly encrypted, the voice information can be well protected before the voice is sent, and the voice is prevented from being intercepted in the subsequent processing and transmission processes. However, the encryption and decryption of analog voice has been one of the difficulties in information security research, and the difficulty is how to make the encrypted voice still able to be transmitted through a voice channel. Because, in general, the voice characteristics are lost after voice encryption. In most speech transmission systems, speech is typically compression encoded in order to reduce the channel bandwidth required for speech transmission, and the encrypted speech cannot be efficiently transmitted over such channels if the speech characteristics are lost.
The existing analog voice encryption technology mainly comprises a time domain scrambling method and a frequency domain scrambling method. The time domain scrambling method is to divide a section of voice signal into a plurality of segments and encrypt the voice of each segment by randomly scrambling the sequence of the voice. The method has the advantages of simple operation and high speech intelligibility after decryption. However, the security of this method is very low, and especially, the method cannot resist slow speech rate attacks; the delay of encryption and decryption is large, and the decrypted voice also contains periodic interference sound. The frequency domain scrambling method is to convert a frame of voice to the frequency domain, and then to directly scramble or scramble the molecular band in the frequency domain. The method has the advantages that the security intensity is higher than that of a time domain scrambling method, but the characteristics of the encrypted voice are lost to a certain extent, and the transmission through a voice compression coding channel is not facilitated.
Modulation techniques convert digital signals into a form to accommodate channel transmission. The general modulation method is to change a sinusoidal carrier signal, using the typical characteristics of the carrier: amplitude, frequency, phase, etc. to carry the digital data. However, such a data modem cannot be used for a system using a voice codec compression technique. The main purpose of speech coding is to reduce the bits needed to represent the speech while still maintaining an acceptable speech quality at the time of decoding recovery, so that the human ear sounds almost the same as the original speech. However, the hearing of the human ear is "thresholded" to mask differences in the sampled waveform of the signal. The sampled waveforms of the decoded and recovered speech signal and the original signal may be significantly different, which may cause a large distortion in the frequency, phase and amplitude characteristics of the data-bearing output of the modem. Therefore, most modems cannot operate on channels using a voice codec, and a modem scheme, i.e., a voice-like modem scheme, needs to be redesigned.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects in the prior art, the invention provides a method for modulating low-speed data into a voice-like signal, the invention constructs a voice-like signal modulated based on a voice excitation-formant model, has the parameter characteristics of general voice information, is favorable for storing the characteristics after being transmitted through a voice channel of a vocoder, and has good capability of resisting the nonlinear operation of voice compression and decompression.
The technical scheme is as follows: in order to achieve the above object, the present invention provides a method of modulating low-speed data into a voice-like signal, comprising the steps of,
step 1: constructing a low-speed data stream to pass through a voice-based excitation-formant generation model, and generating a voice-like signal capable of transmitting low-speed data in a vocoder channel by the low-speed data stream through the model, wherein the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
Further, in the present invention: the similar voice modulation operation adopts multi-frequency point amplitude modulation, selects the fundamental tone frequency, the initial frequency, the number and the position of the formant frequency points according to the vocoder channel, and carries out amplitude modulation based on the formant frequency points in the frequency spectrum according to the frame structure of the signal frame to obtain the similar voice signal with the parameter characteristics of the general voice signal.
Further, in the present invention: the frame structure of the signal frame comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for detecting the word interval and the frequency point amplitude reference of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition.
