Метод завадостійкого кодування мовного повідомлення з прихованим вбудовуванням додаткової інформації

2020 
The article deals with the actual question of providing a given level of information security of the Air Force aviation in the conditions of modern armed confrontation. The principle of functioning of different elements of the Armed Forces in a single information space is considered. Samples of existing domestic and foreign equipment for the exchange of information messages are analyzed. On the basis of the analysis, it was discovered that the existing radio station of the domestic specimen does not meet modern requirements for the protection of information. At the same time, the radio station 9681 V/UHF  provides the bandwidth requirements of the data channels and the level of security. But the modernization of aircraft on the basis of the considered radio station requires significant material costs and implementation of NATO standards. The article "Method of hidden transfer of information in voice message" is analyzed.  The analysis revealed that the developed method of hidden transmission of information in a voice message has disadvantages, namely: 1)insufficient capacity; 2)the distortions that appear during the transition to the frequency range; 3)complexity in calculation; 4)evaluation of the method in the conditions of deliberate distortion was not considered. To remedy the identified shortcomings, it is suggested to use a fault-tolerant Hamming code, which provides for the detection and correction of errors that occurred during the transmission of a voice message. In this case, a hidden data channel is created. The extraction of embedded information is implemented on the receiving side by determining the position of the embedded bit. The restoration of the original voice message is carried out on the basis of reverse decoding with error correction.  Based on Hamming's coding, a method was developed to hide additional information in a voice message. A system of direct and reverse coding was developed based on the method. Simultaneously with the realization of the confidentiality of voice messages, the method additionally takes into account the issues of ensuring the integrity, accessibility and quality of information.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []