Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Camouflage communication method based on voice identification

A technology of speech recognition and communication methods, applied in speech recognition, speech analysis, secure communication devices, etc., to achieve the effect of strong security and high practical value

Inactive Publication Date: 2007-01-24
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The embedding robustness of this scheme is strong, but the amount of embedded data is not as large as that of the LSB (least significant bit) scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Camouflage communication method based on voice identification
  • Camouflage communication method based on voice identification
  • Camouflage communication method based on voice identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]For systems that communicate securely, it is critical that secret information be delivered to its destination without error, and the form in which the information is delivered is secondary. This scheme proposes to use the method of speech recognition to process the secret voice, which greatly reduces the code rate of the secret voice, provides an embedding scheme with the highest transparency and robustness as possible, and realizes real-time confidential communication. From the perspective of information theory, the reason why speech recognition can compress the bit rate is that the speech contains not only semantic information, but also characteristic information such as the speaker's tone, intonation, and emotion; Features are "redundant" compared to semantic commands. Using speech recognition to convert secret speech into command text and then encode and transmit can greatly reduce the code rate of secret information. According to calculations, after using this schem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a disguise communication method based on phone identification used in military secrecy communicatioin and facsimile apparatus system including: generating secret information code stream based on phone identification, serial and parallel transformation and generating being inserted cryptographs based on random cryptographic keys, testing cleartext sonant frame formant and insertion of random cryptograph information and secret information extraction in the following steps: 1, generation of water print and insertion, 2, extraction of water print.

Description

technical field [0001] The invention relates to a voice recognition-based real-time security communication system solution for military security communication and facsimile systems, and belongs to the technical fields of information hiding technology and voice signal processing. Background technique [0002] As a branch of information security field, information hiding technology has developed rapidly in the past ten years. This technology is to embed additional information into digital media without excessively affecting the carrier signal, so as to realize functions such as copyright protection and covert communication. The research hotspots of information hiding technology mainly include the following two aspects: one is to study audio digital watermarking with transparency, security and robustness; this achievement can be used for copyright protection, data addition, anti-tampering and automatic monitoring of wireless transmission, etc. occasion. The second is to study...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/18G10L15/00
Inventor 邓宗元杨震
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products