Further, in the present invention: the frame structure of the signal frame comprises a blank frame, a channel detection frame and a plurality of data frames, the bit number carried by each data frame is the number of formants multiplied by the modulated bit number of each formant, and the same signal frame comprises the key sequence number of the corresponding data segment.
Further, in the present invention: the key sequence number is used for updating a key used by the segmented ciphertext data stream.
Further, in the present invention: the bit rate carried by the voice-like signal is more than or equal to 2.4 Kb/s.
Further, in the present invention: the encryption and decryption operations may further include,
generating a corresponding sub-key group sequence at a sending end through a key distributed at an upper layer, sequencing according to a serial number, generating a random key stream with the same bit as data by each segment according to the sub-key of the serial number corresponding to the key group, and performing exclusive-or operation on the random key stream and low-speed data to obtain an encrypted data stream;
and obtaining the encrypted data stream and the corresponding key group serial number at a receiving end, obtaining a corresponding sub-key according to the serial number, generating a key stream for decryption, and obtaining the transmitted low-speed data.
Has the advantages that: compared with the prior art, the invention has the beneficial effects that:
(1) the voice-like signal modulated based on the voice excitation-formant model has the parameter characteristics of general voice information, is beneficial to storing the characteristics after being transmitted through a voice channel of a vocoder, and has good capability of resisting the voice compression and decompression nonlinear operation;
(2) the stream cipher algorithm does not introduce extra bit error rate, errors cannot be spread, and the strength meets the requirement;
(3) the encryption and decryption delay is small, the framing and de-framing speed is high, and the transmission of low-speed data is not influenced.
The method for modulating low-speed data into a voice-like signal provided by the invention changes intelligible voice into unintelligible voice and simultaneously keeps the voice characteristic, so that the encrypted voice can be smoothly transmitted through a voice compression coding channel.
Drawings
FIG. 1 is a flow chart illustrating a method for modulating low-speed data into a speech-like signal according to the present invention;
FIG. 2 is a diagram illustrating a frame structure format of a signal frame according to the present invention;
FIG. 3 is a schematic diagram of a frequency spectrum of a channel sounding frame according to the present invention;
fig. 4 is a schematic diagram of a spectrum of a single data frame in the present invention.
Detailed Description
The technical scheme of the invention is further explained in detail by combining the attached drawings:
the present invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
As shown in fig. 1, an overall flow chart of a method for modulating low-speed data into a speech-like signal according to the present invention is shown, the method specifically includes the following steps,
step 1: the low-speed data flow generates a voice-like signal which can transmit low-speed data in a vocoder channel through a voice-based excitation-formant generation model, and the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
specifically, the encryption and decryption operation is used for realizing the secret transmission of low-speed data, a stream cipher algorithm is adopted, the encryption and decryption operation also comprises the following steps,
generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a key sequence number frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
In particular, the key k distributed at the transmitting end through the upper layersGenerating a corresponding key group sequence, sequencing according to the serial number, and generating a random key stream k with the same bits as the data by each segment according to the sub-keys of the serial number corresponding to the key groupiAnd carrying out XOR operation with the low-speed data to obtain the encrypted data stream.
Obtaining the encrypted segmented data stream and the corresponding key group serial number at the receiving end, and obtaining the corresponding sub-key according to the serial number,generating a keystream kiAnd decrypting to obtain the transmitted low-speed data. The key sequence number is used for updating a key used by the segmented ciphertext data stream.
Setting M bits transmitted by each frame and M data to be encrypted at a transmitting endi(i 1.. said., m), the encrypted data is Ci(i ═ 1.. multidata., m), the receiving end receives the encrypted data as C'i(i ═ 1.. multidata., M), the decrypted data is M'i(i ═ 1.. multidot.m), M 'should be obtainable'i=MiAnd then:
Figure BDA0002838041850000041
Figure BDA0002838041850000042
