ANALYSIS OF ACOUSTIC INFORMATION PROTECTION METHODS IN CRITICAL APPLICATIONS

Authors

DOI:

https://doi.org/10.30837/ITSSI.2023.23.096

Keywords:

acoustic information; masking of acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; speech modification; speech message compression; computer systems

Abstract

Subject of the study: the process of acoustic information protection in computer systems of critical applications to ensure the required level of system security. The aim of the article is to analyze the methods of acoustic information protection in computer systems of critical application by means of masking to ensure the impossibility of unauthorized access to the system. The article solves the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to study the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the presented methods has led to the following conclusions. One of the perspective directions of acoustic information protection in communication channels and dedicated premises can be considered the creation and development of computerized speech masking systems along with or in conjunction with traditional technologies of semantic protection of acoustic information, namely, speech signal classification based on cryptographic algorithms. The main requirements for today's systems that provide protection of acoustic information in critical computer systems are speed and efficiency of various speech signal processing procedures using standard inexpensive technical means of computer telephony, namely: a personal computer, sound card, telephone line interface device and/or modem. These requirements can be met by applying digital methods of dynamic spectral analysis, i.e. synthesis of speech and audio signals. The choice of specific methods and means of speech masking as one of the types of semantic protection of acoustic information will depend on the practical requirements for the speech protection system and the technical characteristics of the acoustic information transmission channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural and correlation properties to ensure higher security indicators of acoustic channels in computer systems of critical applications.

Author Biographies

Mykhailo Mozhaiev, Scientific Research Centre for Forensic on Intellectual Property of the Ministry of Justice of Ukraine

Deputy Director

Oleksandr Mozhaiev, Kharkiv National University of Internal Affairs

Doctor of technical science, professor

Yurii Gnusov, Kharkiv National University of Internal Affairs

Candidate of technical science, associate professor

Volodymyr Strukov, Kharkiv National University of Internal Affairs

Candidate of technical science, associate professor

Petro Klimushin, Kharkiv National University of Internal Affairs

Candidate of technical science, associate professor

Dmytro Yevstrat, Simon Kuznets Kharkiv National Economic University

Candidate of technical science, associate professor

References

References

Kosenko, V. (2017), "Principles and structure of the methodology of risk-adaptive management of parameters of information and telecommunication networks of critical application systems", Innovative technologies and scientific solutions for industries, No 1 (1), Р. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.046

Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10.20998/2522-9052.2017.2.01

Karen Bailey, Kevin Curran. Steganography. – BookSurge Publishing, 2005 р. – 118 р.

Johnson N., Duric Z., Jajodia S. Information Hiding: Steganography and Watermarking – Attacks and Countermeasures, New York – NY.: Kluwer Academic Pub, 2000 p. URL: https://link.springer.com/chapter/10.1007/0-387-25096-4_6

Elad Barkan. Instant Ciphertext-Only Cryptanalysis of GSM. Encrypted Communication. / Elad Barkan, Eli Biham, Nathan Keller. // Journal of Cryptology, Volume 21, Number 3, July 2008, Р. 392–429 (38).

J. Golic. Cryptanalysis of Alleged A5 Stream Cipher. – Proceedings of EUROCRYPT'97, LNCS 1233, Р. 239–255, Springer-Verlag 1997.

Alex Biryukov. Real Time Cryptanalysis of A5/1 on a PC. / Alex Biryukov, Adi Shamir, David Wagner – Springer Berlin / Heidelberg, 2001. − ISBN: 978-3-540-41728-6. URL: https://cryptome.org/a51-bsw.htm

Mozhaiev O. Development of a method for determining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples / Mozhaiev O., Semenov, S., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Y., Yevstrat, D., Chyrva, Y., Kuchuk, H.// Eastern-European Journal of Enterprise Technologies, 6 (4 (120)), P. 40–49. DOI: https://doi.org/10.15587/1729-4061.2022.269128

Mozhaiev O. Crypto-resistant methods and random number generators in internet of things (iot) devices/ Mozhaiev O., Klimushyn P., Solianyk T., Gnusov Y., Manzhai O., Svitlychnyi V. // Innovative technologies and scientific solutions for industries, 2022 № 2 (20), P. 22–34. DOI: https://doi.org/10.30837/ITSSI.2022.20.022

Mozhaiev O. Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things/ Mozhaiev O, Klimushyn P., Solianyk T., Kolisnyk T. // Advanced Information Systems, 2021. Vol. 5, No 3. P. 103–111. DOI: https://doi.org/10.20998/2522-9052.2021.3.14

Klimushyn, P., (2021), "Hardware support procedures for asymmetric authentication of the internet of things",/ Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V., Kolisnyk, T., Yanov V// Innovative Technologies and Scientific Solutions for Industries, No. 4 (18), P. 31-39. DOI: https://doi.org/10.30837/ITSSI.2021.18.031

J. Friedrich, G. Miroslav, R. Du. Reliable Detection of LSB Steganography in Color and Grayscale Images. Binghampton, New York: SUNY, 2001. URL: http://www.ws.binghamton.edu/fridrich/research/acm_2001_03.pdf

J. Fridrich, R. Du, and L. Meng, "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City. DOI: https://doi.org/10.1109/ICME.2000.871000

W. Brock. W. Dechert and J. Scheinkman. "A test for independence based on the correlation dimension", Working Paper, University of Wisconsin, 1987. DOI: https://doi.org/10.1177/1536867X211025796

Wu H. C., Wu N. I., Tsai C. S., Hwang M. S. Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods // IEEE Transactions on Image and Signal Processing, 2005. – № 5. – P. 611–615. DOI: https://doi.org/10.1049/IP-VIS:20059022

Downloads

Published

2023-04-21

How to Cite

Mozhaiev, M., Mozhaiev, O., Gnusov, Y., Strukov, V., Klimushin, P., & Yevstrat, D. (2023). ANALYSIS OF ACOUSTIC INFORMATION PROTECTION METHODS IN CRITICAL APPLICATIONS. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (1 (23), 96–107. https://doi.org/10.30837/ITSSI.2023.23.096