Technical Field
[0001] The invention relates to techniques for encrypting and decrypting information signals,
for example digital voice signals. More particularly, the invention relates to the
encryption and decryption of information signals based on polyphase filter banks.
Background
[0002] Keeping privacy in telecommunications, for example telephone conversations, is an
important requisite in many areas, such as in business, governmental or military fields.
While various techniques for the encryption of for example voice or speech in real
time exist, such techniques generally require considerable processing power. For this
reason, encryption technologies are typically not included as a standard feature in
communication devices. Encryption solutions for mobile devices such as cellular phones
additionally need to observe the particular requirements imposed by the limited available
energy in such a device and the small dimensions thereof.
[0003] For these reasons voice encryption technologies are often provided as a separate
unit (an 'add-on' device) to communication devices such as mobile phones. In principle,
an analogue voice signal is captured by a microphone, digitized and input into the
encryption add-on. After encryption, the add-on outputs the encrypted voice signal
to the mobile phone. The encrypted signal is then transmitted via a mobile network
to the receiving party, which may be another mobile phone. The encrypted signal is
provided to a decryption add-on, which reverts the encryption and outputs the decrypted
signal, for example back to the mobile phone.
[0004] One conventional technique for voice encryption is the subband analysis of speech
signals by using polyphase filters and the encryption of the signal via permutation
of individual subbands. On the one hand, such technology may avoid a complex synchronization
procedure such as a key exchange between encryption device and decryption device.
On the other hand, however, existing implementations of encryption and decryption
devices based on polyphase filter banks typically lead to a considerable deterioration
of speech quality which is due to the fact that an optimal reconstruction of the original
voice signal is not achieved. Moreover, in many implementations confidentiality is
compromised from time to time or depending on individual speakers, which appears to
be due to the fact that the permutation of subbands as performed in the current implementations
is not sufficient, such that the speech remains recognizable for at least some parts
of the communication.
Summary
[0005] There is a demand for a realtime encryption and decryption technique for information
signals such as voice signals, which achieves an appropriate level of confidentiality
while also meeting further requirements such as those discussed above including, for
example, minimizing complexity for a given degree of confidentiality, minimizing processing
resources, minimizing energy consumption or minimizing size of an encryption or decryption
device.
[0006] This demand is satisfied by a method of encrypting information signals. The method
comprises the steps of splitting, based on multiple analysis subband filters, an input
information signal into a set of signal subbands; performing an encryption operation
on one or more subbands of the set of subbands; and synthesizing, based on multiple
synthesis subband filters, the encrypted set of subbands into an output information
signal, wherein a particular synthesis filter is the product of all analysis filters
except the analysis filter corresponding in subband to the particular synthesis filter.
In some implementations, each of the synthesis filters of the synthesis filter bank
is configured in this way.
[0007] The above demand is further satisfied by a method of decrypting information signals.
This method comprises the steps of splitting, based on multiple analysis subband filters,
an input information signal into a set of signal subbands; performing a decryption
operation on one or more subbands of the set of subbands; and synthesizing, based
on multiple synthesis subband filters, the decrypted set of subbands into an output
information signal, wherein a particular synthesis filter is the product of all analysis
filters except the analysis filter corresponding in subband to the particular synthesis
filter. In some implementations, each of the synthesis filters of the synthesis filter
bank is configured in this way.
[0008] The above methods may be applied to any kind of digital (or analogue) information
signal including for example digital audio signals or digital voice or speech signals.
[0009] The signal subbands may be interleaved subbands. The analysis and/or synthesis subband
filters in both the above-outlined methods may be polyphase subband (component) filters.
The analysis subband filters may be chosen such that the product of all analysis subband
filters is all-pass, i.e. an input information signal would pass a filter implementing
the product of all analysis subband filters essentially unchanged.
[0010] In some implementations of either of the above methods, the multiple analysis filters
may be derived from a single prototype subband filter. In this case, the configuration
of the particular synthesis filter may be simplified. The prototype subband filter
may for example be a (proprietary or standardized) low pass finite impulse response
filter. The analysis / synthesis subband or component filters may be derived from
the prototype filter using, e.g., a factorization technique.
[0011] In some realizations of either one of the above methods, the number of signal subbands
can be varied in time. The time variation (or non-uniformity) of the signal subbands
may be selected according to a complexity of the information to be encrypted or decrypted,
which may be based on a measure of an energy distribution of the input information
signal in frequency. The number of signal subbands may be chosen such that the bit
distribution of the encoding is proportional to the complexity of information. The
analysis filters and correspondingly the synthesis filters may be adapted accordingly.
[0012] The encryption or decryption operation may comprise transforming the signal subbands
into frequency subbands. For example, a Fourier transformation, Laplace transformation
or Z-transformation may be performed. A corresponding inverse or back transformation
may also be included in the encryption (decryption) operation. In some modes of either
one of the methods, the analysis transformation may be an inverse Fourier or Z-transformation,
while the synthesis transformation is a corresponding back transformation.