the framing and deframing operation is used for framing and integrating data, and comprises the steps of adding a blank frame and a channel detection frame at a sending end, framing the data and adding a generated key sequence number for the voice-like modulation operation; and providing a channel detection result and generating a key sequence number for decryption operation at a receiving end, and integrating the data frames.
The method comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for referencing the word interval and the frequency point amplitude of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition. Referring to the schematic diagram of fig. 2, a frame structure format of each signal frame is shown, which is composed of a blank frame of T milliseconds, a channel sounding frame and n data frames, each signal frame contains n +2 frame data, and each frame time is T × n +2 milliseconds.
Specifically, the blank frame is used for energy detection of a synchronous channel vocoder, the channel sounding frame is used for a receiving end to detect the distortion condition of each formant frequency point of a channel, and each frame of the data frame comprises NfEach formant frequency point contains kbit data, and a single data frame contains NfK bits data, where mbit is the serial number of the transmission key, then each signal frame is transmittedTotal data amount s (t) ═ NfK-m) nbit, and therefore its transmission rate v (t) is:
v(t)=S(t)/Tall=(Nf*k-m)*n/T*(n+2)(bit/ms)
further, the voice-like modem operation is used to ensure efficient transmission of signals in the vocoder channel. Carrying out voice-like modulation of multi-frequency point amplitude Modulation (MFAK) of a voice-based excitation-formant generation model on the framed data at a sending end, and modulating low-speed data into voice-like data; the voice-like signal transmitted through the vocoder channel is demodulated into framed data at the receiving end. In this embodiment, the quasi-speech modulation operation adopts multi-frequency amplitude modulation, selects the pitch frequency, the initial frequency, the number of formant frequency points, and the position according to the vocoder channel, and performs amplitude modulation based on the formant frequency points in the spectrum according to the frame structure of the signal frame to obtain a quasi-speech signal having general speech signal parameter characteristics.
Further, the bit rate carried by the voice-like signal is greater than or equal to 2.4 Kb/s.
The similar voice modulation of the voice-based excitation-formant generation model comprises a channel detection frame, and the distortion condition of each formant frequency point is detected at a receiving end to be used as the reference of data demodulation. Referring to fig. 3, a schematic diagram of a frequency spectrum of a channel sounding frame is shown, where a difference value of formant frequencies is a pitch frequency, and a magnitude of the pitch frequency is determined according to a sampling rate and a length of a signal frame, and the pitch frequency should be greater than 60Hz and less than 600 Hz.
Let fundamental frequency be Δ f and initial frequency be f0The number of formant frequency points is NfThen each formant frequency is f (i):
f(i)=f0+i*Δf,i=0,1,2,...,Nf-1
the channel detection frame comprises the sum of unit sine waves of each formant frequency during the voice-like modulation, and the number of formant frequency points is NfAnd (4) respectively.
Referring to the schematic diagram of fig. 4, which is a schematic diagram of a frequency spectrum of a single data frame, data in the data frame is amplitude-modulated at a modulation end based on formant frequency points in the frequency spectrum, and each frame packet of the data frameContaining NfEach frequency point contains kbit data, and the gain modulation range is-2k-1~2k-1dB。
Let X (f)i) Is a frequency point fiThe data is subjected to amplitude modulation in a frequency domain to obtain a data frame frequency point fiSpectral amplitude E (f) ofi):
E(fi)=H(fi)*10^(X(fi)/20)
Wherein, H (f)i) In channel sounding frame f for transmitting endiThe spectral amplitude of (d).
The frequency domain signal e (f) of a single data frame is:
Figure BDA0002838041850000061
the corresponding demodulation end demodulates the data according to the unit formant amplitude in the received channel detection frame:
X′(fi)=20*log10(E′(fi)/H′(fi))
wherein, H' (f)i) Detecting f in frame for receiving end channeliThe spectral amplitude of (d).
Step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
It should be noted that the above-mentioned examples only represent some embodiments of the present invention, and the description thereof should not be construed as limiting the scope of the present invention. It should be noted that, for those skilled in the art, various modifications can be made without departing from the spirit of the present invention, and these modifications should fall within the scope of the present invention.

Claims (7)

1. A method of modulating low speed data into a speech-like signal, characterized by: comprises the following steps of (a) carrying out,
step 1: constructing a low-speed data stream to pass through a voice-based excitation-formant generation model, and generating a voice-like signal capable of transmitting low-speed data in a vocoder channel by the low-speed data stream through the model, wherein the voice-like signal comprises an encryption and decryption operation, a framing and unframing operation and a voice-like modulation and demodulation operation;
step 2: generating a key stream by a regularly updated key through a stream cipher algorithm, obtaining a segmented ciphertext data stream by carrying out encryption operation on the segmented ciphertext data stream and a low-speed data stream with a fixed length obtained by segmentation, obtaining a signal frame to be modulated by carrying out framing operation on the segmented ciphertext data stream, a key sequence number and a frame header containing a blank frame and a channel detection frame, and obtaining a voice-like signal with general voice signal parameter characteristics by carrying out voice-like modulation operation on the signal frame based on a voice excitation-formant generation model;
and step 3: and carrying out frame synchronization and voice-like demodulation operations on the voice-like signals received by the demodulation end to obtain framed data, de-framing the framed data, then taking the key sequence number and the encrypted data to obtain a corresponding key, generating a key stream by the key through a stream cipher algorithm, and carrying out decryption operation on the key stream and the encrypted data to obtain a low-speed data stream.
2. The method of modulating low speed data into a speech-like signal as claimed in claim 1, wherein: the similar voice modulation operation adopts multi-frequency point amplitude modulation, selects the fundamental tone frequency, the initial frequency, the number and the position of the formant frequency points according to the vocoder channel, and carries out amplitude modulation based on the formant frequency points in the frequency spectrum according to the frame structure of the signal frame to obtain the similar voice signal with the parameter characteristics of the general voice signal.
3. The method of modulating low speed data into a speech-like signal as claimed in claim 2, wherein: the frame structure of the signal frame comprises a blank frame for detecting the energy of a synchronous channel vocoder, a channel detection frame for detecting the word interval and the frequency point amplitude reference of a synchronous voice system, and a receiving end detects the distortion condition of each formant frequency point in a channel according to the change characteristics of the channel condition.
4. A method of modulating low speed data into a speech like signal as claimed in claim 3, characterized by: the frame structure of the signal frame comprises a blank frame, a channel detection frame and a plurality of data frames, the bit number carried by each data frame is the number of formants multiplied by the modulated bit number of each formant, and the same signal frame comprises the key sequence number of the corresponding data segment.
5. The method of modulating low speed data into a speech-like signal according to claim 4, wherein: the key sequence number is used for updating a key used by the segmented ciphertext data stream.
6. The method of modulating low speed data into a speech-like signal according to claim 5, wherein: the bit rate carried by the voice-like signal is more than or equal to 2.4 Kb/s.
7. The method of modulating low speed data into a speech-like signal according to claim 6, wherein: the encryption and decryption operations may further include,
generating a corresponding sub-key group sequence at a sending end through a key distributed at an upper layer, sequencing according to a serial number, generating a random key stream with the same bit as data by each segment according to the sub-key of the serial number corresponding to the key group, and performing exclusive-or operation on the random key stream and low-speed data to obtain an encrypted data stream;
and obtaining the encrypted data stream and the corresponding key group serial number at a receiving end, obtaining a corresponding sub-key according to the serial number, generating a key stream for decryption, and obtaining the transmitted low-speed data.
CN202011482696.8A 2020-12-16 2020-12-16 Method for modulating low-speed data into voice-like signal Active CN112614498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011482696.8A CN112614498B (en) 2020-12-16 2020-12-16 Method for modulating low-speed data into voice-like signal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011482696.8A CN112614498B (en) 2020-12-16 2020-12-16 Method for modulating low-speed data into voice-like signal

