Abstract
White noise generators are typically applied for the systems of active interference in the design of systems for protecting verbal information. The level of speech information protection against leaking through acoustic and vibrational channels is determined by employing the appropriate normative method and technology. However, using the multi-channel methods for interception of language information, as well as modern methods for processing digital phonograms (wavelet transform, correlation analysis, etc.), allow the intruder to gain unauthorized access. Attempts to apply generators of speech-like noise based on the use of white noise (and its colored clones), reverberation methods, as well as the Language Choir method and some others, do not resolve the set task. In the framework of this research, we have proposed a technique to overcome these difficulties. It is based on using speech-like interference generators the type of scrambler and applying the objectivized method and a technology to assess the degree of verbal information protection at the border of controlled zone. The objectivized method combines methods for determining the criteria for speech residual intelligibility (methods by Pokrovski and Speech Intelligibility Index), methods for filtering complex noise acoustic signals (wavelet transforms, phonemic correlation analysis and others) and the method for comparing a test signal at the point of location of the signal source and at the border of controlled zone. That makes it possible to improve reliability of the resulting estimate of the level of linguistic signal protection against leaking via acoustic and vibration channels beyond the controlled zone’s borders. In order to investigate the level of protection of speech information at different types of the interference and at different ratios of signal/interference, we have designed a simulation model of the experiment. A technology has been proposed to synthesize test signals based on random phonograms and/or phonograms of articulation tables, recorded by voice narrators, and on mixing different types of interference noise at the assigned ratios of signal to interference. Our research was performed in the block «Wavelet 1-D» from the programming environment Matlab. It was established that when applying a noise interference, the type of white noise, and at the ratios of interference to signal of 20...24 dB, the proposed procedure improves the residual intelligibility of test signal from W≤10 % to W≈40…60 %.
Highlights
Speech information is the object of special attention from criminals wishing to operatively obtain fresh information about the activities of government agencies, various businesses, and organizations, as well as individuals
The aim of this study is to explore a possibility to construct a system of speech information protection, capable to meet the requirements in terms of protection from leaking via acoustic and vibration channels, while using modern methods and technologies for the filtration of noise interference
We recommend using a method for the formation of a speech-like interference of scrambler type for the active systems of speech information protection
Summary
Speech information is the object of special attention from criminals wishing to operatively obtain fresh information about the activities of government agencies, various businesses, and organizations, as well as individuals. Over the period of 201–2014, the world’s leading mass media were publishing revelatory materials related to the activities of secret services from the United States of America – National Security Agency (NSA) and the Central Intelligence Agency (CIA). The included information on listening to higher officials of foreign states, political and public figures. White noise generators (or of its colored clones) are typi cally applied for the systems of active interference when designing systems for protecting speech information. The level of speech information protection against leaking through acoustic and vibrational channels is determined by employing the appropriate normative method and technology. Use of the multi-channel methods for intercepting speech information or modern methods for processing digital phonograms (wavelet transform, correlation analysis, etc.) can allow the intruder to partially or even completely restore speech information
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Eastern-European Journal of Enterprise Technologies
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.