[0013] The encryption or decryption operation may comprise a permutation of at least two
subbands. For example, in case the signal subbands are transformed into frequency
subbands, two or more frequency subbands may be permuted. In some implementations,
the permutation of subbands may be varied in time. The subbands to be currently permuted
may either be signalled from an encrypting device to a decrypting device, or the permutation
may be controlled by a control scheme which is in the same way or similarly implemented
in both devices. As an example, a permutation of subbands may be based on a signal
energy contained therein. For instance, the two subbands containing most of the signal
energy may be permuted with each other. This permutation could be reverted in the
decryption operation.
[0014] Additionally or alternatively to permuting subbands, the encryption operation may
comprise replacing at least one subband by noise. The noise has to be configured such
that the output information signal is unrecognisable with high probability. A corresponding
decryption operation may comprise removing noise from at least one subband based on,
for example, the detection that a noise level in a subband exceeds a predetermined
threshold or the detection of a pre-defined, particular signature imprinted on the
noise by the encryption operation.
[0015] The above-mentioned demand is satisfied by a further method for encrypting information
signals. This method comprises the steps of splitting, based on multiple analysis
subband filters, an input information signal into a set of signal subbands; performing
an encryption operation on one or more subbands of the set of subbands, wherein the
encryption operation comprises replacing at least one subband by noise; and synthesizing,
based on multiple synthesis subband filters, the encrypted set of subbands into an
output information signal.
[0016] A corresponding method for decrypting information signals comprises the steps of
splitting, based on multiple analysis subband filters, an input information signal
into a set of signal subbands; performing a decryption operation on one or more subbands
of the set of subbands, wherein the decryption operation comprises removing noise
from at least one subband; and synthesizing, based on multiple synthesis subband filters,
the decrypted set of subbands into an output information signal.
[0017] Various implementations, realizations and modes of these methods may be considered
which are similar to the implementations, realizations and modes of the first pair
of methods outlined further above.
[0018] The above-mentioned demand is further satisfied by a computer program product, which
comprises program code portions for performing the steps of one or more of the methods
and method aspects described herein when the computer program product is executed
on one or more computing devices, for example one or both of an encryption device
and a decryption device. The computer program product may be stored on a computer
readable recording medium, such as a permanent or rewriteable memory within or associated
with a computing device or a removable CD-ROM, DVD or USB-stick. Additionally or alternatively,
the computer program product may be provided for download to a computing device, for
example via a data network such as the Internet or a communication line such as a
telephone line or wireless link.
[0019] Still further, the above-mentioned demand is satisfied by an encryption device for
encrypting information signals. The device comprises a component adapted to split,
based on multiple analysis subband filters, an input information signal into a set
of signal subbands; a component adapted to perform an encryption operation on one
or more subbands of the set of subbands; and a component adapted to synthesize, based
on multiple synthesis subband filters, the encrypted set of subbands into an output
information signal, wherein a particular synthesis filter is the product of all analysis
filters except the analysis filter corresponding in subband to the particular synthesis
filter.
[0020] The above-mentioned demand is also satisfied by a decryption device for decrypting
information signals. The decryption device comprises a component adapted to split,
based on multiple analysis subband filters, an input information signal into a set
of signal subbands; a component adapted to perform a decryption operation on one or
more subbands of the set of subbands; and a component adapted to synthesize, based
on multiple synthesis subband filters, the decrypted set of subbands into an output
information signal, wherein a particular synthesis filter is the product of all analysis
filters except the analysis filter corresponding in subband to the particular synthesis
filter.
[0021] Regarding still another aspect, the above-mentioned demand is also satisfied by a
further encryption device for encrypting information signals. This device comprises
a component adapted to split, based on multiple analysis subband filters, an input
information signal into a set of signal subbands; a component adapted to perform an
encryption operation on one or more subbands of the set of subbands, wherein the encryption
operation comprises replacing at least one subband by noise; and a component adapted
to synthesize, based on multiple synthesis subband filters, the encrypted set of subbands
into an output information signal.
[0022] A corresponding device for decrypting information signals also satisfies the above
demand and comprises a component adapted to split, based on multiple analysis subband
filters, an input information signal into a set of signal subbands; a component adapted
to perform a decryption operation on one or more subbands of the set of subbands,
wherein the decryption operation comprises removing at least one subband which represents
noise; and a component adapted to synthesize, based on multiple synthesis subband
filters, the decrypted set of subbands into an output information signal.
[0023] The abovementioned demand is further satisfied by an encryption (decryption) device
comprising the encryption device as outlined above and the decryption device as outlined
above. The encryption (decryption) device may be adapted to the encryption (decryption)
of voice or speech signals and may be particularly configured as an add-on device
for mobile phones.
[0024] The abovementioned demand is still further satisfied by a communication device, wherein
the communication device comprises at least one of the encryption device and the decryption
device as outlined above. The communication device may comprise a mobile phone, wherein
the encryption device and/or decryption device may be implemented as hardware, software,
or a combination thereof. Another implementation of the communication device comprises
a headset connectable to a mobile phone. For example, the headset may be an external
headset with processing capabilities for connection with a mobile phone via Bluetooth
or a similar wireless connection technique.
[0025] Any of the above-outlined devices may be implemented based on an FPGA (Field-Programmable
Gate Array). Additionally or alternatively, at least a portion of a circuitry of any
one of the above-outlined devices may be adapted for parallel processing. For example,
the parallel processing may be realized based on the aforementioned prototype subband
filter. An implementation of the above-mentioned headset may comprise an encryption
and/or decryption device implemented on an FPGA with parallel processing capabilities.
Brief Description of the Drawings
[0026] In the following, the invention will further be described with reference to exemplary
embodiments illustrated in the figures, in which:
- Fig. 1
- schematically illustrates an embodiment of a system for encrypting and decrypting
an information signal;
- Fig. 2
- illustrates functional blocks of an encryption device of the system of Fig. 1;
- Fig. 3
- is a flow diagram illustrating an operation of the encryption device of Fig. 2;
- Fig. 4
- illustrates functional blocks of a decryption device of the system of Fig. 1;
- Fig. 5
- is a flow diagram illustrating an operation of the decryption device of Fig. 4;
- Fig. 6
- is a flow diagram illustrating encryption operations performed by the encryption device
of Fig. 2;
- Fig. 7
- is a flow diagram illustrating decryption operations performed by the decryption device
of Fig. 4; and
- Figs. 8a-d
- illustrate functional aspects of the analysis / synthesis filters of the devices of
Figs. 2 and 4.
Detailed Description of Preferred Embodiments
[0027] In the following description, for purposes of explanation and not limitation, specific
details are set forth in order to provide a thorough understanding of the current
invention. It will be apparent to one skilled in the art that the current invention
may be practiced in other embodiments that depart from these specific aspects. For
example, the skilled artisan will appreciate that the current invention may be practised
not only with mobile (cellular, cordless) phones or more general with mobile or wireless
communications, but also with wireline communications, i.e. wireline, landline or
stationary phones including, e.g. IP phones ("Voice over IP").
[0028] The techniques described below may not only be applied to encryption and decryption
of digital voice or speech signals, but to any kind of audio signals or more generally
information signals including, for example, video signals, facsimilie data, electronic
files (file transfer) or electronic data. Besides that, the techniques described herein
may not only be used in conjunction with digital signal processing, but also analogue
signal processing.
[0029] Those skilled in the art will further appreciate that functions explained hereinbelow
may be implemented using individual hardware circuitry, but also using software functioning
in conjunction with a programmed microprocessor, field-programmable gate array (FPGA),
application specific integrated circuit (ASIC) and/or one or more digital signal processors
(DSPs). Further, instead of being provided as an add-on to, e.g., cellular phones,
an encryption and/or decryption device may also be implemented purely software-based
depending on the processing capabilities of current or future general purpose processing
hardware available for, e.g., mobile phones.
[0030] Fig. 1 illustrates an embodiment of a system 100 for the encryption and decryption
of digital audio signals. The system comprises an analogue audio input device 102,
an Analogue-to-Digital(A/D) unit 104, an encryption device 106 and a cellular phone
108 in communication via a mobile network 110 with a receiving mobile phone 112, a
decryption device 114, a Digital-to-Analogue (D/A) unit 116 and an analogue audio
output device 118. The audio input device 102 may be a microphone, while the audio
output device 118 may be a loudspeaker.
[0031] The encryption device 106 may be a hardware add-on which may or may not be specifically
adapted to the mobile phone 108. For example, the encryption device 106 may be connected
to a conventional interface to the mobile phone 108, such as a headset interface as
it is conventionally used for hands-free operation of mobile phones. In this way,
the encryption device may replace a headset or may be connected in between the headset
and the mobile phone. The A/D-unit 104 may be provided on a common hardware with either
one or both of the microphone 102 and encryption device 106 or may be provided as
a stand-alone unit. In some configurations the audio input 102 may be a microphone
integrated in mobile phone 108.
[0032] A user speaks into the audio input device 102, which generates an analogue electrical
representation of the voice or speech input. The electrical signal is provided to
the A/D-unit 104, which samples the signal and generates a digital representation
120 thereof. The digital voice signal 120 is input to the encryption device 106, which
encrypts the signal as will be described in detail further below. The encrypted output
signal 122 is provided to the mobile phone 108 in digital or analogue form. In the
embodiment described here it is assumed that the encryption device 106 outputs digital
encrypted voice signals.
[0033] The signal 122 provided to the mobile phone 108 is transmitted via the mobile network
110 towards the receiving party, i.e. mobile phone 112. From there, the received encrypted
voice signal is forwarded 124 to the decryption device 114. It depends on the details
of the implementation whether the received encrypted voice signal 124 is provided
to the decryption device 114 in digital or analogue form. In the embodiment described
here, it is assumed that the signal 124 is input to the decryption device as a digital
signal.
