Real-time speech secret communication system based on information hiding

A technology of information hiding and secure communication, which is applied in the field of real-time voice secure communication system

Inactive Publication Date: 2009-11-11
吴志军 +1
View PDF2 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The difference between its traditional cryptography is that cipher only hides the content of information, whil

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-time speech secret communication system based on information hiding
  • Real-time speech secret communication system based on information hiding
  • Real-time speech secret communication system based on information hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The development of secure communication system based on information hiding technology is a two-way full-duplex communication mode realized in the VC++ environment. The application platform is WindowsXP, and the code of the key algorithm is implemented by standard C, which is easy to be transplanted to the DSP hardware platform.

[0080] 1) Technical indicators

[0081] Technical indicators mainly include: communication rate, delay and bit error rate, etc.

[0082] (1) Communication rate

[0083] In the voice information hiding and confidential communication system, the voice signal sampling rate is 8kbps, and each frame of the transmitted voice signal is 20ms (160 points), which is divided into 4 subframes (each subframe is 5ms). In order to ensure the real-time performance of voice communication, The data communication rate is required to be greater than 12.8kbps.

[0084] (2) Delay

[0085] The requirement for delay can only be a theoretical estimate, and the calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a speech information hiding secret communication system which organically integrates techniques, such as information hiding, passwords, communication, and the like. In the invention, MELP2.4KBps secret speech is hidden in the public speech of G.721, G.728, GSM and G.729 of a code-excited linear prediction code by connecting a public telephone network PSTN, mobile communication GSM/CDMA, videoconferences and a VoIP network and utilizing a speech information hiding and extraction algorithm, and a private channel is established in a public communication channel to carry out the real-time secret communication of secret speech information. The system adopts an embedded type technique based on DSP, and designs corresponding functional modules, such as speech coding and decoding, speech encryption and decryption, speech information hiding and extraction, and the like. Under the condition that a certain communication rate and a certain speech quality are ensured, secret speech real-time communication is carried out on various public channels, and the communication quality reaches the requirement of a communication standard.

Description

technical field [0001] The invention relates to a real-time voice secure communication system utilizing a communication or transmission network, which belongs to the technical field of secure communication in the field of communication and information engineering. Background technique [0002] Since Shannon proposed the method and theory of secure communication in 1949, the technology of analog scrambling and digital encryption has been used in secure communication for nearly 60 years. Its security mainly depends on the result of analog scrambling transformation and the strength of digital encryption algorithm. . The signal on the transmission line appears as noise, which is easy to attract the attention of wiretapping eavesdroppers. With the development of computer technology, the security of traditional secure communication telephones is becoming more and more fragile. The new chaotic secure communication method mainly utilizes the sensitivity of the chaotic system to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32H04L12/22H04L1/00H04K1/00
Inventor 吴志军杨伟
Owner 吴志军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products