EP2178235A1 - Verschlüsselung von Informationssignalen - Google Patents

Verschlüsselung von Informationssignalen Download PDF

Info

Publication number
EP2178235A1
EP2178235A1 EP08390001A EP08390001A EP2178235A1 EP 2178235 A1 EP2178235 A1 EP 2178235A1 EP 08390001 A EP08390001 A EP 08390001A EP 08390001 A EP08390001 A EP 08390001A EP 2178235 A1 EP2178235 A1 EP 2178235A1
Authority
EP
European Patent Office
Prior art keywords
subbands
signal
subband
encryption
filters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP08390001A
Other languages
English (en)
French (fr)
Other versions
EP2178235B1 (de
Inventor
Anastasis c/o SignalGeneriX Ltd. Kounoudes
Demosthenis c/o SignalGeneriX Ltd. Doumenis
Nikolaos c/o SignalGeneriX Ltd. Doukas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SignalGeneriX Ltd
Original Assignee
SignalGeneriX Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SignalGeneriX Ltd filed Critical SignalGeneriX Ltd
Priority to AT08390001T priority Critical patent/ATE527768T1/de
Priority to EP08390001A priority patent/EP2178235B1/de
Publication of EP2178235A1 publication Critical patent/EP2178235A1/de
Application granted granted Critical
Publication of EP2178235B1 publication Critical patent/EP2178235B1/de
Priority to CY20111101254T priority patent/CY1112183T1/el
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band

Definitions

  • the invention relates to techniques for encrypting and decrypting information signals, for example digital voice signals. More particularly, the invention relates to the encryption and decryption of information signals based on polyphase filter banks.
  • voice encryption technologies are often provided as a separate unit (an 'add-on' device) to communication devices such as mobile phones.
  • an analogue voice signal is captured by a microphone, digitized and input into the encryption add-on.
  • the add-on outputs the encrypted voice signal to the mobile phone.
  • the encrypted signal is then transmitted via a mobile network to the receiving party, which may be another mobile phone.
  • the encrypted signal is provided to a decryption add-on, which reverts the encryption and outputs the decrypted signal, for example back to the mobile phone.
  • One conventional technique for voice encryption is the subband analysis of speech signals by using polyphase filters and the encryption of the signal via permutation of individual subbands.
  • such technology may avoid a complex synchronization procedure such as a key exchange between encryption device and decryption device.
  • existing implementations of encryption and decryption devices based on polyphase filter banks typically lead to a considerable deterioration of speech quality which is due to the fact that an optimal reconstruction of the original voice signal is not achieved.
  • confidentiality is compromised from time to time or depending on individual speakers, which appears to be due to the fact that the permutation of subbands as performed in the current implementations is not sufficient, such that the speech remains recognizable for at least some parts of the communication.
  • the method comprises the steps of splitting, based on multiple analysis subband filters, an input information signal into a set of signal subbands; performing an encryption operation on one or more subbands of the set of subbands; and synthesizing, based on multiple synthesis subband filters, the encrypted set of subbands into an output information signal, wherein a particular synthesis filter is the product of all analysis filters except the analysis filter corresponding in subband to the particular synthesis filter.
  • each of the synthesis filters of the synthesis filter bank is configured in this way.
  • a method of decrypting information signals comprises the steps of splitting, based on multiple analysis subband filters, an input information signal into a set of signal subbands; performing a decryption operation on one or more subbands of the set of subbands; and synthesizing, based on multiple synthesis subband filters, the decrypted set of subbands into an output information signal, wherein a particular synthesis filter is the product of all analysis filters except the analysis filter corresponding in subband to the particular synthesis filter.
  • each of the synthesis filters of the synthesis filter bank is configured in this way.
  • the above methods may be applied to any kind of digital (or analogue) information signal including for example digital audio signals or digital voice or speech signals.
  • the signal subbands may be interleaved subbands.
  • the analysis and/or synthesis subband filters in both the above-outlined methods may be polyphase subband (component) filters.
  • the analysis subband filters may be chosen such that the product of all analysis subband filters is all-pass, i.e. an input information signal would pass a filter implementing the product of all analysis subband filters essentially unchanged.
  • the multiple analysis filters may be derived from a single prototype subband filter.
  • the configuration of the particular synthesis filter may be simplified.
  • the prototype subband filter may for example be a (proprietary or standardized) low pass finite impulse response filter.
  • the analysis / synthesis subband or component filters may be derived from the prototype filter using, e.g., a factorization technique.
  • the number of signal subbands can be varied in time.
  • the time variation (or non-uniformity) of the signal subbands may be selected according to a complexity of the information to be encrypted or decrypted, which may be based on a measure of an energy distribution of the input information signal in frequency.
  • the number of signal subbands may be chosen such that the bit distribution of the encoding is proportional to the complexity of information.
  • the analysis filters and correspondingly the synthesis filters may be adapted accordingly.
  • the encryption or decryption operation may comprise transforming the signal subbands into frequency subbands. For example, a Fourier transformation, Laplace transformation or Z-transformation may be performed. A corresponding inverse or back transformation may also be included in the encryption (decryption) operation.
  • the analysis transformation may be an inverse Fourier or Z-transformation, while the synthesis transformation is a corresponding back transformation.
  • the encryption or decryption operation may comprise a permutation of at least two subbands.
  • two or more frequency subbands may be permuted.
  • the permutation of subbands may be varied in time.
  • the subbands to be currently permuted may either be signalled from an encrypting device to a decrypting device, or the permutation may be controlled by a control scheme which is in the same way or similarly implemented in both devices.
  • a permutation of subbands may be based on a signal energy contained therein. For instance, the two subbands containing most of the signal energy may be permuted with each other. This permutation could be reverted in the decryption operation.
  • the encryption operation may comprise replacing at least one subband by noise.
  • the noise has to be configured such that the output information signal is unrecognisable with high probability.
  • a corresponding decryption operation may comprise removing noise from at least one subband based on, for example, the detection that a noise level in a subband exceeds a predetermined threshold or the detection of a pre-defined, particular signature imprinted on the noise by the encryption operation.
  • This method comprises the steps of splitting, based on multiple analysis subband filters, an input information signal into a set of signal subbands; performing an encryption operation on one or more subbands of the set of subbands, wherein the encryption operation comprises replacing at least one subband by noise; and synthesizing, based on multiple synthesis subband filters, the encrypted set of subbands into an output information signal.
  • a corresponding method for decrypting information signals comprises the steps of splitting, based on multiple analysis subband filters, an input information signal into a set of signal subbands; performing a decryption operation on one or more subbands of the set of subbands, wherein the decryption operation comprises removing noise from at least one subband; and synthesizing, based on multiple synthesis subband filters, the decrypted set of subbands into an output information signal.
  • a computer program product which comprises program code portions for performing the steps of one or more of the methods and method aspects described herein when the computer program product is executed on one or more computing devices, for example one or both of an encryption device and a decryption device.