[0034] The decryption device 114 decrypts the encrypted voice signal 124. The decrypted
voice signal 126 is fed to the D/A-unit 116 which provides an analogue representation
of the audio signal 126 to the audio output 118. The decryption device 114 may, for
example, be connected in between the mobile phone 112 and a headset which includes
the D/A-unit 116 and audio output 118. As one alternative, the D/A-unit 116 may be
implemented on a common hardware with the decryption device 114. In some configurations
the audio output 118 may be a loudspeaker 118 integrated in mobile phone 112.
[0035] Any of the encryption device 106 and the decryption device 114 may, for example,
be implemented on an FPGA platform and may, depending on the concrete operational
environment, include A/D-converter and/or D/A-converter, although these are illustrated
as separate units in Fig. 1. An encryption device (decryption device) may further
comprise various connectors for microphone, earphones, USB port, Ethernet interface,
RS-232 port, etc.
[0036] Fig. 2 illustrates functional building blocks of the encryption device 106 of Fig.
1. The input voice signal 120 is processed by an analysis filter bank 204, a scalar-to-vector
conversion unit 206, a transformation component 208, a permutation component 210 and
a noise generator 212 associated therewith, a further transformation component 214,
a vector-to-scalar conversion unit 216 and a synthesis filter bank 218, which outputs
the encrypted audio signal 122 (cf. Fig. 1).
[0037] An operation of the encryption device 106 will now be described with reference to
the flow diagram of Fig. 3. Generally, the encryption device 106 operates to encrypt
digital information signals, more particularly the digital voice signal 120. In other
embodiments, an input information signal may be an analogue signal. An encryption
device may then comprise an A/D-unit similar to A/D-unit 104 of Fig. 1.
[0038] In step 302, the input voice signal 120 is provided to the analysis filter bank 204,
which operates to split the input voice signal 120 into a set of signal subbands.
It is assumed that the filter bank 204 is a polyphase filter bank comprising multiple
analysis subband filters (component filters) generating a set of interleaved subbands.
While in the example illustrated in Fig. 2 the input signal 120 is split into 16 subbands
220, in other embodiments a smaller or larger number of subbands may be configured.
The multiple analysis filters of the filter bank 204 may be derived from a single
prototype subband filter, which may be a standardized or a proprietary lowpass finite
impulse response (FIR) filter. The desired number of analysis subband filters (polyphase
component filters), may be derived therefrom by using a factorization technique.
[0039] In step 304, at least one encryption operation is performed on one or more subband
of the set of subbands 220 generated by the filter bank 204. Details on the encryption
operations will be described with reference to Fig. 6 further below. As a result of
the encryption operations performed, in step 306 an encrypted set of subbands 222
is provided to the synthesis filter bank 218, which operates to synthesize the encrypted
set of subbands 222 into the output voice signal 122. The filter bank 218 may be configured
similarly as the analysis filter bank 204, i.e. may also be a polyphase filter bank
comprising multiple (synthesis) subband filters. As will be discussed further below,
the synthesis filters are adjusted in a way complementary to the analysis filters
of filter bank 204. Specifically, each of the synthesis filters is a product of all
analysis filters of filter bank 204 except the analysis filter which corresponds in
subband to the particular synthesis filter. The reasons for this choice will be discussed
with reference to Figs. 8a-8d.
[0040] Fig. 4 illustrates functional building blocks of the decryption device 114 of Fig.
1. The encrypted input voice signal 124 is processed by an analysis filter bank 402,
a scalar-to-vector conversion unit 404, a transformation component 406, a permutation
component 408, a noise remover 410, a further transformation component 412, a vector-to-scalar
conversion unit 414 and a synthesis filter bank 416, which outputs the decrypted audio
signal 126 (cf. Fig. 1).
[0041] An operation of the decryption device 114 will be described with reference to the
flow diagram of Fig. 5. Generally, the decryption device 114 operates to decrypt digital
information signals, more particularly the digital voice signal 124. In other embodiments,
an encrypted input information signal may be an analogue signal. A decryption device
may then comprise an A/D-unit. Generally, the components 402 - 416 may be configured
similar in various aspects to the components 204 - 218 of the encryption device 106.
A repetition of such aspects is therefore omitted.
[0042] In step 502, the analysis filter bank 402 operates to split the (encrypted) input
voice signal 124 into a set of signal subbands. The analysis subband filters of the
filter bank 402 may be configured similar to the filters of filter bank 204 in the
encryption device 106. For example, the same prototype filter may be used to derive
the filters for the banks 204 and 402 therefrom. In step 504, at least one decryption
operation is performed on one or more of the set of subbands 418 output by the analysis
filter bank 402. Details on the decryption operations will be described with reference
to Fig. 7 below. In step 506, the decrypted set of subbands 420 is provided to the
synthesis filter bank 416, which operates to synthesize, based on multiple synthesis
subband filters, the decrypted set of subbands 420 into the decrypted output voice
signal 126 (cf. Fig. 1).
[0043] Fig. 6 illustrates encryption operations which may be performed in the course of
step 304 of Fig. 3 and which are described taking reference of the encryption device
106 in Fig. 2. In step 602 the signal subbands generated in filter bank 204 are transformed
into frequency subbands. Specifically, the scalar-to-vector conversion unit 206 converts
the signal subbands 220 into a vector 224 which is then input into the transformation
component 208. This component performs an Inverse Discrete Fourier Transformation
(IDFT) of the input vector 224. The resulting output is a set of frequency subbands
226. It is to be noted that the scalar-to vector conversion unit 206 operates to specifically
configure the subbands 220 for input to the IDFT component 208. In other embodiments,
a component different from unit 206 may be provided. In still other embodiments, no
component at all may be provided and the subbands generated by the filter bank may
be input directly into a transformation component. Similar considerations hold for
the vector-to-scalar conversion unit 216 discussed below.
[0044] In step 604, the permutation component 210 performs a permutation of at least two
of the set of subbands 226. This permutation may be performed the same all the time
or may be varied in time during the operation of the encryption device 106. A time
variation of the permutation may be performed following a fixed predefined scheme
and/or may be controlled dependent on properties of the voice signal to be encrypted.
As an example, a signal energy may be detected for at least a subset of the set of
frequency subbands. Permutations may then, for example, be performed on those subbands
containing most of the signal energy. This will in typical situations lead to an appropriate
encryption of voice or similar information carrying signals, as an insufficient scrambling
due to a permutation of empty subbands is avoided. Further, the permutation process
may be easily reverted in the decryption device without the need for an extra signalling.
Consider a permutation of the two subbands containing most of the signal energy: Performing
exactly the same processing in the decryption device would revert the permutation
and would in this way decrypt the encrypted signal. However, in some embodiments in
which time-varying encryption is applied, parameters for properly controlling a decryption
may be signalled to the decryption device. Such signalling may be performed in-line,
i.e. embedded within the encrypted information signal, or in any other way.
[0045] In step 606, the noise generator 212 operates to replace at least one of the frequency
subbands 226 by noise. The noise may be, for example, white noise which may or may
not be randomly generated. An intensity of the noise has to be sufficient such that
the speech signal becomes unrecognizable and that cryptoanalytic attacks on the encrypted
information signal are prevented. The noise intensity may be predetermined or may
be controlled based on, for example, a signal energy measured from one or more of
the subbands or the input information signal 120. For instance, the signal energies
measured for controlling a permutation process may also be used for controlling the
noise to be injected into the signal. In some embodiments, an in-line signalling may
be imprinted on the noise in order that the decryption device may properly control
a decryption, as discussed above.
[0046] The subband(s) to be replaced by noise may be fixed. For example, a frequency subband
known to generally carry low signal energy for the case of human speech may be chosen.
Additionally or alternatively, based on a measurement of subband signal energies,
one or more subbands containing a signal energy below a predetermined threshold or
containing the lowest signal energy in the set of subbands may be selected for noise
injection.
[0047] In step 608, the transformation component 214 perform the inverse transformation
to the transformation performed by the transformation component 208. In the embodiment
illustrated in Fig. 2, the transformation component 214 performs a Discrete Fourier
transformation (DFT). The resulting vector 230 is fed to the vector-to-scalar conversion
unit 216 which outputs the encrypted set of signal subbands 222 to the synthesis filter
bank 218, as has been described already above.
[0048] While the steps 604 and 606 are illustrated in Fig. 6 as following on each other,
it is to be noted that subband permutation and noise injection may be performed in
any order and may also be performed in parallel to each other. Further, an encryption
device may perform only one of these operations. For example, a particular encryption
device may only perform the subband permutation or may only perform noise injection.
Still other encryption devices may be set into different confidentiality modes according
to a desired confidentiality level (security level). Such a level may be measured,
for example, by estimates of the efforts (processing power) required for an attacker
to decrypt the encrypted information signal. The device confidentiality modes may
differ from each other by switching on or off or configuring in different ways one
or more of the above encryption operations. Moreover, such a multi-mode encryption
(or decryption) device may be manually or automatically adjusted to its decryption
(or encryption) counterpart, which may be of a different model series etc., at the
other end of the communication line.
[0049] Fig. 7 illustrates decryption operations which may be performed in the course of
step 504 of Fig. 5 and which are described taking reference of the decryption device
114 of Fig. 4. It is generally to be noted that many units and components of the decryption
device 114 may operate similarly to the corresponding units and components of the
encryption device 106 (in some embodiments, all units and components may operate similar).
In particular, the filter banks 402 and 416 of device 114 may exactly correspond to
the filter banks 204 and 218 of device 106. In case of a combined device for encryption
and decryption, which may be used in an ongoing communication to encrypt outgoing
signals and decrypt incoming signals in an alternating fashion, one and the same combination
of analysis filter bank and synthesis filter bank may be used for the encryption and
the decryption. Thus, only a single analysis filter bank and a single synthesis filter
bank may be required. Similarly, only one set of encryption and decryption components
may be required for performing the encryption and decryption operations (however,
the noise injection cannot simply be reverted).
[0050] In step 702 the encrypted signal subbands 418 are transformed into frequency subbands.
The components 404 and 406 of the encryption device 114 may operate similar to the
components 206 and 208 of the encryption device in Fig. 2; therefore the detailed
description of step 602 applies similarly also to the components 404 and 406. The
output of the transformation component 406 is a set of frequency subbands 422. In
step 704, the permutation component 408 operates to perform a permutation of at least
two subbands from the set of subbands 422. In order for a successful decryption, the
permutation performed by the permutation component 210 in the encryption device 106
has to be reverted. How to correctly reverse the permutation process performed in
the encryption device 106 depends on the details thereof.
[0051] In case a fixed permutation scheme is implemented by the permutation device 210,
the reverse permutation scheme will also be a fixed scheme, and may even be exactly
the same scheme. In case the permutation is varied in time according to a prescribed
scheme, the component 408 may apply a similar scheme, however, some time synchronization
would then be required between components 210 and 408. In case of a random permutation
scheme, a more extensive signalling would be required which indicates the momentary
permutation configuration to the permutation component 408. Such signalling mechanism
may comprise in-line signalling, which may for example be imprinted on the noise by
the noise generator 212 in Fig. 2.
[0052] In case a permutation is controlled by parameters related to properties of the current
information signal, both the permutation components 210 and 408 may determine parameters
from the (encrypted) signal in the same way. This requires that parameters are used
as permutation control parameters which are not changed by the permutation or any
other encryption operations. As an example, the signal energy contained in each of
the frequency subbands may be determined. This parameter set will not be changed by
permutation, and noise injection may preferably only affect low energy subbands. Thus,
in case the encryption permutation comprises permuting the two frequency bands containing
most of the signal energy, this can be reverted in the decryption stage without any
signalling. In this specific case, the permutation component 408 may act exactly similar
as the permutation component 210 in order to revert the permutation performed therein.
[0053] In step 706, the noise remover 410 operates to remove noise from those subbands to
which noise has been added by the noise generator 212 in the encryption device 106.
In case the noise generator 212 replaces a signal by noise in fixedly prescribed subbands,
the noise remover 410 may replace noise by silence (zero signal energy) in these subbands.
In case the noise generator 212 determines subbands with low signal energy, the noise
remover 410 has to detect the one or more subbands of the set of subbands 422 which
contain noise. The component 410 requires decision logic in this respect in order
to decide whether a subband is filled, for example, by white noise. In case the noise
generator 212 in the encryption device 106 imprints a particular "noise ID" signature
on the noise, the noise remover 410 may specifically search for such noise ID in the
set of frequency subbands 422. In case such a noise ID is detected in a frequency
subband, the signal in this subband is replaced by silence.
[0054] In step 708, the transformation components 412 and 414 act to back-transform the
decrypted frequency subbands 424. The back transformation may be performed in a way
as has been described with reference to the components 214 and 216 of the encryption
device 106; this description may therefore be referred to.
[0055] The sequence of steps 704 and 706 may be performed in any order, parallel to each
other, or only one of these steps may be performed. The corresponding discussion of
steps 604 and 606 is referred to.
[0056] Turning to the configuration in detail of the filter banks in the encryption device
106 and decryption device 114, it is generally to be noted that the analysis and synthesis
of the unencrypted voice signal in the encryption device 106 and of the encrypted
voice signal in the decryption device 114 may be performed in the same way. Therefore,
while for the sake of brevity in the following it is only referred to the analysis
filter bank 204 and synthesis filter bank 218 of the encryption device 106, it is
to be understood that these considerations hold similarly for the analysis filter
bank 402 and the synthesis filter bank 416 of the decryption device 114.
[0057] In order to minimize speech deterioration during encryption and decryption of a voice
signal, it is required that the synthesis subband filters are configured complementary
to the analysis subband filters. More specifically, one or more of each of the filter
functions for the synthesis subband filters may be configured as the product of all
filter functions of the analysis filters except the filter function for the analysis
filter corresponding in subband to the synthesis filter to be configured. A derivation
is presented in the following proving plausibility of this concept.
[0058] The analysis filters (filter functions, polyphase components or subphase filters
of the analysis filter bank) are denoted as E
i, i = 0, 1, ..., M-1; i.e., there are M polyphase components in the analysis filter
bank. Further, H denotes the product of all analysis filters E
i ,

Then, the concept that a particular synthesis filter should be the product of all
analysis filters except the analysis filter corresponding in subband to the particular
synthesis filter can be formulated as: The kth polyphase component in the synthesis
filter bank should be H/Ek.
[0059] Fig. 8a schematically illustrates a signal processing system accepting a digital
input signal x [n] and providing an output signal y [n]. The signal x [n] is processed
by M branches, each branch applying the product of filter functions F
1(z), F
2(z), ..., F
M(z) =u[n]. As the system of Fig. 8a is intended as a model for the encryption and
decryption of an information signal without signal deterioration, it is demanded that
the behaviour of the system should be all-pass, i.e. x[n] = y[n] (ignoring factors
of 1/M). Let X(z), Y(z) and U
k(z) represent the z-transforms of x(z), y(z) and u
k(z). In this case,

and

[0060] For the system behaviour being all-pass, the filter functions have to satisfy the
condition that

is all-pass.
[0061] Fig. 8b illustrates the system of Fig. 8a wherein the filter functions F(z) have
been rearranged. Still, the system behaviour is all-pass. An identity matrix may be
inserted at the point A indicated in Fig. 8b, which also leaves the operation of the
system unchanged.
[0062] In order to apply the system arranged as in Fig. 8b to the analysis and synthesis
of information signals, we identify the filter functions F(z) with the polyphase coefficients
E(z) and insert at the point A in Fig. 8b the product of the inverse and direct FFT
matrices as the identity matrix. The resulting filter H is depicted in Fig. 8c. Insertion
of H as shown in Fig. 8c into the system of Fig. 8b leads to the system of in Fig.
8d, which schematically illustrates an operation principle of encryption device 106
or decryption device 114. Note that the encryption or decryption operations discussed
above are performed at the point indicated by arrow 802.
[0063] Assuming the filter bank (set of analysis filters) 204 of the device 106 is represented
by the set of filters 804 in Fig. 8d, the filter bank 218 is represented by the set
of filters 806 in Fig. 8d. The synthesis filters 806 are complementary to the analysis
filters 804. For example, the synthesis filter corresponding to the analysis filter
E
0 (i.e. the synthesis filter which corresponds to the analysis filter in the 0
th subband) is E
1 E
2 ... E
M-1 , the synthesis filter corresponding to the analysis filter E
1 is E
0 E
2 ... E
M-1 , etc., and the synthesis filter corresponding to the analysis filter E
M-1 is E
0 E
1 ,.. E
M-2 .
[0064] In an embodiment in which the multiple analysis filters 804 are derived from a single
prototype subband filter E, the synthesis filters 806 can be constructed based only
on the prototype E in order to achieve an optimal reconstruction of the original input
information signal x[n]. The original signal is approximated as

[0065] The above-described approach allows static and dynamic filter banks. For instance,
the signal subbands can be varied in time, i.e. non-uniform filter banks can be realized,
wherein the bit distribution of the encoding is proportional to the complexity of
the information carried in each subband. In this way, the signal subbands may be varied
in time based on an energy distribution of the information signal in frequency. In
other embodiments, the signal subbands may be varied in time according to a predefined
scheme, which would have to be known to the receiver also. As a general example for
a time-variation, in a non-uniform filter bank one or more of the vertical stages
of the analysis and synthesis filter banks may be omitted leading to ½ or ¼ of the
resolution.
[0066] The techniques proposed herein allow an optimized reconstruction of the original
information signal after encryption and decryption. This is based on the fact that
the filters used in the synthesis phase of the encryption and decryption devices are
configured complementary to the filters used in the analysis phase, and this avoids
alias components appearing in the synthesized signal. At the same time, the complementary
approach allows a simplified construction of the synthesis filters, which are based
on the analysis filters. In case a prototype (or sample or template) filter is used
for construction of the analysis filters, the construction of the synthesis filters
is also particularly simplified. In some embodiments the prototype filter, which may
be provided e.g. in the form of a hardware implementation, is re-used for all filters
of the analysis and synthesis filter banks. This allows a considerable reduction of
resource usage, power consumption and size of the encryption or decryption device.
[0067] Further, employing subband-based technology allows parallel processing which in turn
leads to low energy consumption and/or a minimization of latency being an important
factor for man-man synchronous communication. The parallel processing may, for example,
ensure that latency is uniformly distributed across the frequency spectrum. An FPGA
may be used for implementing the parallel processing, which further reduces complexity
and power consumption. In another approach to save processing efforts, the number
of encoded and encrypted bits may be selected based on, for example, the distribution
of signal energy over the frequency spectrum. The proposed techniques allow further
optimizations related to a detection and deletion of silence periods in the voice
signal.
[0068] The conventional encryption by frequency permutation often do not lead to a satisfying
scrambling of the original signal, which is basically due to the relatively narrowband
nature of human speech in a transmission channel. As proposed herein, confidentiality
can be increased by exploiting the typically non-uniform distribution of energy in
the information signal over the frequency spectrum. For example, a signal energy distribution
of frequency subbands can be determined. Preferably subbands carrying high signal
energy may be permuted. Moreover, it is proposed the option to add noise to subbands,
for example subbands of low signal energy. Vice versa, a given desired level of confidentiality
may be reached - employing the techniques proposed herein - with less processing efforts,
which serves to reduce the processing efforts and required bandwidths. Further, a
decryption device may be configured to ignore some of the frequency bands which the
device knows to contain noise, which may lead to further savings in terms of processing
resources, energy consumption, etc.
[0069] It is also proposed an encryption/decryption system with a configurable level of
security (confidentiality), i.e. a system allowing an adjustment of the complexity
of the encryption operation(s). For example, different security levels may be defined
based on the number of frequency bands permuted and/or the number of frequency bands
which are replaced by noise. The analysis of the (frequency) subbands, for example
with regard to the distribution of the signal energy, may also be adjusted according
to the required security level, i.e. complexity of encryption or decryption operations.
[0070] On the other hand, an encryption and/or decryption system operating according to
the techniques proposed herein may also be implemented on a common hardware with a
communication device, for example in a smartphone, notebook, etc.
[0071] The proposed techniques allow implementing an encryption device, decryption device
or combined device on a simplified circuitry with small footprint and which is straightforwardly
connectable to a communication device such as a mobile phone and with minimal requirements
on processing power, memory and/or power supply. No further external peripheral devices
may be needed.
[0072] While the current invention has been described in relation to its preferred embodiments,
it is to be understood that this description is for illustrative purposes only. Accordingly,
it is intended that the invention be limited only by the scope of the claims appended
hereto.
1. A method of encrypting information signals, the method comprising the steps of
- splitting (302), based on multiple analysis subband filters (204), an input information
signal (120) into a set of signal subbands (220);
- performing (304) an encryption operation on one or more subbands of the set of subbands;
and
- synthesizing (306), based on multiple synthesis subband filters (218), the encrypted
set of subbands (222) into an output information signal (122),
wherein a particular synthesis filter is the product of all analysis filters except
the analysis filter corresponding in subband to the particular synthesis filter.
2. A method of decrypting information signals, the method comprising the steps of
- splitting (502), based on multiple analysis subband filters (402), an input information
signal (124) into a set of signal subbands (418);
- performing (504) a decryption operation on one or more subbands of the set of subbands;
and
- synthesizing (506), based on multiple synthesis subband filters (416), the decrypted
set of subbands (420) into an output information signal (126),
wherein a particular synthesis filter is the product of all analysis filters except
the analysis filter corresponding in subband to the particular synthesis filter.
3. The method according to claim 1 or 2,
wherein the product of all analysis subband filters (204, 402) is all-pass.
4. The method according to any one of the preceding claims,
wherein the multiple analysis filters (204, 402) are derived from a single prototype
subband filter.
5. The method according to any one of the preceding claims,
wherein the encryption or decryption operation comprises transforming (602) the signal
subbands (220, 418) into frequency subbands (226, 422).
6. The method according to any one of the preceding claims,
wherein the encryption or decryption operation comprises a permutation (604) of at
least two subbands.
7. The method according to claim 6,
wherein the permutation is varied in time.
8. The method according to any one of claims 1 and 3 to 7,
wherein the encryption operation comprises replacing (606) at least one subband by
noise.
9. The method according to any one of claims 1 and 3 to 8,
wherein the number of signal subbands is varied in time.
10. A method of encrypting information signals, the method comprising the steps of
- splitting (302), based on multiple analysis subband filters (204), an input information
signal (120) into a set of signal subbands (220);
- performing (304) an encryption operation on one or more subbands of the set of subbands,
wherein the encryption operation comprises replacing (606) at least one subband with
noise; and
- synthesizing (306), based on multiple synthesis subband filters (218), the encrypted
set of subbands (222) into an output information signal (122).
11. A method of decrypting information signals, the method comprising the steps of
- splitting (502), based on multiple analysis subband filters (402), an input information
signal (124) into a set of signal subbands (418);
- performing (504) a decryption operation on one or more subbands of the set of subbands,
wherein the decryption operation comprises removing (706) noise from at least one
subband; and
- synthesizing (506), based on multiple synthesis subband filters (416), the decrypted
set of subbands (420) into an output information signal (126).
12. A computer program product comprising program code portions for performing the method
according to any one of the preceding claims when the computer program product is
executed on one or more computing devices.
13. An encryption device (106) for encrypting information signals, comprising:
- a component (204) adapted to split, based on multiple analysis subband filters,
an input information signal (120) into a set of signal subbands (220);
- a component (206 - 216) adapted to perform an encryption operation on one or more
subbands of the set of subbands; and
- a component (218) adapted to synthesize, based on multiple synthesis subband filters,
the encrypted set of subbands (222) into an output information signal (122),
wherein a particular synthesis filter is the product of all analysis filters except
the analysis filter corresponding in subband to the particular synthesis filter.
14. A decryption device for decrypting information signals, comprising:
- a component (402) adapted to split, based on multiple analysis subband filters,
an input information signal (124) into a set of signal subbands (418);
- a component (404 - 414) adapted to perform a decryption operation on one or more
subbands of the set of subbands; and
- a component (416) adapted to synthesize, based on multiple synthesis subband filters,
the decrypted set of subbands (420) into an output information signal (126),
wherein a particular synthesis filter is the product of all analysis filters except
the analysis filter corresponding in subband to the particular synthesis filter.
15. An encryption and decryption device comprising the encryption device according to
claim 13 and the decryption device according to claim 14, adapted in particular as
an add-on device for mobile phones.
16. A communication device, in particular a mobile phone or a headset connectable to a
mobile phone, comprising at least one of the encryption device according to claim
13 and the decryption device according to claim 14.