Safety communication method for voice information

A technology for secure communication and voice information, applied in the field of communication

Inactive Publication Date: 2012-10-17
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a method for safe communication of voice information aiming at the security problems currently existing in voice communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety communication method for voice information
  • Safety communication method for voice information
  • Safety communication method for voice information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] A method for safe communication of voice information, including two parts: a voice sending process and a voice receiving process, and its realization process is as follows: figure 1 shown. In the method, unless otherwise specified, "n-bit" represents n binary digits.

[0068] Step 1. The sending end obtains the voice to be sent and processes the audio file to generate the audio file of the voice to be sent embedded with the secret voice. details as follows:

[0069] Step 1.1: Collect voice

[0070] This step may be to obtain the existing voice and audio files of the system, or to record the user's voice and audio to obtain the recorded audio files. The acquired audio files are called Secret Voices. For example, we collected the 341KB WAV format audio file info.wav.

[0071] Step 1.2: Encode the secret voice info.wav for compressing the secret voice to save subsequent communication overhead. The encoding process is as follows:

[0072] Step (1): For the secret vo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety communication method for voice information. The hiddenness of communication is guaranteed through a discrete cosine transform domain embedding algorithm based on coefficient quantization. A secret voice is encrypted through a selective chaotic encryption algorithm, and only few key bits in audio frequency are encrypted in the encryption process, so that the encryption efficiency is greatly improved, and the confidentiality of the content in the secret voice is guaranteed. The completeness of the content in the secret voice is judged by calculating and comparing a robust message authentication code of the secret voice. While the hiddenness of voice communication is guaranteed, the confidentiality and the completeness of the voice communication content are ensured, and the safe voice communication is realized.

Description

technical field [0001] The invention relates to the technical field of voice communication information security, in particular to a communication method capable of simultaneously ensuring the concealment of voice communication itself and the confidentiality and integrity of voice communication content. Background technique [0002] At present, voice communication has been everywhere around us. With the continuous development of smart phones, mobile communication technology, and multimedia technology, many voice chat software such as Michat, TalkBox, and WeChat have emerged around people, which are presented to people as a new communication method. However, voice chat software such as Michat and WeChat do not consider security issues, but only guarantee the usability of the software. This poses a great threat to communication privacy, and also limits the application of this communication method in commercial, military and other environments that require strict confidentialit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/00H04L9/00
Inventor 于立涛祝烈煌谢驭舟刘丹
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products