  • the computer program product may be stored on a computer readable recording medium, such as a permanent or rewriteable memory within or associated with a computing device or a removable CD-ROM, DVD or USB-stick. Additionally or alternatively, the computer program product may be provided for download to a computing device, for example via a data network such as the Internet or a communication line such as a telephone line or wireless link.
  • an encryption device for encrypting information signals.
  • the device comprises a component adapted to split, based on multiple analysis subband filters, an input information signal into a set of signal subbands; a component adapted to perform an encryption operation on one or more subbands of the set of subbands; and a component adapted to synthesize, based on multiple synthesis subband filters, the encrypted set of subbands into an output information signal, wherein a particular synthesis filter is the product of all analysis filters except the analysis filter corresponding in subband to the particular synthesis filter.
  • the above-mentioned demand is also satisfied by a decryption device for decrypting information signals.
  • the decryption device comprises a component adapted to split, based on multiple analysis subband filters, an input information signal into a set of signal subbands; a component adapted to perform a decryption operation on one or more subbands of the set of subbands; and a component adapted to synthesize, based on multiple synthesis subband filters, the decrypted set of subbands into an output information signal, wherein a particular synthesis filter is the product of all analysis filters except the analysis filter corresponding in subband to the particular synthesis filter.
  • a further encryption device for encrypting information signals.
  • This device comprises a component adapted to split, based on multiple analysis subband filters, an input information signal into a set of signal subbands; a component adapted to perform an encryption operation on one or more subbands of the set of subbands, wherein the encryption operation comprises replacing at least one subband by noise; and a component adapted to synthesize, based on multiple synthesis subband filters, the encrypted set of subbands into an output information signal.
  • a corresponding device for decrypting information signals also satisfies the above demand and comprises a component adapted to split, based on multiple analysis subband filters, an input information signal into a set of signal subbands; a component adapted to perform a decryption operation on one or more subbands of the set of subbands, wherein the decryption operation comprises removing at least one subband which represents noise; and a component adapted to synthesize, based on multiple synthesis subband filters, the decrypted set of subbands into an output information signal.
  • an encryption (decryption) device comprising the encryption device as outlined above and the decryption device as outlined above.
  • the encryption (decryption) device may be adapted to the encryption (decryption) of voice or speech signals and may be particularly configured as an add-on device for mobile phones.
  • the abovementioned demand is still further satisfied by a communication device, wherein the communication device comprises at least one of the encryption device and the decryption device as outlined above.
  • the communication device may comprise a mobile phone, wherein the encryption device and/or decryption device may be implemented as hardware, software, or a combination thereof.
  • Another implementation of the communication device comprises a headset connectable to a mobile phone.
  • the headset may be an external headset with processing capabilities for connection with a mobile phone via Bluetooth or a similar wireless connection technique.
  • any of the above-outlined devices may be implemented based on an FPGA (Field-Programmable Gate Array). Additionally or alternatively, at least a portion of a circuitry of any one of the above-outlined devices may be adapted for parallel processing. For example, the parallel processing may be realized based on the aforementioned prototype subband filter.
  • An implementation of the above-mentioned headset may comprise an encryption and/or decryption device implemented on an FPGA with parallel processing capabilities.
  • the techniques described below may not only be applied to encryption and decryption of digital voice or speech signals, but to any kind of audio signals or more generally information signals including, for example, video signals, facsimilie data, electronic files (file transfer) or electronic data. Besides that, the techniques described herein may not only be used in conjunction with digital signal processing, but also analogue signal processing.
  • an encryption and/or decryption device may also be implemented purely software-based depending on the processing capabilities of current or future general purpose processing hardware available for, e.g., mobile phones.
  • Fig. 1 illustrates an embodiment of a system 100 for the encryption and decryption of digital audio signals.
  • the system comprises an analogue audio input device 102, an Analogue-to-Digital(A/D) unit 104, an encryption device 106 and a cellular phone 108 in communication via a mobile network 110 with a receiving mobile phone 112, a decryption device 114, a Digital-to-Analogue (D/A) unit 116 and an analogue audio output device 118.
  • the audio input device 102 may be a microphone, while the audio output device 118 may be a loudspeaker.
  • the encryption device 106 may be a hardware add-on which may or may not be specifically adapted to the mobile phone 108.
  • the encryption device 106 may be connected to a conventional interface to the mobile phone 108, such as a headset interface as it is conventionally used for hands-free operation of mobile phones. In this way, the encryption device may replace a headset or may be connected in between the headset and the mobile phone.
  • the A/D-unit 104 may be provided on a common hardware with either one or both of the microphone 102 and encryption device 106 or may be provided as a stand-alone unit.
  • the audio input 102 may be a microphone integrated in mobile phone 108.
  • a user speaks into the audio input device 102, which generates an analogue electrical representation of the voice or speech input.
  • the electrical signal is provided to the A/D-unit 104, which samples the signal and generates a digital representation 120 thereof.
  • the digital voice signal 120 is input to the encryption device 106, which encrypts the signal as will be described in detail further below.
  • the encrypted output signal 122 is provided to the mobile phone 108 in digital or analogue form. In the embodiment described here it is assumed that the encryption device 106 outputs digital encrypted voice signals.
  • the signal 122 provided to the mobile phone 108 is transmitted via the mobile network 110 towards the receiving party, i.e. mobile phone 112. From there, the received encrypted voice signal is forwarded 124 to the decryption device 114. It depends on the details of the implementation whether the received encrypted voice signal 124 is provided to the decryption device 114 in digital or analogue form. In the embodiment described here, it is assumed that the signal 124 is input to the decryption device as a digital signal.
  • the decryption device 114 decrypts the encrypted voice signal 124.
  • the decrypted voice signal 126 is fed to the D/A-unit 116 which provides an analogue representation of the audio signal 126 to the audio output 118.
  • the decryption device 114 may, for example, be connected in between the mobile phone 112 and a headset which includes the D/A-unit 116 and audio output 118.
  • the D/A-unit 116 may be implemented on a common hardware with the decryption device 114.
  • the audio output 118 may be a loudspeaker 118 integrated in mobile phone 112.
  • Any of the encryption device 106 and the decryption device 114 may, for example, be implemented on an FPGA platform and may, depending on the concrete operational environment, include A/D-converter and/or D/A-converter, although these are illustrated as separate units in Fig. 1 .
  • An encryption device (decryption device) may further comprise various connectors for microphone, earphones, USB port, Ethernet interface, RS-232 port, etc.
  • Fig. 2 illustrates functional building blocks of the encryption device 106 of Fig. 1 .
  • the input voice signal 120 is processed by an analysis filter bank 204, a scalar-to-vector conversion unit 206, a transformation component 208, a permutation component 210 and a noise generator 212 associated therewith, a further transformation component 214, a vector-to-scalar conversion unit 216 and a synthesis filter bank 218, which outputs the encrypted audio signal 122 (cf. Fig. 1 ).
  • the encryption device 106 operates to encrypt digital information signals, more particularly the digital voice signal 120.
  • an input information signal may be an analogue signal.
  • An encryption device may then comprise an A/D-unit similar to A/D-unit 104 of Fig. 1 .
  • the input voice signal 120 is provided to the analysis filter bank 204, which operates to split the input voice signal 120 into a set of signal subbands.
  • the filter bank 204 is a polyphase filter bank comprising multiple analysis subband filters (component filters) generating a set of interleaved subbands. While in the example illustrated in Fig. 2 the input signal 120 is split into 16 subbands 220, in other embodiments a smaller or larger number of subbands may be configured.
  • the multiple analysis filters of the filter bank 204 may be derived from a single prototype subband filter, which may be a standardized or a proprietary lowpass finite impulse response (FIR) filter.
  • the desired number of analysis subband filters (polyphase component filters) may be derived therefrom by using a factorization technique.
  • step 304 at least one encryption operation is performed on one or more subband of the set of subbands 220 generated by the filter bank 204. Details on the encryption operations will be described with reference to Fig. 6 further below.
  • an encrypted set of subbands 222 is provided to the synthesis filter bank 218, which operates to synthesize the encrypted set of subbands 222 into the output voice signal 122.
  • the filter bank 218 may be configured similarly as the analysis filter bank 204, i.e. may also be a polyphase filter bank comprising multiple (synthesis) subband filters.
  • the synthesis filters are adjusted in a way complementary to the analysis filters of filter bank 204. Specifically, each of the synthesis filters is a product of all analysis filters of filter bank 204 except the analysis filter which corresponds in subband to the particular synthesis filter. The reasons for this choice will be discussed with reference to Figs. 8a-8d .
  • Fig. 4 illustrates functional building blocks of the decryption device 114 of Fig. 1 .
  • the encrypted input voice signal 124 is processed by an analysis filter bank 402, a scalar-to-vector conversion unit 404, a transformation component 406, a permutation component 408, a noise remover 410, a further transformation component 412, a vector-to-scalar conversion unit 414 and a synthesis filter bank 416, which outputs the decrypted audio signal 126 (cf. Fig. 1 ).
  • the decryption device 114 operates to decrypt digital information signals, more particularly the digital voice signal 124.
  • an encrypted input information signal may be an analogue signal.
  • a decryption device may then comprise an A/D-unit.
  • the components 402 - 416 may be configured similar in various aspects to the components 204 - 218 of the encryption device 106. A repetition of such aspects is therefore omitted.
  • the analysis filter bank 402 operates to split the (encrypted) input voice signal 124 into a set of signal subbands.
  • the analysis subband filters of the filter bank 402 may be configured similar to the filters of filter bank 204 in the encryption device 106. For example, the same prototype filter may be used to derive the filters for the banks 204 and 402 therefrom.
  • at least one decryption operation is performed on one or more of the set of subbands 418 output by the analysis filter bank 402. Details on the decryption operations will be described with reference to Fig. 7 below.
  • step 506 the decrypted set of subbands 420 is provided to the synthesis filter bank 416, which operates to synthesize, based on multiple synthesis subband filters, the decrypted set of subbands 420 into the decrypted output voice signal 126 (cf. Fig. 1 ).
  • Fig. 6 illustrates encryption operations which may be performed in the course of step 304 of Fig. 3 and which are described taking reference of the encryption device 106 in Fig. 2 .
  • the signal subbands generated in filter bank 204 are transformed into frequency subbands.
  • the scalar-to-vector conversion unit 206 converts the signal subbands 220 into a vector 224 which is then input into the transformation component 208.
  • This component performs an Inverse Discrete Fourier Transformation (IDFT) of the input vector 224.
  • IDFT Inverse Discrete Fourier Transformation
  • the resulting output is a set of frequency subbands 226.
  • the scalar-to vector conversion unit 206 operates to specifically configure the subbands 220 for input to the IDFT component 208.
  • a component different from unit 206 may be provided.
  • no component at all may be provided and the subbands generated by the filter bank may be input directly into a transformation component. Similar considerations hold for the vector-to-scalar conversion unit 216 discussed below.
  • the permutation component 210 performs a permutation of at least two of the set of subbands 226.
  • This permutation may be performed the same all the time or may be varied in time during the operation of the encryption device 106.
  • a time variation of the permutation may be performed following a fixed predefined scheme and/or may be controlled dependent on properties of the voice signal to be encrypted.
  • a signal energy may be detected for at least a subset of the set of frequency subbands. Permutations may then, for example, be performed on those subbands containing most of the signal energy. This will in typical situations lead to an appropriate encryption of voice or similar information carrying signals, as an insufficient scrambling due to a permutation of empty subbands is avoided.
  • the permutation process may be easily reverted in the decryption device without the need for an extra signalling.
  • a permutation of the two subbands containing most of the signal energy Performing exactly the same processing in the decryption device would revert the permutation and would in this way decrypt the encrypted signal.
  • parameters for properly controlling a decryption may be signalled to the decryption device. Such signalling may be performed in-line, i.e. embedded within the encrypted information signal, or in any other way.
  • the noise generator 212 operates to replace at least one of the frequency subbands 226 by noise.
  • the noise may be, for example, white noise which may or may not be randomly generated.
  • An intensity of the noise has to be sufficient such that the speech signal becomes unrecognizable and that cryptoanalytic attacks on the encrypted information signal are prevented.
  • the noise intensity may be predetermined or may be controlled based on, for example, a signal energy measured from one or more of the subbands or the input information signal 120. For instance, the signal energies measured for controlling a permutation process may also be used for controlling the noise to be injected into the signal.
  • an in-line signalling may be imprinted on the noise in order that the decryption device may properly control a decryption, as discussed above.
  • the subband(s) to be replaced by noise may be fixed.
  • a frequency subband known to generally carry low signal energy for the case of human speech may be chosen.
  • one or more subbands containing a signal energy below a predetermined threshold or containing the lowest signal energy in the set of subbands may be selected for noise injection.
  • step 608 the transformation component 214 perform the inverse transformation to the transformation performed by the transformation component 208.
  • the transformation component 214 performs a Discrete Fourier transformation (DFT).
  • DFT Discrete Fourier transformation
  • the resulting vector 230 is fed to the vector-to-scalar conversion unit 216 which outputs the encrypted set of signal subbands 222 to the synthesis filter bank 218, as has been described already above.
  • subband permutation and noise injection may be performed in any order and may also be performed in parallel to each other.
  • an encryption device may perform only one of these operations.
  • a particular encryption device may only perform the subband permutation or may only perform noise injection.
  • Still other encryption devices may be set into different confidentiality modes according to a desired confidentiality level (security level). Such a level may be measured, for example, by estimates of the efforts (processing power) required for an attacker to decrypt the encrypted information signal.
  • the device confidentiality modes may differ from each other by switching on or off or configuring in different ways one or more of the above encryption operations.
  • such a multi-mode encryption (or decryption) device may be manually or automatically adjusted to its decryption (or encryption) counterpart, which may be of a different model series etc., at the other end of the communication line.
  • Fig. 7 illustrates decryption operations which may be performed in the course of step 504 of Fig. 5 and which are described taking reference of the decryption device 114 of Fig. 4 . It is generally to be noted that many units and components of the decryption device 114 may operate similarly to the corresponding units and components of the encryption device 106 (in some embodiments, all units and components may operate similar). In particular, the filter banks 402 and 416 of device 114 may exactly correspond to the filter banks 204 and 218 of device 106.
  • step 702 the encrypted signal subbands 418 are transformed into frequency subbands.
  • the components 404 and 406 of the encryption device 114 may operate similar to the components 206 and 208 of the encryption device in Fig. 2 ; therefore the detailed description of step 602 applies similarly also to the components 404 and 406.
  • the output of the transformation component 406 is a set of frequency subbands 422.
  • the permutation component 408 operates to perform a permutation of at least two subbands from the set of subbands 422. In order for a successful decryption, the permutation performed by the permutation component 210 in the encryption device 106 has to be reverted. How to correctly reverse the permutation process performed in the encryption device 106 depends on the details thereof.
  • the reverse permutation scheme will also be a fixed scheme, and may even be exactly the same scheme.
  • the component 408 may apply a similar scheme, however, some time synchronization would then be required between components 210 and 408.
  • a more extensive signalling would be required which indicates the momentary permutation configuration to the permutation component 408.
  • Such signalling mechanism may comprise in-line signalling, which may for example be imprinted on the noise by the noise generator 212 in Fig. 2 .
  • both the permutation components 210 and 408 may determine parameters from the (encrypted) signal in the same way. This requires that parameters are used as permutation control parameters which are not changed by the permutation or any other encryption operations.
  • the signal energy contained in each of the frequency subbands may be determined. This parameter set will not be changed by permutation, and noise injection may preferably only affect low energy subbands.
  • the encryption permutation comprises permuting the two frequency bands containing most of the signal energy, this can be reverted in the decryption stage without any signalling.
  • the permutation component 408 may act exactly similar as the permutation component 210 in order to revert the permutation performed therein.
  • the noise remover 410 operates to remove noise from those subbands to which noise has been added by the noise generator 212 in the encryption device 106.
  • the noise remover 410 may replace noise by silence (zero signal energy) in these subbands.
  • the noise remover 410 has to detect the one or more subbands of the set of subbands 422 which contain noise.
  • the component 410 requires decision logic in this respect in order to decide whether a subband is filled, for example, by white noise.
  • the noise remover 410 may specifically search for such noise ID in the set of frequency subbands 422. In case such a noise ID is detected in a frequency subband, the signal in this subband is replaced by silence.
  • step 708 the transformation components 412 and 414 act to back-transform the decrypted frequency subbands 424.
  • the back transformation may be performed in a way as has been described with reference to the components 214 and 216 of the encryption device 106; this description may therefore be referred to.
  • steps 704 and 706 may be performed in any order, parallel to each other, or only one of these steps may be performed.
  • the corresponding discussion of steps 604 and 606 is referred to.
  • the analysis and synthesis of the unencrypted voice signal in the encryption device 106 and of the encrypted voice signal in the decryption device 114 may be performed in the same way. Therefore, while for the sake of brevity in the following it is only referred to the analysis filter bank 204 and synthesis filter bank 218 of the encryption device 106, it is to be understood that these considerations hold similarly for the analysis filter bank 402 and the synthesis filter bank 416 of the decryption device 114.
  • the synthesis subband filters are configured complementary to the analysis subband filters. More specifically, one or more of each of the filter functions for the synthesis subband filters may be configured as the product of all filter functions of the analysis filters except the filter function for the analysis filter corresponding in subband to the synthesis filter to be configured. A derivation is presented in the following proving plausibility of this concept.
  • the concept that a particular synthesis filter should be the product of all analysis filters except the analysis filter corresponding in subband to the particular synthesis filter can be formulated as:
  • the kth polyphase component in the synthesis filter bank should be H/Ek.
  • Fig. 8a schematically illustrates a signal processing system accepting a digital input signal x [n] and providing an output signal y [n].
  • F 1 (z), F 2 (z), ..., F M (z) u[n].
  • x[n] y[n] (ignoring factors of 1/M).
  • the filter functions have to satisfy the condition that ⁇ i ⁇ F i z is all-pass.
  • Fig. 8b illustrates the system of Fig. 8a wherein the filter functions F(z) have been rearranged. Still, the system behaviour is all-pass. An identity matrix may be inserted at the point A indicated in Fig. 8b , which also leaves the operation of the system unchanged.
  • the filter bank (set of analysis filters) 204 of the device 106 is represented by the set of filters 804 in Fig. 8d
  • the filter bank 218 is represented by the set of filters 806 in Fig. 8d
  • the synthesis filters 806 are complementary to the analysis filters 804.
  • the synthesis filter corresponding to the analysis filter E 0 i.e. the synthesis filter which corresponds to the analysis filter in the 0 th subband
  • the synthesis filter corresponding to the analysis filter E 1 is E 0 E 2 ... E M-1
  • the synthesis filter corresponding to the analysis filter E M-1 is E 0 E 1 ,.. E M-2 .
  • the synthesis filters 806 can be constructed based only on the prototype E in order to achieve an optimal reconstruction of the original input information signal x[n].
  • the signal subbands can be varied in time, i.e. non-uniform filter banks can be realized, wherein the bit distribution of the encoding is proportional to the complexity of the information carried in each subband.
  • the signal subbands may be varied in time based on an energy distribution of the information signal in frequency.
  • the signal subbands may be varied in time according to a predefined scheme, which would have to be known to the receiver also.
  • a time-variation in a non-uniform filter bank one or more of the vertical stages of the analysis and synthesis filter banks may be omitted leading to 1 ⁇ 2 or 1 ⁇ 4 of the resolution.
  • the techniques proposed herein allow an optimized reconstruction of the original information signal after encryption and decryption. This is based on the fact that the filters used in the synthesis phase of the encryption and decryption devices are configured complementary to the filters used in the analysis phase, and this avoids alias components appearing in the synthesized signal.
  • the complementary approach allows a simplified construction of the synthesis filters, which are based on the analysis filters.
  • a prototype (or sample or template) filter is used for construction of the analysis filters
  • the construction of the synthesis filters is also particularly simplified.
  • the prototype filter which may be provided e.g. in the form of a hardware implementation, is re-used for all filters of the analysis and synthesis filter banks. This allows a considerable reduction of resource usage, power consumption and size of the encryption or decryption device.
  • employing subband-based technology allows parallel processing which in turn leads to low energy consumption and/or a minimization of latency being an important factor for man-man synchronous communication.
  • the parallel processing may, for example, ensure that latency is uniformly distributed across the frequency spectrum.
  • An FPGA may be used for implementing the parallel processing, which further reduces complexity and power consumption.
  • the number of encoded and encrypted bits may be selected based on, for example, the distribution of signal energy over the frequency spectrum.
  • the proposed techniques allow further optimizations related to a detection and deletion of silence periods in the voice signal.
  • the conventional encryption by frequency permutation often do not lead to a satisfying scrambling of the original signal, which is basically due to the relatively narrowband nature of human speech in a transmission channel.
  • confidentiality can be increased by exploiting the typically non-uniform distribution of energy in the information signal over the frequency spectrum. For example, a signal energy distribution of frequency subbands can be determined. Preferably subbands carrying high signal energy may be permuted. Moreover, it is proposed the option to add noise to subbands, for example subbands of low signal energy. Vice versa, a given desired level of confidentiality may be reached - employing the techniques proposed herein - with less processing efforts, which serves to reduce the processing efforts and required bandwidths. Further, a decryption device may be configured to ignore some of the frequency bands which the device knows to contain noise, which may lead to further savings in terms of processing resources, energy consumption, etc.
  • an encryption/decryption system with a configurable level of security (confidentiality), i.e. a system allowing an adjustment of the complexity of the encryption operation(s).
  • a configurable level of security i.e. a system allowing an adjustment of the complexity of the encryption operation(s).
  • different security levels may be defined based on the number of frequency bands permuted and/or the number of frequency bands which are replaced by noise.
  • the analysis of the (frequency) subbands for example with regard to the distribution of the signal energy, may also be adjusted according to the required security level, i.e. complexity of encryption or decryption operations.
  • an encryption and/or decryption system operating according to the techniques proposed herein may also be implemented on a common hardware with a communication device, for example in a smartphone, notebook, etc.
  • the proposed techniques allow implementing an encryption device, decryption device or combined device on a simplified circuitry with small footprint and which is straightforwardly connectable to a communication device such as a mobile phone and with minimal requirements on processing power, memory and/or power supply. No further external peripheral devices may be needed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
EP08390001A 2008-10-17 2008-10-17 Verschlüsselung von Informationssignalen Active EP2178235B1 (de)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AT08390001T ATE527768T1 (de) 2008-10-17 2008-10-17 Verschlüsselung von informationssignalen
EP08390001A EP2178235B1 (de) 2008-10-17 2008-10-17 Verschlüsselung von Informationssignalen
CY20111101254T CY1112183T1 (el) 2008-10-17 2011-12-16 Κωδικοποιηση πληροφοριακων σηματων

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP08390001A EP2178235B1 (de) 2008-10-17 2008-10-17 Verschlüsselung von Informationssignalen

Publications (2)

Publication Number Publication Date
EP2178235A1 true EP2178235A1 (de) 2010-04-21
EP2178235B1 EP2178235B1 (de) 2011-10-05

Family

ID=40427843

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08390001A Active EP2178235B1 (de) 2008-10-17 2008-10-17 Verschlüsselung von Informationssignalen

Country Status (3)

Country Link
EP (1) EP2178235B1 (de)
AT (1) ATE527768T1 (de)
CY (1) CY1112183T1 (de)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180026533A (ko) * 2015-07-06 2018-03-12 자일링크스 인코포레이티드 가변 대역폭 필터링
US20210288807A1 (en) * 2018-07-10 2021-09-16 Cirrus Logic International Semiconductor Ltd. System and method for performing biometric authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1465923A (en) * 1973-04-03 1977-03-02 Siemens Ag Camouflaged speech signal transmission systems
US4829378A (en) * 1988-06-09 1989-05-09 Bell Communications Research, Inc. Sub-band coding of images with low computational complexity
US4959863A (en) * 1987-06-02 1990-09-25 Fujitsu Limited Secret speech equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1465923A (en) * 1973-04-03 1977-03-02 Siemens Ag Camouflaged speech signal transmission systems
US4959863A (en) * 1987-06-02 1990-09-25 Fujitsu Limited Secret speech equipment
US4829378A (en) * 1988-06-09 1989-05-09 Bell Communications Research, Inc. Sub-band coding of images with low computational complexity

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SMITH M J T ET AL: "EXACT RECONSTRUCTION TECHNIQUES FOR TREE-STRUCTURED SUBBAND CODERS", IEEE TRANSACTIONS ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, IEEE INC. NEW YORK, USA, vol. ASSP-34, no. 3, 1 June 1986 (1986-06-01), pages 434 - 441, XP000828453, ISSN: 0096-3518 *
WADA S ET AL: "SPECTRUM SCRAMBLING BY MEANS OF QMF BANKS FOR SECURE COMMUNICATION", IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS,COMMUNICATIONS AND COMPUTER SCIENCES, ENGINEERING SCIENCES SOCIETY, TOKYO, JP, vol. E78-A, no. 8, 1 August 1995 (1995-08-01), pages 1042 - 1045, XP000536063, ISSN: 0916-8508 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180026533A (ko) * 2015-07-06 2018-03-12 자일링크스 인코포레이티드 가변 대역폭 필터링
JP2018524930A (ja) * 2015-07-06 2018-08-30 ザイリンクス インコーポレイテッドXilinx Incorporated 可変帯域幅フィルタリング
KR102644069B1 (ko) 2015-07-06 2024-03-05 자일링크스 인코포레이티드 가변 대역폭 필터링
US20210288807A1 (en) * 2018-07-10 2021-09-16 Cirrus Logic International Semiconductor Ltd. System and method for performing biometric authentication
US11799657B2 (en) * 2018-07-10 2023-10-24 Cirrus Logic Inc. System and method for performing biometric authentication

Also Published As

Publication number Publication date
ATE527768T1 (de) 2011-10-15
CY1112183T1 (el) 2015-12-09
EP2178235B1 (de) 2011-10-05

Similar Documents

Publication Publication Date Title
KR100734836B1 (ko) 재생가능한 세션 키들을 생성하는 시스템 및 방법
US8855303B1 (en) Cryptography using a symmetric frequency-based encryption algorithm
Al Saad et al. A speech encryption based on chaotic maps
EP2772001B1 (de) Dynamisches verschlüsselungsverfahren
Belmeguenai et al. A novel approach based on stream cipher for selective speech encryption
KR20200135128A (ko) 음성 통신용 대칭형 양자 암호화 키 기반 암호화 장치
Yousif Encryption and decryption of audio signal based on Rsa algorithn
Mosa et al. Encryption of speech signal with multiple secret keys in time and transform domains
Slimani et al. Encryption of speech signal with multiple secret keys
EP2178235B1 (de) Verschlüsselung von Informationssignalen
KR100836942B1 (ko) 음성신호의 인크립션/디크립션 방법과 이를 위한 장치
de Andrade et al. Speech privacy for modern mobile communication systems
Manjunath et al. Speech encryption using circulant transformations
Hermassi et al. A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map
CN106412812A (zh) 一种蓝牙语音通信方法、系统和一种蓝牙耳机
Mossa Security enhancement for AES encrypted speech in communications
US20160173456A1 (en) Dynamic Spectrum Audio Encryption and Decryption Device
CN1585539A (zh) 手机的加密方法
CN102307346A (zh) 手机通信保密方法及保密手机
CN104994500B (zh) 一种用于移动电话的语音保密传输方法及装置
Pekerti et al. Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques
Su et al. Hierarchical selective encryption for G. 729 speech based on bit sensitivity
CN105788602A (zh) 一种用于话音频带压缩系统的语音加密方法和装置
Jameel et al. Transform-domain and DSP based secure speech communication system
CN117979051B (zh) 一种音频防伪方法、设备及介质

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

17P Request for examination filed

Effective date: 20100930

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602008010231

Country of ref document: DE

Effective date: 20111201

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

LTIE Lt: invalidation of european patent or patent extension

Effective date: 20111005

REG Reference to a national code

Ref country code: GR

Ref legal event code: EP

Ref document number: 20110402998

Country of ref document: GR

Effective date: 20120206

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 527768

Country of ref document: AT

Kind code of ref document: T

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120105

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20111031

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120206

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120105

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

26N No opposition filed

Effective date: 20120706

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602008010231

Country of ref document: DE

Effective date: 20120706

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120116

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20111017

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20121031

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20121031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111005

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 9

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 10

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230912

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230912

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GR

Payment date: 20231019

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IE

Payment date: 20231019

Year of fee payment: 16

Ref country code: DE

Payment date: 20231026

Year of fee payment: 16

Ref country code: CY

Payment date: 20230913

Year of fee payment: 16