Publications (2)

Publication Number Publication Date
CN112614498A true CN112614498A (en) 2021-04-06
CN112614498B CN112614498B (en) 2024-02-06

Family

ID=75239603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011482696.8A Active CN112614498B (en) 2020-12-16 2020-12-16 Method for modulating low-speed data into voice-like signal

Country Status (1)

Country Link
CN (1) CN112614498B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113270105A (en) * 2021-05-20 2021-08-17 东南大学 Voice-like data transmission method based on hybrid modulation
CN116366169A (en) * 2023-06-01 2023-06-30 浙江大学 Ultrasonic channel modeling method, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020094081A1 (en) * 2001-01-16 2002-07-18 Alexander Medvinsky System for securely communicating information packets
KR20030083101A (en) * 2002-04-19 2003-10-30 한국전자통신연구원 Real time voice packet encryption/decryption system and encrypting/decrypting method using the same
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN102006593A (en) * 2010-10-29 2011-04-06 公安部第一研究所 End-to-end voice encrypting method for low-speed narrowband wireless digital communication
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020094081A1 (en) * 2001-01-16 2002-07-18 Alexander Medvinsky System for securely communicating information packets
KR20030083101A (en) * 2002-04-19 2003-10-30 한국전자통신연구원 Real time voice packet encryption/decryption system and encrypting/decrypting method using the same
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN102006593A (en) * 2010-10-29 2011-04-06 公安部第一研究所 End-to-end voice encrypting method for low-speed narrowband wireless digital communication
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘影彤: "关于移动通信端到端语音加解密方案研究", 《中国优秀硕士学位论文全文数据库(信息科技辑)》, pages 136 - 729 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113270105A (en) * 2021-05-20 2021-08-17 东南大学 Voice-like data transmission method based on hybrid modulation
CN113270105B (en) * 2021-05-20 2022-05-10 东南大学 Voice-like data transmission method based on hybrid modulation
CN116366169A (en) * 2023-06-01 2023-06-30 浙江大学 Ultrasonic channel modeling method, electronic device and storage medium
CN116366169B (en) * 2023-06-01 2023-10-24 浙江大学 Ultrasonic channel modeling method, electronic device and storage medium

Also Published As

Publication number Publication date
CN112614498B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN112614498B (en) Method for modulating low-speed data into voice-like signal
JPH06501139A (en) Cryptographic system resynchronization during handoff
US4179586A (en) System of encoded speech transmission and reception
CN109346092A (en) The system and method for voice encryption communication is carried out between a kind of communication terminal
KR960008031B1 (en) Encryption system for digital cellular communications
Raheema et al. Performance Comparison of Hybrid Chaotic Maps Based on Speech Scrambling for OFDM Techniques
Ryan et al. Communications and information systems
Krasnowski et al. Introducing a novel data over voice technique for secure voice communication
Biancucci et al. Secure data and voice transmission over GSM voice channel: Applications for secure communications
CN111818522A (en) Voice call encryption method and device
CN115694990A (en) Voice transmission system based on network encryption
JPH09214636A (en) Method and device for voice communication imbedded with data
JP3459074B2 (en) Method and apparatus for enhanced security enhancement of a private key to a lookup table to improve security of wireless telephone messages
Chen et al. End-to-end speech encryption algorithm based on speech scrambling in frequency domain
CN113270105B (en) Voice-like data transmission method based on hybrid modulation
EP0377687A1 (en) Spectrally efficient method for communicating an information signal
CN109346090A (en) A method of penetrating vocoder
WO2009074711A1 (en) Speech data encryption and decryption
Čubrilović et al. Evaluation of improved classification of speech-like waveforms used for secure voice transmission
CN113645613B (en) Cellular mobile network real-time voice encryption equipment and method
JPH04304727A (en) Data ciphering device, data decoder and data ciphering decoder
KR100634495B1 (en) Wireless communication terminal having information secure function and method therefor
KR100408516B1 (en) Terminal for secure communication in CDMA system and methods for transmitting information using encryption and receiving information using decryption
Chen et al. A r-ask ofdm modulation and demodulation scheme against vocoder compression
JP2003032382A (en) Voice communication device with caption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant