User Identification and Cipher Synchronization in Speech information hiding
Absimcf-User identification must be done in speech information hiding. To shorten the time of building link and exchanging protocol, this paper presents a technology for fast cross-identification. To enhance the security of communication, encryption should be done before hiding information. After encryption, secure info is hidden in the host info which has been recorded. Bccause speech communications arc on thc full-duplex synchronization link and have burst of communications, ,so we use the same encryption nnd decryption algori thms on both sides to avoid increasing operation spending which will bc caused if using different encryption and decryption algorithms. A strict synchronization algorithm is requested, 50 the cycle buffcr synchronization algorithm is presented.
用户评论