CN104361886B - Speech ciphering method and device and voice decryption method and device - Google Patents
Speech ciphering method and device and voice decryption method and device Download PDFInfo
- Publication number
- CN104361886B CN104361886B CN201410592233.5A CN201410592233A CN104361886B CN 104361886 B CN104361886 B CN 104361886B CN 201410592233 A CN201410592233 A CN 201410592233A CN 104361886 B CN104361886 B CN 104361886B
- Authority
- CN
- China
- Prior art keywords
- voice
- encrypted
- decryption
- characteristic parameter
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明实施例涉及信息安全技术领域,尤其涉及一种语音加密方法和装置以及语音解密方法和装置。The embodiment of the present invention relates to the field of information security technologies, and in particular to a voice encryption method and device, and a voice decryption method and device.
背景技术Background technique
语音加密技术是一种常用的信息加密技术,主要是通过语音识别,从输入的语音中识别出字符,得到加密字符序列,然后通过加密算法用加密字符序列对待加密信息进行加密,以保证所述信息的安全。相应的,对已加密的信息进行解密时,通过语音识别对用于解密的语音进行语音识别,从用于解密的语音中识别出字符,得到解密字符序列。之后,将解密字符序列与加密字符序列进行匹配,若匹配成功时,则通过与上述加密算法对应的解密算法用解密字符序列或加密字符序列对已加密的信息进行解密,得到被保护的信息。可以看出,现有语音加密和解密技术使得被加密的信息比较容易被破译,导致信息的安全性降低。Speech encryption technology is a commonly used information encryption technology. It mainly recognizes characters from the input voice through speech recognition to obtain an encrypted character sequence, and then encrypts the encrypted information with the encrypted character sequence through an encryption algorithm to ensure the above-mentioned Information Security. Correspondingly, when decrypting encrypted information, voice recognition is performed on the voice used for decryption through voice recognition, characters are recognized from the voice used for decryption, and a sequence of decrypted characters is obtained. Afterwards, match the decrypted character sequence with the encrypted character sequence, and if the match is successful, use the decrypted character sequence or the encrypted character sequence to decrypt the encrypted information through the decryption algorithm corresponding to the above encryption algorithm to obtain the protected information. It can be seen that the existing voice encryption and decryption technology makes the encrypted information easier to decipher, resulting in reduced information security.
发明内容Contents of the invention
本发明实施例提供一种语音加密方法和装置以及语音解密方法和装置,以增加破译难度,提高信息的安全性。Embodiments of the present invention provide a voice encryption method and device, and a voice decryption method and device, so as to increase the difficulty of deciphering and improve the security of information.
第一方面,本发明实施例提供了一种语音加密方法,包括:In the first aspect, the embodiment of the present invention provides a voice encryption method, including:
识别用于加密的语音中的字符,得到加密字符序列;Recognize the characters in the speech used for encryption to obtain the encrypted character sequence;
提取所述用于加密的语音的特征参数;Extracting the characteristic parameters of the speech used for encryption;
用识别得到的所述加密字符序列对待加密的信息进行加密,并保存所述加密字符序列及所述特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配。Using the identified encrypted character sequence to encrypt the information to be encrypted, and saving the encrypted character sequence and the characteristic parameters, for use in decrypting the decrypted character sequence and the voice used for decryption when the information is obtained by decrypting The characteristic parameters are matched.
第二方面,本发明实施例还提供了一种语音加密装置,包括:In a second aspect, the embodiment of the present invention also provides a voice encryption device, including:
语音识别模块,用于识别用于加密的语音中的字符,得到加密字符序列;The speech recognition module is used for recognizing the character in the speech that is used for encrypting, obtains the encrypted character sequence;
特征提取模块,用于提取所述用于加密的语音的特征参数;A feature extraction module, used to extract the feature parameters of the speech used for encryption;
加密模块,用于用所述语音识别模块识别得到的所述加密字符序列对待加密的信息进行加密,并保存所述加密字符序列及所述特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配。The encryption module is used to encrypt the information to be encrypted by using the encrypted character sequence recognized by the speech recognition module, and save the encrypted character sequence and the characteristic parameters, so that when the information is obtained by decryption, It is matched with the decrypted character sequence and the characteristic parameters of the speech used for decryption.
本发明实施例提供的语音加密方法和装置,通过在语音加密过程中提取并保存用于加密信息的语音的特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配,使得当有不良企图的解密者试图破译被加密的信息时,不仅需要语音携带的字符要一致,而且语音的特征也要匹配成功才能达到破译的目的,从而增加了破译难度,提高了加密信息的安全性。The voice encryption method and device provided by the embodiments of the present invention extract and store the characteristic parameters of the voice used to encrypt information during the voice encryption process, so that when the information is obtained by decryption, it can be used for decrypting the character sequence and used for decryption. The feature parameters of the speech are matched, so that when a decryptor with bad intentions tries to decipher the encrypted information, not only the characters carried by the speech must be consistent, but also the speech features must be matched successfully to achieve the purpose of deciphering, thereby increasing the The difficulty of deciphering improves the security of encrypted information.
第三方面,本发明实施例还提供了一种语音解密方法,包括:In a third aspect, the embodiment of the present invention also provides a voice decryption method, including:
识别用于对被加密信息进行解密的语音,得到解密字符序列;Recognize the voice used to decrypt the encrypted information to obtain the decrypted character sequence;
提取所述用于解密的语音的特征参数;Extracting the characteristic parameters of the speech used for decryption;
将所述解密字符序列和所述用于解密的语音的特征参数与保存的加密字符序列和特征参数分别进行匹配,所述加密字符序列和特征参数为对所述被加密信息加密的语音的加密字符序列和特征参数;Matching the decrypted character sequence and the characteristic parameters of the speech used for decryption with the saved encrypted character sequence and characteristic parameters respectively, the encrypted character sequence and characteristic parameters are the encryption of the speech encrypted by the encrypted information Character sequences and feature parameters;
匹配成功后,用所述解密字符序列或所述加密字符序列对所述被加密信息进行解密。After the matching is successful, the encrypted information is decrypted by using the decrypted character sequence or the encrypted character sequence.
第四方面,本发明实施例还提供了一种语音解密装置,包括:In a fourth aspect, the embodiment of the present invention also provides a voice decryption device, including:
语音识别模块,用于识别用于对被加密信息进行解密的语音,得到解密字符序列;The voice recognition module is used to identify the voice used to decrypt the encrypted information to obtain the decrypted character sequence;
特征提取模块,用于提取所述用于解密的语音的特征参数;Feature extraction module, used for extracting the feature parameter of the speech that is used for decrypting;
匹配模块,用于将所述解密字符序列和所述用于解密的语音的特征参数与保存的加密字符序列和特征参数分别进行匹配,所述加密字符序列和特征参数为对所述被加密信息加密的语音的加密字符序列和特征参数;A matching module, configured to match the decrypted character sequence and the characteristic parameters of the speech used for decryption with the stored encrypted character sequence and characteristic parameters, the encrypted character sequence and characteristic parameters are the encrypted information The encrypted character sequence and characteristic parameters of the encrypted voice;
解密模块,用于匹配成功后,用所述解密字符序列或所述加密字符序列对所述被加密信息进行解密。The decryption module is configured to use the decrypted character sequence or the encrypted character sequence to decrypt the encrypted information after the matching is successful.
本发明实施例提供的语音解密方法和装置,通过在解密的过程中提取语音的特征参数,并在解密字符序列及提取的特征参数与保存的加密字符序列及特征参数分别匹配成功的情况下,用解密字符序列或加密字符序列对被加密的信息进行解密,相对于现有技术仅对解密字符序列和加密字符序列进行匹配增加了破译难度,提高了信息的安全性。The speech decryption method and device provided by the embodiments of the present invention extract the characteristic parameters of the speech during the decryption process, and when the decrypted character sequence and the extracted characteristic parameters are successfully matched with the stored encrypted character sequence and characteristic parameters respectively, The encrypted information is decrypted by using the decrypted character sequence or the encrypted character sequence. Compared with the prior art, only matching the decrypted character sequence and the encrypted character sequence increases the difficulty of deciphering and improves the security of the information.
附图说明Description of drawings
为了更清楚地说明本发明,下面将对本发明中所需要使用的附图做一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the present invention more clearly, the accompanying drawings that need to be used in the present invention will be briefly introduced below. Obviously, the accompanying drawings in the following description are some embodiments of the present invention. For those of ordinary skill in the art , on the premise of not paying creative labor, other drawings can also be obtained based on these drawings.
图1a为本发明实施例一提供的一种语音加密方法的流程图;Fig. 1a is a flowchart of a voice encryption method provided by Embodiment 1 of the present invention;
图1b为本发明实施例提供的语音加密方法中语音分贝值的波形示意图;Fig. 1 b is a schematic diagram of the waveform of the voice decibel value in the voice encryption method provided by the embodiment of the present invention;
图2为本发明实施例二提供的一种语音加密方法的流程图;Fig. 2 is the flowchart of a kind of speech encryption method that the embodiment 2 of the present invention provides;
图3为本发明实施例三提供的一种语音加密装置的结构示意图;FIG. 3 is a schematic structural diagram of a voice encryption device provided by Embodiment 3 of the present invention;
图4为本发明实施例四提供的一种语音解密方法的流程图;FIG. 4 is a flow chart of a speech decryption method provided in Embodiment 4 of the present invention;
图5为本发明实施例五提供的一种语音解密装置的结构示意图。FIG. 5 is a schematic structural diagram of a speech decryption device provided by Embodiment 5 of the present invention.
具体实施方式detailed description
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施例中的技术方案作进一步详细描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。可以理解的是,此处所描述的具体实施例仅用于解释本发明,而非对本发明的限定,基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。另外还需要说明的是,为了便于描述,附图中仅示出了与本发明相关的部分而非全部内容。In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Example. It can be understood that the specific embodiments described here are only used to explain the present invention, rather than limit the present invention. Based on the embodiments of the present invention, all those skilled in the art can obtain without creative work. Other embodiments all belong to the protection scope of the present invention. In addition, it should be noted that, for the convenience of description, only parts related to the present invention are shown in the drawings but not all content.
实施例一Embodiment one
请参阅图1a,为本发明实施例一提供的一种语音加密方法的流程图。本发明实施例的方法可以由配置以硬件和/或软件实现的语音加密装置来执行,该实现装置典型的是配置于能够提供语音加密服务的终端中,例如,配置在智能手机、平板电脑等各种移动终端中。Please refer to FIG. 1a, which is a flowchart of a voice encryption method provided by Embodiment 1 of the present invention. The method of the embodiment of the present invention can be executed by a voice encryption device implemented in hardware and/or software. The implementation device is typically configured in a terminal capable of providing voice encryption services, such as a smart phone, a tablet computer, etc. various mobile terminals.
该方法包括:操作11~操作13。The method includes: operation 11-operation 13.
操作11中,识别用于加密的语音中的字符,得到加密字符序列。In operation 11, characters in the speech for encryption are identified to obtain an encrypted character sequence.
本操作具体是通过语音识别技术,从用于加密的语音中识别得到加密字符序列。This operation specifically uses speech recognition technology to recognize and obtain an encrypted character sequence from the speech used for encryption.
其中,用于加密的语音是指对待加密的信息进行加密的语音,既可以是用户通过能够提供语音加密服务的终端中的麦克风输入的语音,也可以是所述终端本地存储的语音,还可以是实时下载得到的语音片段。优选是采用用户通过能够提供语音加密服务的终端中的麦克风输入的语音,对于待加密的信息,用户可以根据自身需要输入合适的语音,便于用户记忆,而且输入的语音的内容用户可以自主控制,增加了灵活性。Wherein, the voice used for encryption refers to the voice for encrypting the information to be encrypted, which can be the voice input by the user through the microphone in the terminal capable of providing voice encryption service, or the voice stored locally in the terminal, or It is a voice clip downloaded in real time. Preferably, the voice input by the user through the microphone in the terminal capable of providing voice encryption services is adopted. For the information to be encrypted, the user can input an appropriate voice according to his own needs, which is convenient for the user to remember, and the content of the input voice can be controlled by the user independently. Increased flexibility.
所述用于加密的语音既可以是中文形式,也可以是英文等其他形式,本实施例对此不进行限制,只要能够被提供语音加密服务的终端正确识别即可。The voice used for encryption may be in Chinese or in other forms such as English, which is not limited in this embodiment, as long as it can be correctly recognized by the terminal providing the voice encryption service.
所述加密字符序列,是指由从用于加密的语音中识别得到的字符,按照用于加密的语音中可识别音素的先后顺序,形成的字符序列。例如,用于加密的语音为“开门”,识别得到字符“kai”和字符“men”,由字符“kai”和字符“men”按照用于加密的语音中可识别音素的先后顺序,形成加密字符序列“kaimen”。The encrypted character sequence refers to a character sequence formed from characters recognized from the encrypted speech according to the sequence of recognizable phonemes in the encrypted speech. For example, the voice used for encryption is "open the door", and the characters "kai" and "men" are recognized, and the characters "kai" and "men" are used in the order of recognizable phonemes in the voice used for encryption to form an encrypted The character sequence "kaimen".
操作12中,提取所述用于加密的语音的特征参数。In operation 12, the characteristic parameters of the speech used for encryption are extracted.
语音的特征包括轻重缓急等,如甲说话通常低沉且慢,乙说话通常快且声音很高,也就是说,不同的人具有不同的语音特征,如果提取这些特征并进行保存,并在解密时用于与试图解密的语音的特征进行匹配,则可以保证只有加密的人才能解密被加密的信息,提高信息的安全性。Voice features include priorities, etc. For example, A usually speaks in a deep and slow voice, and B usually speaks quickly and with a high voice. That is to say, different people have different voice features. If these features are extracted and saved, and used for decryption Matching with the characteristics of the voice that is trying to be decrypted can ensure that only the person who encrypts can decrypt the encrypted information, improving the security of the information.
操作13中,用识别得到的所述加密字符序列对待加密的信息进行加密,并保存所述加密字符序列及所述特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配。In operation 13, encrypt the information to be encrypted by using the identified encrypted character sequence, and save the encrypted character sequence and the characteristic parameters, so as to be used for combining with the decrypted character sequence and the used Match the feature parameters of the decrypted speech.
本操作不仅包含用识别得到的所述加密字符序列对待加密的信息进行加密的操作,而且包含保存所述加密字符序列及所述特征参数的操作,两者没有顺序限制,也可以并行执行。用识别得到的所述加密字符序列对待加密的信息进行加密时,所采用的加密算法可为AES256等,这里不做限制。This operation not only includes the operation of encrypting the information to be encrypted with the identified encrypted character sequence, but also includes the operation of saving the encrypted character sequence and the characteristic parameters, both of which are not limited in order, and can also be executed in parallel. When using the identified encrypted character sequence to encrypt the information to be encrypted, the encryption algorithm used may be AES256, etc., which is not limited here.
其中,所述待加密的信息可以包括:文档、视频文件、音频文件或图片等各种类型,也可以是前述几种类型的组合。Wherein, the information to be encrypted may include various types such as documents, video files, audio files, or pictures, or may be a combination of the aforementioned types.
其中,保存所述加密字符序列及所述特征参数具体是用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数分别进行匹配,换言之,在对被加密信息进行解密时,不仅需要将解密字符序列与保存的加密字符序列进行匹配,还需要将用于解密的语音的特征参数与保存的用于加密的语音的特征参数进行匹配。Wherein, storing the encrypted character sequence and the characteristic parameters is specifically used to match the decrypted character sequence and the characteristic parameters of the speech used for decryption when decrypting the information, in other words, when the encrypted information is When decrypting, it is not only necessary to match the decrypted character sequence with the saved encrypted character sequence, but also to match the characteristic parameters of the speech used for decryption with the saved characteristic parameters of the speech used for encryption.
本实施例的技术方案,通过在语音加密过程中提取并保存用于加密信息的语音的特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配,使得当有不良企图的解密者试图破译被加密的信息时,不仅需要语音携带的字符要一致,而且语音的特征也要匹配成功才能达到破译的目的,从而增加了破译难度,提高了加密信息的安全性。In the technical solution of this embodiment, by extracting and storing the characteristic parameters of the speech used for encrypting information during the speech encryption process, when the information is obtained by decryption, it can be used for decrypting the character sequence and the characteristic parameters of the speech used for decryption. Matching is carried out, so that when a decryptor with bad intentions tries to decipher the encrypted information, not only the characters carried by the voice must be consistent, but also the characteristics of the voice must be matched successfully to achieve the purpose of deciphering, thereby increasing the difficulty of deciphering and improving the Security of Encrypted Information.
需要说明的是,在本实施例中,操作11和操作12是相互独立的,没有必然的顺序限制,可以采用与本实施例相反的顺序执行,也可以并行执行。It should be noted that, in this embodiment, operation 11 and operation 12 are independent of each other, and there is no necessary order restriction, and may be performed in a reverse order to that of this embodiment, or may be performed in parallel.
还需要说明的是,上述提取所述用于加密的语音的特征参数可包括:提取所述用于加密的语音的时长、语速值和分贝值中的至少一个。It should also be noted that the extraction of the characteristic parameters of the speech used for encryption may include: extracting at least one of the duration, speech rate and decibel value of the speech used for encryption.
提取所述用于加密的语音的分贝值,可以是获取所述用于加密的语音被识别后在每个时间点上的分贝值;或者还可以是获取所述加密字符序列中每个字符的分贝值。如图1b所示,分贝值是在时间轴上呈曲线的,时间点不同,分贝值也有所不同。把图1b中的波形图转化成数据,可以保存成一个数组即每个时间点上的分贝值。如说出“z_h_i__m_a_______k_a_i___m_e_n”(可参见下述实施例二中的说明)的时间是3秒,也就是说有30个0.1秒,那分贝值可表示为数组:[30,20,40,30,35,30,20,10,50,50,50,40,25,15,5,0,0,0,0,30,35,35,35,25,15,35,35,35,35,35]。加密字符序列、语速值和分贝值可以分开保存到一个文件。即使对于相同的加密字符序列,由于加密者说话方式的差异,通常导致不同的加密者输入的用于加密的语音的分贝值不一致,因此在加密时保存加密字符序列和用于加密的语音的分贝值,解密时,即使解密字符序列与加密字符序列匹配成功,仍可以通过用于加密的语音的分贝值增加破译难度,从而提高加密信息的安全性。Extracting the decibel value of the speech used for encryption may be to obtain the decibel value at each time point after the speech used for encryption is recognized; or it may also be to obtain the decibel value of each character in the encrypted character sequence decibel value. As shown in Figure 1b, the decibel value is a curve on the time axis, and the decibel value is different at different time points. Convert the waveform diagram in Figure 1b into data, which can be saved as an array, that is, the decibel value at each time point. If the time for saying "z_h_i__m_a_______k_a_i___m_e_n" (see the description in the following embodiment two) is 3 seconds, that is to say, there are 30 0.1 seconds, then the decibel value can be expressed as an array: [30,20,40,30, 35,30,20,10,50,50,50,40,25,15,5,0,0,0,0,30,35,35,35,25,15,35,35,35,35, 35]. Encrypted character sequences, speech rate values and decibel values can be saved separately to a file. Even for the same encrypted character sequence, due to the difference in the way the encryptor speaks, the decibel values of the speech used for encryption input by different encryptors are usually inconsistent, so the encrypted character sequence and the decibel of the speech used for encryption are saved when encrypting When decrypting, even if the decrypted character sequence matches the encrypted character sequence successfully, the decibel value of the encrypted voice can still increase the difficulty of deciphering, thereby improving the security of encrypted information.
提取的特征参数越多,耗时越长,但对被加密的信息进行破译的难度越大,加密信息的安全性越高;提取的特征参数越少,耗时越短,但对被加密的信息进行破译的难度越低,加密信息的安全性越低,因此选择提取合适的特征参数,可以兼顾加密效率和加密信息的安全性。The more feature parameters extracted, the longer the time-consuming, but the more difficult it is to decipher the encrypted information, the higher the security of the encrypted information; the fewer the feature parameters extracted, the shorter the time-consuming, but the encrypted information The lower the difficulty of deciphering the information, the lower the security of the encrypted information. Therefore, choosing to extract appropriate feature parameters can take into account the encryption efficiency and the security of the encrypted information.
下面通过具体实施例说明提取所述用于加密的语音的语速值的实现方式。The implementation manner of extracting the speech rate value of the speech used for encryption will be described below through specific embodiments.
实施例二Embodiment two
请参阅图2,为本发明实施例二提供的一种语音加密方法的流程图。本实施例在上述实施例的基础上,提供了提取所述用于加密的语音的特征参数这一操作的优选方案,具体提供了提取所述用于加密的语音的语速值的优选方案。Please refer to FIG. 2 , which is a flowchart of a voice encryption method provided by Embodiment 2 of the present invention. On the basis of the foregoing embodiments, this embodiment provides a preferred solution for the operation of extracting the characteristic parameters of the speech used for encryption, and specifically provides a preferred solution for extracting the speech rate value of the speech used for encryption.
该优选方法包括:操作21~操作22。The preferred method includes: operation 21-operation 22.
操作21中,获取所述加密字符序列中相邻两个字符之间的时间间隔。In operation 21, the time interval between two adjacent characters in the encrypted character sequence is obtained.
本实施例中,通过获取所述加密字符序列中相邻两个字符之间的时间间隔,将得到的所述时间间隔作为所述用于加密的语音的语速值。换言之,基于所述加密字符序列中相邻两个字符之间的停顿,表征所述用于加密的语音的语速值。例如,某人要对信息进行加密时,首先按住屏幕上的虚拟麦克按钮,对着说话,例如说“芝麻开门”,说完话抬手,结束说话,其中开始和结束的方式各种各样,这里不做限制。In this embodiment, by acquiring the time interval between two adjacent characters in the encrypted character sequence, the obtained time interval is used as the speech rate value of the speech used for encryption. In other words, based on the pause between two adjacent characters in the encrypted character sequence, characterize the speech rate value of the speech used for encryption. For example, when a person wants to encrypt information, he first presses the virtual microphone button on the screen, speaks to the person, such as saying "Open Sesame", raises his hand after speaking, and ends speaking. There are various ways of starting and ending. So, there is no limit here.
加密装置中会对“芝麻开门”进行语音识别,分析出以下字符在时间轴上的分布:The encryption device will perform speech recognition on "Open Sesame", and analyze the distribution of the following characters on the time axis:
#______z_h_i__m_a_______k_a_i___m_e_n____##______z_h_i__m_a_______k_a_i___m_e_n____#
其中,第一个“#”表示开始,第二个“#”表示结束;每个“_”或字母所占用的时间都是0.1秒。z之前和n之后都是等待时间,不考虑,仅分析从z到n之间的部分,得到其中相邻两个字母之间的时间间隔,也即到每两个音素的停顿时间差。Among them, the first "#" indicates the start, and the second "#" indicates the end; the time taken by each "_" or letter is 0.1 second. The waiting time before z and after n is ignored, and only the part between z and n is analyzed to obtain the time interval between two adjacent letters, that is, the pause time difference between every two phonemes.
由于加密者说话方式的差异,导致不同的加密者输入的用于加密的语音中相邻两个字符之间的停顿不一致,因此,解密时,即使解密字符序列与加密字符序列匹配成功,仍可以根据加解密语音之间相邻两个字母的时间间隔的匹配结果来增加破译难度,从而提高被加密的信息的安全性。Due to the difference in the way the encryptor speaks, the pause between two adjacent characters in the speech input by different encryptors for encryption is inconsistent. Therefore, when decrypting, even if the decrypted character sequence matches the encrypted character sequence successfully, it is still possible. According to the matching result of the time interval between two adjacent letters between the encrypted and decrypted voices, the difficulty of deciphering is increased, thereby improving the security of the encrypted information.
操作22中,获取所述用于加密的语音的时长,根据所述时长及所述加密字符序列中字符的数量,得到所述用于加密的语音的语速值。In operation 22, the duration of the speech used for encryption is obtained, and the speech rate value of the speech used for encryption is obtained according to the duration and the number of characters in the encrypted character sequence.
例如通过语音识别出的“#______z_h_i__m_a_______k_a_i___m_e_n____#”,可以得到语音时长,40×0.1秒=4秒,共有11个字符,因此可以得到语速值为4÷11秒。For example, "#______z_h_i__m_a_______k_a_i___m_e_n____#" through speech recognition can get the speech duration, 40×0.1 second=4 seconds, and there are 11 characters in total, so the speech rate value can be obtained as 4÷11 seconds.
由于加密者说话快慢的差异,通常导致不同的加密者输入的用于加密的语音的时长不一致,因此解密时,即使解密字符序列与加密字符序列匹配成功,仍可以根据用于加解密的语音之间语速值的匹配结果增加破译难度,从而进一步提高加密信息的安全性。Due to the difference in speech speed of the encryptors, the duration of the speech used for encryption input by different encryptors is usually inconsistent. Therefore, when decrypting, even if the decrypted character sequence matches the encrypted character sequence successfully, it can still be based on the speech used for encryption and decryption. The matching results of speech rate values between speech rates increase the difficulty of deciphering, thereby further improving the security of encrypted information.
与操作21的区别在于,操作21基于所述加密字符序列中相邻两个字符之间的停顿,表征所述用于加密的语音的语速值;而操作22基于所述用于加密的语音的时长及所述加密字符序列中字符的数量,通过每个字符的耗时,表征所述用于加密的语音的语速值。The difference with operation 21 is that operation 21 characterizes the speech rate value of the speech used for encryption based on the pause between two adjacent characters in the encrypted character sequence; and operation 22 is based on the speech rate value of the speech used for encryption and the number of characters in the encrypted character sequence, the speech rate value of the speech used for encryption is characterized by the time consumption of each character.
需要说明的是,在本实施例中,操作21和操作22是相互独立的,都是提取所述用于加密的语音的语速值的优选实施方式,换言之,提取所述用于加密的语音的语速值可以包括操作21和操作22中的至少一项,当执行多项操作时,其执行顺序不限。It should be noted that in this embodiment, operation 21 and operation 22 are independent of each other, and both are preferred implementations of extracting the speech rate value of the speech used for encryption, in other words, extracting the speech rate value of the speech used for encryption The speech rate value of may include at least one of operation 21 and operation 22, and when multiple operations are performed, the order in which they are performed is not limited.
当组合执行时,提取的特征参数越多,耗时越长,但对被加密的信息进行破译的难度越大,加密信息的安全性越高;当单独执行其中一项时,提取的特征参数越少,耗时越短,但对被加密的信息进行破译的难度越低,加密信息的安全性越低,因此选择提取合适的特征参数,可以兼顾加密效率和加密信息的安全性。When executed in combination, the more feature parameters extracted, the longer the time-consuming, but the more difficult it is to decipher the encrypted information, the higher the security of the encrypted information; when one of them is executed alone, the extracted feature parameters The less it takes, the shorter the time-consuming, but the lower the difficulty of deciphering the encrypted information, the lower the security of the encrypted information. Therefore, choosing to extract appropriate feature parameters can take into account the encryption efficiency and the security of the encrypted information.
实施例三Embodiment three
请参阅图3,为本发明实施例三提供的一种语音加密装置的结构示意图。该装置包括:语音识别模块31、特征提取模块32和加密模块33。Please refer to FIG. 3 , which is a schematic structural diagram of a voice encryption device provided by Embodiment 3 of the present invention. The device includes: a voice recognition module 31 , a feature extraction module 32 and an encryption module 33 .
其中,识别模块31用于识别用于加密的语音中的字符,得到加密字符序列;特征提取模块32用于提取所述用于加密的语音的特征参数;加密模块33用于用所述语音识别模块识别得到的所述加密字符序列对待加密的信息进行加密,并保存所述加密字符序列及所述特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配。Wherein, recognition module 31 is used for identifying the character in the speech that is used for encrypting, obtains encrypted character sequence; Feature extraction module 32 is used for extracting the characteristic parameter of described speech that is used for encrypting; Encryption module 33 is used for using described speech recognition The encrypted character sequence obtained by module identification is used to encrypt the information to be encrypted, and save the encrypted character sequence and the characteristic parameters, so that when the information is obtained by decryption, the decrypted character sequence and the voice used for decryption The characteristic parameters are matched.
本实施例的技术方案,通过在语音加密过程中提取并保存用于加密信息的语音的特征参数,以用于在解密得到所述信息时,与解密字符序列及用于解密的语音的特征参数进行匹配,使得当有不良企图的解密者试图破译被加密的信息时,不仅需要语音携带的字符要一致,而且语音的特征也要匹配成功才能达到破译的目的,从而增加了破译难度,提高了加密信息的安全性。In the technical solution of this embodiment, by extracting and storing the characteristic parameters of the speech used for encrypting information during the speech encryption process, when the information is obtained by decryption, it can be used for decrypting the character sequence and the characteristic parameters of the speech used for decryption. Matching is carried out, so that when a decryptor with bad intentions tries to decipher the encrypted information, not only the characters carried by the voice must be consistent, but also the characteristics of the voice must be matched successfully to achieve the purpose of deciphering, thereby increasing the difficulty of deciphering and improving the Security of Encrypted Information.
在上述方案中,特征提取模块32优选包括时间提取子模块、语速提取子模块和分贝提取子模块中的至少一个。In the above solution, the feature extraction module 32 preferably includes at least one of a time extraction submodule, a speech rate extraction submodule and a decibel extraction submodule.
其中,时间提取子模块用于提取所述用于加密的语音的时长;语速提取子模块用于提取所述用于加密的语音的语速值;分贝提取子模块用于提取所述用于加密的语音的分贝值。Wherein, the time extraction submodule is used to extract the duration of the speech used for encryption; the speech rate extraction submodule is used to extract the speech rate value of the speech used for encryption; the decibel extraction submodule is used to extract the speech rate used for The decibel level of encrypted speech.
所述语速提取子模块用于执行下述至少一项:The speech rate extraction submodule is used to perform at least one of the following:
获取所述加密字符序列中相邻两个字符之间的时间间隔;Obtain the time interval between two adjacent characters in the encrypted character sequence;
获取所述用于加密的语音的时长,根据所述时长及所述加密字符序列中字符的数量,得到所述用于加密的语音的语速值。The duration of the speech used for encryption is obtained, and the speech rate value of the speech used for encryption is obtained according to the duration and the number of characters in the encrypted character sequence.
所述分贝提取子模块用于:The decibel extraction submodule is used to:
获取所述用于加密的语音被识别后在每个时间点上的分贝值;或者Obtain the decibel value at each time point after the voice used for encryption is recognized; or
用于获取所述加密字符序列中每个字符的分贝值。Used to obtain the decibel value of each character in the encrypted character sequence.
本发明实施例提供的语音加密装置可执行本发明任意实施例所提供的语音加密方法,具备执行方法相应的功能模块和有益效果。The speech encryption device provided in the embodiment of the present invention can execute the speech encryption method provided in any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method.
实施例四Embodiment Four
请参阅图4,为本发明实施例四提供的一种语音解密方法的流程图。本发明实施例的方法可以由配置以硬件和/或软件实现的语音解密装置来执行,该实现装置典型的是配置于能够提供语音解密服务的终端中,例如,配置在智能手机、平板电脑等各种移动终端中。Please refer to FIG. 4 , which is a flowchart of a speech decryption method provided by Embodiment 4 of the present invention. The method of the embodiment of the present invention can be executed by a voice decryption device implemented in hardware and/or software, and the implementation device is typically configured in a terminal capable of providing voice decryption services, such as a smart phone, a tablet computer, etc. various mobile terminals.
该方法包括:操作41~操作44。The method includes: operation 41 to operation 44 .
操作41中,识别用于对被加密信息进行解密的语音,得到解密字符序列。In operation 41, the speech used for decrypting the encrypted information is recognized to obtain a sequence of decrypted characters.
本操作具体是通过语音识别技术,从用于对被加密信息进行解密的语音中识别得到解密字符序列。This operation specifically uses speech recognition technology to recognize and obtain a decrypted character sequence from the speech used to decrypt the encrypted information.
所述解密字符序列,是指由从对被加密信息进行解密的语音中识别得到的字符,按照用于对被加密信息进行解密的语音中可识别音素的先后顺序,形成的字符序列。The decrypted character sequence refers to the character sequence formed from the characters recognized from the speech that decrypts the encrypted information, according to the sequence of identifiable phonemes in the speech used to decrypt the encrypted information.
操作42中,提取所述用于解密的语音的特征参数。In operation 42, feature parameters of the speech for decryption are extracted.
本操作与上述加密实施例中提取用于加密的语音的特征参数的提取方式相同,这里不做赘述。This operation is the same as the method of extracting the characteristic parameters of the encrypted speech in the above encryption embodiment, and will not be repeated here.
操作43中,将所述解密字符序列和所述用于解密的语音的特征参数与保存的加密字符序列和特征参数分别进行匹配,所述加密字符序列和特征参数为对所述被加密信息加密的语音的加密字符序列和特征参数。In operation 43, the decrypted character sequence and the characteristic parameters of the speech used for decryption are matched with the stored encrypted character sequence and characteristic parameters, and the encrypted character sequence and characteristic parameters are used to encrypt the encrypted information. The encrypted character sequence and feature parameters of the speech.
本操作中不仅包括将所述解密字符序列与保存的对所述被加密信息加密的语音的加密字符序列进行匹配,还包括将所述用于解密的语音的特征参数与保存的对所述被加密信息加密的语音的特征参数进行匹配。This operation not only includes matching the decrypted character sequence with the saved encrypted character sequence of the speech encrypted by the encrypted information, but also includes matching the characteristic parameters of the speech used for decryption with the saved pair of the encrypted speech The encrypted information is used to match the characteristic parameters of the encrypted voice.
其中,对被加密信息加密的语音的加密字符序列和特征参数可以存储在所述终端中。Wherein, the encrypted character sequence and characteristic parameters of the voice encrypted by the encrypted information can be stored in the terminal.
其中,将所述解密字符序列与保存的对所述被加密信息加密的语音的加密字符序列进行匹配,优选是将所述解密字符序列与所述加密字符序列进行完全匹配,以增加破译难度,提高被加密信息的安全性。Wherein, the decrypted character sequence is matched with the stored encrypted character sequence of the speech encrypted by the encrypted information, preferably the decrypted character sequence is completely matched with the encrypted character sequence to increase the difficulty of deciphering, Improve the security of encrypted information.
