SPEECH-LIKE INTERFERENCE RESISTANT TO NOISE REDUCTION METHODS AS A RESULT OF SCRAMBLING OF THE PROTECTED SPEECH

S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov
{"title":"SPEECH-LIKE INTERFERENCE RESISTANT TO NOISE REDUCTION METHODS AS A RESULT OF SCRAMBLING OF THE PROTECTED SPEECH","authors":"S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov","doi":"10.21681/2311-3456-2022-5-14-27","DOIUrl":null,"url":null,"abstract":"The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2022-5-14-27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
类语音干扰由于被保护语音的置乱而抵抗降噪方法
本文的目的是研究基于对受保护的语音信号进行置乱来创建类语音干扰(SLI)的可能性,这种干扰可以抵抗噪声,通过处理其频谱图图像来恢复和重建失真语音,包括使用说话人的语音数据库。方法:应用系统分析、数字频谱时间分析、信号和图像的数字处理、超声图像的图像分析。结果:提出以潜在语音可理解度的概念作为语音信息安全性的主要指标,确定了评估潜在语音可理解度的方法。提出了一种基于图像分析合成技术的补偿型数字噪声清除算法。创建SLI的要求是形成的,包括改变语音的频谱-时间包络,去除(“削弱”)语音谐波结构的痕迹,平衡受保护的语音信号和SLI屏蔽它的容量。本文描述了形成抵抗数字噪声清除和畸变超声图重建程序的SLI的方法,并就通过潜在可理解性指标评估干扰有效性的方法提出了建议。研究结果将有助我们更了解攻击工具的工作原理,发展有效对抗可能威胁的方法和手段,并扩展现有的语音信息保护系统的能力。科学的新颖性在于制定了评估类语音干扰有效性的标准,考虑到入侵者恢复扭曲语音信息的可理解性的能力,提出了形成符合这些标准的扰频器类型SLI的方法,提出了改进现有方法的建议,以评估和监测通过技术渠道泄漏的语音信息的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1