CN105071896A - Vocoder penetration encryption and decryption method and system and voice encryption and decryption method - Google Patents

Vocoder penetration encryption and decryption method and system and voice encryption and decryption method Download PDF

Info

Publication number
CN105071896A
CN105071896A CN201510428876.0A CN201510428876A CN105071896A CN 105071896 A CN105071896 A CN 105071896A CN 201510428876 A CN201510428876 A CN 201510428876A CN 105071896 A CN105071896 A CN 105071896A
Authority
CN
China
Prior art keywords
reformation
frequency domain
module
transform
obtains
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510428876.0A
Other languages
Chinese (zh)
Inventor
庞潼川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Core shield (Beijing) Information Technology Co., Ltd.
Original Assignee
庞潼川
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 庞潼川 filed Critical 庞潼川
Priority to CN201510428876.0A priority Critical patent/CN105071896A/en
Publication of CN105071896A publication Critical patent/CN105071896A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a vocoder penetration encryption and decryption method and a system and a voice encryption and decryption method. The vocoder penetration encryption and decryption method comprises steps: 1, digital plaintext digital voice is received; 2, N point time-frequency domain forward transform is carried out on the plaintext digital voice, and a frequency-domain digital voice signal is obtained; 3, according to a transform domain reforming sequence, forward reforming is carried out on the frequency-domain digital voice signal, and a reforming signal is obtained; 4, N point time-frequency domain inverse transform is carried out on the reforming signal, and ciphertext voice data are generated; and 5, synchronous information is inserted in the ciphertext voice data, and ciphertext voice is formed and outputted. Compared with voice-like modulation encryption and decryption algorithm, the method of the invention has strong communication environment adaptability and can be applied to the whole course communication network for circuit domain communication; the algorithm is concise, the structure is compact, and the processing ability is not highly required; and the process is certain, the order is clear, and the storage space is not highly required.