其中,将所述用于解密的语音的特征参数与保存的特征参数进行匹配,优选包括:判断所述用于解密的语音的特征参数的值是否在所述保存的特征参数的值的预设偏差范围内,若所述用于解密的语音的特征参数的值在所述预设偏差范围内,则匹配成功。换言之,只要将所述用于解密的语音的特征参数与保存的特征参数进行模糊匹配,进行模糊匹配的原因在于,由于相同的加密者每次说同一句加密语音,虽然加密字符序列一致,但是由于每次说话的方式不可能完全一致,导致特征参数不可能完全一致,因此为了提高解密效率,只要用于解密的语音的特征参数与保存的特征参数大体相同即可,没必要完全一样。对于模糊匹配的相似度可以预先设定所述保存的特征参数的值的偏差范围来实现。Wherein, matching the characteristic parameter of the speech used for decryption with the saved characteristic parameter preferably includes: judging whether the value of the characteristic parameter of the speech used for decryption is within the preset value of the saved characteristic parameter Within the deviation range, if the value of the characteristic parameter of the speech used for decryption is within the preset deviation range, the matching is successful. In other words, as long as the characteristic parameters of the speech used for decryption are fuzzy matched with the saved characteristic parameters, the reason for fuzzy matching is that since the same encryptor speaks the same encrypted speech each time, although the encrypted character sequence is consistent, the Since the way of speaking cannot be exactly the same every time, the characteristic parameters cannot be completely consistent. Therefore, in order to improve the decryption efficiency, as long as the characteristic parameters of the speech used for decryption are roughly the same as the saved characteristic parameters, it is not necessary to be exactly the same. The similarity of the fuzzy matching can be realized by presetting the deviation range of the value of the saved characteristic parameter.
假设以用于加密的语音“芝麻开门”为为例对匹配时长进行说明。通过语音识别得到“z_h_i__m_a_______k_a_i___m_e_n”(可参见上述实施例二中的说明)及时长3秒,从而得到加密字符序列--“zhimakaimen”,保存“zhimakaimen”及时长3秒。解密时,语音识别得到的解密字符序列为“zhimakaimen”后,还要判断用于解密的语音的时长是否在3秒±3×20%范围内,其中,±3×20%为预设偏差范围,可视实际需要而定,这里不做限制。如果用于解密的语音的时长在3秒±3×20%范围内,即介于2.4秒~3.6秒之间时,则时长匹配成功。Assume that the matching duration is described by taking the encrypted voice "Open Sesame" as an example. Get "z_h_i__m_a_______k_a_i___m_e_n" (see the description in the above-mentioned embodiment two) and a duration of 3 seconds through speech recognition, thereby obtaining an encrypted character sequence -- "zhimakaimen", save "zhimakaimen" and a duration of 3 seconds. When decrypting, after the decrypted character sequence obtained by speech recognition is "zhimakaimen", it is also necessary to judge whether the duration of the speech used for decryption is within the range of 3 seconds ± 3 × 20%, where ± 3 × 20% is the preset deviation range , depending on actual needs, and there is no limit here. If the duration of the speech used for decryption is within the range of 3 seconds±3×20%, that is, between 2.4 seconds and 3.6 seconds, the duration matching is successful.
仍以用于加密的语音“芝麻开门”为例(参见上述实施例二中的说明)对匹配加解密字符序列中相邻两个字符之间的时间间隔进行说明。,从第1个字符“z”到第11字符“n”,相邻两个字符之间的时间间隔分别为0.1秒、0.1秒、0.2秒、0.1秒、0.7秒、0.1秒、0.1秒、0.3秒、0.1秒和0.1秒。仍假设预设偏差范围为加密字符序列中相邻两个字符之间时间间隔的±20%,则在解密字符序列与加密字符序列匹配成功时,若解密字符序列中每相邻两个字符之间的时间间隔与加密字符序列中对应的相邻字符之间的时间间隔之间的差值,在加密字符序列中对应的相邻字符之间的时间间隔的±20%范围内,如解密字符序列中每相邻两个字符之间的时间间隔按字符序列的排列为0.09秒、0.11秒、0.17秒、0.1秒、0.57秒、0.09秒、0.1秒、0.25秒、0.11秒和0.09秒,则匹配成功。Still taking the voice "Open Sesame" used for encryption as an example (see the description in the second embodiment above), the time interval between two adjacent characters in the matching encryption and decryption character sequence will be described. , from the first character "z" to the eleventh character "n", the time intervals between two adjacent characters are 0.1 second, 0.1 second, 0.2 second, 0.1 second, 0.7 second, 0.1 second, 0.1 second, 0.3 seconds, 0.1 seconds and 0.1 seconds. Still assuming that the preset deviation range is ±20% of the time interval between two adjacent characters in the encrypted character sequence, when the decrypted character sequence matches the encrypted character sequence successfully, if every two adjacent characters in the decrypted character sequence The difference between the time interval between and the time interval between corresponding adjacent characters in the encrypted character sequence, within the range of ±20% of the time interval between corresponding adjacent characters in the encrypted character sequence, such as decrypted characters The time interval between every two adjacent characters in the sequence is 0.09 seconds, 0.11 seconds, 0.17 seconds, 0.1 seconds, 0.57 seconds, 0.09 seconds, 0.1 seconds, 0.25 seconds, 0.11 seconds and 0.09 seconds according to the sequence of characters, then The match was successful.
类似地,对于用于加密的语音被识别后在每个时间点的分贝值,也可以设定相应的预设偏差范围,判断用于解密的语音被识别后在每个时间点的分贝值与用于加密的语音中对应的各时间点上的分贝值之间的偏差,是否在预设偏差范围内,如过是,则匹配成功。Similarly, for the decibel value at each time point after the speech used for encryption is recognized, a corresponding preset deviation range can also be set, and it is judged that the decibel value at each time point after the speech used for decryption is recognized is consistent with Whether the deviation between the decibel values at the corresponding time points in the voice used for encryption is within the preset deviation range, if so, the matching is successful.
或者,也可以仅对加密字符序列中每个字符对应的分贝值设定相应的预设偏差范围,判断解密字符序列中每个字符的分贝值与加密字符序列中对应的字符的分贝值之间的偏差是否在预设偏差范围内,若是,则匹配成功。Alternatively, it is also possible to set a corresponding preset deviation range only for the decibel value corresponding to each character in the encrypted character sequence, and determine the difference between the decibel value of each character in the decrypted character sequence and the corresponding character in the encrypted character sequence. Whether the deviation is within the preset deviation range, if so, the matching is successful.
由于解密时还需要将所述用于解密的语音的特征参数与保存的特征参数进行匹配模糊匹配,这样,即使加密字符序列暴露,如果特征参数匹配失败,仍不能解密得到被保护的信息,因此,不仅提高了信息的安全性,而且可以公开把加密的话语文字作为提示,避免通过语音加密技术保护信息的用户忘记密码。Since the feature parameters of the speech used for decryption need to be matched with the preserved feature parameters for fuzzy matching during decryption, even if the encrypted character sequence is exposed, if the feature parameter matching fails, the protected information cannot be decrypted, so , not only improves the security of the information, but also can openly use the encrypted speech text as a prompt, so as to prevent the user who protects the information through the voice encryption technology from forgetting the password.
