CN112614498B - A method of modulating low-speed data into speech-like signals - Google Patents
A method of modulating low-speed data into speech-like signals Download PDFInfo
- Publication number
- CN112614498B CN112614498B CN202011482696.8A CN202011482696A CN112614498B CN 112614498 B CN112614498 B CN 112614498B CN 202011482696 A CN202011482696 A CN 202011482696A CN 112614498 B CN112614498 B CN 112614498B
- Authority
- CN
- China
- Prior art keywords
- speech
- signal
- key
- frame
- low
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000009432 framing Methods 0.000 claims abstract description 11
- 238000001514 detection method Methods 0.000 claims description 23
- 238000001228 spectrum Methods 0.000 claims description 10
- 230000001360 synchronised effect Effects 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 abstract description 12
- 230000005284 excitation Effects 0.000 abstract 1
- 230000011218 segmentation Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 9
- 230000006835 compression Effects 0.000 description 5
- 238000007906 compression Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006837 decompression Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 206010071299 Slow speech Diseases 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/08—Determination or coding of the excitation function; Determination or coding of the long-term prediction parameters
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
- G10L19/16—Vocoder architecture
- G10L19/167—Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Acoustics & Sound (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
- Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)
Abstract
Description
技术领域Technical field
本发明涉及类语音调制的技术领域,尤其涉及一种将低速数据调制为类语音信号的方法。The present invention relates to the technical field of speech-like modulation, and in particular, to a method of modulating low-speed data into a speech-like signal.
背景技术Background technique
语音通信是日常信息交流不可缺少的方式,对手机、电话机的窃听事件时有发生。手机被安装木马之后,用户的通话很容易通过无线网络被窃听;对电话语音的监听则可以通过对电话线路进行并线的方式达到。如果能够对模拟语音直接进行加密,就可以在语音发送之前就保护好语音信息,防止语音在后续处理、传输过程中被窃听。然而,对模拟语音的加解密一直是信息安全研究的难点之一,其困难之处在于如何使得加密之后的语音仍能通过语音信道进行传输。因为,通常语音加密之后就失去了语音特性。在大多数语音传输系统中,为了减少语音传输所需的信道带宽,通常会对语音进行压缩编码,加密后的语音如果丢失了语音特性就不能有效通过这类信道进行传输。Voice communication is an indispensable way of daily information exchange, and incidents of eavesdropping on mobile phones and telephones occur from time to time. After a Trojan is installed on a mobile phone, the user's calls can easily be eavesdropped through the wireless network; phone voice monitoring can be achieved by paralleling the phone lines. If the analog voice can be directly encrypted, the voice information can be protected before the voice is sent, preventing the voice from being eavesdropped during subsequent processing and transmission. However, encryption and decryption of analog voice has always been one of the difficulties in information security research. The difficulty lies in how to enable the encrypted voice to still be transmitted through the voice channel. Because usually the voice characteristics are lost after voice encryption. In most voice transmission systems, in order to reduce the channel bandwidth required for voice transmission, voice is usually compressed and encoded. If the encrypted voice loses its voice characteristics, it cannot be effectively transmitted through such channels.
现有的模拟语音加密技术主要包括时域置乱法和频域置乱法。其中时域置乱法是把一段语音信号分为若干片段,通过将各个片段语音的顺序随机打乱进行加密。这种方法的优点是操作简单,解密后的语音可懂度很高。但这种方法的安全性很低,特别是不能抵抗慢语速攻击;且加解密延时很大,解密后的语音中还包含周期性的干扰音。频域置乱法就是将一帧语音变换到频域,在频域直接置乱或分子带置乱。这种方法的优点是安全强度比时域置乱法高,但加密后语音的特征会有一定程度的丢失,不利于通过语音压缩编码通道进行传输。Existing analog voice encryption technologies mainly include time domain scrambling and frequency domain scrambling. Among them, the time domain scrambling method divides a speech signal into several segments, and encrypts the speech by randomly shuffling the order of each segment. The advantage of this method is that it is simple to operate and the decrypted speech is highly intelligible. However, the security of this method is very low, especially it cannot resist slow speech attacks; the encryption and decryption delay is very large, and the decrypted speech also contains periodic interference sounds. The frequency domain scrambling method is to transform a frame of speech into the frequency domain, and scramble it directly or with molecular bands in the frequency domain. The advantage of this method is that the security intensity is higher than that of the time domain scrambling method, but the characteristics of the encrypted speech will be lost to a certain extent, which is not conducive to transmission through the speech compression encoding channel.