Description

Vocoder penetrates encipher-decipher method and system and voice encryption/decryption method
Technical field
The present invention relates to vocoder and penetrate encipher-decipher method and system and voice encryption/decryption method.
Background technology
Voice communication can be monitored, and voice encryption evades the effective means that voice messaging divulges a secret.Packet domain voice communication (also known as VoIP) and circuit domain voice communication can be divided into according to the transmission means of voice communication.Current circuit domain voice communication accounts for main flow, patent of the present invention only for circuit domain voice communication, after chat as no special indicates, all refer to circuit domain voice communication.Communication process position residing for current voice encryption/decryption algorithm both domestic and external as shown in Figure 1.
For mobile phone, what adopt above-mentioned voice encryption/decryption scheme is all mobile phone dedicated, the key code changing communication core bottom most software relevant is needed to implant voice encryption/decryption, and the key code difficulty changing communication core bottom most software relevant is large, easily affect properties of product, this is also cause can doing at present the very few main cause of producer as the encryption mobile phone of Fig. 1 scheme; Moreover, if consumer wants voice encryption/decryption function just must change mobile phone, and the brand mobile phone of the usual user use habit that has oneself to admire.
If do not revise the key code that communication core bottom most software is relevant, or user just can realize voice encryption communication without the need to changing mobile phone, will activate new demand, create new market.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of voice encryption/decryption method that the key code changed mobile phone without the need to user or be correlated with without the need to revising communication core bottom most software just can realize voice encryption communication of accomplishing, and a kind of vocoder moved with fixed communication network circuit domain voice communication encoding and decoding that penetrates penetrates encipher-decipher method and system.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of vocoder penetrates encryption method, specifically comprises the following steps:
Step 1: receive digitized plaintext digital speech;
Step 2: the direct transform of N point time-frequency domain is implemented to described plaintext digital speech, obtains frequency domain digital voice signal;
Step 3: carry out forward reformation according to transform domain reformation sequence pair frequency domain digital voice signal, obtain renormalizing signal;
Step 4: the inverse transformation of N point time-frequency domain is implemented to renormalizing signal, generating ciphertext speech data;
Step 5: insert synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
The invention has the beneficial effects as follows: relative to class voice modulation enciphering and deciphering algorithm, the application's communication environment is adaptable, be applicable to the full process and full network of circuit domain communication; Algorithm is simplified, compact conformation, less demanding to disposal ability; Flow process is bright and clear, and order is clear, less demanding to memory space.
On the basis of technique scheme, the present invention can also do following improvement.
Further, the process that the forward in described step 3 is reformed comprises: carry out frequency displacement according to transform domain reformation sequence pair frequency domain digital voice signal.
Further, the acquisition methods of the transform domain reformation sequence in described step 3, comprises the following steps:
Both call sides generates the initial key seed of each session by seed key, or both call sides exchanges the initial key seed obtaining each session by seed key;
Based on the key seed obtained, both call sides adopts high order linear displacement feedback register to generate High-Order Pseudo stochastic flow key;
According to frequency displacement principle farthest, High-Order Pseudo stochastic flow key is converted to reformation sequence, obtains transform domain reformation sequence.
Further, the synchronizing information in described step 5 refers to certain pseudo random sequence guaranteeing that data communication both data aligns, or the combination of one or more sinusoidal single-tone sequence.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of vocoder penetrates encryption system, comprises receiver module, direct transform module, forward reformation module, inverse transform module and synchronization module;
Described receiver module is for receiving digitized plaintext digital speech;
Described direct transform module is used for implementing the direct transform of N point time-frequency domain to described plaintext digital speech, obtains frequency domain digital voice signal;
Described forward reformation module is used for carrying out forward reformation according to transform domain reformation sequence pair audio digital signals, obtains renormalizing signal;
Described inverse transform module is used for implementing the inverse transformation of N point time-frequency domain, generating ciphertext speech data to renormalizing signal;
Described synchronization module is used for inserting synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of vocoder penetrates decryption method, specifically comprises the following steps:
Step a: search synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Step b: the direct transform of N point time-frequency domain is implemented to ciphertext voice, obtains figure signal;
Step c: carry out reverse reformation according to transform domain reformation sequence pair figure signal, obtain frequency domain digital voice signal;
Steps d: the inverse transformation of N point time-frequency domain is implemented to frequency domain digital voice signal, obtains expressly digital speech;
Step e: will expressly export by digital speech.
The invention has the beneficial effects as follows: relative to class voice modulation enciphering and deciphering algorithm, the application's communication environment is adaptable, be applicable to the full process and full network of circuit domain communication; Algorithm is simplified, compact conformation, less demanding to disposal ability; Flow process is bright and clear, and order is clear, less demanding to memory space.
On the basis of technique scheme, the present invention can also do following improvement.
Further, the process of the reverse reformation in described step c comprises: carry out the figure signal after frequency displacement according to according to transform domain reformation sequence, obtains frequency domain digital voice signal.
Further, the acquisition methods of the transform domain reformation sequence in described step c, comprises the following steps:
Both call sides generates the initial key seed of each session by seed key, or both call sides exchanges the initial key seed obtaining each session by seed key;
Based on the key seed obtained, both call sides adopts high order linear displacement feedback register to generate High-Order Pseudo stochastic flow key;
According to frequency displacement principle farthest, High-Order Pseudo stochastic flow key is converted to reformation sequence, obtains transform domain reformation sequence.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of vocoder penetrates decryption system, comprises search synchronization module, deciphering direct transform module, deciphering reformation module, deciphering inverse transform module and output module;
Described search synchronization module, for searching for synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Described deciphering direct transform module is used for implementing the direct transform of N point time-frequency domain to ciphertext voice, obtains figure signal;
Described deciphering reformation module is used for carrying out reverse reformation according to transform domain reformation sequence pair figure signal, obtains frequency domain digital voice signal;
Described deciphering inverse transform module is used for implementing the inverse transformation of N point time-frequency domain to frequency domain digital voice signal, obtains expressly digital speech;
Described output module is used for expressly exporting by digital speech.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of voice encryption/decryption method, specifically comprises the following steps:
Vocoder is set between input and AD converter and penetrates encryption method;
Vocoder is set between D/A converter and output and penetrates decryption method.
The invention has the beneficial effects as follows: effectively can penetrate various types of voice communication vocoder, ciphering terminal developer does not need to revise the key code that communication core bottom most software is correlated with just can realize safe voice encryption communication, and user is without the need to changing admiring brand mobile phone and just can realizing voice encryption communication of use habit; This patent possesses huge market value.
Accompanying drawing explanation
Fig. 1 voice encryption/decryption overall flow figure of the prior art;
Fig. 2 is that a kind of vocoder of the present invention penetrates encryption method flow chart;
Fig. 3 is that a kind of vocoder of the present invention penetrates encryption system structured flowchart;
Fig. 4 is that a kind of vocoder of the present invention penetrates decryption method flow chart;
Fig. 5 is that a kind of vocoder of the present invention penetrates decryption system structured flowchart;
Fig. 6 is a kind of voice encryption/decryption method flow diagram of the present invention;
Fig. 7 is a kind of voice encryption/decryption method flow block diagram described in the concrete example of the present invention;
Fig. 8 is class voice modulation encryption and decryption structured flowchart in prior art;
Fig. 9 penetrates encipher-decipher method FB(flow block) for a kind of vocoder described in the concrete example of the present invention.
In accompanying drawing, the list of parts representated by each label is as follows:
1, receiver module, 2, direct transform module, 3, forward reformation module, 4, inverse transform module, 5, synchronization module, 6, search synchronization module, 7, deciphering direct transform module, 8, deciphering reformation module, 9, deciphering inverse transform module, 10, output module.
Embodiment
Be described principle of the present invention and feature below in conjunction with accompanying drawing, example, only for explaining the present invention, is not intended to limit scope of the present invention.
As shown in Figure 2, for a kind of vocoder of the present invention penetrates encryption method, specifically comprise the following steps:
Step 1: receive digitized plaintext digital speech;
Step 2: the direct transform of N point time-frequency domain is implemented to described plaintext digital speech, obtains frequency domain digital voice signal;
Step 3: carry out forward reformation according to transform domain reformation sequence pair frequency domain digital voice signal, obtain renormalizing signal;
Step 4: the inverse transformation of N point time-frequency domain is implemented to renormalizing signal, generating ciphertext speech data;
Step 5: insert synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
As shown in Figure 3, for a kind of vocoder of the present invention penetrates encryption system, comprise receiver module 1, direct transform module 2, forward reformation module 3, inverse transform module 4 and synchronization module 5;
Described receiver module 1 is for receiving digitized plaintext digital speech;
Described direct transform module 2, for implementing the direct transform of N point time-frequency domain to described plaintext digital speech, obtains frequency domain digital voice signal;
Described forward reformation module 3, for carrying out forward reformation according to transform domain reformation sequence pair audio digital signals, obtains renormalizing signal;
Described inverse transform module 4 is for implementing the inverse transformation of N point time-frequency domain, generating ciphertext speech data to renormalizing signal;
Described synchronization module 5, for inserting synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
As shown in Figure 4, for a kind of vocoder of the present invention penetrates decryption method, specifically comprise the following steps:
Step a: search synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Step b: the direct transform of N point time-frequency domain is implemented to ciphertext voice, obtains figure signal;
Step c: carry out reverse reformation according to transform domain reformation sequence pair figure signal, obtain frequency domain digital voice signal;
Steps d: the inverse transformation of N point time-frequency domain is implemented to frequency domain digital voice signal, obtains expressly digital speech;
Step e: will expressly export by digital speech.