操作44中,匹配成功后,用所述解密字符序列或所述加密字符序列对所述被加密信息进行解密。In operation 44, after the matching is successful, the encrypted information is decrypted by using the decrypted character sequence or the encrypted character sequence.
本实施例的技术方案,通过在解密的过程中提取语音的特征参数,并在解密字符序列及提取的特征参数与保存的加密字符序列及特征参数分别匹配成功的情况下,用解密字符序列或加密字符序列对被加密的信息进行解密,相对于现有技术仅对解密字符序列和加密字符序列进行匹配增加了破译难度,提高了信息的安全性。In the technical solution of this embodiment, by extracting the characteristic parameters of the speech during the decryption process, and when the decrypted character sequence and the extracted characteristic parameters are successfully matched with the preserved encrypted character sequence and the characteristic parameters respectively, the decrypted character sequence or The encrypted character sequence decrypts the encrypted information. Compared with the prior art, only matching the decrypted character sequence and the encrypted character sequence increases the difficulty of deciphering and improves the security of the information.
需要说明的是,本实施例中,操作41和操作42是相互独立的,没有必然的顺序限制,可以采用与本实施例相反的顺序执行,也可以并行执行。It should be noted that in this embodiment, operation 41 and operation 42 are independent of each other, and there is no necessary order restriction, and may be performed in a reverse order to that of this embodiment, or may be performed in parallel.
通过前述实施例一和实施例二可知,提取所述用于加密的语音的特征参数优选包括:提取所述用于加密的语音的时长、语速值和分贝值中的至少一个。相应地,提取所述用于解密的语音的特征参数,优选包括:提取所述用于解密的语音的时长、语速值和分贝值中的至少一个。具体提取所述用于解密的语音的哪种类型的特征参数,取决于保存的对所述被加密信息加密的语音的特征参数的类型。It can be known from the foregoing first and second embodiments that extracting the characteristic parameters of the speech used for encryption preferably includes: extracting at least one of the duration, speech rate and decibel value of the speech used for encryption. Correspondingly, extracting the characteristic parameters of the speech for decryption preferably includes: extracting at least one of the duration, speech rate and decibel value of the speech for decryption. Which type of characteristic parameter of the speech used for decryption is specifically extracted depends on the type of the saved characteristic parameter of the speech encrypted by the encrypted information.
其中,提取所述用于解密的语音的语速值既可以包括获取所述解密字符序列中相邻两个字符之间的时间间隔;也可以包括获取所述用于解密的语音的时长,根据所述时长及所述解密字符序列中字符的数量,得到所述用于解密的语音的语速值。Wherein, extracting the speech rate value of the speech used for decryption may include obtaining the time interval between two adjacent characters in the decrypted character sequence; it may also include obtaining the duration of the speech used for decryption, according to The speech rate value of the speech used for decryption is obtained by the duration and the number of characters in the decrypted character sequence.
与前述实施例二类似,此处不再赘述。Similar to the foregoing second embodiment, details are not repeated here.
其中,提取所述用于解密的语音的分贝值,可以是获取所述用于解密的语音被识别后在每个时间点上的分贝值;或者还可以是获取所述解密字符序列中每个字符的分贝值。Wherein, extracting the decibel value of the speech used for decryption may be to obtain the decibel value at each time point after the speech used for decryption is recognized; or it may also be to obtain each decibel value in the decrypted character sequence The decibel value of the character.
实施例五Embodiment five
请参阅图5,为本发明实施例五提供的一种语音解密装置的结构示意图。该装置包括:语音识别模块51、特征提取模块52、匹配模块53和解密模块54。Please refer to FIG. 5 , which is a schematic structural diagram of a speech decryption device provided by Embodiment 5 of the present invention. The device includes: a speech recognition module 51 , a feature extraction module 52 , a matching module 53 and a decryption module 54 .
其中,识别模块51用于识别用于对被加密信息进行解密的语音,得到解密字符序列;特征参数提取模块52用于提取所述用于解密的语音的特征参数;匹配模块53用于将所述解密字符序列和所述用于解密的语音的特征参数与保存的加密字符序列和特征参数分别进行匹配,所述加密字符序列和特征参数为对所述被加密信息加密的语音的加密字符序列和特征参数;解密模块54用于匹配成功后,用所述解密字符序列或所述加密字符序列对所述被加密信息进行解密。Wherein, the identification module 51 is used to identify the speech used to decrypt the encrypted information to obtain the decrypted character sequence; the characteristic parameter extraction module 52 is used to extract the characteristic parameter of the speech used for decryption; the matching module 53 is used to use the The decrypted character sequence and the characteristic parameter of the speech used for decryption are respectively matched with the stored encrypted character sequence and characteristic parameter, and the encrypted character sequence and characteristic parameter are the encrypted character sequence of the speech encrypted by the encrypted information and characteristic parameters; the decryption module 54 is used to decrypt the encrypted information with the decrypted character sequence or the encrypted character sequence after the matching is successful.
本实施例的技术方案,通过在解密的过程中提取语音的特征参数,并在解密字符序列及提取的特征参数与保存的加密字符序列及特征参数分别匹配成功的情况下,用解密字符序列或加密字符序列对被加密的信息进行解密,相对于现有技术仅对解密字符序列和加密字符序列进行匹配增加了破译难度,提高了信息的安全性。In the technical solution of this embodiment, by extracting the characteristic parameters of the speech during the decryption process, and when the decrypted character sequence and the extracted characteristic parameters are successfully matched with the preserved encrypted character sequence and the characteristic parameters respectively, the decrypted character sequence or The encrypted character sequence decrypts the encrypted information. Compared with the prior art, only matching the decrypted character sequence and the encrypted character sequence increases the difficulty of deciphering and improves the security of the information.
在上述方案中,特征提取模块52优选包括时间提取子模块、语速提取子模块和分贝提取子模块中的至少一个。In the above solution, the feature extraction module 52 preferably includes at least one of a time extraction submodule, a speech rate extraction submodule and a decibel extraction submodule.
其中,时间提取子模块用于提取所述用于解密的语音的时长;语速提取子模块用于提取所述用于解密的语音的语速值;分贝提取子模块用于提取所述用于解密的语音的分贝值。Wherein, the time extraction submodule is used to extract the duration of the speech used for decryption; the speech rate extraction submodule is used to extract the speech rate value of the speech used for decryption; the decibel extraction submodule is used to extract the speech rate used for decryption The decibel value of the decrypted speech.
所述语速提取子模块优选用于执行下述至少一项:The speech rate extraction submodule is preferably used to perform at least one of the following:
获取所述解密字符序列中相邻两个字符之间的时间间隔;Obtain the time interval between two adjacent characters in the decrypted character sequence;
获取所述用于解密的语音的时长,根据所述时长及所述解密字符序列中字符的数量,得到所述用于解密的语音的语速值。The duration of the speech used for decryption is obtained, and the speech rate value of the speech used for decryption is obtained according to the duration and the number of characters in the decrypted character sequence.
所述分贝提取子模块优选用于:获取所述用于解密的语音被识别后在每个时间点上的分贝值;或者获取所述解密字符序列中每个字符的分贝值。The decibel extraction sub-module is preferably used to: obtain the decibel value at each time point after the speech used for decryption is recognized; or obtain the decibel value of each character in the decrypted character sequence.
在上述方案中,所述匹配模块53具体可以用于:判断所述用于解密的语音的特征参数的值是否在所述保存的特征参数的值的预设偏差范围内,若所述用于解密的语音的特征参数的值在所述预设偏差范围内,则匹配成功。In the above solution, the matching module 53 can be specifically used to: determine whether the value of the characteristic parameter of the speech used for decryption is within the preset deviation range of the value of the characteristic parameter saved, if the If the value of the characteristic parameter of the decrypted speech is within the preset deviation range, the matching is successful.
本发明实施例提供的语音解密装置可执行本发明任意实施例所提供的语音解密方法,具备执行方法相应的功能模块和有益效果。The speech decryption device provided in the embodiment of the present invention can execute the speech decryption method provided in any embodiment of the present invention, and has corresponding functional modules and beneficial effects for executing the method.
最后应说明的是:以上各实施例仅用于说明本发明的技术方案,而非对其进行限制;实施例中优选的实施方式,并非对其进行限制,对于本领域技术人员而言,本发明可以有各种改动和变化。凡在本发明的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present invention, but not to limit them; preferred implementations in the examples are not to limit them, and for those skilled in the art, this The invention is capable of various modifications and variations. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the protection scope of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410592233.5A CN104361886B (en) | 2014-10-29 | 2014-10-29 | Speech ciphering method and device and voice decryption method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410592233.5A CN104361886B (en) | 2014-10-29 | 2014-10-29 | Speech ciphering method and device and voice decryption method and device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104361886A CN104361886A (en) | 2015-02-18 |
| CN104361886B true CN104361886B (en) | 2017-11-03 |
Family
ID=52529142
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410592233.5A Active CN104361886B (en) | 2014-10-29 | 2014-10-29 | Speech ciphering method and device and voice decryption method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104361886B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105812573A (en) * | 2016-04-28 | 2016-07-27 | 努比亚技术有限公司 | Voice processing method and mobile terminal |
| CN110442675A (en) * | 2019-06-27 | 2019-11-12 | 平安科技(深圳)有限公司 | Question and answer matching treatment, model training method, device, equipment and storage medium |
| CN116781417B (en) * | 2023-08-15 | 2023-11-17 | 北京中电慧声科技有限公司 | Anti-cracking voice interaction method and system based on voice recognition |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101000647A (en) * | 2007-01-08 | 2007-07-18 | 北京飞天诚信科技有限公司 | Method and device for raising safety of data input |
| CN101409819A (en) * | 2008-11-27 | 2009-04-15 | 杭州电子科技大学 | Method for encrypting and deciphering digital camera picture based on voiceprint |
| CN102073829A (en) * | 2011-01-10 | 2011-05-25 | 杭州电子科技大学 | Document encrypting method and document decrypting method on basis of voice print |
| CN102819702A (en) * | 2012-07-19 | 2012-12-12 | 腾讯科技(深圳)有限公司 | File encryption operation method and file encryption operation system |
| CN103118002A (en) * | 2012-12-21 | 2013-05-22 | 北京飞漫软件技术有限公司 | Method of speech sound used as secret key to achieve data resource cloud storage management |
| CN103699834A (en) * | 2013-09-11 | 2014-04-02 | 李霆 | Multifunctional virtual vault and data encrypting method |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4755689B2 (en) * | 2005-07-27 | 2011-08-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | System and method for secure file delivery to legitimate recipients |
-
2014
- 2014-10-29 CN CN201410592233.5A patent/CN104361886B/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101000647A (en) * | 2007-01-08 | 2007-07-18 | 北京飞天诚信科技有限公司 | Method and device for raising safety of data input |
| CN101409819A (en) * | 2008-11-27 | 2009-04-15 | 杭州电子科技大学 | Method for encrypting and deciphering digital camera picture based on voiceprint |
| CN102073829A (en) * | 2011-01-10 | 2011-05-25 | 杭州电子科技大学 | Document encrypting method and document decrypting method on basis of voice print |
| CN102819702A (en) * | 2012-07-19 | 2012-12-12 | 腾讯科技(深圳)有限公司 | File encryption operation method and file encryption operation system |
| CN103118002A (en) * | 2012-12-21 | 2013-05-22 | 北京飞漫软件技术有限公司 | Method of speech sound used as secret key to achieve data resource cloud storage management |
| CN103699834A (en) * | 2013-09-11 | 2014-04-02 | 李霆 | Multifunctional virtual vault and data encrypting method |
Non-Patent Citations (1)
| Title |
|---|
| 声音的特征;杨小锋;《教师发声训练教程》;北京师范大学出版社;20120630;第19-22页 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104361886A (en) | 2015-02-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107169374B (en) | Encryption and decryption system and method based on voiceprint and voice recognition technology | |
| CN104935429B (en) | A data processing method and system using multiple encryption | |
| US10146983B2 (en) | Fingerprint decryption method and device | |
| WO2016106989A1 (en) | Multi-system security authentication method, multi-system security authentication apparatus and terminal | |
| CN105389493A (en) | Password management method and password management system | |
| CN107533598B (en) | Input method, device and terminal for login password of application | |
| CN105069335A (en) | Password setting method, verification method and terminal | |
| CN103824030A (en) | Data protection device and data protection method | |
| CN111242611B (en) | Method and system for recovering digital wallet key | |
| CN104091134B (en) | Password inputting method with combination of safety and convenience | |
| CN104361886B (en) | Speech ciphering method and device and voice decryption method and device | |
| KR101052294B1 (en) | Content Security Devices and Content Security Methods | |
| CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
| WO2015196642A1 (en) | Data encryption method, decryption method and device | |
| CN114245374A (en) | Security authentication method, system and related equipment | |
| CN110519061A (en) | A kind of identity identifying method based on biological characteristic, equipment and system | |
| CN105224885A (en) | A kind of data processing method and terminal | |
| CN110084014A (en) | Data inputting method, device, computer equipment and storage medium | |
| CN104580255B (en) | Authentication method and system of the identification equipment based on recognizable code stream to terminal device | |
| CN105844137B (en) | Device and method for identifying picture browsing operation authority | |
| WO2017215436A1 (en) | Information encryption and decryption method, device and terminal | |
| JP2000306090A (en) | Device and method for authenticating individual and recording medium | |
| CN106446713A (en) | Encryption method and system for database content | |
| CN104715180A (en) | Dual encryption system and method | |
| CN106022147A (en) | Method and device for file encryption and decryption |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |