IP voice steganography method based on speed modulation

A speed and voice technology, applied in the field of covert communication, which can solve the problems of personal privacy theft and abuse, communication content theft or tampering, etc.

Active Publication Date: 2014-10-08
HUAQIAO UNIVERSITY
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while it brings great convenience to human beings, it also brings various security risks and hidd...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP voice steganography method based on speed modulation
  • IP voice steganography method based on speed modulation
  • IP voice steganography method based on speed modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below through specific embodiments.

[0039] The present invention is applicable to any speech coder with variable rate coding function, such as ITUG.722.1, ITUG.723.1, IETFiLBC, GSMRTE-LTP and AMR, etc., and the widely used ITUG.723.1 speech coding will be taken as an example below, combined with the attached Figure further illustrates the present invention.

[0040] The processing flow of the present invention is as attached figure 1 As shown, it includes the pre-negotiation step, the step of embedding secret information and the step of extracting secret information.

[0041] 1. Pre-agreement steps: The communication parties pre-agreed that the speech coder used in the communication process is ITUG.723.1; agree to use low rate (5.3kbit / s) and high rate (6.3kbit / s) for voice communication, and use the high rate (6.3kbit / s) and low rate (5.3kbit / s) are marked as "0" and "1" respectively, and it is agreed to start transmi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IP voice steganography method based on speed modulation, and belongs to the field of safety communication. The IP voice steganography method is suitable for covert communication with IP voice (voice over IP, VoIP) as the carrier, and the purpose is that under the premise that any changes do not make to the content of voice streams, covert information is hidden into the voice streams with dynamically adjusted speed to achieve transparent covert communication. The method comprises the steps of (1) making an appointment in advance, (2) embedding covert information and (3) extracting covert information. According to the method, the character that in IP voice communication, a variable speed voice coder can dynamically switch speeds according to actual needs on any frame boundary is used, and hiding of the covert information is achieved through modulation of the voice frame speed. The hiding process does not make any change to the content of the voice stream, and therefore the sensory quality of the IP voice is effectively maintained. In addition, the IP voice steganography method is not related to the specific voice coder, is suitable for voice coders with the variable speed coding function, and has good universality.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a steganographic method for voice over IP (Voice over IP, VoIP) based on rate modulation, which is suitable for covert communication using voice over IP as a carrier. Background technique [0002] The rapid development of Internet technology has greatly changed human production and life style. However, while it brings great convenience to human beings, it also brings various security risks and hidden dangers such as the theft or tampering of communication content, the theft and abuse of personal privacy, and so on. Therefore, people begin to pay close attention to the issue of how to conduct secure communication in an open Internet environment. Steganography is an important branch of information hiding technology, and has received widespread attention as the core technology of covert communication. Redundancy of data characteristics), under the premise of not affecting the q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L19/018G10L19/24
Inventor 田晖卢璥郭舒婷秦界刘进黄永峰陈永红陈维斌陈锻生
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products