As shown in Figure 5, for a kind of vocoder of the present invention penetrates decryption system, comprise search synchronization module 6, deciphering direct transform module 7, deciphering reformation module 8, deciphering inverse transform module 9 and output module 10;
Described search synchronization module 6, for searching for synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Described deciphering direct transform module 7, for implementing the direct transform of N point time-frequency domain to ciphertext voice, obtains figure signal;
Described deciphering reformation module 8, for carrying out reverse reformation according to transform domain reformation sequence pair figure signal, obtains frequency domain digital voice signal;
Described deciphering inverse transform module 9, for implementing the inverse transformation of N point time-frequency domain to frequency domain digital voice signal, obtains expressly digital speech;
Described output module 10 will be for will expressly export by digital speech.
As shown in Figure 6, be a kind of voice encryption/decryption method of the present invention, specifically comprise the following steps:
Vocoder is set between input and AD converter and penetrates encryption method;
Vocoder is set between D/A converter and output and penetrates decryption method.
As shown in Figure 7, a kind of voice encryption/decryption method described in the concrete example of the present invention is equivalent to and inserts extra encrypting module and deciphering module between MIC and AD, between DA and SPK.For convenience of distinguishing and describing, the built-in encryption and decryption (comprising built-in encryption and built-in deciphering respectively) that is called of encryption and decryption as shown in Figure 1 before, encryption and decryption is as shown in Figure 7 external encryption and decryption (comprising external encryption and external deciphering respectively).
Except PSTN adopts A rule or U to restrain waveform coding, GSM/CDMA/3G all employs LPC coding, and LPC coding, especially for the time-domain and frequency-domain feature of voice, extracts frequency spectrum and the waveform parameter of voice, then implements parameter coding; During LPC decoding, according to the speech characteristic parameter received reconstructed voice again.
Usually the encrypt data formed after voice encryption has been lost to the principal character of voice, will have been blocked as hash by vocoder after vocoder, and cause voice ciphertext communication failure thus.
Use external encryption and decryption first to the encoding and decoding of anti vocoder, the voice after encrypting must to be made still to possess the principal character of voice, can vocoder be penetrated.Having at present utilizes class voice modulation method to penetrate the way of vocoder, as shown in Figure 8.
Method shown in Fig. 8 needs huge vector code book as a reference, and computational complexity is large, takies memory space many, and is easily subject to channel disturbance and causes tonequality sharply to worsen, cannot use in adverse circumstances.
As shown in Figure 9, for a kind of vocoder described in the concrete example of the present invention penetrates encipher-decipher method, voice encryption concrete steps are as follows:
Step 1: obtain digitized plaintext digital speech;
Step 2: implement the direct transform of N point time-frequency domain, usually adopt FFT, i.e. fast fourier transform, obtain frequency domain digital voice signal;
Step 3: do forward according to the Output rusults of transform domain reformation sequence pair step 2 and reform.So-called forward is reformed and is referred to and carry out frequency displacement according to transform domain reformation sequence pair frequency domain digital voice signal.The reformation sequence wherein used is certain arrangement all natural between 1 to Q (Q<N), and its generative process is:
Step 3.1: both call sides is generated by seed key or exchanges the initial key seed obtaining each session, this step and conventional unsymmetrical key generate with exchange similar;
Step 3.2: the key seed generated based on previous step, both call sides adopts high order linear displacement feedback register to generate High-Order Pseudo stochastic flow key.
Step 3.3: according to frequency displacement principle farthest, High-Order Pseudo stochastic flow key is converted to reformation sequence.
Step 4: implement the inverse transformation of N point time-frequency domain and form ciphertext speech data, frequency domain inverse transformation adopts N point IFFT usually, i.e. N point quick Fourier inverse;
Step 5: insert synchronizing information to ciphertext speech data, forms ciphertext voice output.So-called synchronizing information is exactly the combination of certain pseudo random sequence or the one or more sinusoidal single-tone sequence guaranteeing that data communication both data aligns.
Voice deciphering concrete steps are as follows:
Step 1: search synchronizing information, by the original position asking the means such as relevant or peakvalue's checking to obtain encrypt data, namely separates synchronous, thus obtains ciphertext phonetic entry;
Step 2: implement the direct transform of N point time-frequency domain;
Step 3: the Output rusults according to reformation sequence pair step 2 does reverse reformation.The generative process of the reformation sequence of middle use is with the step 3.1-3.3 of voice encryption step; Reverse reformation is the inverse process that forward is reformed;
Step 4: implement the inverse transformation of N point time-frequency domain.
Step 5: plaintext speech data step 4 formed exports.
Vocoder penetrates enciphering and deciphering algorithm and class voice modulation enciphering and deciphering algorithm has obvious diacritical point:
(1), the former adopts stream encryption and transform domain to reform, and the latter adopts ultralow Compression, then implements block encryption and class voice modulation.The two has basic difference;
(2), that the former must increase data syn-chronization outside ciphertext is synchronous with solution, and the latter is built-in synchronous head in ultralow Compression is encoded, extra synchronous without the need to increasing;
(3), the former by data transformation with encryption organically combine, the latter adopts independent block encryption;
(4), the former encrypts at transform domain, is reduced to time-domain transmission, insensitive to channel disturbance; The latter have employed ultralow Compression technology, and the relevance of speech data reduces greatly, very responsive to channel disturbance.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. vocoder penetrates an encryption method, it is characterized in that, specifically comprises the following steps:
Step 1: receive digitized plaintext digital speech;
Step 2: the direct transform of N point time-frequency domain is implemented to described plaintext digital speech, obtains frequency domain digital voice signal;
Step 3: carry out forward reformation according to transform domain reformation sequence pair frequency domain digital voice signal, obtain renormalizing signal;
Step 4: the inverse transformation of N point time-frequency domain is implemented to renormalizing signal, generating ciphertext speech data;
Step 5: insert synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
2. a kind of vocoder according to claim 1 penetrates encryption method, it is characterized in that, the process that the forward in described step 3 is reformed comprises: carry out frequency displacement according to transform domain reformation sequence pair frequency domain digital voice signal.
3. a kind of vocoder according to claim 1 and 2 penetrates encryption method, it is characterized in that, the acquisition methods of the transform domain reformation sequence in described step 3, comprises the following steps:
Both call sides generates the initial key seed of each session by seed key, or both call sides exchanges the initial key seed obtaining each session by seed key;
Based on the key seed obtained, both call sides adopts high order linear displacement feedback register to generate High-Order Pseudo stochastic flow key;
According to frequency displacement principle farthest, High-Order Pseudo stochastic flow key is converted to reformation sequence, obtains transform domain reformation sequence.
4. a kind of vocoder according to claim 1 penetrates encryption method, it is characterized in that, the synchronizing information in described step 5 refers to certain pseudo random sequence guaranteeing that data communication both data aligns, or the combination of one or more sinusoidal single-tone sequence.
5. vocoder penetrates an encryption system, it is characterized in that, comprises receiver module, direct transform module, forward reformation module, inverse transform module and synchronization module;
Described receiver module is for receiving digitized plaintext digital speech;
Described direct transform module is used for implementing the direct transform of N point time-frequency domain to described plaintext digital speech, obtains frequency domain digital voice signal;
Described forward reformation module is used for carrying out forward reformation according to transform domain reformation sequence pair audio digital signals, obtains renormalizing signal;
Described inverse transform module is used for implementing the inverse transformation of N point time-frequency domain, generating ciphertext speech data to renormalizing signal;
Described synchronization module is used for inserting synchronizing information to ciphertext speech data, forms ciphertext voice and exports.
6. vocoder penetrates a decryption method, it is characterized in that, specifically comprises the following steps:
Step a: search synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Step b: the direct transform of N point time-frequency domain is implemented to ciphertext voice, obtains figure signal;
Step c: carry out reverse reformation according to transform domain reformation sequence pair figure signal, obtain frequency domain digital voice signal;
Steps d: the inverse transformation of N point time-frequency domain is implemented to frequency domain digital voice signal, obtains expressly digital speech;
Step e: will expressly export by digital speech.
7. a kind of vocoder according to claim 6 penetrates decryption method, it is characterized in that, the process of the reverse reformation in described step c comprises: carry out the figure signal after frequency displacement according to according to transform domain reformation sequence, obtains frequency domain digital voice signal.
8. a kind of vocoder according to claim 6 or 7 penetrates decryption method, it is characterized in that, the acquisition methods of the transform domain reformation sequence in described step c, comprises the following steps:
Both call sides generates the initial key seed of each session by seed key, or both call sides exchanges the initial key seed obtaining each session by seed key;
Based on the key seed obtained, both call sides adopts high order linear displacement feedback register to generate High-Order Pseudo stochastic flow key;
According to frequency displacement principle farthest, High-Order Pseudo stochastic flow key is converted to reformation sequence, obtains transform domain reformation sequence.
9. vocoder penetrates a decryption system, it is characterized in that, comprises search synchronization module, deciphering direct transform module, deciphering reformation module, deciphering inverse transform module and output module;
Described search synchronization module, for searching for synchronizing information, obtains the original position of encrypt data, thus obtains ciphertext phonetic entry;
Described deciphering direct transform module is used for implementing the direct transform of N point time-frequency domain to ciphertext voice, obtains figure signal;
Described deciphering reformation module is used for carrying out reverse reformation according to transform domain reformation sequence pair figure signal, obtains frequency domain digital voice signal;
Described deciphering inverse transform module is used for implementing the inverse transformation of N point time-frequency domain to frequency domain digital voice signal, obtains expressly digital speech;
Described output module is used for expressly exporting by digital speech.
10. a voice encryption/decryption method, is characterized in that, specifically comprises the following steps:
Vocoder is set between input and AD converter and penetrates encryption method;
Vocoder is set between D/A converter and output and penetrates decryption method.
CN201510428876.0A 2015-07-20 2015-07-20 Vocoder penetration encryption and decryption method and system and voice encryption and decryption method Pending CN105071896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510428876.0A CN105071896A (en) 2015-07-20 2015-07-20 Vocoder penetration encryption and decryption method and system and voice encryption and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510428876.0A CN105071896A (en) 2015-07-20 2015-07-20 Vocoder penetration encryption and decryption method and system and voice encryption and decryption method

Publications (1)

Publication Number Publication Date
CN105071896A true CN105071896A (en) 2015-11-18

Family

ID=54501194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510428876.0A Pending CN105071896A (en) 2015-07-20 2015-07-20 Vocoder penetration encryption and decryption method and system and voice encryption and decryption method

Country Status (1)

Country Link
CN (1) CN105071896A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105869646A (en) * 2016-05-04 2016-08-17 芯盾(北京)信息技术有限公司 Voice data processing method for synchronizing information source voice data before vocoders

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560338B1 (en) * 1998-08-28 2003-05-06 Qualcomm Incorporated Limiting delays associated with the generation of encryption stream ciphers
CN101299632A (en) * 2007-05-03 2008-11-05 通用汽车公司 Synchronization and segment type detection method for data transmission via an audio communication system
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560338B1 (en) * 1998-08-28 2003-05-06 Qualcomm Incorporated Limiting delays associated with the generation of encryption stream ciphers
CN101299632A (en) * 2007-05-03 2008-11-05 通用汽车公司 Synchronization and segment type detection method for data transmission via an audio communication system
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨典兵,罗兴国,张汝云: "端到端保密通信中的类语音调制解调器涉及", 《计算机应用与软件》 *
金堃: "《中国优秀硕士学位论文全文数据库》", 15 July 2013 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105869646A (en) * 2016-05-04 2016-08-17 芯盾(北京)信息技术有限公司 Voice data processing method for synchronizing information source voice data before vocoders

Similar Documents

Publication Publication Date Title
US20200021566A1 (en) Dynamic encryption method
US8345871B2 (en) Fast authentication over slow channels
WO2016173724A1 (en) Encryption system, encryption key wallet and method
CN103402198B (en) A kind of method that radio communication terminal encryption parameter transmits
CN104378198A (en) Voice encryption method based on block cipher system
KR20150073753A (en) Apparatus and methdo for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
CN111259414A (en) Method, device and equipment for encrypting audio stored in file
Habib et al. Secure speech communication algorithm via DCT and TD-ERCS chaotic map
CN105992203A (en) Speech communication encryption key negotiation method and system based on same
CN104077541B (en) Selective encryption method and device based on multimedia data
CN103812646A (en) Method for encrypting and outputting audio data and device thereof
CN105071896A (en) Vocoder penetration encryption and decryption method and system and voice encryption and decryption method
CN103023630A (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
Ambika et al. Secure Speech Communication–A Review
CN109036439A (en) A kind of perceptual hash feature extraction method and system encrypting voice signal
JP2013098869A (en) Voice system
CN104994500B (en) A kind of speech security transmission method and device for mobile phone
CN111368321B (en) Communication anti-monitoring method and device
CN108632215B (en) Digital communication encryption and decryption method and device
WO2022031563A1 (en) Enhanced security for existing public key infrastructure
EP3406050A1 (en) Method for safeguarding the confidentiality of the sender&#39;s identification of messages transmitted through promiscuous channels
CN100359908C (en) Privacy telephone
Hamdi et al. A new secure and efficient scheme of ADPCM encoder based on chaotic encryption
Haseeb et al. A Survey on Speech Encryption Using Chaos Map
Khan et al. Crypt analysis of two time pads in case of compressed speech

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160303

Address after: 102401, 616, building six, building 12, building No. 1, Fangshan District Chen Chen street, Beijing

Applicant after: Core shield (Beijing) Information Technology Co., Ltd.

Address before: 100080, -2, Chinese Academy of Sciences Talent Exchange Center, No. 25 West Fourth Ring Road, Haidian District, Beijing

Applicant before: Pang Chongchuan

RJ01 Rejection of invention patent application after publication

Application publication date: 20151118

RJ01 Rejection of invention patent application after publication