Speaker recognition from encrypted VoIP communications
نویسندگان
چکیده
Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. This makes the identity tracing of perpetrators during forensic investigations a challenging task since conventional speaker recognition techniques are limited to unencrypted speech communications. In this paper, we propose techniques for speaker identification and verification from encrypted VoIP conversations. Our experimental results show that the proposed techniques can correctly identify the actual speaker for 70–75% of the time among a group of 10 potential suspects. We also achieve more than 10 fold improvement over random guessing in identifying a perpetrator in a group of 20 potential suspects. An equal error rate of 17% in case of speaker verification on the CSLU speaker recognition corpus is achieved. a 2009 Elsevier Ltd. All rights reserved.
منابع مشابه
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additional features of voice communication protocols might still allow eavesdroppers to discover information on the transmitted content and the speaker. We develop a novel approach for unveiling the identity of speakers who...
متن کاملNovel Detection Algorithm of Speech Activity and the impact of Speech Codecs on Remote Speaker Recognition System
In this paper, we studied the effects of voice codecs on remote speaker recognition system, considering three types of speech codec: PCM, DPCM and ADPCM conforming to International Telecommunications Union Telecoms (ITU-T) recommendation used in telephony and VoIP (Voice over Internet Protocol). To improve the performance of speaker recognition in a noisy environment, we propose a new speech ac...
متن کاملMulti-class Traffic Morphing for Encrypted VoIP Communication
In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics of the underlying audio— for example, the language or individual phrases spoken on the encrypted VoIP call. Traffic morphing has been proposed as a general solution for defending against such attacks. In traffic morphing, the sender pads ciphertext to obfuscate the distr...
متن کاملExtraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces a new set of challenges fo...
متن کاملReviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication
This paper focuses on authentication issues and user ID detection depending on the voice signature of the incoming Voice over IP (VoIP) calls. Firstly, a complete speaker recognition system based on LPC feature extraction and decision based on Artificial Neural Network was described and built using MATLAB package. Then, MATLAB package was used to develop a simplified prototype version of the mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Digital Investigation
دوره 7 شماره
صفحات -
تاریخ انتشار 2010