调制技术是将数字信号变换成一定形式,以适应信道传输。一般的调制方法是改变一个正弦载波信号,用载波的典型特征:振幅、频率和相位等来承载数字数据。然而,这种数据调制解调器不能用于使用了语音编解码压缩技术的系统。语音编码的主要目的是减少表示语音所需的比特,同时在解码恢复时仍然保持合格的语音质量,使得人耳听起来和原始语音几乎一样。但人耳的听觉是有听觉“阈”的,能屏蔽掉信号抽样波形上的差别。因此解码还原出的语音信号和原始信号的抽样波形可能有明显不同,这使得调制解调器输出的承载数据的频率、相位和振幅特征发生较大的畸变。因此,大部分调制解调器不能在使用语音编解码器的信道上工作,需要重新设计一种调制解调方案,即类语音调制解调方案。Modulation technology converts digital signals into a certain form to adapt to channel transmission. The general modulation method is to change a sinusoidal carrier signal and use the typical characteristics of the carrier: amplitude, frequency and phase to carry digital data. However, this data modem cannot be used in systems that use speech codec compression techniques. The main purpose of speech coding is to reduce the bits required to represent speech while still maintaining acceptable speech quality when decoding is restored, making it sound almost the same to the original speech to the human ear. However, the human ear has a hearing "threshold" that can block out differences in signal sampling waveforms. Therefore, the sampled waveform of the speech signal restored by decoding may be significantly different from the original signal, which causes greater distortion in the frequency, phase and amplitude characteristics of the data-bearing data output by the modem. Therefore, most modems cannot work on channels using voice codecs, and a modem scheme needs to be redesigned, a voice-like modulation and demodulation scheme.
发明内容Contents of the invention
发明目的:为了克服现有技术中存在的不足,本发明提供了一种将低速数据调制为类语音信号的方法,该发明构建了一种基于语音的激励-共振峰模型调制的类语音信号,具有一般语音信息的参数特征,且利于通过声码器语音信道传输后保存特征,具有良好抵抗语音压缩和解压缩非线性操作的能力。Purpose of the invention: In order to overcome the deficiencies in the existing technology, the present invention provides a method for modulating low-speed data into a speech-like signal. The invention constructs a speech-like signal modulated by a speech-based excitation-formant model. It has the parameter characteristics of general speech information, is conducive to preserving the characteristics after transmission through the vocoder speech channel, and has good ability to resist non-linear operations of speech compression and decompression.
技术方案:为了实现上述发明目的,本发明提供了一种将低速数据调制为类语音信号的方法,包括以下步骤,Technical solution: In order to achieve the above-mentioned object of the invention, the present invention provides a method for modulating low-speed data into a speech-like signal, which includes the following steps:
步骤1:构建低速数据流通过基于语音的激励-共振峰生成模型,低速数据流通过所述模型产生能够在声码器信道中传输低速数据的类语音信号,包括加解密操作、成帧解帧操作和类语音调制解调操作;Step 1: Construct a low-speed data stream through a speech-based excitation-formant generation model. The low-speed data stream generates a speech-like signal capable of transmitting low-speed data in the vocoder channel through the model, including encryption and decryption operations, framing and deframing. operations and voice-like modem operations;
步骤2:定时更新的密钥通过流密码算法生成密钥流,与经过分段得到固定长度的低速数据流通过加密操作得到分段的密文数据流,分段的密文数据流、密钥序号和包含空白帧、信道探测帧的帧头经过成帧操作得到待调制的信号帧,信号帧通过基于语音的激励-共振峰生成模型的类语音调制操作得到具有一般语音信号参数特征的类语音信号;Step 2: The regularly updated key generates a key stream through the stream cipher algorithm, and is segmented to obtain a fixed-length low-speed data stream through an encryption operation to obtain a segmented ciphertext data stream. The segmented ciphertext data stream and key The sequence number and the frame header including the blank frame and the channel detection frame are processed through a framing operation to obtain the signal frame to be modulated. The signal frame is obtained through a speech-like modulation operation based on the speech excitation-formant generation model to obtain a speech-like speech with general speech signal parameter characteristics. Signal;
步骤3:在解调端接收的类语音信号,进行帧同步和类语音解调操作,得到成帧的数据,解帧后取密钥序号和加密数据,得到相应的密钥,密钥通过流密码算法生成密钥流,与加密数据经过解密操作,得到低速数据流。Step 3: Perform frame synchronization and speech-like demodulation operations on the speech-like signal received at the demodulation end to obtain framed data. After deframing, the key serial number and encrypted data are obtained to obtain the corresponding key. The key passes through the stream The cryptographic algorithm generates a key stream, which is decrypted with the encrypted data to obtain a low-speed data stream.
进一步的,在本发明中:所述类语音调制操作采用多频点幅度调制,根据声码器通道选择基音频率、初始频率、共振峰频点数量和位置,根据信号帧的帧结构进行基于频谱中共振峰频点的幅度调制,得到具有一般语音信号参数特征的类语音信号。Further, in the present invention: the speech-like modulation operation adopts multi-frequency point amplitude modulation, selects the pitch frequency, initial frequency, number and position of formant frequency points according to the vocoder channel, and performs spectrum-based processing according to the frame structure of the signal frame. Amplitude modulation of the mid-formant frequency point is used to obtain a speech-like signal with general speech signal parameter characteristics.
进一步的,在本发明中:所述信号帧的帧结构,包括同步信道声码器能量检测的空白帧、同步语音系统的字间隔和频点幅度参考的信道探测帧,根据信道条件的变化特征,供接收端检测信道中每个共振峰频点失真情况。Further, in the present invention: the frame structure of the signal frame includes a blank frame for synchronous channel vocoder energy detection, a word interval of the synchronous speech system, and a channel detection frame for frequency point amplitude reference, according to the changing characteristics of the channel conditions , for the receiving end to detect the distortion of each formant frequency point in the channel.
进一步的,在本发明中:所述信号帧的帧结构包括空白帧、信道探测帧和若干个数据帧,且每个数据帧承载的比特数为其共振峰数量乘以每个共振峰调制的比特数,同一信号帧包含对应数据分段的密钥序号。Further, in the present invention: the frame structure of the signal frame includes a blank frame, a channel detection frame and several data frames, and the number of bits carried by each data frame is its number of formants multiplied by the number of formants modulated. The number of bits, the same signal frame contains the key sequence number of the corresponding data segment.
进一步的,在本发明中:所述密钥序号用于对所述分段的密文数据流使用的密钥进行更新。Further, in the present invention: the key sequence number is used to update the key used in the segmented ciphertext data stream.
进一步的,在本发明中:所述类语音信号承载的比特速率大于等于2.4Kb/s。Further, in the present invention: the bit rate carried by the voice-like signal is greater than or equal to 2.4Kb/s.
进一步的,在本发明中:所述加解密操作还包括,Further, in the present invention: the encryption and decryption operations also include:
在发送端通过上层分发的密钥生成对应的子密钥组序列,并按照序列号进行排序,每个分段按照密钥组对应序列号的子密钥生成与数据相同比特的随机密钥流,与低速数据进行异或运算得到加密的数据流;At the sending end, the corresponding subkey group sequence is generated through the key distributed by the upper layer, and is sorted according to the sequence number. Each segment generates a random key stream with the same bits as the data according to the subkey of the key group corresponding to the sequence number. , perform XOR operation with low-speed data to obtain an encrypted data stream;
在接收端得到经过加密的数据流和对应的密钥组序列号,根据序列号得到对应的子密钥,生成密钥流进行解密,得到传输的低速数据。At the receiving end, the encrypted data stream and the corresponding key group sequence number are obtained, the corresponding sub-key is obtained according to the sequence number, and the key stream is generated for decryption to obtain the transmitted low-speed data.
有益效果:本发明与现有技术相比,其有益效果是:Beneficial effects: Compared with the prior art, the beneficial effects of the present invention are:
(1)基于语音的激励-共振峰模型调制的类语音信号具有一般语音信息的参数特征,利于通过声码器语音信道传输后保存特征,具有良好抵抗语音压缩和解压缩非线性操作的能力;(1) The speech-like signal modulated by the speech excitation-formant model has the parameter characteristics of general speech information, which is beneficial to preserving the characteristics after transmission through the vocoder speech channel, and has good resistance to nonlinear operations of speech compression and decompression;
(2)流密码算法不引入额外误码率,错误不会传播,且强度符合要求;(2) The stream cipher algorithm does not introduce additional bit error rates, errors will not propagate, and the strength meets the requirements;
(3)加解密延时小,成帧和解帧速度快,不影响低速数据的传输。(3) The encryption and decryption delay is small, the framing and deframing speed is fast, and it does not affect the transmission of low-speed data.
本发明提出的将低速数据调制为类语音信号的方法,在将可懂的语音变为不可懂语音的同时,还保留了语音特性,这样加密后的语音就可以顺利通过语音压缩编码通道进行传输。The method proposed by the present invention to modulate low-speed data into a speech-like signal not only changes intelligible speech into incomprehensible speech, but also retains the speech characteristics, so that the encrypted speech can be smoothly transmitted through the speech compression encoding channel. .
附图说明Description of drawings
图1为本发明所述将低速数据调制为类语音信号的方法流程示意图;Figure 1 is a schematic flow chart of the method of modulating low-speed data into a speech-like signal according to the present invention;
图2为本发明中信号帧的帧结构格式示意图;Figure 2 is a schematic diagram of the frame structure format of the signal frame in the present invention;
图3为本发明中信道探测帧的频谱示意图;Figure 3 is a schematic spectrum diagram of the channel detection frame in the present invention;
图4为本发明中单个数据帧的频谱示意图。Figure 4 is a schematic spectrum diagram of a single data frame in the present invention.
具体实施方式Detailed ways
下面结合附图对本发明的技术方案做进一步的详细说明:The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings:
本发明可以用许多不同的形式实现,而不应当认为限于这里所述的实施例。相反,提供这些实施例以便使本公开透彻且完整,并且将向本领域技术人员充分表达本发明的范围。The invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
如图1所示,为本发明提出的一种将低速数据调制为类语音信号的方法的整体流程示意图,该方法具体包括以下步骤,As shown in Figure 1, it is an overall flow diagram of a method for modulating low-speed data into a speech-like signal proposed by the present invention. The method specifically includes the following steps:
步骤1:低速数据流通过基于语音的激励-共振峰生成模型,产生能过在声码器信道中传输低速数据的类语音信号,包括加解密操作、成帧解帧操作和类语音调制解调操作;Step 1: The low-speed data stream passes through the speech-based excitation-formant generation model to generate a speech-like signal that can transmit low-speed data in the vocoder channel, including encryption and decryption operations, framing and deframing operations, and speech-like modulation and demodulation. operate;
具体的,所述加解密操用于实现对低速数据的保密传输,采用流密码算法,加解密操还包括以下步骤,Specifically, the encryption and decryption operations are used to realize confidential transmission of low-speed data, using a stream cipher algorithm. The encryption and decryption operations also include the following steps:
定时更新的密钥通过流密码算法生成密钥流,与经过分段得到固定长度的低速数据流通过加密操作得到分段的密文数据流,分段的密文数据流、密钥序号和包含空白帧、密钥序号帧的帧头经过成帧操作得到待调制的信号帧,信号帧通过基于语音的激励-共振峰生成模型的类语音调制操作得到具有一般语音信号参数特征的类语音信号;The regularly updated key generates a key stream through a stream cipher algorithm, and is segmented to obtain a fixed-length low-speed data stream through an encryption operation to obtain a segmented ciphertext data stream. The segmented ciphertext data stream, key sequence number and include The frame headers of the blank frame and the key number frame undergo a framing operation to obtain the signal frame to be modulated. The signal frame undergoes a speech-like modulation operation based on the speech excitation-formant generation model to obtain a speech-like signal with general speech signal parameter characteristics;
在解调端接收的类语音信号,进行帧同步和类语音解调操作,得到成帧的数据,解帧后取密钥序号和加密数据,得到相应的密钥,密钥通过流密码算法生成密钥流,与加密数据经过解密操作,得到低速数据流。The speech-like signal received at the demodulation end performs frame synchronization and speech-like demodulation operations to obtain framed data. After deframing, the key sequence number and encrypted data are obtained to obtain the corresponding key. The key is generated through a stream cipher algorithm. The key stream and the encrypted data undergo a decryption operation to obtain a low-speed data stream.
具体的,在发送端通过上层分发的密钥ks生成对应的密钥组序列,并按照序列号进行排序,每个分段按照密钥组对应序列号的子密钥生成与数据相同比特的随机密钥流ki,与低速数据进行异或运算得到加密的数据流。Specifically, at the sending end, the corresponding key group sequence is generated through the key k s distributed by the upper layer, and is sorted according to the sequence number. Each segment generates the same bits as the data according to the subkey of the sequence number corresponding to the key group. The random key stream k i is XORed with the low-speed data to obtain an encrypted data stream.
在接收端得到经过加密的分段数据流和对应的密钥组序列号,并根据序列号得到对应的子密钥,生成密钥流ki进行解密,得到传输的低速数据。所述密钥序号用于对所述分段的密文数据流使用的密钥进行更新。At the receiving end, the encrypted segmented data stream and the corresponding key group sequence number are obtained, and the corresponding subkey is obtained according to the sequence number, and the key stream k i is generated for decryption to obtain the transmitted low-speed data. The key sequence number is used to update the key used by the segmented ciphertext data stream.
设每帧传输m比特,发送端待加密数据为Mi(i=1,...,m),加密数据为Ci(i=1,...,m),接收端接收加密数据为C′i(i=1,...,m),解密数据为M′i(i=1,...,m),应当可以得到M′i=Mi,则:Assume that each frame transmits m bits, the data to be encrypted at the sending end is Mi ( i =1,...,m), the encrypted data is C i (i=1,...,m), and the encrypted data received at the receiving end is C′ i (i=1,...,m), the decrypted data is M′ i (i=1,...,m), it should be possible to get M′ i =M i , then:
成帧解帧操作用于对数据进行分帧和整合操作,包括在发送端添加空白帧、信道探测帧,并为类语音调制操作进行数据分帧、添加生成密钥序号;在接收端为解密操作提供信道探测结果和生成密钥序号,并对数据帧进行整合。Framing and deframing operations are used to frame and integrate data, including adding blank frames and channel detection frames at the transmitter, and performing data framing and adding generated key serial numbers for voice-like modulation operations; decryption at the receiver The operation provides channel detection results and generates key sequence numbers, and integrates data frames.
包括同步信道声码器能量检测的空白帧、同步语音系统的字间隔和频点幅度参考的信道探测帧,根据信道条件的变化特征,供接收端检测信道中每个共振峰频点失真情况。参照图2的示意,为每个信号帧的帧结构格式,其由T毫秒的空白帧、信道探测帧和n个数据帧组成,每个信号帧共包含n+2帧数据,每一帧时间为T*(n+2)毫秒。It includes the blank frame for synchronous channel vocoder energy detection, the word interval of the synchronous speech system, and the channel detection frame for frequency point amplitude reference. According to the changing characteristics of the channel conditions, the receiving end can detect the distortion of each formant frequency point in the channel. Referring to the diagram in Figure 2, the frame structure format of each signal frame is composed of a blank frame of T milliseconds, a channel detection frame and n data frames. Each signal frame contains a total of n+2 frames of data. Each frame time is T*(n+2) milliseconds.
