Speaker Recognition in Encrypted Voice Streams

被引:0
|
作者
Backes, Michael [1 ,2 ]
Doychev, Goran [1 ]
Duermuth, Markus [1 ]
Koepf, Boris [2 ]
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] Max Planck Inst Soft Syst MPI SWS, D-67663 Kaiserslautern, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additional features of voice communication protocols might still allow eavesdroppers to discover information on the transmitted content and the speaker. We develop a novel approach for unveiling the identity of speakers who participate in encrypted voice communication, solely by eavesdropping on the encrypted traffic. Our approach exploits the concept of voice activity detection (VAD), a widely used technique for reducing the bandwidth consumption of voice traffic. We show that the reduction of traffic caused by VAD techniques creates patterns in the encrypted traffic, which in turn reveal the patterns of pauses in the underlying voice stream. We show that these patterns are speaker-characteristic, and that they are sufficient to undermine the anonymity of the speaker in encrypted voice communication. In an empirical setup with 20 speakers our analysis is able to correctly identify an unknown speaker in about 48% of all cases. Our work extends and generalizes existing work that exploits variable bit-rate encoding for identifying the conversation language and content of encrypted voice streams.
引用
收藏
页码:508 / +
页数:4
相关论文
共 50 条
  • [1] Voice - recognition of speaker sex
    Kramer, Elena
    [J]. SPRACHE-STIMME-GEHOR, 2014, 38 (01): : 8 - 8
  • [2] Speaker recognition from encrypted VoIP communications
    Khan, L. A.
    Baig, M. S.
    Youssef, Amr M.
    [J]. DIGITAL INVESTIGATION, 2010, 7 (1-2) : 65 - 73
  • [3] Voice Encrypted Recognition Authentication - VERA
    Szlosarczyk, Sebastian
    Schulte, Andrea
    [J]. 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2015), 2015, : 270 - 274
  • [4] Voice Disguise in Automatic Speaker Recognition
    Farrus, Mireia
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [5] Voice disguise and automatic speaker recognition
    Zhang, Cuiling
    Tan, Tiejun
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2008, 175 (2-3) : 118 - 122
  • [6] Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis
    Saini, Shalini
    Saxena, Nitesh
    [J]. 2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [7] Voice articulator for Thai speaker recognition system
    Limpanakorn, S
    Tanprasert, C
    [J]. ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 2396 - 2400
  • [8] Improving speaker recognition by biometric voice deconstruction
    Miguel Mazaira-Fernandez, Luis
    Alvarez-Marquina, Agustin
    Gomez-Vilda, Pedro
    [J]. FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY, 2015, 3
  • [9] Noise Robust Voice Detector for Speaker Recognition
    Hernandez, Gabriel
    Calvo, Jose R.
    Fernandez, Rafael
    Rodes, Ivis
    Martinez, Rafael
    [J]. 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 2605 - 2608
  • [10] MLLR Transforms Based Speaker Recognition in Broadcast Streams
    Silovsky, Jan
    Cerva, Petr
    Zdansky, Jindrich
    [J]. CROSS-MODAL ANALYSIS OF SPEECH, GESTURES, GAZE AND FACIAL EXPRESSIONS, 2009, 5641 : 423 - 431