ANALYSIS OF ACOUSTIC INFORMATION PROTECTION METHODS IN CRITICAL APPLICATIONS
DOI:
https://doi.org/10.30837/ITSSI.2023.23.096Keywords:
acoustic information; masking of acoustic information; technical protection; cryptographic protection; steganographic (steganophonic) protection; speech modification; speech message compression; computer systemsAbstract
Subject of the study: the process of acoustic information protection in computer systems of critical applications to ensure the required level of system security. The aim of the article is to analyze the methods of acoustic information protection in computer systems of critical application by means of masking to ensure the impossibility of unauthorized access to the system. The article solves the following tasks: to analyze the software and hardware masking of speech; to study the masking of speech messages in order to introduce unrecognizability; to study the features of speech message compression; to investigate methods of covert transmission of acoustic information. The results of the work, which were obtained using mathematical methods of information transformation in computer systems, are potentially possible methods of masking speech messages to ensure the impossibility of unauthorized access to the system. The analysis of the functioning of the presented methods has led to the following conclusions. One of the perspective directions of acoustic information protection in communication channels and dedicated premises can be considered the creation and development of computerized speech masking systems along with or in conjunction with traditional technologies of semantic protection of acoustic information, namely, speech signal classification based on cryptographic algorithms. The main requirements for today's systems that provide protection of acoustic information in critical computer systems are speed and efficiency of various speech signal processing procedures using standard inexpensive technical means of computer telephony, namely: a personal computer, sound card, telephone line interface device and/or modem. These requirements can be met by applying digital methods of dynamic spectral analysis, i.e. synthesis of speech and audio signals. The choice of specific methods and means of speech masking as one of the types of semantic protection of acoustic information will depend on the practical requirements for the speech protection system and the technical characteristics of the acoustic information transmission channel. Further research is desirable to analyze the possible use of methods for synthesizing large ensembles of quasi-orthogonal discrete signals with improved ensemble, structural and correlation properties to ensure higher security indicators of acoustic channels in computer systems of critical applications.
References
References
Kosenko, V. (2017), "Principles and structure of the methodology of risk-adaptive management of parameters of information and telecommunication networks of critical application systems", Innovative technologies and scientific solutions for industries, No 1 (1), Р. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.046
Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10.20998/2522-9052.2017.2.01
Karen Bailey, Kevin Curran. Steganography. – BookSurge Publishing, 2005 р. – 118 р.
Johnson N., Duric Z., Jajodia S. Information Hiding: Steganography and Watermarking – Attacks and Countermeasures, New York – NY.: Kluwer Academic Pub, 2000 p. URL: https://link.springer.com/chapter/10.1007/0-387-25096-4_6
Elad Barkan. Instant Ciphertext-Only Cryptanalysis of GSM. Encrypted Communication. / Elad Barkan, Eli Biham, Nathan Keller. // Journal of Cryptology, Volume 21, Number 3, July 2008, Р. 392–429 (38).
J. Golic. Cryptanalysis of Alleged A5 Stream Cipher. – Proceedings of EUROCRYPT'97, LNCS 1233, Р. 239–255, Springer-Verlag 1997.
Alex Biryukov. Real Time Cryptanalysis of A5/1 on a PC. / Alex Biryukov, Adi Shamir, David Wagner – Springer Berlin / Heidelberg, 2001. − ISBN: 978-3-540-41728-6. URL: https://cryptome.org/a51-bsw.htm
Mozhaiev O. Development of a method for determining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples / Mozhaiev O., Semenov, S., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Y., Yevstrat, D., Chyrva, Y., Kuchuk, H.// Eastern-European Journal of Enterprise Technologies, 6 (4 (120)), P. 40–49. DOI: https://doi.org/10.15587/1729-4061.2022.269128
Mozhaiev O. Crypto-resistant methods and random number generators in internet of things (iot) devices/ Mozhaiev O., Klimushyn P., Solianyk T., Gnusov Y., Manzhai O., Svitlychnyi V. // Innovative technologies and scientific solutions for industries, 2022 № 2 (20), P. 22–34. DOI: https://doi.org/10.30837/ITSSI.2022.20.022
Mozhaiev O. Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things/ Mozhaiev O, Klimushyn P., Solianyk T., Kolisnyk T. // Advanced Information Systems, 2021. Vol. 5, No 3. P. 103–111. DOI: https://doi.org/10.20998/2522-9052.2021.3.14
Klimushyn, P., (2021), "Hardware support procedures for asymmetric authentication of the internet of things",/ Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V., Kolisnyk, T., Yanov V// Innovative Technologies and Scientific Solutions for Industries, No. 4 (18), P. 31-39. DOI: https://doi.org/10.30837/ITSSI.2021.18.031
J. Friedrich, G. Miroslav, R. Du. Reliable Detection of LSB Steganography in Color and Grayscale Images. Binghampton, New York: SUNY, 2001. URL: http://www.ws.binghamton.edu/fridrich/research/acm_2001_03.pdf
J. Fridrich, R. Du, and L. Meng, "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City. DOI: https://doi.org/10.1109/ICME.2000.871000
W. Brock. W. Dechert and J. Scheinkman. "A test for independence based on the correlation dimension", Working Paper, University of Wisconsin, 1987. DOI: https://doi.org/10.1177/1536867X211025796
Wu H. C., Wu N. I., Tsai C. S., Hwang M. S. Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods // IEEE Transactions on Image and Signal Processing, 2005. – № 5. – P. 611–615. DOI: https://doi.org/10.1049/IP-VIS:20059022
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.