An Algorithm for Forming an Adaptive Speech-Like Interference to Protect Confidential Speech Information in Office Spaces
https://doi.org/10.31854/1813-324X-2025-11-5-21-27
EDN: IRBHCD
Abstract
Relevant. Current trends in information security research are driven by the growing number of threats associated with the leakage of speech information from premises via acoustic and vibroacoustic channels. Current methods of passive and active protection of premises, based on noise generation and the use of libraries of pre-recorded audio signals, do not always achieve the required level of protection due to a lack of adaptation to the parameters of real speech and the acoustic environment in the premises, as well as due to disregard for regulatory requirements regarding indoor noise levels. All this has necessitated the development of new algorithms for the active protection of office premises from leakage, particularly via acoustic-vibrational channels, based on the use of speech signals from participants in negotiations.
The aim of the study is to ensure the required verbal intelligibility coefficient at the boundary of a controlled office area by improving active information protection systems through the development and application of an algorithm for generating speech-like interference that is adaptive to changes in the speech parameters of negotiators, the office environment, and noise level regulations. Information theory and digital signal processing methods were used to solve these problems.
In result an algorithm for generating adaptive speech-like interference for use in active information protection systems in offices has been developed. The proposed algorithm for generating adaptive speech-like interference allows it to be generated from the speech signals of negotiators only when they are present, thereby enhancing the interference's masking properties.
The novelty of the study lies in the introduction of multichannel procedures for generating adaptive speech-like interference.
The theoretical significance of this research lies in expanding our understanding of methods, models, and techniques for adaptive acoustic masking of speech information and developing an algorithm for generating speech-like interference based on speech parameter analysis.
Practical significance. The developed algorithm can be implemented using standard computing devices and acoustic systems. This makes it applicable to both current and future active speech protection systems.
References
1. Suprun A.F. Technical Information Security. Part 1. Peter the Great St. Petersburg Polytechnic University Publ.; 2021. 242 p. (in Russ.)
2. Golubinskiy A.N. Calculation of the Pitch Frequency of a Speech Signal on the Basis of Polyharmonical Mathematical Model. Vestnik of Voronezh Institute of the Ministry of the Interior of Russia. 2009;1:81–89. (in Russ.) EDN:JXUTKN
3. Volchikhina M.V., Fursova A.V. Model of Adaptation of Information Security Means Parameters to Speech Parameters of Negotiation Subjects in an Office-Type Premises. Vestnik of Voronezh Institute of the Ministry of the Interior of Russia. 2024;1:108–114. (in Russ.) EDN:NLOJVC
4. Volchikhina M.V. A Method for Adapting the Parameters of Information Security Tools Using a Discrete Change in the Amplitude and Timbre of the Subjects of Negotiations. Transactions of TSTU. 2022;28(2):226–234. (in Russ.) DOI:10.17277/ vestnik.2022.02.pp.226-234. EDN:AXWBIH
5. Sheluhin O.I. Network Anomalies. Detection, Localization, Forecasting. Moscow: Goryachaya Liniya – Telecom Publ.; 2020. 447 p. (in Russ.)
6. Katorin Yu.F., Razumovsky A.V., Spivak A.I. Information Security by Technical Means. St. Petersburg: National Research University ITMO Publ.; 2012. 416 p. (in Russ.)
7. Tsaregorodtsev A.V., Taraskin M.M. Methods and Means of Information Protection in Public Administration. Moscow: Prospect Publ.; 2017. 205 p. (in Russ.)
8. Lynkov L.M., Golikov V.F., Borbotko T.V. Fundamentals of Information Protection and Intellectual Property Management. Minsk: Belarusian State University of Informatics and Radioelectronics Publ.; 2013. 243 p. (in Russ.)
9. Vorona V.A., Kostenko V.O. Ways and Means of Information Protection from Leaks Through Technical Channels. Computational Nanotechnology. 2016;3:208–223. (in Russ.) EDN:WKNGZD
10. Khorev A.A. Technical Information Security. Moscow: Analitika Publ.; 2008. 436 p. (in Russ.)
11. Buzov G.A., Kalinin S.V., Kondratyev A.V. Protection against Information Leakage via Technical Channels. Moscow: Goryachaya Liniya – Telecom Publ.; 2005. 415 p. (in Russ.) EDN:QMOJMV
12. GOST R 50840-95. Speech transmission over varies communication channels. Techniques for measurements of speech quality, intelligibility and voice identification. Moscow: Gosstandart Rossii Publ.; 1997. 230 p. (in Russ.)
13. Dvoryankin S.V., Makarov Yu.K., Khorev A.A. Justification of the Criteria for the Effectiveness of Speech Information Protection from Leakage via Technical Channels. Zaŝita informacii. Inside. 2007;2(14):18–25. (in Russ.) EDN:TRKKQR
14. Zheleznyak V.K., Makarov Yu.K., Khorev A.A. Some Methodological Approaches to Assessing the Efficiency of Speech Information Protection. Specialnaya tekhnika. 2000;4:39–45. (in Russ.) EDN:YPUIBV
15. Khorev A.A. Methods and Means for Protection of Compartmentalized Security Zones Against Voice (Acoustic) Information Leakage Through Service Channels: Speech Protection Systems. Specialnaya tekhnika. 2013;4:31–63. (in Russ.) EDN:RINYMP
16. Makarov Yu.K., Khorev A.A. Methods of Speech Information Protection and Evaluation of Their Effectiveness. Zaŝita informacii. Confidential. 2001;4:22–33. (in Russ.)
17. Dvoryankin S.V., Dvoryankin N.S., Ustinov R.A. Improvement of Image Analysis/Synthesis Technologies of Acoustic (Speech) Information for the Control, Safety and Communication Systems. IT Security (Russia). 2019;26(1):64–76. (in Russ.) EDN:VWAQNW
18. Alekseev V.V., Gridnev V.A., Moiseeva M.V., Ryzhkov A.P., Yakovlev A.V. Theoretical Foundations for the Construction and Application of a Research Complex for Monitoring the Security Characteristics of Confidential Information. Tambov: Tambov State Technical University Publ.; 2022. 100 p. (in Russ.)
19. Volchikhina M.V. Assessment of the Level of Verbal Intelligibility at the Border of the Controlled Zone of the Office Premises by the Articulation Method. Vestnik of Voronezh Institute of the Ministry of the Interior of Russia. 2022;2:105–112. (in Russ.) EDN:POMJEB
Review
For citations:
Volchikhina M.V. An Algorithm for Forming an Adaptive Speech-Like Interference to Protect Confidential Speech Information in Office Spaces. Proceedings of Telecommunication Universities. 2025;11(5):21-27. (In Russ.) https://doi.org/10.31854/1813-324X-2025-11-5-21-27. EDN: IRBHCD


