具体的,空白帧用于同步信道声码器的能量检测,信道探测帧用于接收端检测信道的每个共振峰频点失真情况,数据帧每帧包含Nf个共振峰频点,每个频点包含kbit数据,则单个数据帧包含Nf*k bit数据,其中mbit为传输密钥序号,则每个信号帧传输总数据量S(t)=(Nf*k-m)*nbit,因此其传输速率v(t)为:Specifically, the blank frame is used for energy detection of the synchronous channel vocoder, and the channel detection frame is used by the receiving end to detect the distortion of each formant frequency point of the channel. Each data frame contains N f formant frequency points, each The frequency point contains kbit data, then a single data frame contains N f *k bit data, where mbit is the transmission key sequence number, then the total data amount transmitted by each signal frame is S(t)=(N f *km)*nbit, so Its transmission rate v(t) is:
v(t)=S(t)/Tall=(Nf*k-m)*n/T*(n+2)(bit/ms)v(t)=S(t)/T all =(N f *km)*n/T*(n+2)(bit/ms)
进一步的,所述类语音调制解调操作用于保证信号在声码器通道的有效传输。在发送端对成帧的数据进行基于语音的激励-共振峰生成模型多频点幅度调制(MFAK)的类语音调制,将低速数据调制为类语音;在接收端将经过声码器信道传输的类语音信号解调为成帧的数据。本实施例中,类语音调制操作采用多频点幅度调制,根据声码器通道选择基音频率、初始频率、共振峰频点数量和位置,根据信号帧的帧结构进行基于频谱中共振峰频点的幅度调制,得到具有一般语音信号参数特征的类语音信号。Further, the voice-like modulation and demodulation operation is used to ensure effective transmission of signals in the vocoder channel. At the transmitting end, the framed data is subjected to voice-based excitation-formant generation model multi-frequency amplitude modulation (MFAK)-like speech modulation, and the low-speed data is modulated into speech-like; at the receiving end, the data transmitted through the vocoder channel is The speech-like signal is demodulated into framed data. In this embodiment, the speech-like modulation operation adopts multi-frequency point amplitude modulation. The pitch frequency, initial frequency, number and position of formant frequency points are selected according to the vocoder channel, and the formant frequency points in the spectrum are performed according to the frame structure of the signal frame. Amplitude modulation to obtain a speech-like signal with general speech signal parameter characteristics.
进一步的,类语音信号承载的比特速率大于等于2.4Kb/s。Furthermore, the bit rate carried by the voice-like signal is greater than or equal to 2.4Kb/s.
基于语音的激励-共振峰生成模型的类语音调制中包含信道探测帧,在接收端探测每个共振峰频点的失真情况作为数据解调的参考。参照图3的示意,为信道探测帧的频谱示意图,其共振峰频率的差值就是基音频率,根据采样率和信号帧的长度,确定基音频率的大小,且基音频率应大于60Hz且小于600Hz。The speech-like modulation based on the speech excitation-formant generation model includes a channel detection frame, and the distortion of each formant frequency point is detected at the receiving end as a reference for data demodulation. Referring to the diagram in Figure 3, which is a spectrum diagram of a channel detection frame, the difference between the formant frequencies is the fundamental frequency. The fundamental frequency is determined based on the sampling rate and the length of the signal frame, and the fundamental frequency should be greater than 60Hz and less than 600Hz.
设基音频率为Δf,初始频率为f0,共振峰频点数量为Nf,则每个共振峰频率为f(i):Assume that the fundamental frequency is Δf, the initial frequency is f 0 , and the number of formant frequency points is N f , then each formant frequency is f(i):
f(i)=f0+i*Δf,i=0,1,2,...,Nf-1f(i)=f 0 +i*Δf, i=0, 1, 2,..., N f -1
信道探测帧在类语音调制时包含每个共振峰频率的单位正弦波之和,共振峰频点数为Nf个。The channel detection frame contains the sum of unit sine waves of each formant frequency during speech-like modulation, and the number of formant frequency points is N f .
参照图4的示意,为单个数据帧的频谱示意图,数据帧中的数据在调制端基于频谱中的共振峰频点进行幅度调制,数据帧每帧包含Nf个共振峰频点,每个频点包含kbit数据,增益调制范围为-2k-1~2k-1dB。Referring to the diagram in Figure 4, it is a spectrum diagram of a single data frame. The data in the data frame is amplitude modulated based on the formant frequency points in the spectrum at the modulation end. Each data frame contains N f formant frequency points, and each frequency The points contain kbit data, and the gain modulation range is -2 k-1 ~ 2 k-1 dB.
设X(fi)为频点fi的数据,在频域进行幅度调制,得到数据帧频点fi处的频谱幅度E(fi): Suppose _ _ _
E(fi)=H(fi)*10^(X(fi)/20)E(f i )=H(f i )*10^(X(f i )/20)
其中,H(fi)为发送端的信道探测帧中fi的频谱幅度。Among them, H(fi ) is the spectrum amplitude of fi in the channel detection frame of the transmitter.
单个数据帧的频域信号E(f)为:The frequency domain signal E(f) of a single data frame is:
对应解调端根据接收到的信道探测帧中的单位共振峰幅度,对数据进行解调:The corresponding demodulation end demodulates the data according to the unit formant amplitude in the received channel detection frame:
X′(fi)=20*log10(E′(fi)/H′(fi))X'(f i )=20*log10(E'(f i )/H'(f i ))
其中,H'(fi)为接收端的信道探测帧中fi的频谱幅度。Among them, H'( fi ) is the spectrum amplitude of fi in the channel detection frame of the receiving end.
步骤2:定时更新的密钥通过流密码算法生成密钥流,与经过分段得到固定长度的低速数据流通过加密操作得到分段的密文数据流,分段的密文数据流、密钥序号和包含空白帧、信道探测帧的帧头经过成帧操作得到待调制的信号帧,信号帧通过基于语音的激励-共振峰生成模型的类语音调制操作得到具有一般语音信号参数特征的类语音信号;Step 2: The regularly updated key generates a key stream through the stream cipher algorithm, and is segmented to obtain a fixed-length low-speed data stream through an encryption operation to obtain a segmented ciphertext data stream. The segmented ciphertext data stream and key The sequence number and the frame header including the blank frame and the channel detection frame are processed through a framing operation to obtain the signal frame to be modulated. The signal frame is obtained through a speech-like modulation operation based on the speech excitation-formant generation model to obtain a speech-like speech with general speech signal parameter characteristics. Signal;
步骤3:在解调端接收的类语音信号,进行帧同步和类语音解调操作,得到成帧的数据,解帧后取密钥序号和加密数据,得到相应的密钥,密钥通过流密码算法生成密钥流,与加密数据经过解密操作,得到低速数据流。Step 3: Perform frame synchronization and speech-like demodulation operations on the speech-like signal received at the demodulation end to obtain framed data. After deframing, the key serial number and encrypted data are obtained to obtain the corresponding key. The key passes through the stream The cryptographic algorithm generates a key stream, which is decrypted with the encrypted data to obtain a low-speed data stream.
应说明的是,以上所述实施例仅表达了本发明的部分实施方式,其描述并不能理解为对本发明专利范围的限制。应当指出的是,对于本技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干改进,这些均应落入本发明的保护范围。It should be noted that the above-described embodiments only express some implementations of the present invention, and their descriptions should not be construed as limiting the patent scope of the present invention. It should be noted that for those of ordinary skill in the art, several improvements can be made without departing from the concept of the present invention, and these should all fall within the protection scope of the present invention.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482696.8A CN112614498B (en) | 2020-12-16 | 2020-12-16 | A method of modulating low-speed data into speech-like signals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482696.8A CN112614498B (en) | 2020-12-16 | 2020-12-16 | A method of modulating low-speed data into speech-like signals |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112614498A CN112614498A (en) | 2021-04-06 |
CN112614498B true CN112614498B (en) | 2024-02-06 |
Family
ID=75239603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011482696.8A Active CN112614498B (en) | 2020-12-16 | 2020-12-16 | A method of modulating low-speed data into speech-like signals |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112614498B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113270105B (en) * | 2021-05-20 | 2022-05-10 | 东南大学 | A Voice-like Data Transmission Method Based on Hybrid Modulation |
CN116366169B (en) * | 2023-06-01 | 2023-10-24 | 浙江大学 | Ultrasonic channel modeling method, electronic equipment and storage media |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030083101A (en) * | 2002-04-19 | 2003-10-30 | 한국전자통신연구원 | Real time voice packet encryption/decryption system and encrypting/decrypting method using the same |
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN102006593A (en) * | 2010-10-29 | 2011-04-06 | 公安部第一研究所 | End-to-end voice encrypting method for low-speed narrowband wireless digital communication |
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7684565B2 (en) * | 2001-01-16 | 2010-03-23 | General Instrument Corporation | System for securely communicating information packets |
-
2020
- 2020-12-16 CN CN202011482696.8A patent/CN112614498B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030083101A (en) * | 2002-04-19 | 2003-10-30 | 한국전자통신연구원 | Real time voice packet encryption/decryption system and encrypting/decrypting method using the same |
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN102006593A (en) * | 2010-10-29 | 2011-04-06 | 公安部第一研究所 | End-to-end voice encrypting method for low-speed narrowband wireless digital communication |
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
Non-Patent Citations (1)
Title |
---|
关于移动通信端到端语音加解密方案研究;刘影彤;《中国优秀硕士学位论文全文数据库(信息科技辑)》;第136-729页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112614498A (en) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105790854B (en) | A kind of short range data transmission method and device based on sound wave | |
CN102624518B (en) | Voice encryption and decryption method | |
CN112614498B (en) | A method of modulating low-speed data into speech-like signals | |
CN101026836A (en) | Anti vocoder compressed end-to-end voice encryption device and method | |
CN110011760B (en) | Full-duplex multi-carrier near-field communication method based on sound waves | |
CN207234973U (en) | Video conferencing system based on quantum cryptography | |
CN101765106A (en) | Method for encrypting voice based on GSM voice channel transmission | |
Raheema et al. | Performance comparison of hybrid chaotic maps based on speech scrambling for OFDM techniques | |
CN111818522A (en) | Voice call encryption method and device | |
Krasnowski et al. | Introducing a novel data over voice technique for secure voice communication | |
Biancucci et al. | Secure data and voice transmission over GSM voice channel: Applications for secure communications | |
CN116132040B (en) | A quantum noise stream cipher encryption communication method and system | |
CN102307346A (en) | Method for security of mobile phone communication and security mobile phone | |
Čubrilović et al. | Evaluation of improved classification of speech-like waveforms used for secure voice transmission | |
CN115694990A (en) | Voice transmission system based on network encryption | |
JPH03500118A (en) | A spectrally efficient method for communicating information signals | |
Nishihara et al. | Design of secure near-field communication for smartphones using sound and vibration | |
CN113270105B (en) | A Voice-like Data Transmission Method Based on Hybrid Modulation | |
CN113645613A (en) | Device and method for real-time voice encryption in cellular mobile network | |
CN109346090A (en) | A method of penetrating vocoder | |
CN115696313B (en) | Encryption communication method and system of unmanned mobile equipment based on channel detection | |
KR100634495B1 (en) | Wireless communication transceiver with information protection function and method | |
KR100408516B1 (en) | Terminal for secure communication in CDMA system and methods for transmitting information using encryption and receiving information using decryption | |
JPH04304727A (en) | Data encryption device, data decryption device, and data encryption/decryption device | |
CN202218292U (en) | Secret mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 211189 No. 2 Southeast University Road, Jiangning District, Nanjing, Jiangsu Patentee after: SOUTHEAST University Country or region after: China Patentee after: Zijinshan Laboratory Address before: 211189 No. 2 Southeast University Road, Jiangning District, Nanjing, Jiangsu Patentee before: SOUTHEAST University Country or region before: China Patentee before: Purple Mountain Laboratories |
|
CP03 | Change of name, title or address |