Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice encryption and decryption method for conversion parties on basis of voice print

An encryption, decryption, and voice technology, which is applied in the field of voice encryption and decryption based on voiceprint, can solve the problems of increasing the complexity of voice processing and methods, and achieve the effects of reducing system resource overhead, good security, and fast encryption speed

Inactive Publication Date: 2011-05-18
HANGZHOU DIANZI UNIV
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method improves the speed of voice encryption, but at the same time increases the complexity of voice processing and method usage
The complexity is mainly manifested in the fact that different speech encoding methods must be matched with different speech encryption methods, which adds a lot of inconvenience for users to use this method
This method still uses the symmetric encryption method to encrypt the voice, and needs to maintain an additional key exchange control channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice encryption and decryption method for conversion parties on basis of voice print
  • Voice encryption and decryption method for conversion parties on basis of voice print
  • Voice encryption and decryption method for conversion parties on basis of voice print

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with accompanying drawing.

[0025] 1) Both parties in the call exchange voice streams, and this process is repeated;

[0026] 2) The speech signal flow presents randomness according to the dialogue content and physiological state of the talker, and on this basis, the speech feature parameters (MFCC parameters) extracted after speech signal processing also present randomness. (MFCC parameters vary with the speaker's tone, syllable, syllable context, glottal airflow model, and their own unique pronunciation.)

[0027] Based on the above facts, we can extract effective keys from the voice signals of both parties in the call and implement encryption and decryption. Due to the large volume of voice signals, a sufficiently long effective key can be extracted, and it has good randomness. Therefore, the present invention uses the XOR encryption method to encrypt and decrypt the voice stream. In practice, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a voice encryption and decryption method for conversion parties on the basis of voice print, comprising the following steps of: (1) exchanging a section of shared secret by conversion parties; (2) starting the voice conversation by conversion parties, and determining a format of a network transmission packet; (3) in the process of conversion, calculating the MFCC (Mel Frequency Cepstral Coefficient) parameter of the voice characteristic information of self at certain interval by a voice sender, and extracting a secret key from the MFCC parameter; (4) numbering a voicepacket participating in calculating the MFCC parameter when the voice sender sends the voice packet; (5) receiving the voice packet by a voice receiver, and splicing the voice packet containing sequence numbers in order, calculating the MFCC parameter, and extracting the secret key from the MFCC parameter; (6) after the voice sender finishes sending the voice packet containing the vocal print secret key, sending a countdown voice packet at certain interval; and (7) after receiving the countdown voice packet, beginning countdown by the voice receiver, and replacing the current secret key when time is up, wherein both parties have symmetrical operation from steps (3) to (7). The voice encryption and decryption method generates the secret key by the voice characteristics of conversion parties, the length of the secret key can be chosen as required, and randomness is excellent.

Description

technical field [0001] The invention belongs to the technical field of data encryption transmission, and in particular relates to a method for encrypting and decrypting voices of both parties in a conversation based on voiceprints. Background technique [0002] Voice calls are the basic way of information exchange in the information age society. With the continuous enhancement of people's security awareness, people have higher and higher requirements for the confidentiality of voice calls. Encrypting voice calls is an important technical means to ensure call security. [0003] Due to the real-time requirements of voice calls, the voice encryption technology must be fast, efficient and safe. Currently used voice call encryption methods are mainly various symmetric encryption algorithms. Compared with asymmetric encryption algorithms (public-private key encryption algorithms), symmetric encryption algorithms are fast and efficient; but for the real-time requirements of voic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04W12/02H04W12/04G10L17/00H04W12/041
Inventor 吴震东
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products