A Hash Feature-Based Encrypted Voice Content Authentication Method
A technology of encrypted voice and authentication method, which is applied in voice analysis, instruments, etc., and can solve problems such as unencrypted voice, few encrypted voice content authentication schemes, and conventional methods that cannot be directly applied to the field of voice encryption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.
[0075] like figure 1 Shown, the encrypted voice content authentication method based on hash feature of the present invention comprises the following steps:
[0076] S1) input original speech M={m i ,1≤i≤I}, where m i ∈(-32768,32767);
[0077] S2) generate encrypted speech by stream cipher RC4 and Logistic mapping, this step includes:
[0078] S2.1) Transform a sample value m i into 16-bit binary {v i,15 ,v i,14 ,....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com